Chevron Left
Retour à Cryptographic Hash and Integrity Protection

Avis et commentaires pour d'étudiants pour Cryptographic Hash and Integrity Protection par University of Colorado System

69 évaluations

À propos du cours

Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication. This course is a part of the Applied Cryptography specialization....

Meilleurs avis


11 juin 2020

course is excellent and I hope it would be better if there is an advanced level specialisation continuation for this specialisation


1 juin 2021

Great theory. Professor is also super clear in his explanations.

Recommended :)

Filtrer par :

1 - 7 sur 7 Avis pour Cryptographic Hash and Integrity Protection

par SAI S K

12 juin 2020

par Sebastian C

2 juin 2021

par Adri J J J

25 mai 2020

par Mohamed T

19 juin 2018

par Lincoln A

29 nov. 2021


18 janv. 2018

par Abhinav P

15 déc. 2019