Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Preimage attack
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (7)
Login to filter by course
Login to filter by course
Reset
Hashing: Basics and Security
Explores the basics and security aspects of hashing in data representation and verification.
Applied Cryptography: Hash Functions
Explores hash functions and their crucial role in cryptography, digital signatures, and blockchain technology.
Hash Functions: Security and Applications
Explores hash functions, their security, common attacks, and applications in data verification and blockchain.
ROS Attack: Security Analysis
Explores the (in)security of ROS, k-sum problems, blind signatures, and Schnorr's Blind Signature.
Cryptography: Data Integrity
Explains the properties of cryptographic hash functions and Message Authentication Codes for ensuring data integrity.
Functions: Definitions and Notations
Covers the generalities of functions, including the definition of an application between sets and the uniqueness of elements in the image set.
Blockchain Basics: Financial Applications
Delves into blockchain basics and financial applications, covering hash puzzles, Merkle trees, proof of stake, and smart contracts.
Previous
Page 1 of 1
Next