Difference between revisions of "Tiger"
From The ECRYPT Hash Function Website
| Line 1: | Line 1: | ||
| − | + | == General == | |
| + | hmm | ||
| + | <!-- | ||
| + | * digest size: 160 bits | ||
| + | * max. message length: < 2<sup>64</sup> bits | ||
| + | * compression function: 512-bit message block, 160-bit chaining variable | ||
| + | * Specification: | ||
| + | --> | ||
| + | |||
| + | == Cryptanalysis == | ||
| + | |||
| + | |||
| + | === Best Known Results === | ||
| + | |||
| + | ---- | ||
| + | |||
| + | === Generic Attacks === | ||
| + | * [[GenericAttacksMerkleDamgaard| Generic Attacks on the Merkle-Damgaard Construction ]] | ||
| + | |||
| + | ---- | ||
| + | |||
| + | === Collision Attacks === | ||
| + | |||
| + | ---- | ||
| + | |||
| + | === Second Preimage Attacks === | ||
| + | |||
| + | ---- | ||
| + | |||
| + | === Preimage Attacks === | ||
| + | |||
| + | |||
| + | ---- | ||
| + | |||
| + | === Others === | ||
| + | |||
| + | |||
| + | == Performance Evaluation / Implementation (HW and SW) == | ||
Revision as of 15:10, 7 March 2008
Contents
1 General
hmm