A slide titles is " Digital signatures: How it works". On the same slide later down: sign the message with the hash value e.g. sign(hasj´h value, private key). It it not explained wahr the function sugn is , although that was the purose of this slide according to the title...
One thing i need clarification on : In the very last slide of the video, at the end of the slide, maybe i didn't understood well this passage or maybe something is missing but it is implied that v=verify(h,public key) is identical to the signature of the sender i.e. v=verify(h,public key)=signature ?! Then what if i am an ennemy and write my own message and generate a verified value from the hash of my message and the public key of the original sender ? how will the reciever make the difference ?
Nice explanations
cute. well explained
A slide titles is " Digital signatures: How it works". On the same slide later down: sign the message with the hash value e.g. sign(hasj´h value, private key). It it not explained wahr the function sugn is , although that was the purose of this slide according to the title...
thank you bro
Alice lookin' rough, bro
Good explanation, but
Explain with code like example
Thanks. I've explained with code examples on my next video.
One thing i need clarification on :
In the very last slide of the video, at the end of the slide, maybe i didn't understood well this passage or maybe something is missing but it is implied that v=verify(h,public key) is identical to the signature of the sender i.e. v=verify(h,public key)=signature ?!
Then what if i am an ennemy and write my own message and generate a verified value from the hash of my message and the public key of the original sender ? how will the reciever make the difference ?
1:33 - why the hell is Alice a bald headed dude? lol
Thanks Bro
That does not look like an Alice.
Why Alice is bald?