Tiger (hash function)
Top View
- Algorithms, Key Size and Parameters Report – 2014
- Fast Message Franking: from Invisible Salamanders to Encryptment
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
- Theoretical Survey on Secure Hash Functions and Issues
- A Comparative Study of Rivest Cipher Algorithms
- Cyclonecrypto | Embedded Cryptographic Toolkit for ARM
- Encryption Test Suite User Guide
- Intel® Converged Security and Management Engine (Intel® CSME)
- New Pseudo Near Collision Attack on Tiger
- Cryptographic Hash Functions
- CSE331 : Computer Security Fundamentals Part I : Crypto (3)
- Advanced Crypto
- Energy Consumption of Hash Functions
- Cryptographic Hash Functions
- Entrust Nshield Hsmi
- ENTRUST® Nshield ISSUANCE HARDWARE SECURITY MODULE
- ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)