Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,448 results
From the physical world to the virtual world, algorithms are seemingly everywhere. David J. Malan, Professor of Computer Science ...
4,746,093 views
2 years ago
268 views
13 years ago
Presenters: Islam Faisal, Boston University Florian Mendel, Infineon Technologies This Cryptography session will cover the ...
38 views
1 year ago
Presenters: Kazuhiko Minematsu, Research Fellow, NEC and Yokohama National University Yosuke Todo, Distinguished ...
55 views
Presenters: Olivier Blazy, Professor, Ecole Polytechnique Loïc Ferreira, Research Engineer, Orange This Cryptography session ...
93 views
Information-theoretic message authentication codes, ICP from information-theoretic MACs.
288 views
3 years ago
The CSN11131 module runs at Edinburgh Napier University. An outline of the content is here: ...
1,071 views
Take a trip back in time and let's learn all about GR (graphics) and HGR (high resolution graphics) in AppleSoft BASIC on a ...
407,120 views
So just to stress here the key generation algorithm of the composed MAC is the same as the key generation algorithm of your base ...
2,948 views
6 years ago
যথা, একটি MAC যা ইনপুট নিতে পারে, যা ইনপুট হিসাবে ব্লকগুলির একটি ক্রম ...
4,178 views
This is a very thorough video to tell you everything about SSL/TLS and its underlying cryptographic system. - Learn more about ...
136,544 views
5 years ago
Digital Electronics: Quine-McCluskey Minimization Technique (Tabular Method) Topics discussed: 1) Prime implicants and ...
2,119,167 views
10 years ago
https://github.com/billbuchanan/appliedcrypto.
446 views
Access your devices securely from anywhere with TwinGate: https://ntck.co/ai_terminal Still using AI in the browser? You're doing ...
1,289,219 views
2 months ago
From the April 2, 2025 Indy .NET Consortium Meetup Learn the fundamentals of cryptography, including public/private and ...
47 views
9 months ago
Presenters: Navid Alamati, Staff Research Scientist, VISA Research Benjamin Schlosser, Research Associate / PhD Student, ...
69 views
Warning! We go deep in this video to explain how the TLS handshake is completed. Warning! This is a technical deep dive and ...
306,400 views
Whether it's by email, text, or social media platform, the average person will send over 60 messages per day—that's 22000 ...
3,760 views
7 years ago
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur.
9,044 views
So imagine that we have an one-time information-theoretic secure MAC where the tag generation algorithm is Tag-Gen and the ...
3,834 views