ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,020,038 results

Practical Networking
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

... vs Encryption (two different problems) 2:37 - MAC Simply Explained 3:58 - MACs vs HMACs 5:38 - MAC Algorithms 5:57 - MACs ...

6:52
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

35,466 views

1 year ago

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

329,859 views

8 years ago

JayPMedia
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

... Attack 1:14 Hashing 1:55 The problem with Hashing 2:19 What is HMAC 3:25 MAC algorithms 3:51 HMAC in TLS 4:07 HMAC is ...

6:09
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

9,036 views

2 years ago

Cybersecurity at St. Cloud State University
16. Message Authentication Code MAC

... she uses a publicly known mac algorithm to generate a message of authentication code the message authentication code takes ...

1:21
16. Message Authentication Code MAC

29,531 views

3 years ago

Practical Networking
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is ...

7:24
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

80,308 views

4 years ago

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,051 views

9 years ago

Jan Goebel
HMAC explained | keyed hash message authentication code

More exclusive content: https://productioncoder.com/you-decide-what-we-build-next Twitter: https://twitter.com/_jgoebel Blog: ...

6:33
HMAC explained | keyed hash message authentication code

87,123 views

4 years ago

Computerphile
SHA2 Fatal Flaw? (Hash Length Extension Attack) - Computerphile

SHA2's weakness explained by Dr Mike Pound -- Check out Brilliant's courses and start for free at ...

12:24
SHA2 Fatal Flaw? (Hash Length Extension Attack) - Computerphile

115,985 views

3 months ago

Computerphile
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

Your browser is using this system right now! (at time of typing!) - Dr Mike Pound explains this ubiquitous system! EXTRA BITS with ...

18:02
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

132,749 views

1 year ago

Introduction to Cryptography by Christof Paar
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com.

1:15:07
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

64,517 views

11 years ago

People also watched

jakkuh
Apple did what NVIDIA wouldn't

Check out Boot.dev at https://boot.dev/?promo=JAKKUH and use code JAKKUH to get 25% off your first plan! Support me on ...

20:04
Apple did what NVIDIA wouldn't

847,057 views

3 weeks ago

AICodeKing
OpenCode + Free Opus 4.5 (Antigravity Auth) : STOP USING Claude Code MAX This is the NEW ALTERNATIVE

In this video, I break down Anthropic's crackdown on Claude Code Max subscriptions in third-party tools like OpenCode and ...

9:56
OpenCode + Free Opus 4.5 (Antigravity Auth) : STOP USING Claude Code MAX This is the NEW ALTERNATIVE

15,087 views

10 hours ago

3Blue1Brown
How secure is 256 bit security?

How hard is it to find a 256-bit hash just by guessing and checking? Help fund future projects: ...

5:06
How secure is 256 bit security?

3,586,215 views

8 years ago

Jeff Geerling
Apple didn't have to go this hard...

RDMA over Thunderbolt support landed in macOS 26.2. Is it good for HPC? For Exo and LLMs? Find out in this video. Resources ...

14:25
Apple didn't have to go this hard...

478,541 views

3 weeks ago

Mobilefish.com
Blockchain tutorial 30: HMAC

If you like this video and want to support me, go this page for my donation crypto addresses: ...

3:34
Blockchain tutorial 30: HMAC

17,159 views

7 years ago

ByteByteGo
Why is JWT popular?

Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bytebytego.ck.page/subscribe ...

5:14
Why is JWT popular?

408,543 views

2 years ago

ByteByteGo
Session Vs JWT: The Differences You May Not Know!

Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bit.ly/bytebytegoytTopic Animation ...

7:00
Session Vs JWT: The Differences You May Not Know!

582,330 views

1 year ago

Low Level Game Dev
The 5 Levels Of C++

Check out my Failproof OpenGL course for beginners: https://www.udemy.com/course/failproof-opengl-for-beginners/?

10:29
The 5 Levels Of C++

216,147 views

7 months ago

NetworkChuck
I built an AI supercomputer with 5 Mac Studios

Get NordVPN 2Y plan + 4 months extra + 6 MORE months extra: https://nordvpn.com/networkchuck It's risk-free with Nord's 30-day ...

34:57
I built an AI supercomputer with 5 Mac Studios

1,896,354 views

10 months ago

Programming w/ Professor Sluiter
Hashing vs Encryption Differences

Go to http://StudyCoding.org to subscribe to the full list of courses and get source code for projects. How is hashing used in ...

19:38
Hashing vs Encryption Differences

194,670 views

6 years ago

Trouble- Free
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

7:13
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|

240,496 views

4 years ago

COSIC - Computer Security and Industrial Cryptography
"Rotational Cryptanalysis on MAC Algorithm Chaskey" (ACNS 2020)

Title: "Rotational Cryptanalysis on MAC Algorithm Chaskey" Authors: Liliya Kraleva, Tomer Ashur and Vincent Rijmen Venue: ...

17:05
"Rotational Cryptanalysis on MAC Algorithm Chaskey" (ACNS 2020)

245 views

5 years ago

Practical Networking
Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials

In this video, we dive into the fascinating world of hashing and how it transforms data. You'll learn how hashing algorithms, like ...

6:03
Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials

29,619 views

1 year ago

Vidder, Inc.
Galois/Counter Mode (GCM) and GMAC

There's an updated video at https://www.youtube.com/watch?v=R2SodepLWLg Or search for 104 Galois/Counter Mode (GCM) ...

3:15
Galois/Counter Mode (GCM) and GMAC

38,940 views

9 years ago

Liliya Stoykova
Rotational Cryptanalysis on MAC Algorithm Chaskey,  ACNS2020
17:05
Rotational Cryptanalysis on MAC Algorithm Chaskey, ACNS2020

38 views

5 years ago

Sundeep Saradhi Kanthety
16-HMAC Algorithm Explained 🔐 | Hash-Based Message Authentication Code in Network Security

Hi Friends, SUPER THANKS is enabled by YouTube and if any viewer want to contribute any financial support (not mandatory) ...

20:58
16-HMAC Algorithm Explained 🔐 | Hash-Based Message Authentication Code in Network Security

175,017 views

7 years ago

Neso Academy
Multiple Access with Collision Avoidance (MACA)

Computer Networks: Multiple Access with Collision Avoidance (MACA) Topics Discussed: 1) Hidden and Exposed Terminal ...

9:53
Multiple Access with Collision Avoidance (MACA)

91,648 views

5 years ago

Udacity
Hash Based Message Authentication

This video is part of the Udacity course "Intro to Information Security". Watch the full course at ...

2:20
Hash Based Message Authentication

59,363 views

9 years ago

Hack Sphere X
Build a Python MAC Changer Algorithm - 27

Ready to take your Python hacking skills to the next level? In this power-packed video, we build a full MAC Address Changer ...

29:09
Build a Python MAC Changer Algorithm - 27

105 views

7 months ago