Chevron Left
Zurück zu Cryptographic Hash and Integrity Protection

Bewertung und Feedback des Lernenden für Cryptographic Hash and Integrity Protection von University of Colorado System

4.5
Sterne
69 Bewertungen

Über den Kurs

Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication. This course is a part of the Applied Cryptography specialization....

Top-Bewertungen

SK

11. Juni 2020

course is excellent and I hope it would be better if there is an advanced level specialisation continuation for this specialisation

SC

1. Juni 2021

Great theory. Professor is also super clear in his explanations.

Recommended :)

Filtern nach:

1 - 7 von 7 Bewertungen für Cryptographic Hash and Integrity Protection

von SAI S K

12. Juni 2020

von Sebastian C

2. Juni 2021

von Adri J J J

25. Mai 2020

von Mohamed T

19. Juni 2018

von Lincoln A

29. Nov. 2021

von CHITTILLA V V

18. Jan. 2018

von Abhinav P

15. Dez. 2019