Cryptanalysis of the Tiger Hash Function
From MaRDI portal
Publication:3498398
DOI10.1007/978-3-540-76900-2_33zbMath1153.94410OpenAlexW2154759077WikidataQ56289332 ScholiaQ56289332MaRDI QIDQ3498398
Vincent Rijmen, Florian Mendel
Publication date: 15 May 2008
Published in: Advances in Cryptology – ASIACRYPT 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-76900-2_33
collisionhash functionsdifferential attackCryptanalysisnear-collisionpseudo-collisionpseudo-near-collision
Related Items (5)
The Hash Function Family LAKE ⋮ Cryptanalysis of the GOST Hash Function ⋮ Two Passes of Tiger Are Not One-Way ⋮ Preimages for Reduced-Round Tiger ⋮ The rebound attack and subspace distinguishers: application to Whirlpool
Cites Work
This page was built for publication: Cryptanalysis of the Tiger Hash Function