This is the only really left thing of #2: implement the Tiger128 and Tiger160 hash algorithms. While this can be done and will eventually done importance of this is considered to be low.