ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

123,824 results

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,052 views

9 years ago

Introduction to Cryptography by Christof Paar
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com.

1:15:07
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

64,606 views

11 years ago

Hack Sphere X
Build a Python MAC Changer Algorithm - 27

Ready to take your Python hacking skills to the next level? In this power-packed video, we build a full MAC Address Changer ...

29:09
Build a Python MAC Changer Algorithm - 27

106 views

7 months ago

WIRED
Harvard Professor Explains Algorithms in 5 Levels of Difficulty | WIRED

From the physical world to the virtual world, algorithms are seemingly everywhere. David J. Malan, Professor of Computer Science ...

25:47
Harvard Professor Explains Algorithms in 5 Levels of Difficulty | WIRED

4,753,449 views

2 years ago

Sundeep Saradhi Kanthety
16-HMAC Algorithm Explained 🔐 | Hash-Based Message Authentication Code in Network Security

Hi Friends, SUPER THANKS is enabled by YouTube and if any viewer want to contribute any financial support (not mandatory) ...

20:58
16-HMAC Algorithm Explained 🔐 | Hash-Based Message Authentication Code in Network Security

175,201 views

7 years ago

Sundeep Saradhi Kanthety
13-Message Authentication in Cryptography 🔐 | MAC vs Hash Functions vs Encryption

Three types of Authentications 1. Message Encryption 2. Message Authentication Code 3. Hash Functions.

40:57
13-Message Authentication in Cryptography 🔐 | MAC vs Hash Functions vs Encryption

239,777 views

7 years ago

Satish C J
Message Authentication Code (MAC) and HMAC - Cryptography - Cyber Security CSE4003

In this lecture we will be looking at 1. What is a Message Authentication Code ? (MAC) 2. Hash Based Message Authentication ...

29:42
Message Authentication Code (MAC) and HMAC - Cryptography - Cyber Security CSE4003

38,028 views

5 years ago

Part Time Larry
QuantConnect LEAN Algorithmic Trading Engine - Getting Started

Like the video? Support my content by signing up for Interactive Brokers using the link below: ...

46:08
QuantConnect LEAN Algorithmic Trading Engine - Getting Started

86,080 views

3 years ago

Maarten Grootendorst
Intuition behind Mamba and State Space Models | Enhancing LLMs!

Mamba is an exciting LLM architecture that, when used with Transformers, might introduce new capabilities we haven't seen ...

24:06
Intuition behind Mamba and State Space Models | Enhancing LLMs!

20,861 views

10 months ago

Boot dev and TJ DeVries
C Programming and Memory Management - Full Course

Learn how to manually manage memory in the C programming language and build not one, but two garbage collectors from ...

4:43:48
C Programming and Memory Management - Full Course

284,716 views

11 months ago

Neso Academy
Quine-McCluskey Minimization Technique (Tabular Method)

Digital Electronics: Quine-McCluskey Minimization Technique (Tabular Method) Topics discussed: 1) Prime implicants and ...

23:43
Quine-McCluskey Minimization Technique (Tabular Method)

2,126,555 views

10 years ago

HackVlix
Shellcode for macOS on M1 chips - Part 1: Quick overview of ARM64 assembly language

This series shows how to write shellcode in ARM64 assembly for macOS on M1 chips. In this first video, I review the basics of ...

1:15:26
Shellcode for macOS on M1 chips - Part 1: Quick overview of ARM64 assembly language

32,828 views

3 years ago

T V Nagaraju Technical
TYPES OF AUTHENTICATION  || MESSAGE ENCRYPTION || MESSAGE AUTHENTICATION CODE || HASH FUNCTIONS

In this video we discussed Authentication Requirement, Authentication function and types of authentication. Authentication means ...

30:26
TYPES OF AUTHENTICATION || MESSAGE ENCRYPTION || MESSAGE AUTHENTICATION CODE || HASH FUNCTIONS

38,612 views

6 years ago

george hotz archive
George Hotz | Programming | comma.ai openpilot ON A MAC?!? | part1 | AoC Day 15

Date of stream 15 Dec 2019. Live-stream chat added as Subtitles/CC - English (Twitch Chat). Stream title: comma.ai openpilot ON ...

6:09:38
George Hotz | Programming | comma.ai openpilot ON A MAC?!? | part1 | AoC Day 15

92,213 views

6 years ago

DigitalSreeni
305 - What is Cellpose algorithm for segmentation?

What is Cellpose algorithm for instance segmentation? and how to train your own Cellpose model? Code generated in the video ...

30:04
305 - What is Cellpose algorithm for segmentation?

12,825 views

2 years ago

connorcreate
How To Build a Stock Trading Bot With Alpaca and Python - Full Beginner Tutorial

This tutorial will teach you how to connect to and use the Alpaca Markets API to trade stocks and stream stock market data. Link to ...

32:21
How To Build a Stock Trading Bot With Alpaca and Python - Full Beginner Tutorial

45,320 views

1 year ago

LMG Clips
Our Views Are Down.

Thanks to our LMG clips sponsors dbrand, Dell, and Secretlab. You can check them out at the links below: dbrand: ...

34:05
Our Views Are Down.

226,611 views

4 months ago

Stanford Online
Stanford CS149 I Parallel Computing I 2023 I Lecture 1 - Why Parallelism? Why Efficiency?

Challenges of parallelizing code, motivations for parallel chips, processor basics To follow along with the course, visit the course ...

1:12:22
Stanford CS149 I Parallel Computing I 2023 I Lecture 1 - Why Parallelism? Why Efficiency?

79,211 views

1 year ago

SUMANT R MORAB
Week 6 : Navier-Stokes using MAC Algorithm & Introduction to turbulence

Contents: 1. MAC algorithm coding 2. Relevance of Turbulence 3. Mathematical modelling.

2:00:51
Week 6 : Navier-Stokes using MAC Algorithm & Introduction to turbulence

212 views

2 years ago

UG TUTOR
H MAC algorithm, Network security and cryptography #bca #mca
20:30
H MAC algorithm, Network security and cryptography #bca #mca

13 views

1 year ago