Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
7,164 results
MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.
5,051 views
9 years ago
Brute Force attacks on Message Authentication Codes; attacking the key versus attack the tag/code. Course material via: ...
863 views
10 years ago
This video shows a real world hash function based on the HAIFA construction. [06 04 02]
2,729 views
4 years ago
Messages have been encrypted for millennia. Successfully hiding the plaintext has required increasingly sophisticated algorithms ...
1,646 views
https://media.ccc.de/v/36c3-10627-cryptography_demystified An introduction without maths This talk will explain the basic building ...
3,507 views
6 years ago
Smartphone usage has become ubiquitous but how secure are our communications? This talk gives an overview of the keys and ...
360 views
1 year ago
275 views
Paper by Avijit Dutta, Mridul Nandi, Suprita Talnikar presented at Eurocrypt 2019 See ...
492 views
Block Cipher.
1,682 views
5 years ago
Paper by Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi presented at FSE 2020 See ...
269 views
Paper by Christopher Portmann presented at Eurocrypt 2017. See https://iacr.org/cryptodb/data/paper.php?pubkey=28040.
143 views
8 years ago
In this video we learn about a hash based MAC. [06 05 03]
1,076 views
Brute force attacks on MACs; Hash Function concepts. Lecture 15 of CSS322 Security and Cryptography at Sirindhorn ...
1,096 views
11 years ago
Paper by Andrew Morgan, Rafael Pass, Elaine Shi presented at Asiacrypt 2020 See ...
254 views
Paper by Willy Quach, Yevgeniy Dodis, Daniel Wichs presented at Eurocrypt 2022 See ...
167 views
3 years ago
Paper by Avik Chakraborti and Nilanjan Datta and Mridul Nandi and Kan Yasuda, presented at CHES 2018.
288 views
7 years ago
Paper by Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu presented at FSE 2020 See ...
69 views
Paper by Mihir Bellare and Asha Camper Singh and Joseph Jaeger and Maya Nyayapati and Igors Stepanovs, presented at ...
512 views
Introduction to hashing.
54 views
Introduction to authentication. Authentication with symmetric key encryption. Authentication with Message Authentication Codes.
1,523 views