|
Cryptographic Hash Functions (Part 3) Brief of the Video: This video lecture covers the pitfalls of iterated hash functions. It also discusses multi-collisions and poisoning of messages.
Copyright Lecture videos are linked and streamed with permission from The National Programme on Technology Enhanced Learning (NPTEL), an initiative by seven IITs and the IISs for creating course contents in engineering and science, and funded by the Ministry of Human Resource Development. Copyright to this content is owned and maintained by the institutes participating in the NPTEL. |
More videos:
1
1/1pagetotal 0 Records