ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

7,164 results

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,051 views

9 years ago

Steven Gordon
Security of MAC Functions (CSS322, L18, Y14)

Brute Force attacks on Message Authentication Codes; attacking the key versus attack the tag/code. Course material via: ...

37:05
Security of MAC Functions (CSS322, L18, Y14)

863 views

10 years ago

Cry.College
The BLAKE2 Hash Function

This video shows a real world hash function based on the HAIFA construction. [06 04 02]

2:25
The BLAKE2 Hash Function

2,729 views

4 years ago

secappdev.org
Cryptographic Algorithms - Bart Preneel

Messages have been encrypted for millennia. Successfully hiding the plaintext has required increasingly sophisticated algorithms ...

1:31:37
Cryptographic Algorithms - Bart Preneel

1,646 views

10 years ago

media.ccc.de
36C3 -  Cryptography demystified

https://media.ccc.de/v/36c3-10627-cryptography_demystified An introduction without maths This talk will explain the basic building ...

53:25
36C3 - Cryptography demystified

3,507 views

6 years ago

Devopedia
5G Security Algorithms

Smartphone usage has become ubiquitous but how secure are our communications? This talk gives an overview of the keys and ...

1:23:19
5G Security Algorithms

360 views

1 year ago

IACR
Known key Distinguisher on Full PRESENT
17:38
Known key Distinguisher on Full PRESENT

275 views

10 years ago

IACR
Beyond Birthday Bound Secure MAC in Faulty Nonce Model

Paper by Avijit Dutta, Mridul Nandi, Suprita Talnikar presented at Eurocrypt 2019 See ...

20:22
Beyond Birthday Bound Secure MAC in Faulty Nonce Model

492 views

6 years ago

Cryptography
Block Cipher

Block Cipher.

1:30:14
Block Cipher

1,682 views

5 years ago

IACR
On the Security of Sponge-type Authenticated Encryption Modes

Paper by Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi presented at FSE 2020 See ...

24:47
On the Security of Sponge-type Authenticated Encryption Modes

269 views

5 years ago

IACR
Quantum authentication with key recycling

Paper by Christopher Portmann presented at Eurocrypt 2017. See https://iacr.org/cryptodb/data/paper.php?pubkey=28040.

23:21
Quantum authentication with key recycling

143 views

8 years ago

Cry.College
The HMAC Construction

In this video we learn about a hash based MAC. [06 05 03]

1:42
The HMAC Construction

1,076 views

4 years ago

Steven Gordon
Authentication with MACs and Hash Functions (CSS322, Lecture 15, 2013)

Brute force attacks on MACs; Hash Function concepts. Lecture 15 of CSS322 Security and Cryptography at Sirindhorn ...

1:16:02
Authentication with MACs and Hash Functions (CSS322, Lecture 15, 2013)

1,096 views

11 years ago

IACR
On the Adaptive Security of MACs and PRFs

Paper by Andrew Morgan, Rafael Pass, Elaine Shi presented at Asiacrypt 2020 See ...

23:12
On the Adaptive Security of MACs and PRFs

254 views

5 years ago

IACR
Authentication in the Bounded Storage Model

Paper by Willy Quach, Yevgeniy Dodis, Daniel Wichs presented at Eurocrypt 2022 See ...

23:49
Authentication in the Bounded Storage Model

167 views

3 years ago

IACR
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers

Paper by Avik Chakraborti and Nilanjan Datta and Mridul Nandi and Kan Yasuda, presented at CHES 2018.

19:17
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers

288 views

7 years ago

IACR
Efficient Side-Channel Secure Message Authentication with Better Bounds

Paper by Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu presented at FSE 2020 See ...

26:07
Efficient Side-Channel Secure Message Authentication with Better Bounds

69 views

5 years ago

IACR
Ratcheted Encryption and Key Exchange  The Security of Messaging

Paper by Mihir Bellare and Asha Camper Singh and Joseph Jaeger and Maya Nyayapati and Igors Stepanovs, presented at ...

21:53
Ratcheted Encryption and Key Exchange The Security of Messaging

512 views

8 years ago

Zaki Malik
Hashing

Introduction to hashing.

34:02
Hashing

54 views

7 years ago

Steven Gordon
Authentication with Symmetric Key Crypto and MACs (CSS322, L17, Y14)

Introduction to authentication. Authentication with symmetric key encryption. Authentication with Message Authentication Codes.

1:19:10
Authentication with Symmetric Key Crypto and MACs (CSS322, L17, Y14)

1,523 views

10 years ago