Menu

Close
  • Home
  • About
  • Programming
  • Machine Learning
  • Cryptography
Subscribe
Blog Logo Menu

innovea.tech's notes by Sébastien Attia

Thoughts, stories and ideas on Machine Learning and Programming.

Scroll Down
« Newer Posts Page 2 of 2

Asymmetric cryptography

What is the problem with the symmetric cryptography ? With the symmetric cryptography, a same password is used to encrypt and decrypt a message. The problem... »

Author image Sébastien Attia on Cryptography 16 Jun 2016

The hash functions

What is a hash function ? A hash function takes any string as input and computes a fixed size fingerprint. The hashes of two equal messages... »

Author image Sébastien Attia on Cryptography 14 Jun 2016
« Newer Posts Page 2 of 2
innovea.tech's notes by Sébastien Attia © 2018
Proudly published with Jekyll using Jasper