{ "name": "Hash Functions", "order": 6, "challenges": [ { "id": "59a5801209a6acac5983b670", "title": "Introduction to Hash Functions", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b194", "title": "Data integrity", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b195", "title": "Security of hash functions", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b196", "title": "Random Oracle model", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b197", "title": "Algorithms in the random oracle model", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b198", "title": "Comparison of security criteria", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b199", "title": "Iterated hash functions", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b201", "title": "Merkle-Damgard Construction", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b202", "title": "Secure hash algorithm", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] } ] }