Prof. Satish I have learned a lot from you educational videos. Always looking forwatd to watch it. If you could make a class about data structures and how they interact with cybersecurity , if there is some interaction, it would be great. Your classes are clear and consice in explaining all the intrincacies of cybersecurity. EXCELLENT work and DEEPLY APPRECIATED. Please keep it up. Best wishes for you and family from Miami, Florida. THANK YOU!!!!!
Thanks, very clear even for someone with little prior knowledge! But what exactly happens in the maj or ch functions? I can't picture what happens with these words there!
This is the best video I have come across on SHA 512. I have accidentally stumbled upon your video. Your explanation is perfect. Loved it
Prof. Satish I have learned a lot from you educational videos. Always looking forwatd to watch it. If you could make a class about data structures and how they interact with cybersecurity , if there is some interaction, it would be great. Your classes are clear and consice in explaining all the intrincacies of cybersecurity. EXCELLENT work and DEEPLY APPRECIATED. Please keep it up. Best wishes for you and family from Miami, Florida. THANK YOU!!!!!
Excellent Explanation sir. Lots of appreciation for your effort.Thank you so much.
Thank you so much for this,was searching for SHA Algorithm since a long tym
What a Explanation
very well explained such a vast concept..thank you sir
Thanks for such a helpful tutorial tomorrow is my presentation and it's help me a lot 😃
Excellent presentation…thank you sir 🙏
Thanks and welcome
Such an amazing explanation!
Wow😍... Great explanation.. thank you sir
Crystal clear explanation sir
Thank you for the clear explanation.
Great explanation
Thankyou sir.very clear explanation
awesome explanation
Thankyou sir, it was very clear.
Thanks, very clear even for someone with little prior knowledge! But what exactly happens in the maj or ch functions? I can't picture what happens with these words there!
Excellent Explanation doctor, please, can you add this lecture in pdf or ppt format
Amazing
Thank you so much sir
Worth one👍
Thank you very much, you explained it very well !!!!
can you post a video on SHA 256 ??
Thanks for the feedback. Will try and post videos on SHA 256 soon.
@@SatishCJ Thank you very much
Is there any course for this hashing Algorithms
If any one know tell institute names
Hello sir ..how to perform addition modulo 2^64
Can you share the documents used in your video?
thank you
How to login this website
Is the IV (H0) random?
Yes it is random.
amazing