YOU ARE A LEGEND FOR EXPLAINING THIS SO WELL, I'VE UNDERSTOOD SHA 512 COMPLETELY AND PROPERLY ONLY BECAUSE OF YOU. I HOPE AND PRAY FOR YOU TO PROSPER AND ACHIEVE ALL YOUR DREAMS IN LIFE. THANK YOU SO MUCH PROFESSOR. I've been trying to understand hash functions in SO LONG and you just explained it so well. GOD BLESS YOU SIR. MASSIVE RESPECT TO YOU. Thank you once again.
Prof. Satish I have learned a lot from you educational videos. Always looking forwatd to watch it. If you could make a class about data structures and how they interact with cybersecurity , if there is some interaction, it would be great. Your classes are clear and consice in explaining all the intrincacies of cybersecurity. EXCELLENT work and DEEPLY APPRECIATED. Please keep it up. Best wishes for you and family from Miami, Florida. THANK YOU!!!!!
Thanks, very clear even for someone with little prior knowledge! But what exactly happens in the maj or ch functions? I can't picture what happens with these words there!
YOU ARE A LEGEND FOR EXPLAINING THIS SO WELL, I'VE UNDERSTOOD SHA 512 COMPLETELY AND PROPERLY ONLY BECAUSE OF YOU. I HOPE AND PRAY FOR YOU TO PROSPER AND ACHIEVE ALL YOUR DREAMS IN LIFE. THANK YOU SO MUCH PROFESSOR. I've been trying to understand hash functions in SO LONG and you just explained it so well. GOD BLESS YOU SIR. MASSIVE RESPECT TO YOU. Thank you once again.
Prof. Satish I have learned a lot from you educational videos. Always looking forwatd to watch it. If you could make a class about data structures and how they interact with cybersecurity , if there is some interaction, it would be great. Your classes are clear and consice in explaining all the intrincacies of cybersecurity. EXCELLENT work and DEEPLY APPRECIATED. Please keep it up. Best wishes for you and family from Miami, Florida. THANK YOU!!!!!
This is the best video I have come across on SHA 512. I have accidentally stumbled upon your video. Your explanation is perfect. Loved it
Your explanation is so good, understood very clearly sir!!!
Excellent Explanation sir. Lots of appreciation for your effort.Thank you so much.
What a Explanation
Thank you so much for this,was searching for SHA Algorithm since a long tym
very well explained such a vast concept..thank you sir
Thanks for such a helpful tutorial tomorrow is my presentation and it's help me a lot 😃
Such an amazing explanation!
Excellent presentation…thank you sir 🙏
Thanks and welcome
Thanks, very clear even for someone with little prior knowledge! But what exactly happens in the maj or ch functions? I can't picture what happens with these words there!
Thank you for the clear explanation.
Wow😍... Great explanation.. thank you sir
Thankyou sir.very clear explanation
Crystal clear explanation sir
Excellent Explanation doctor, please, can you add this lecture in pdf or ppt format
Thankyou sir, it was very clear.
Great explanation
Thank you so much sir
awesome explanation
Amazing
Thank you very much, you explained it very well !!!!
can you post a video on SHA 256 ??
Thanks for the feedback. Will try and post videos on SHA 256 soon.
@@SatishCJ Thank you very much
Worth one👍
Hello sir ..how to perform addition modulo 2^64
Can you share the documents used in your video?
thank you
Is there any course for this hashing Algorithms
If any one know tell institute names
How to login this website
Is the IV (H0) random?
Yes it is random.
amazing