This lecture explains Applications of Cryptographic Hash Functions like Message Authentication, Digital Signatures and few Others. It also provides description of Two Simple Hash Functions and Security Requirements for Cryptographic Hash Functions.
No download links available.