Menu

Close
  • Home
  • About
  • Programming
  • Machine Learning
  • Cryptography
Subscribe
Blog Logo Menu

Cryptography

A 3-post collection

Page 1 of 1

The digital signature

What is a digital signature ? Like a signature, a digital signature allows to authenticate the emitter of the message and verify the message has not... »

Author image Sébastien Attia on Cryptography 18 Jun 2016

Asymmetric cryptography

What is the problem with the symmetric cryptography ? With the symmetric cryptography, a same password is used to encrypt and decrypt a message. The problem... »

Author image Sébastien Attia on Cryptography 16 Jun 2016

The hash functions

What is a hash function ? A hash function takes any string as input and computes a fixed size fingerprint. The hashes of two equal messages... »

Author image Sébastien Attia on Cryptography 14 Jun 2016
Page 1 of 1
innovea.tech's notes by Sébastien Attia © 2018
Proudly published with Jekyll using Jasper