39 relations: Advanced Direct Connect, ASCII, BitTorrent, Cambridge, Comparison of cryptographic hash functions, CPAN, Cryptographic hash function, Cryptography, Direct Connect (protocol), Eli Biham, GNU, GNU coding standards, Gnutella, Graz, Hash function security summary, Hexadecimal, Indocrypt, IPsec, John Kelsey (cryptanalyst), Kibibyte, Kolkata, List of hash functions, MD4, MD5, Merkle tree, Merkle–Damgård construction, Microcontroller, NESSIE, Object identifier, One-way compression function, Pretty Good Privacy, RIPEMD, Ross J. Anderson, S-box, Secure Hash Algorithms, Serpent (cipher), SHA-2, Stefan Lucks, 64-bit computing.
Advanced Direct Connect
Advanced Direct Connect (ADC) is a peer-to-peer file sharing and chat protocol, using the same network topology, concepts and terminology as the Direct Connect (DC) protocol.
New!!: Tiger (cryptography) and Advanced Direct Connect · See more »
ASCII
ASCII, abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication.
New!!: Tiger (cryptography) and ASCII · See more »
BitTorrent
BitTorrent (abbreviated to BT) is a communication protocol for peer-to-peer file sharing (P2P) which is used to distribute data and electronic files over the Internet.
New!!: Tiger (cryptography) and BitTorrent · See more »
Cambridge
Cambridge is a university city and the county town of Cambridgeshire, England, on the River Cam approximately north of London.
New!!: Tiger (cryptography) and Cambridge · See more »
Comparison of cryptographic hash functions
The following tables compare general and technical information for a number of cryptographic hash functions.
New!!: Tiger (cryptography) and Comparison of cryptographic hash functions · See more »
CPAN
The Comprehensive Perl Archive Network (CPAN) is a repository of over 250,000 software modules and accompanying documentation for 39,000 distributions, written in the Perl programming language by over 12,000 contributors.
New!!: Tiger (cryptography) and CPAN · See more »
Cryptographic hash function
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.
New!!: Tiger (cryptography) and Cryptographic hash function · See more »
Cryptography
Cryptography or cryptology (from κρυπτός|translit.
New!!: Tiger (cryptography) and Cryptography · See more »
Direct Connect (protocol)
Direct Connect (DC) is a peer-to-peer file sharing protocol.
New!!: Tiger (cryptography) and Direct Connect (protocol) · See more »
Eli Biham
Eli Biham (אלי ביהם) is an Israeli cryptographer and cryptanalyst, currently a professor at the Technion Israeli Institute of Technology Computer Science department.
New!!: Tiger (cryptography) and Eli Biham · See more »
GNU
GNU is an operating system and an extensive collection of computer software.
New!!: Tiger (cryptography) and GNU · See more »
GNU coding standards
The GNU coding standards are a set of rules and guidelines for writing programs that work consistently within the GNU system.
New!!: Tiger (cryptography) and GNU coding standards · See more »
Gnutella
Gnutella (possibly by analogy with the GNU Project) is a large peer-to-peer network.
New!!: Tiger (cryptography) and Gnutella · See more »
Graz
Graz is the capital of Styria and the second-largest city in Austria after Vienna.
New!!: Tiger (cryptography) and Graz · See more »
Hash function security summary
This article summarizes publicly known attacks against cryptographic hash functions.
New!!: Tiger (cryptography) and Hash function security summary · See more »
Hexadecimal
In mathematics and computing, hexadecimal (also base, or hex) is a positional numeral system with a radix, or base, of 16.
New!!: Tiger (cryptography) and Hexadecimal · See more »
Indocrypt
Indocrypt (also INDOCRYPT) is an annual international cryptography conference held each December since 2000 in India.
New!!: Tiger (cryptography) and Indocrypt · See more »
IPsec
In computing, Internet Protocol Security (IPsec) is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network.
New!!: Tiger (cryptography) and IPsec · See more »
John Kelsey (cryptanalyst)
John Kelsey is a cryptographer who works at NIST.
New!!: Tiger (cryptography) and John Kelsey (cryptanalyst) · See more »
Kibibyte
The kibibyte is a multiple of the unit byte for quantities of digital information.
New!!: Tiger (cryptography) and Kibibyte · See more »
Kolkata
Kolkata (also known as Calcutta, the official name until 2001) is the capital of the Indian state of West Bengal.
New!!: Tiger (cryptography) and Kolkata · See more »
List of hash functions
This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions.
New!!: Tiger (cryptography) and List of hash functions · See more »
MD4
The MD4 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1990.
New!!: Tiger (cryptography) and MD4 · See more »
MD5
The MD5 algorithm is a widely used hash function producing a 128-bit hash value.
New!!: Tiger (cryptography) and MD5 · See more »
Merkle tree
In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the hash of a data block and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes.
New!!: Tiger (cryptography) and Merkle tree · See more »
Merkle–Damgård construction
In cryptography, the Merkle–Damgård construction or Merkle–Damgård hash function is a method of building collision-resistant cryptographic hash functions from collision-resistant one-way compression functions.
New!!: Tiger (cryptography) and Merkle–Damgård construction · See more »
Microcontroller
A microcontroller (MCU for microcontroller unit, or UC for μ-controller) is a small computer on a single integrated circuit.
New!!: Tiger (cryptography) and Microcontroller · See more »
NESSIE
NESSIE (New European Schemes for Signatures, Integrity and Encryption) was a European research project funded from 2000–2003 to identify secure cryptographic primitives.
New!!: Tiger (cryptography) and NESSIE · See more »
Object identifier
In computing, object identifiers or OIDs are an identifier mechanism standardized by the International Telecommunications Union (ITU) and ISO/IEC for naming any object, concept, or "thing" with a globally unambiguous persistent name.
New!!: Tiger (cryptography) and Object identifier · See more »
One-way compression function
In cryptography, a one-way compression function is a function that transforms two fixed-length inputs into a fixed-length output.
New!!: Tiger (cryptography) and One-way compression function · See more »
Pretty Good Privacy
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication.
New!!: Tiger (cryptography) and Pretty Good Privacy · See more »
RIPEMD
RIPEMD (RACE Integrity Primitives Evaluation Message Digest) is a family of cryptographic hash functions developed in Leuven, Belgium, by Hans Dobbertin, Antoon Bosselaers and Bart Preneel at the COSIC research group at the Katholieke Universiteit Leuven, and first published in 1996.
New!!: Tiger (cryptography) and RIPEMD · See more »
Ross J. Anderson
Ross John Anderson, FRS, FREng (born 15 September 1956) is a researcher, writer, and industry consultant in security engineering.
New!!: Tiger (cryptography) and Ross J. Anderson · See more »
S-box
In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution.
New!!: Tiger (cryptography) and S-box · See more »
Secure Hash Algorithms
The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), including.
New!!: Tiger (cryptography) and Secure Hash Algorithms · See more »
Serpent (cipher)
Serpent is a symmetric key block cipher that was a finalist in the Advanced Encryption Standard (AES) contest, where it was ranked second to Rijndael.
New!!: Tiger (cryptography) and Serpent (cipher) · See more »
SHA-2
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).
New!!: Tiger (cryptography) and SHA-2 · See more »
Stefan Lucks
Stefan Lucks is a researcher in the fields of communications security and cryptography.
New!!: Tiger (cryptography) and Stefan Lucks · See more »
64-bit computing
In computer architecture, 64-bit computing is the use of processors that have datapath widths, integer size, and memory address widths of 64 bits (eight octets).
New!!: Tiger (cryptography) and 64-bit computing · See more »
Redirects here:
Tiger (hash), Tiger hash, Tiger hash function, Tiger-192.
References
[1] https://en.wikipedia.org/wiki/Tiger_(cryptography)