Free Tiger Code
Free fast implementation of tiger and the TTH algorithms
Brought to you by:
franxisco1988
File | Date | Author | Commit |
---|---|---|---|
C | 2013-10-05 |
![]() |
[569322] Fix big endian result conversors |
C# | 2013-06-04 |
![]() |
[77849a] Added support for C# via a wrapper writen by Fr... |
erlang | 2012-09-29 |
![]() |
[e7f515] Adding erlang implementation of Tiger by gelraen |
php | 2012-08-11 |
![]() |
[26242e] Version 5 |
CHANGELOG | 2013-06-04 |
![]() |
[77849a] Added support for C# via a wrapper writen by Fr... |
DISCLAIMER | 2012-08-11 |
![]() |
[5f8a52] Version 2 |
LICENSE | 2012-08-11 |
![]() |
[5f8a52] Version 2 |
README | 2012-08-11 |
![]() |
[26242e] Version 5 |
THANKS | 2013-06-04 |
![]() |
[fb81f1] Updated the thanks file |
TODO | 2012-08-11 |
![]() |
[26242e] Version 5 |
These are some implementations of tiger made without looking at the original reference code to ensure the resulting code can be published under a free license. The paper was looked though to know how did tiger work. Currently we provide native implementations of tiger in C and PHP. Yes, this means for example that the PHP implementation is written only using PHP. In the C implementation various optimizations to make the calculations faster are included, amongst other things there is a SSE2 implementation of the key scheduling (there is no implementation of the tiger round code since the s-table look ups trashed performance). Free tiger also provides an implementation of the tigerp1 and tigerp2 functions these functions are intended to provide a safer method of password storage for authentication methods similar to the one used by DC as defined in http://www.dcbase.org/forums/viewtopic.php?f=18&t=770