Cryptographic Hash and Integrity Protection (Coursera)
Categories
Effort
Languages
This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric [...]
Mar 20th 2023