Chevron Left
Voltar para Cryptographic Hash and Integrity Protection

Comentários e feedback de alunos de Cryptographic Hash and Integrity Protection da instituição Sistema de Universidades do ColoradoUniversidade do Colorado

4.5
estrelas
43 classificações
5 avaliações

Sobre o curso

Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication. This course is a part of the Applied Cryptography specialization....

Melhores avaliações

SK

Jun 12, 2020

course is excellent and I hope it would be better if there is an advanced level specialisation continuation for this specialisation

AJ

May 26, 2020

One of the best courses on hashing in cryptography...

Filtrar por:

1 — 5 de 5 Avaliações para o Cryptographic Hash and Integrity Protection

por SAI S K

Jun 12, 2020

course is excellent and I hope it would be better if there is an advanced level specialisation continuation for this specialisation

por Adri J J J

May 26, 2020

One of the best courses on hashing in cryptography...

por Mohamed T

Jun 19, 2018

Excellent course

por CHITTILLA V V

Jan 18, 2018

Great course

por Abhinav P

Dec 15, 2019

Peer reviews take way longer than expected.