
de.pfabulist.loracle.urls.tiger-crypto.txt Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of loracle-maven-plugin Show documentation
Show all versions of loracle-maven-plugin Show documentation
maven plugin to check the licenses of all dependencies and possible incompatibilities
Tiger Cryptography
This code comes from the reference implementation of the Tiger cryptographic hash function. The only modification made is to pull out the data types and the api into a header file (this file, tiger.h). The reference implementation is available at:
http://www.cs.technion.ac.il/~biham/Reports/Tiger/
From that page:
Tiger has no usage restrictions nor patents. It can be used freely, with the reference implementation, with other implementations or with a modification to the reference implementation (as long as it still implements Tiger). We only ask you to let us know about your implementation and to cite the origin of Tiger and of the reference implementation.
© 2015 - 2025 Weber Informatics LLC | Privacy Policy