Chevron Left
返回到 Cryptographic Hash and Integrity Protection

学生对 科罗拉多大学系统 提供的 Cryptographic Hash and Integrity Protection 的评价和反馈

33 个评分
4 条评论


Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication. This course is a part of the Applied Cryptography specialization....



1 - Cryptographic Hash and Integrity Protection 的 4 个评论(共 4 个)

创建者 Adri J J J

May 26, 2020

One of the best courses on hashing in cryptography...

创建者 Mohamed T

Jun 19, 2018

Excellent course


Jan 18, 2018

Great course

创建者 Abhinav P

Dec 15, 2019

Peer reviews take way longer than expected.