The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST). These include FIPS PUB 180, 180-1, 180-2 and Draft FIPS Publication 202. They are used to create secure hashes for data authentication.
Stanford University
Winter 2023
This course offers an introduction to cryptographic techniques used in computer security, covering encryption, message integrity, digital signatures, key management, and more. It is suitable for advanced undergraduates and masters students with some proof techniques and programming experience.
No concepts data
+ 55 more conceptsBrown University
Spring 2023
Applied Cryptography at Brown University offers a practical take on securing systems. By learning foundational cryptographic algorithms and advanced topics like zero-knowledge proofs and post-quantum cryptography, students gain both theoretical insights and hands-on experience in implementing cryptosystems using C++ and crypto libraries. Label: State-of-art concepts.
No concepts data
+ 63 more concepts