DelphiEncryptionCompendium
DelphiEncryptionCompendium copied to clipboard
Implement Tiger128 and 160 hash algorithms
This is the only really left thing of #2: implement the Tiger128 and Tiger160 hash algorithms.
While this can be done and will eventually done importance of this is considered to be low.