Chevron Left
Вернуться к Cryptographic Hash and Integrity Protection

Отзывы учащихся о курсе Cryptographic Hash and Integrity Protection от партнера Система университетов штата Колорадо

4.4
звезд
Оценки: 53
Рецензии: 5

О курсе

Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication. This course is a part of the Applied Cryptography specialization....

Лучшие рецензии

SK
11 июня 2020 г.

course is excellent and I hope it would be better if there is an advanced level specialisation continuation for this specialisation

AJ
25 мая 2020 г.

One of the best courses on hashing in cryptography...

Фильтр по:

1–5 из 5 отзывов о курсе Cryptographic Hash and Integrity Protection

автор: SAI S K

12 июня 2020 г.

course is excellent and I hope it would be better if there is an advanced level specialisation continuation for this specialisation

автор: Adri J J J

25 мая 2020 г.

One of the best courses on hashing in cryptography...

автор: Mohamed T

19 июня 2018 г.

Excellent course

автор: CHITTILLA V V

18 янв. 2018 г.

Great course

автор: Abhinav P

15 дек. 2019 г.

Peer reviews take way longer than expected.