YoVDO

SHA-3 vs the World

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Cryptography Courses Cryptographic Algorithms Courses

Course Description

Overview

Explore the intricacies of SHA-3 and its comparison to other cryptographic hash functions in this 40-minute conference talk from DefCamp 2017. Delve into the latest research and practices in the field of information security, focusing on the strengths and weaknesses of SHA-3 relative to other widely-used hash algorithms. Gain insights from security specialists and experts as they discuss the implications of SHA-3 adoption in various applications. Learn about the evolution of cryptographic hash functions and understand why SHA-3 was developed as a potential successor to previous SHA standards. Discover how this talk fits into the broader context of DefCamp, a leading conference on Hacking & Information Security in Central and Eastern Europe, known for bringing together decision-makers, security professionals, and developers from around the world.

Syllabus

DefCamp 2017 - SHA-3 vs the world


Taught by

DefCamp

Related Courses

Cryptography And Network Security
Indian Institute of Technology, Kharagpur via Swayam
Applied Cryptography
University of Colorado System via Coursera
Cryptography Principles for IT Professionals and Developers
Pluralsight
Cryptography Application
Pluralsight
Security Architecture and Engineering: Build Defenses for CISSP®

Pluralsight