YoVDO

SHA-3 vs the World

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Cryptography Courses Cryptographic Algorithms Courses

Course Description

Overview

Explore the intricacies of SHA-3 and its comparison to other cryptographic hash functions in this 40-minute conference talk from DefCamp 2017. Delve into the latest research and practices in the field of information security, focusing on the strengths and weaknesses of SHA-3 relative to other widely-used hash algorithms. Gain insights from security specialists and experts as they discuss the implications of SHA-3 adoption in various applications. Learn about the evolution of cryptographic hash functions and understand why SHA-3 was developed as a potential successor to previous SHA standards. Discover how this talk fits into the broader context of DefCamp, a leading conference on Hacking & Information Security in Central and Eastern Europe, known for bringing together decision-makers, security professionals, and developers from around the world.

Syllabus

DefCamp 2017 - SHA-3 vs the world


Taught by

DefCamp

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera