Videos

Published on March 5th, 2017 📆 | 6889 Views ⚑

0

Applied Cryptography: Hash Functions – Part 2


iSpeech


This video describes the input-output behavior of hash functions, as well as the security requirements. In particular, one-wayness, first and second pre-image resistance are discussed.

video, sharing, camera phone, video phone, free, upload
2017-03-05 17:30:41

source





Tagged with:



Comments are closed.