Applied Cryptography: Hash Functions - Part 2
This video explores the input-output behavior of hash functions and outlines essential security requirements, focusing on concepts such as one-wayness and first and second pre-image resistance.

Leandro Junes
7.8K views β’ Mar 5, 2017

About this video
This video describes the input-output behavior of hash functions, as well as the security requirements. In particular, one-wayness, first and second pre-image resistance are discussed.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
7.8K
Likes
120
Duration
17:59
Published
Mar 5, 2017
User Reviews
4.6
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.