ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

122,977 results

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,052 views

9 years ago

Introduction to Cryptography by Christof Paar
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com.

1:15:07
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

64,583 views

11 years ago

Hack Sphere X
Build a Python MAC Changer Algorithm - 27

Ready to take your Python hacking skills to the next level? In this power-packed video, we build a full MAC Address Changer ...

29:09
Build a Python MAC Changer Algorithm - 27

106 views

7 months ago

AppleProgramming
C Programming on the Mac L47 - Recursion

An introduction to recursion using C. Twitter: https://twitter.com/LucasDerraugh GitHub: https://github.com/lucasderraugh Site: ...

26:46
C Programming on the Mac L47 - Recursion

1,779 views

12 years ago

SUMANT R MORAB
Week 6 : Navier-Stokes using MAC Algorithm & Introduction to turbulence

Contents: 1. MAC algorithm coding 2. Relevance of Turbulence 3. Mathematical modelling.

2:00:51
Week 6 : Navier-Stokes using MAC Algorithm & Introduction to turbulence

212 views

2 years ago

UCLComputerScience
Scalable and Secure Systems and Networking: Algorithms, Adversaries, Doubt, and Details

Prof Brad Karp's Inaugural Lecture, 5 February 2016 www.cs.ucl.ac.uk Networking has profoundly improved modern life by ...

1:21:15
Scalable and Secure Systems and Networking: Algorithms, Adversaries, Doubt, and Details

251 views

9 years ago

UG TUTOR
H MAC algorithm, Network security and cryptography #bca #mca
20:30
H MAC algorithm, Network security and cryptography #bca #mca

13 views

1 year ago

Sundeep Saradhi Kanthety
16-HMAC Algorithm Explained 🔐 | Hash-Based Message Authentication Code in Network Security

Hi Friends, SUPER THANKS is enabled by YouTube and if any viewer want to contribute any financial support (not mandatory) ...

20:58
16-HMAC Algorithm Explained 🔐 | Hash-Based Message Authentication Code in Network Security

175,178 views

7 years ago

NANOG
Tutorial: IEEE 802.1aq Shortest Path Bridging

Speakers: Peter Ashwood-Smith, Huawei Technologies Canada IEEE 802.1aq Shortest Path Bridging (presented at Nanog 49) is ...

1:22:53
Tutorial: IEEE 802.1aq Shortest Path Bridging

7,418 views

9 years ago

Veritasium
The Most Important Algorithm Of All Time

The Fast Fourier Transform is used everywhere but it has a fascinating origin story that could have ended the nuclear arms race.

26:33
The Most Important Algorithm Of All Time

10,244,576 views

3 years ago

AppleProgramming
C Programming on the Mac L50 - Dynamic Memory Allocation

How to dynamically allocate memory in C using malloc and free. Twitter: https://twitter.com/LucasDerraugh GitHub: ...

23:06
C Programming on the Mac L50 - Dynamic Memory Allocation

7,006 views

11 years ago

AppleProgramming
Objective-C on the Mac L41 - NSSortDescriptor

How to sort arrays using NSSortDescriptor.

20:08
Objective-C on the Mac L41 - NSSortDescriptor

6,389 views

13 years ago

Steven Gordon
Message Authentication Codes (CSS441, L16, Y15)

MACs for authentication; modification and masquerade attacks on MACs; assumptions of MACs and collisions. Course material ...

1:07:07
Message Authentication Codes (CSS441, L16, Y15)

2,857 views

9 years ago

CH 27: IIT KANPUR 04: Mechanical Engineering...
Lecture 19: Solving Navier-Stokes Equations For Incompressible Flows using MAC Algorithm Part 2

swayamprabha #ch27sp Subject : Mechanical Engineering Course Name : Computational Fluid Dynamics and Heat Transfer ...

53:44
Lecture 19: Solving Navier-Stokes Equations For Incompressible Flows using MAC Algorithm Part 2

37 views

1 year ago

RG Learning Academy
18. DSP Architecture and Algorithms - Barrel Shifter and Multiply and Accumulate (MAC) unit

Barrel Shifter Multiply and Accumulate (MAC) unit.

37:21
18. DSP Architecture and Algorithms - Barrel Shifter and Multiply and Accumulate (MAC) unit

1,119 views

5 years ago

SUMANT R MORAB
Week 11: Turbulent Flow & MAC algorithm code for Lid Driven Cavity

Contents: 1. Features of Turbulent flow 2. Turbulence Statistics 3. MAC algorithm-based code for N-S solution.

54:28
Week 11: Turbulent Flow & MAC algorithm code for Lid Driven Cavity

367 views

3 years ago

AppleProgramming
Objective-C on the Mac L40 - NSPredicate

How to use NSPredicate to compare and filter objects.

20:02
Objective-C on the Mac L40 - NSPredicate

6,027 views

13 years ago

Mihir Bellare
Authenticated Encryption

Authenticated encryption. Integrity of ciphertexts (INT-CTXT). Encryption with redundancy and its failure. Generic composition: ...

1:04:52
Authenticated Encryption

1,138 views

4 years ago

Dr. Bharatendra Rai
Analyzing Text Data with R (on Mac)

Link to R and data files: https://github.com/bkrai/R-files-from-YouTube Provides introduction to text mining with r. Text analytics ...

20:43
Analyzing Text Data with R (on Mac)

5,372 views

9 years ago

george hotz archive
George Hotz | Programming | comma.ai openpilot ON A MAC?!? | part1 | AoC Day 15

Date of stream 15 Dec 2019. Live-stream chat added as Subtitles/CC - English (Twitch Chat). Stream title: comma.ai openpilot ON ...

6:09:38
George Hotz | Programming | comma.ai openpilot ON A MAC?!? | part1 | AoC Day 15

92,208 views

6 years ago