SHA-3 vs the World
Offered By: DefCamp via YouTube
Course Description
Overview
Explore the intricacies of SHA-3 and its comparison to other cryptographic hash functions in this 40-minute conference talk from DefCamp 2017. Delve into the latest research and practices in the field of information security, focusing on the strengths and weaknesses of SHA-3 relative to other widely-used hash algorithms. Gain insights from security specialists and experts as they discuss the implications of SHA-3 adoption in various applications. Learn about the evolution of cryptographic hash functions and understand why SHA-3 was developed as a potential successor to previous SHA standards. Discover how this talk fits into the broader context of DefCamp, a leading conference on Hacking & Information Security in Central and Eastern Europe, known for bringing together decision-makers, security professionals, and developers from around the world.
Syllabus
DefCamp 2017 - SHA-3 vs the world
Taught by
DefCamp
Related Courses
Cryptography And Network SecurityIndian Institute of Technology, Kharagpur via Swayam Applied Cryptography
University of Colorado System via Coursera Cryptography Principles for IT Professionals and Developers
Pluralsight Cryptography Application
Pluralsight Security Architecture and Engineering: Build Defenses for CISSP®
Pluralsight