ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

176,276 results

Practical Networking
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

... vs Encryption (two different problems) 2:37 - MAC Simply Explained 3:58 - MACs vs HMACs 5:38 - MAC Algorithms 5:57 - MACs ...

6:52
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

35,728 views

1 year ago

JayPMedia
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

... Attack 1:14 Hashing 1:55 The problem with Hashing 2:19 What is HMAC 3:25 MAC algorithms 3:51 HMAC in TLS 4:07 HMAC is ...

6:09
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

9,136 views

2 years ago

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

330,013 views

8 years ago

Practical Networking
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is ...

7:24
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

80,426 views

4 years ago

Jan Goebel
HMAC explained | keyed hash message authentication code

More exclusive content: https://productioncoder.com/you-decide-what-we-build-next Twitter: https://twitter.com/_jgoebel Blog: ...

6:33
HMAC explained | keyed hash message authentication code

87,208 views

4 years ago

Computerphile
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

Your browser is using this system right now! (at time of typing!) - Dr Mike Pound explains this ubiquitous system! EXTRA BITS with ...

18:02
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

133,084 views

1 year ago

Trouble- Free
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

7:13
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|

240,671 views

4 years ago

Computerphile
SHA2 Fatal Flaw? (Hash Length Extension Attack) - Computerphile

SHA2's weakness explained by Dr Mike Pound -- Check out Brilliant's courses and start for free at ...

12:24
SHA2 Fatal Flaw? (Hash Length Extension Attack) - Computerphile

116,147 views

3 months ago

Practical Networking
Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials

In this video, we dive into the fascinating world of hashing and how it transforms data. You'll learn how hashing algorithms, like ...

6:03
Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials

29,843 views

1 year ago

COSIC - Computer Security and Industrial Cryptography
"Rotational Cryptanalysis on MAC Algorithm Chaskey" (ACNS 2020)

Title: "Rotational Cryptanalysis on MAC Algorithm Chaskey" Authors: Liliya Kraleva, Tomer Ashur and Vincent Rijmen Venue: ...

17:05
"Rotational Cryptanalysis on MAC Algorithm Chaskey" (ACNS 2020)

245 views

5 years ago

Gizmo & Mac
Stoner Algorithm

Provided to YouTube by ONErpm Stoner Algorithm · Gizmo & Mac · HNGT · Max Krause · Nikolaus Nagel · Ricardo Hingst Stoner ...

4:18
Stoner Algorithm

477 views

0

Wheeler Ruml
MAC

UNH CS 730.

15:43
MAC

1,470 views

12 years ago

Tech Arkit
SSH vulnerabilities MAC algorithms and CBC ciphers - Resolved | Tech Arkit

How to Disable weak ciphers in SSH protocol access Join this channel to get access to perks: ...

6:50
SSH vulnerabilities MAC algorithms and CBC ciphers - Resolved | Tech Arkit

20,152 views

4 years ago

Abhishek Sharma
MAC in Cryptography ||  Message Authentication Code in Cryptography and network security

MAC #messageAuthenticationCode #Cryptography #NetworkSecurity #security #AbhishekDit #InformationSecurity Authentication ...

14:41
MAC in Cryptography || Message Authentication Code in Cryptography and network security

417,866 views

6 years ago

CBTVid
2 - Cryptography Basics - Digital Signature

in this video you'll learn about digital signature and it's applications.

5:17
2 - Cryptography Basics - Digital Signature

63,660 views

4 years ago

Liliya Stoykova
Rotational Cryptanalysis on MAC Algorithm Chaskey,  ACNS2020
17:05
Rotational Cryptanalysis on MAC Algorithm Chaskey, ACNS2020

38 views

5 years ago

Cihangir Tezcan
Message Authentication Codes: CMAC and HMAC

Full Course: https://www.youtube.com/playlist?list=PLUoixF7agmItZuTTXCFfY4J4p0ad2qbKs Message Authentication Codes ...

9:40
Message Authentication Codes: CMAC and HMAC

4,924 views

3 years ago

Trouble- Free
#36 HMAC (Hash Based) & CMAC (Cipher Based)  |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

8:10
#36 HMAC (Hash Based) & CMAC (Cipher Based) |CNS|

254,002 views

4 years ago

Neso Academy
Multiple Access with Collision Avoidance (MACA)

Computer Networks: Multiple Access with Collision Avoidance (MACA) Topics Discussed: 1) Hidden and Exposed Terminal ...

9:53
Multiple Access with Collision Avoidance (MACA)

91,720 views

5 years ago

Computerphile
AES Explained (Advanced Encryption Standard) - Computerphile

Advanced Encryption Standard - Dr Mike Pound explains this ubiquitous encryption technique. n.b in the matrix multiplication ...

14:14
AES Explained (Advanced Encryption Standard) - Computerphile

1,420,615 views

6 years ago

F5 DevCentral Community
What Are AEAD Ciphers?

In this video, John from DevCentral explains AEAD (Authenticated Encryption with Associated Data) ciphers. He discusses their ...

11:09
What Are AEAD Ciphers?

26,698 views

7 years ago

HTMLconversions - Online Tutorials
6  Implementing The Algorithm to Check The Mac Did Change
6:13
6 Implementing The Algorithm to Check The Mac Did Change

1 view

1 year ago

Practical Networking
Diffie-Hellman Key Exchange and Forward Secrecy

Diffie-Hellman is the most secure way of doing a Key Exchange. Specifically because it provides a very important Cryptographic ...

13:00
Diffie-Hellman Key Exchange and Forward Secrecy

11,520 views

1 year ago

Professor Messer
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

Security+ Training Course Index: https://professormesser.link/701videos Professor Messer's Course Notes: ...

10:25
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

262,963 views

2 years ago

Jon Mac
Your Ultimate Guide to the TikTok Algorithm (2025)

Work With Me: https://thejonmac.com/ai.

10:59
Your Ultimate Guide to the TikTok Algorithm (2025)

71,859 views

1 year ago