ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,448 results

WIRED
Harvard Professor Explains Algorithms in 5 Levels of Difficulty | WIRED

From the physical world to the virtual world, algorithms are seemingly everywhere. David J. Malan, Professor of Computer Science ...

25:47
Harvard Professor Explains Algorithms in 5 Levels of Difficulty | WIRED

4,746,093 views

2 years ago

Osiris Salazar
7   4   Constructions from ciphers and MACs 21 min
20:18
7 4 Constructions from ciphers and MACs 21 min

268 views

13 years ago

RSA Conference
Constructions

Presenters: Islam Faisal, Boston University Florian Mendel, Infineon Technologies This Cryptography session will cover the ...

43:22
Constructions

38 views

1 year ago

RSA Conference
Symmetric-Key Primitives

Presenters: Kazuhiko Minematsu, Research Fellow, NEC and Yokohama National University Yosuke Todo, Distinguished ...

55:42
Symmetric-Key Primitives

55 views

2 years ago

RSA Conference
Public Key Cryptography

Presenters: Olivier Blazy, Professor, Ecole Polytechnique Loïc Ferreira, Research Engineer, Orange This Cryptography session ...

35:38
Public Key Cryptography

93 views

1 year ago

NPTEL - Indian Institute of Science, Bengaluru
Lec 55 ICP from Information-Theoretic MAC: I

Information-theoretic message authentication codes, ICP from information-theoretic MACs.

54:18
Lec 55 ICP from Information-Theoretic MAC: I

288 views

3 years ago

Bill Buchanan OBE
Introduction to CSN11131 (Applied Cryptography and Trust)

The CSN11131 module runs at Edinburgh Napier University. An outline of the content is here: ...

41:05
Introduction to CSN11131 (Applied Cryptography and Trust)

1,071 views

3 years ago

The Coding Train
Apple ][ Coding Challenge: Fractal Tree

Take a trip back in time and let's learn all about GR (graphics) and HGR (high resolution graphics) in AppleSoft BASIC on a ...

35:35
Apple ][ Coding Challenge: Fractal Tree

407,120 views

3 years ago

NPTEL - Indian Institute of Science, Bengaluru
noc20 cs02 lec29 Message Authentication Using Hash Functions

So just to stress here the key generation algorithm of the composed MAC is the same as the key generation algorithm of your base ...

42:56
noc20 cs02 lec29 Message Authentication Using Hash Functions

2,948 views

6 years ago

NPTEL - Indian Institute of Science, Bengaluru
noc20 cs02 lec23 Message Authentication for Long Messages   Part I

যথা, একটি MAC যা ইনপুট নিতে পারে, যা ইনপুট হিসাবে ব্লকগুলির একটি ক্রম ...

30:22
noc20 cs02 lec23 Message Authentication for Long Messages Part I

4,178 views

6 years ago

TECH SCHOOL
A complete overview of SSL/TLS and its cryptographic system

This is a very thorough video to tell you everything about SSL/TLS and its underlying cryptographic system. - Learn more about ...

37:26
A complete overview of SSL/TLS and its cryptographic system

136,544 views

5 years ago

Neso Academy
Quine-McCluskey Minimization Technique (Tabular Method)

Digital Electronics: Quine-McCluskey Minimization Technique (Tabular Method) Topics discussed: 1) Prime implicants and ...

23:43
Quine-McCluskey Minimization Technique (Tabular Method)

2,119,167 views

10 years ago

Bill Buchanan OBE
Introduction (CSN11131)

https://github.com/billbuchanan/appliedcrypto.

22:19
Introduction (CSN11131)

446 views

2 years ago

NetworkChuck
You've Been Using AI the Hard Way (Use This Instead)

Access your devices securely from anywhere with TwinGate: https://ntck.co/ai_terminal Still using AI in the browser? You're doing ...

33:44
You've Been Using AI the Hard Way (Use This Instead)

1,289,219 views

2 months ago

Auri Rahimzadeh
Cryptography 101 - Indy  NET Consortium

From the April 2, 2025 Indy .NET Consortium Meetup Learn the fundamentals of cryptography, including public/private and ...

1:12:04
Cryptography 101 - Indy NET Consortium

47 views

9 months ago

RSA Conference
Multiparty Protocols

Presenters: Navid Alamati, Staff Research Scientist, VISA Research Benjamin Schlosser, Research Associate / PhD Student, ...

43:39
Multiparty Protocols

69 views

2 years ago

David Bombal
TLS Handshake Deep Dive and decryption with Wireshark

Warning! We go deep in this video to explain how the TLS handshake is completed. Warning! This is a technical deep dive and ...

1:05:40
TLS Handshake Deep Dive and decryption with Wireshark

306,400 views

3 years ago

Stanford Online
Stanford Seminar - Bugs in Crypto Implementations

Whether it's by email, text, or social media platform, the average person will send over 60 messages per day—that's 22000 ...

36:12
Stanford Seminar - Bugs in Crypto Implementations

3,760 views

7 years ago

nptelhrd
Message Authentication Codes

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur.

51:52
Message Authentication Codes

9,044 views

13 years ago

NPTEL - Indian Institute of Science, Bengaluru
noc20 cs02 lec25 Information theoretic MACs   Part I

So imagine that we have an one-time information-theoretic secure MAC where the tag generation algorithm is Tag-Gen and the ...

27:10
noc20 cs02 lec25 Information theoretic MACs Part I

3,834 views

6 years ago