Chevron Left
Cryptographic Hash and Integrity Protection に戻る

University of Colorado System による Cryptographic Hash and Integrity Protection の受講者のレビューおよびフィードバック

4.4
53件の評価
5件のレビュー

コースについて

Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication. This course is a part of the Applied Cryptography specialization....

人気のレビュー

SK
2020年6月11日

course is excellent and I hope it would be better if there is an advanced level specialisation continuation for this specialisation

AJ
2020年5月25日

One of the best courses on hashing in cryptography...

フィルター:

Cryptographic Hash and Integrity Protection: 1 - 5 / 5 レビュー

by SAI S K

2020年6月12日

course is excellent and I hope it would be better if there is an advanced level specialisation continuation for this specialisation

by Adri J J J

2020年5月25日

One of the best courses on hashing in cryptography...

by Mohamed T

2018年6月19日

Excellent course

by CHITTILLA V V

2018年1月18日

Great course

by Abhinav P

2019年12月15日

Peer reviews take way longer than expected.