YoVDO

SHA-3 vs the World

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Cryptography Courses Cryptographic Algorithms Courses

Course Description

Overview

Explore the intricacies of SHA-3 and its comparison to other cryptographic hash functions in this 40-minute conference talk from DefCamp 2017. Delve into the latest research and practices in the field of information security, focusing on the strengths and weaknesses of SHA-3 relative to other widely-used hash algorithms. Gain insights from security specialists and experts as they discuss the implications of SHA-3 adoption in various applications. Learn about the evolution of cryptographic hash functions and understand why SHA-3 was developed as a potential successor to previous SHA standards. Discover how this talk fits into the broader context of DefCamp, a leading conference on Hacking & Information Security in Central and Eastern Europe, known for bringing together decision-makers, security professionals, and developers from around the world.

Syllabus

DefCamp 2017 - SHA-3 vs the world


Taught by

DefCamp

Related Courses

The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
DefCamp via YouTube
The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube
Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube
How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube
To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube