ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,220 results

IACR
Known key Distinguisher on Full PRESENT
17:38
Known key Distinguisher on Full PRESENT

275 views

10 years ago

Lady Tasnim
MAC Constructions based on Hash and Block Ciphers

So this is the most secure and popular hash based mac algorithm used in these protocols so it's proven secure as long as the ...

16:09
MAC Constructions based on Hash and Block Ciphers

168 views

4 years ago

Lady Tasnim
what is MAC? why is it used? Applied Cryptography

please use the comments section to comment, and like and subscribe if you would like me to post more videos like this.

13:51
what is MAC? why is it used? Applied Cryptography

194 views

4 years ago

IACR
Fine-grained Secure Attribute-based Encryption

Paper by Yuyu Wang, Jiaxin Pan, Yu Chen presented at Crypto 2021 See https://iacr.org/cryptodb/data/paper.php?pubkey=31236 ...

18:50
Fine-grained Secure Attribute-based Encryption

433 views

4 years ago

Tanja Lange: Intro to crypto
Message Authentication Codes (MACs)

Slides are updated to correct an error for the formulas for OFB mode. Part of Introduction to Cryptology ...

10:06
Message Authentication Codes (MACs)

891 views

5 years ago

internet-class
What is a crytographically secure hash function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

5:45
What is a crytographically secure hash function?

1,303 views

9 years ago

IACR
Indifferentiable Authenticated Encryption

Paper by Manuel Barbosa and Pooya Farshim, presented at Crypto 2018.

18:47
Indifferentiable Authenticated Encryption

293 views

7 years ago

IACR
Tight Security Bounds for Double-block Hash-then-Sum MACs

Paper by Seongkwang Kim, Byeonghak Lee, Jooyoung Lee presented at Eurocrypt 2020 See ...

18:05
Tight Security Bounds for Double-block Hash-then-Sum MACs

189 views

5 years ago

Vu Hung Nguyen (Hưng)
11 Cryptographic Hashes: Your Data's Digital Fingerprint #AI #NLP #Tech #Podcast #Learning

Cryptographic Hash Functions Explained: SHA, Security & Applications Overview: This episode provides a comprehensive look ...

7:21
11 Cryptographic Hashes: Your Data's Digital Fingerprint #AI #NLP #Tech #Podcast #Learning

9 views

3 months ago

IACR
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption

Paper by Bart Mennink presented at Asiacrypt 2020 See https://iacr.org/cryptodb/data/paper.php?pubkey=30657. The conference ...

18:12
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption

141 views

5 years ago

IACR
The Exact Security of PMAC with Two Powering-Up Masks

Paper by Yusuke Naito presented at FSE 2020 See https://iacr.org/cryptodb/data/paper.php?pubkey=29507. The conference ...

17:55
The Exact Security of PMAC with Two Powering-Up Masks

125 views

5 years ago

IACR
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers

Paper by Avik Chakraborti and Nilanjan Datta and Mridul Nandi and Kan Yasuda, presented at CHES 2018.

19:17
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers

288 views

7 years ago

Cry.College
Message Digest 5

This video shows a real world hash function based on the Merkle-Damgard construction. [06 03 03]

4:50
Message Digest 5

230 views

4 years ago

IACR
Hierarchical Identity Based Encryption from Affine Messafe Authentication

Presentation at Crypto 2014. Paper by Olivier Blazy and Eike Kiltz and Jiaxin Pan.

18:04
Hierarchical Identity Based Encryption from Affine Messafe Authentication

1,495 views

11 years ago

IACR
Categorization of Faulty Nonce Misuse Resistant Message Authentication

Paper by Yu Long Chen, Bart Mennink, Bart Preneel presented at Asiacrypt 2021 See ...

18:06
Categorization of Faulty Nonce Misuse Resistant Message Authentication

86 views

4 years ago

IACR
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

Talk at FSE 2013. Gordon Procter and Carlos Cid. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=25072.

19:01
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

157 views

10 years ago

Gamefreak0101
Mac C++ Programming #12 - Switch Statements

In this video, you'll learn the basics about switch statements and how to use them. Want my setup? Here's what I use on the daily ...

8:22
Mac C++ Programming #12 - Switch Statements

2,660 views

11 years ago

UTeM MOOC
LECTURE 2 - AUTHENTICATION AND BASIC CRYPTOGRAPHY (PART 4)

INFORMATION TECHNOLOGY SECURITY_UTEM_MOOC.

6:54
LECTURE 2 - AUTHENTICATION AND BASIC CRYPTOGRAPHY (PART 4)

30 views

9 years ago

GTALUG
Taskwarrior with Tomas Babej

Taskwarrior homepage -- https://taskwarrior.org/ From July 2019 Meeting. Meeting page -- https://gtalug.org/meeting/2019-07/

8:31
Taskwarrior with Tomas Babej

7,178 views

6 years ago

PaceIT Online
PACE-IT: Security + 6.1 - Introduction to Cryptography (part 2)

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

7:44
PACE-IT: Security + 6.1 - Introduction to Cryptography (part 2)

234 views

10 years ago