Cryptographic Hash Functions & Ensuring Communication Integrity π
Dive into Lecture 2e of 'Security Protocols' to understand how cryptographic hash functions safeguard communication integrity between Alice and Bob. Perfect for students and security enthusiasts!

Antonis M
322 views β’ Oct 12, 2020

About this video
Lectures for the course "Security Protocols: Helping Alice and Bob to Share Secrets" at Tampere University by Antonis Michalas.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
322
Likes
1
Duration
15:26
Published
Oct 12, 2020
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now