17 lines
916 B
Text
17 lines
916 B
Text
|
These are some implementations of tiger made without looking at the original
|
||
|
reference code to ensure the resulting code can be published under a free
|
||
|
license. The paper was looked though to know how did tiger work.
|
||
|
|
||
|
Currently we provide native implementations of tiger in C and PHP. Yes, this
|
||
|
means for example that the PHP implementation is written only using PHP.
|
||
|
|
||
|
In the C implementation various optimizations to make the calculations faster
|
||
|
are included, amongst other things there is a SSE2 implementation of the key
|
||
|
scheduling (there is no implementation of the tiger round code since the
|
||
|
s-table look ups trashed performance).
|
||
|
|
||
|
Free tiger also provides an implementation of the tigerp1 and tigerp2 functions
|
||
|
these functions are intended to provide a safer method of password storage for
|
||
|
authentication methods similar to the one used by DC as defined in
|
||
|
http://www.dcbase.org/forums/viewtopic.php?f=18&t=770
|