Cryptography: Hash Functions 
Cryptography: Hash Functions
by MIT
Video Lecture 30 of 34
Copyright Information: Erik Demaine, Srinivas Devadas, and Nancy Lynch. 6.046J Design and Analysis of Algorithms, Spring 2015. (Massachusetts Institute of Technology: MIT OpenCourseWare), http://ocw.mit.edu (Accessed 3 Apr, 2016). License: Creative Commons BY-NC-SA
Not yet rated
Views: 850
Date Added: April 3, 2016

Lecture Description

In this lecture, Professor Devadas covers the basics of cryptography, including desirable properties of cryptographic functions, and their applications to security.

Course Index

Course Description

This is an intermediate algorithms course with an emphasis on teaching techniques for the design and analysis of efficient algorithms, emphasizing methods of application. Topics include divide-and-conquer, randomization, dynamic programming, greedy algorithms, incremental improvement, complexity, and cryptography.

This course is taught by Prof. Erik Demaine, Prof. Srinivas Devadas, and Prof. Nancy Lynch.

Comments

There are no comments. Be the first to post one.
  Post comment as a guest user.
Click to login or register:
Your name:
Your email:
(will not appear)
Your comment:
(max. 1000 characters)
Are you human? (Sorry)