Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Tiger (cryptography)

Index Tiger (cryptography)

In cryptography, Tiger is a cryptographic hash function designed by Ross Anderson and Eli Biham in 1995 for efficiency on 64-bit platforms. [1]

39 relations: Advanced Direct Connect, ASCII, BitTorrent, Cambridge, Comparison of cryptographic hash functions, CPAN, Cryptographic hash function, Cryptography, Direct Connect (protocol), Eli Biham, GNU, GNU coding standards, Gnutella, Graz, Hash function security summary, Hexadecimal, Indocrypt, IPsec, John Kelsey (cryptanalyst), Kibibyte, Kolkata, List of hash functions, MD4, MD5, Merkle tree, Merkle–Damgård construction, Microcontroller, NESSIE, Object identifier, One-way compression function, Pretty Good Privacy, RIPEMD, Ross J. Anderson, S-box, Secure Hash Algorithms, Serpent (cipher), SHA-2, Stefan Lucks, 64-bit computing.

Advanced Direct Connect

Advanced Direct Connect (ADC) is a peer-to-peer file sharing and chat protocol, using the same network topology, concepts and terminology as the Direct Connect (DC) protocol.

New!!: Tiger (cryptography) and Advanced Direct Connect · See more »

ASCII

ASCII, abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication.

New!!: Tiger (cryptography) and ASCII · See more »

BitTorrent

BitTorrent (abbreviated to BT) is a communication protocol for peer-to-peer file sharing (P2P) which is used to distribute data and electronic files over the Internet.

New!!: Tiger (cryptography) and BitTorrent · See more »

Cambridge

Cambridge is a university city and the county town of Cambridgeshire, England, on the River Cam approximately north of London.

New!!: Tiger (cryptography) and Cambridge · See more »

Comparison of cryptographic hash functions

The following tables compare general and technical information for a number of cryptographic hash functions.

New!!: Tiger (cryptography) and Comparison of cryptographic hash functions · See more »

CPAN

The Comprehensive Perl Archive Network (CPAN) is a repository of over 250,000 software modules and accompanying documentation for 39,000 distributions, written in the Perl programming language by over 12,000 contributors.

New!!: Tiger (cryptography) and CPAN · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: Tiger (cryptography) and Cryptographic hash function · See more »

Cryptography

Cryptography or cryptology (from κρυπτός|translit.

New!!: Tiger (cryptography) and Cryptography · See more »

Direct Connect (protocol)

Direct Connect (DC) is a peer-to-peer file sharing protocol.

New!!: Tiger (cryptography) and Direct Connect (protocol) · See more »

Eli Biham

Eli Biham (אלי ביהם) is an Israeli cryptographer and cryptanalyst, currently a professor at the Technion Israeli Institute of Technology Computer Science department.

New!!: Tiger (cryptography) and Eli Biham · See more »

GNU

GNU is an operating system and an extensive collection of computer software.

New!!: Tiger (cryptography) and GNU · See more »

GNU coding standards

The GNU coding standards are a set of rules and guidelines for writing programs that work consistently within the GNU system.

New!!: Tiger (cryptography) and GNU coding standards · See more »

Gnutella

Gnutella (possibly by analogy with the GNU Project) is a large peer-to-peer network.

New!!: Tiger (cryptography) and Gnutella · See more »

Graz

Graz is the capital of Styria and the second-largest city in Austria after Vienna.

New!!: Tiger (cryptography) and Graz · See more »

Hash function security summary

This article summarizes publicly known attacks against cryptographic hash functions.

New!!: Tiger (cryptography) and Hash function security summary · See more »

Hexadecimal

In mathematics and computing, hexadecimal (also base, or hex) is a positional numeral system with a radix, or base, of 16.

New!!: Tiger (cryptography) and Hexadecimal · See more »

Indocrypt

Indocrypt (also INDOCRYPT) is an annual international cryptography conference held each December since 2000 in India.

New!!: Tiger (cryptography) and Indocrypt · See more »

IPsec

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network.

New!!: Tiger (cryptography) and IPsec · See more »

John Kelsey (cryptanalyst)

John Kelsey is a cryptographer who works at NIST.

New!!: Tiger (cryptography) and John Kelsey (cryptanalyst) · See more »

Kibibyte

The kibibyte is a multiple of the unit byte for quantities of digital information.

New!!: Tiger (cryptography) and Kibibyte · See more »

Kolkata

Kolkata (also known as Calcutta, the official name until 2001) is the capital of the Indian state of West Bengal.

New!!: Tiger (cryptography) and Kolkata · See more »

List of hash functions

This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions.

New!!: Tiger (cryptography) and List of hash functions · See more »

MD4

The MD4 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1990.

New!!: Tiger (cryptography) and MD4 · See more »

MD5

The MD5 algorithm is a widely used hash function producing a 128-bit hash value.

New!!: Tiger (cryptography) and MD5 · See more »

Merkle tree

In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the hash of a data block and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes.

New!!: Tiger (cryptography) and Merkle tree · See more »

Merkle–Damgård construction

In cryptography, the Merkle–Damgård construction or Merkle–Damgård hash function is a method of building collision-resistant cryptographic hash functions from collision-resistant one-way compression functions.

New!!: Tiger (cryptography) and Merkle–Damgård construction · See more »

Microcontroller

A microcontroller (MCU for microcontroller unit, or UC for μ-controller) is a small computer on a single integrated circuit.

New!!: Tiger (cryptography) and Microcontroller · See more »

NESSIE

NESSIE (New European Schemes for Signatures, Integrity and Encryption) was a European research project funded from 2000–2003 to identify secure cryptographic primitives.

New!!: Tiger (cryptography) and NESSIE · See more »

Object identifier

In computing, object identifiers or OIDs are an identifier mechanism standardized by the International Telecommunications Union (ITU) and ISO/IEC for naming any object, concept, or "thing" with a globally unambiguous persistent name.

New!!: Tiger (cryptography) and Object identifier · See more »

One-way compression function

In cryptography, a one-way compression function is a function that transforms two fixed-length inputs into a fixed-length output.

New!!: Tiger (cryptography) and One-way compression function · See more »

Pretty Good Privacy

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication.

New!!: Tiger (cryptography) and Pretty Good Privacy · See more »

RIPEMD

RIPEMD (RACE Integrity Primitives Evaluation Message Digest) is a family of cryptographic hash functions developed in Leuven, Belgium, by Hans Dobbertin, Antoon Bosselaers and Bart Preneel at the COSIC research group at the Katholieke Universiteit Leuven, and first published in 1996.

New!!: Tiger (cryptography) and RIPEMD · See more »

Ross J. Anderson

Ross John Anderson, FRS, FREng (born 15 September 1956) is a researcher, writer, and industry consultant in security engineering.

New!!: Tiger (cryptography) and Ross J. Anderson · See more »

S-box

In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution.

New!!: Tiger (cryptography) and S-box · See more »

Secure Hash Algorithms

The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), including.

New!!: Tiger (cryptography) and Secure Hash Algorithms · See more »

Serpent (cipher)

Serpent is a symmetric key block cipher that was a finalist in the Advanced Encryption Standard (AES) contest, where it was ranked second to Rijndael.

New!!: Tiger (cryptography) and Serpent (cipher) · See more »

SHA-2

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).

New!!: Tiger (cryptography) and SHA-2 · See more »

Stefan Lucks

Stefan Lucks is a researcher in the fields of communications security and cryptography.

New!!: Tiger (cryptography) and Stefan Lucks · See more »

64-bit computing

In computer architecture, 64-bit computing is the use of processors that have datapath widths, integer size, and memory address widths of 64 bits (eight octets).

New!!: Tiger (cryptography) and 64-bit computing · See more »

Redirects here:

Tiger (hash), Tiger hash, Tiger hash function, Tiger-192.

References

[1] https://en.wikipedia.org/wiki/Tiger_(cryptography)

OutgoingIncoming
Hey! We are on Facebook now! »