[cryptography series] episode 4 : "hash functions"
Techniques and research to secure messages belong to the field of cryptography. For a very long time, cryptography was the exclusive domain of the military a...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Pakistan under the topic 'bigg boss 19 full episode'.
About this video
Techniques and research to secure messages belong to the field of cryptography.
For a very long time, cryptography was the exclusive domain of the military and intelligence services.
Nowadays, cryptography is used by everyone.
In this episode, we look at one-way hash functions. We'll study existing standards (SHA series), and we'll get into the details of sponge functions. We'll also talk about keyed hashing (MAC and PRF).
+++++ GOING FURTHER +++++
- Book "Applied cryptography " [Bruce SCHNEIER]
- Book "Serious cryptography " [Philippe AUMASSON]
+++++ ORIGINAL SOUNDTRACK +++++
Original soundtrack by Fragile Architecture: https://fragilearchitecture.bandcamp.com/album/clearsec-original-soundtrack
+++++ SOURCES +++++
https://www.clearsec.net/s04e04.html
+++++ SUBSCRIBING +++++
Subscribe here: https://www.youtube.com/channel/UCup911j5LsN-Y4FbOwnu8QA?sub_confirmation=1
+++++ WEBSITE +++++
https://www.clearsec.net
Video Information
Views
168
Total views since publication
Likes
1
User likes and reactions
Duration
24:52
Video length
Published
Apr 28, 2019
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#clearsec #IT security #infosec #cybersecurity #cyberpunk #cryptography #cryptanalysis #cryptology #one-way hash function #hash value #hash #digest #preimage #collision #birthday attack #iterative hashing #Merkle Damgard #permutation-based hash function #sponge function #Keccak #MD5 #SHA #SHA1 #SHA-1 #SHA2 #SHA-2 #SHA256 #SHA3 #SHA-3 #SHAKE128 #SHAKE256 #XOF #keyed hashing #MAC #HMAC #CMAC #PRF #Joan Daemen #Guido Bertoni #Michael Peeters #Gilles Van Assche
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.