* Intro (time: 0:00)
* Hash Functions (time: 1:06, slide(s): 3-6)
* Message Authentication Code (MAC) (time: 1:11, slide(s): 7)
* Digital Signatures (time: 12:50, slide(s): 8-9)
* Other Applications (time: 15:34, slide(s): 10)
* Two Simple Hash Functions (time: 19:35, slide(s): 11)
* Requirements and Security (time: 22:24, slide(s): 13-14)
- Preimage (time: 22:43, slide(s): 13)
- Collision (time: 25:01, slide(s): 13)
* Relationship among Hash Function Properties (time: 29:04, slide(s): 15-16)
* Brute-Force Attacks (time: 32:55, slide(s): 17)
* Crypatanlysis (time: 34:01, slide(s): 17)
* Collision Resistant Attacks (time: 34:20, slide(s): 18-19)
* General Structure of Secure Hash Code (time: 41:28, slide(s): 20)
* Hash Functions Based on Cipher Block Chaining (time: 42:51, slide(s): 21)
* Secure Hash Algorithm (SHA) (time: 45:01, slide(s): 31-30)
* First Collision for Full SHA-1 (time: 57:11)
* Summary (time: 59:09, slide(s): 31)
ANNOTATION BY: an SSP CCE 2021 alumnus who prefered to be anonymous!
--Computer and Network Security