1. Anderson RJ, Biham E (1996) Tiger: a fast new hash function. In: Gollmann D (ed) FSE. Lecture notes in computer science, vol 1039. Springer, Heidelberg, pp 89–97
2. Isobe T, Shibutani K (2009) Preimage attacks on reduced tiger andsha-2. In: Dunkelman O (ed) Fast software encryption. Lecture notes in computer science, vol 5665. Springer, Heidelberg, pp 139–155
3. Mendel F (2009) Two passes of tiger are not one-way. In: Preneel B (ed) AFRICACRYPT. Lecture notes in computer science, vol 5580. Springer, Heidelberg, pp 29–40
4. Mendel F, Rijmen V (2007) Cryptanalysis of the tiger hash function. In: Kurosawa K (ed) ASIACRYPT. Lecture notes in computer science, vol 4833. Springer, Heidelberg, pp 536–550
5. Mendel F, Preneel B, Rijmen V, Yoshida H, Watanabe D (2006) Update on tiger. In: Barua R, Lange T (eds) INDOCRYPT. Lecture notes in computer science, vol 4329. Springer, Heidelberg, pp 63–79