Applied Cryptography: Hash Functions - Part 2

This video explores the input-output behavior of hash functions and outlines essential security requirements, focusing on concepts such as one-wayness and first and second pre-image resistance.

Applied Cryptography: Hash Functions - Part 2
Leandro Junes
7.8K views β€’ Mar 5, 2017
Applied Cryptography: Hash Functions - Part 2

About this video

This video describes the input-output behavior of hash functions, as well as the security requirements. In particular, one-wayness, first and second pre-image resistance are discussed.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

7.8K

Likes

120

Duration

17:59

Published

Mar 5, 2017

User Reviews

4.6
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.