Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of SHA-3 and its comparison to other cryptographic hash functions in this 40-minute conference talk from DefCamp 2017. Delve into the latest research and practices in the field of information security, focusing on the strengths and weaknesses of SHA-3 relative to other widely-used hash algorithms. Gain insights from security specialists and experts as they discuss the implications of SHA-3 adoption in various applications. Learn about the evolution of cryptographic hash functions and understand why SHA-3 was developed as a potential successor to previous SHA standards. Discover how this talk fits into the broader context of DefCamp, a leading conference on Hacking & Information Security in Central and Eastern Europe, known for bringing together decision-makers, security professionals, and developers from around the world.