ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,014,916 results

Practical Networking
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

... vs Encryption (two different problems) 2:37 - MAC Simply Explained 3:58 - MACs vs HMACs 5:38 - MAC Algorithms 5:57 - MACs ...

6:52
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

35,699 views

1 year ago

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

330,003 views

8 years ago

JayPMedia
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

... Attack 1:14 Hashing 1:55 The problem with Hashing 2:19 What is HMAC 3:25 MAC algorithms 3:51 HMAC in TLS 4:07 HMAC is ...

6:09
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

9,126 views

2 years ago

Cybersecurity at St. Cloud State University
16. Message Authentication Code MAC

... she uses a publicly known mac algorithm to generate a message of authentication code the message authentication code takes ...

1:21
16. Message Authentication Code MAC

29,569 views

3 years ago

Practical Networking
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is ...

7:24
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

80,419 views

4 years ago

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,051 views

9 years ago

Jan Goebel
HMAC explained | keyed hash message authentication code

More exclusive content: https://productioncoder.com/you-decide-what-we-build-next Twitter: https://twitter.com/_jgoebel Blog: ...

6:33
HMAC explained | keyed hash message authentication code

87,198 views

4 years ago

Computerphile
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

Your browser is using this system right now! (at time of typing!) - Dr Mike Pound explains this ubiquitous system! EXTRA BITS with ...

18:02
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

133,054 views

1 year ago

People also watched

Low Level Game Dev
The 5 Levels Of C++

Check out my Failproof OpenGL course for beginners: https://www.udemy.com/course/failproof-opengl-for-beginners/?

10:29
The 5 Levels Of C++

217,786 views

7 months ago

Mobilefish.com
Blockchain tutorial 30: HMAC

If you like this video and want to support me, go this page for my donation crypto addresses: ...

3:34
Blockchain tutorial 30: HMAC

17,159 views

7 years ago

Maximilian Schwarzmüller
Libraries & tech stack I'm excited about (for 2026)

It's a new year - time for a new tech stack! Well, not really. But there ARE a couple of libraries and technologies I'm currently using ...

13:55
Libraries & tech stack I'm excited about (for 2026)

14,111 views

19 hours ago

Alex Ziskind
Apple JUST Dropped a Game-Changer

Every M3 Ultra Mac Studio and Mac Mini cluster I've built hit the same wall… until Apple quietly removed the bottleneck—and ...

22:35
Apple JUST Dropped a Game-Changer

274,744 views

3 weeks ago

Jeff Geerling
Apple didn't have to go this hard...

RDMA over Thunderbolt support landed in macOS 26.2. Is it good for HPC? For Exo and LLMs? Find out in this video. Resources ...

14:25
Apple didn't have to go this hard...

482,052 views

3 weeks ago

Paul Turner
Intro to Digital Signatures & HMACs (and a little about TLS :)

Integrity and authentication are important to security. Digital signatures and HMACs serve as two of the primary means of ...

21:04
Intro to Digital Signatures & HMACs (and a little about TLS :)

5,051 views

3 years ago

NetworkChuck
50 macOS Tips and Tricks Using Terminal (the last one is CRAZY!)

I know your password. Change it with Dashlane: https://www.dashlane.com/networkchuck50 (Use code networkchuck50 to get ...

11:11
50 macOS Tips and Tricks Using Terminal (the last one is CRAZY!)

938,699 views

3 years ago

ByteByteGo
Why is JWT popular?

Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bytebytego.ck.page/subscribe ...

5:14
Why is JWT popular?

408,850 views

2 years ago

Networking Newbies
Hashed Message Authentication Code   HMAC

In this video, we are discussing about Hashed Message Authentication Code (HMAC) which not only provides integrity of the ...

8:43
Hashed Message Authentication Code HMAC

5,690 views

3 years ago

Catherine Li
How I'd learn to code if I had to start over

To try everything Brilliant has to offer—free—for a full 30 days, visit https://brilliant.org/CatherineLi You will get 20% off Brilliant's ...

11:27
How I'd learn to code if I had to start over

523,764 views

1 year ago

Computerphile
SHA2 Fatal Flaw? (Hash Length Extension Attack) - Computerphile

SHA2's weakness explained by Dr Mike Pound -- Check out Brilliant's courses and start for free at ...

12:24
SHA2 Fatal Flaw? (Hash Length Extension Attack) - Computerphile

116,133 views

3 months ago

Introduction to Cryptography by Christof Paar
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com.

1:15:07
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

64,541 views

11 years ago

Trouble- Free
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

7:13
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|

240,660 views

4 years ago

Practical Networking
Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials

In this video, we dive into the fascinating world of hashing and how it transforms data. You'll learn how hashing algorithms, like ...

6:03
Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials

29,824 views

1 year ago

Udacity
Hash Based Message Authentication

This video is part of the Udacity course "Intro to Information Security". Watch the full course at ...

2:20
Hash Based Message Authentication

59,373 views

9 years ago

COSIC - Computer Security and Industrial Cryptography
"Rotational Cryptanalysis on MAC Algorithm Chaskey" (ACNS 2020)

Title: "Rotational Cryptanalysis on MAC Algorithm Chaskey" Authors: Liliya Kraleva, Tomer Ashur and Vincent Rijmen Venue: ...

17:05
"Rotational Cryptanalysis on MAC Algorithm Chaskey" (ACNS 2020)

245 views

5 years ago

Vidder, Inc.
Galois/Counter Mode (GCM) and GMAC

There's an updated video at https://www.youtube.com/watch?v=R2SodepLWLg Or search for 104 Galois/Counter Mode (GCM) ...

3:15
Galois/Counter Mode (GCM) and GMAC

38,970 views

9 years ago

Liliya Stoykova
Rotational Cryptanalysis on MAC Algorithm Chaskey,  ACNS2020
17:05
Rotational Cryptanalysis on MAC Algorithm Chaskey, ACNS2020

38 views

5 years ago

Sundeep Saradhi Kanthety
16-HMAC Algorithm Explained 🔐 | Hash-Based Message Authentication Code in Network Security

Hi Friends, SUPER THANKS is enabled by YouTube and if any viewer want to contribute any financial support (not mandatory) ...

20:58
16-HMAC Algorithm Explained 🔐 | Hash-Based Message Authentication Code in Network Security

175,077 views

7 years ago

Neso Academy
Multiple Access with Collision Avoidance (MACA)

Computer Networks: Multiple Access with Collision Avoidance (MACA) Topics Discussed: 1) Hidden and Exposed Terminal ...

9:53
Multiple Access with Collision Avoidance (MACA)

91,716 views

5 years ago

Tech Arkit
SSH vulnerabilities MAC algorithms and CBC ciphers - Resolved | Tech Arkit

How to Disable weak ciphers in SSH protocol access Join this channel to get access to perks: ...

6:50
SSH vulnerabilities MAC algorithms and CBC ciphers - Resolved | Tech Arkit

20,150 views

4 years ago