Cryptographic Hash Functions (Part 2)
Brief of the Video:
In this lecture, Dr. Debdeep Mukhopadhyay from IIT Kharagpur tackles the relative order of hardness of security criteria for hash functions. He also looks into iterated hash functions.
Lecture videos are linked and streamed with permission from The National Programme on Technology Enhanced Learning (NPTEL), an initiative by seven IITs and the IISs for creating course contents in engineering and science, and funded by the Ministry of Human Resource Development. Copyright to this content is owned and maintained by the institutes participating in the NPTEL.
1 1/1pagetotal 0 Records