Chevron Left
Voltar para Cryptographic Hash and Integrity Protection

Comentários e feedback de alunos de Cryptographic Hash and Integrity Protection da instituição Sistema de Universidades do ColoradoUniversidade do Colorado

4.5
estrelas
69 classificações

Sobre o curso

Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication. This course is a part of the Applied Cryptography specialization....

Melhores avaliações

SK

11 de jun de 2020

course is excellent and I hope it would be better if there is an advanced level specialisation continuation for this specialisation

SC

1 de jun de 2021

Great theory. Professor is also super clear in his explanations.

Recommended :)

Filtrar por:

1 — 7 de 7 Avaliações para o Cryptographic Hash and Integrity Protection

por SAI S K

12 de jun de 2020

por Sebastian C

2 de jun de 2021

por Adri J J J

25 de mai de 2020

por Mohamed T

19 de jun de 2018

por Lincoln A

29 de nov de 2021

por CHITTILLA V V

18 de jan de 2018

por Abhinav P

15 de dez de 2019