ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,007,674 results

Practical Networking
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

... vs Encryption (two different problems) 2:37 - MAC Simply Explained 3:58 - MACs vs HMACs 5:38 - MAC Algorithms 5:57 - MACs ...

6:52
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

35,397 views

1 year ago

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

329,801 views

8 years ago

JayPMedia
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

... Attack 1:14 Hashing 1:55 The problem with Hashing 2:19 What is HMAC 3:25 MAC algorithms 3:51 HMAC in TLS 4:07 HMAC is ...

6:09
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

9,002 views

2 years ago

Cybersecurity at St. Cloud State University
16. Message Authentication Code MAC

... she uses a publicly known mac algorithm to generate a message of authentication code the message authentication code takes ...

1:21
16. Message Authentication Code MAC

29,514 views

3 years ago

Practical Networking
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is ...

7:24
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

80,285 views

4 years ago

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,051 views

9 years ago

Jan Goebel
HMAC explained | keyed hash message authentication code

More exclusive content: https://productioncoder.com/you-decide-what-we-build-next Twitter: https://twitter.com/_jgoebel Blog: ...

6:33
HMAC explained | keyed hash message authentication code

87,095 views

4 years ago

Introduction to Cryptography by Christof Paar
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com.

1:15:07
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

64,511 views

11 years ago

People also watched

NetworkChuck
Ethernet is DEAD?? Mac Studio is 100x FASTER!!

Hey…just try Twingate….you'll never look at VPN the same: https://ntck.co/twingate-networkchuck I built another AI supercomputer ...

33:14
Ethernet is DEAD?? Mac Studio is 100x FASTER!!

394,705 views

2 weeks ago

Underscore_
The Astonishing Algorithm That Reads the Future
33:46
The Astonishing Algorithm That Reads the Future

274,697 views

3 months ago

Alex Finn
I was using Claude Code wrong... then I discovered this

There are many ways you can be using Claude Code. THIS way is by far the best. Join the Vibe Coding Academy waitlist: ...

13:00
I was using Claude Code wrong... then I discovered this

27,212 views

9 days ago

jakkuh
Apple did what NVIDIA wouldn't

Check out Boot.dev at https://boot.dev/?promo=JAKKUH and use code JAKKUH to get 25% off your first plan! Support me on ...

20:04
Apple did what NVIDIA wouldn't

842,000 views

3 weeks ago

NetworkChuck
I built an AI supercomputer with 5 Mac Studios

Get NordVPN 2Y plan + 4 months extra + 6 MORE months extra: https://nordvpn.com/networkchuck It's risk-free with Nord's 30-day ...

34:57
I built an AI supercomputer with 5 Mac Studios

1,895,473 views

10 months ago

Jeff Geerling
Apple didn't have to go this hard...

RDMA over Thunderbolt support landed in macOS 26.2. Is it good for HPC? For Exo and LLMs? Find out in this video. Resources ...

14:25
Apple didn't have to go this hard...

476,878 views

3 weeks ago

MIT OpenCourseWare
21. Cryptography: Hash Functions

MIT 6.046J Design and Analysis of Algorithms, Spring 2015 View the complete course: http://ocw.mit.edu/6-046JS15 Instructor: ...

1:22:01
21. Cryptography: Hash Functions

192,458 views

9 years ago

freeCodeCamp.org
CUDA Programming Course – High-Performance Computing with GPUs

Lean how to program with Nvidia CUDA and leverage GPUs for high-performance computing and deep learning.

11:55:11
CUDA Programming Course – High-Performance Computing with GPUs

464,719 views

1 year ago

3Blue1Brown
How secure is 256 bit security?

How hard is it to find a 256-bit hash just by guessing and checking? Help fund future projects: ...

5:06
How secure is 256 bit security?

3,585,976 views

8 years ago

Catherine Li
How I'd learn to code if I had to start over

To try everything Brilliant has to offer—free—for a full 30 days, visit https://brilliant.org/CatherineLi You will get 20% off Brilliant's ...

11:27
How I'd learn to code if I had to start over

518,687 views

11 months ago

Computerphile
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

Your browser is using this system right now! (at time of typing!) - Dr Mike Pound explains this ubiquitous system! EXTRA BITS with ...

18:02
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

132,669 views

1 year ago

Computerphile
SHA2 Fatal Flaw? (Hash Length Extension Attack) - Computerphile

SHA2's weakness explained by Dr Mike Pound -- Check out Brilliant's courses and start for free at ...

12:24
SHA2 Fatal Flaw? (Hash Length Extension Attack) - Computerphile

115,950 views

3 months ago

Trouble- Free
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

7:13
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|

240,412 views

4 years ago

COSIC - Computer Security and Industrial Cryptography
"Rotational Cryptanalysis on MAC Algorithm Chaskey" (ACNS 2020)

Title: "Rotational Cryptanalysis on MAC Algorithm Chaskey" Authors: Liliya Kraleva, Tomer Ashur and Vincent Rijmen Venue: ...

17:05
"Rotational Cryptanalysis on MAC Algorithm Chaskey" (ACNS 2020)

245 views

5 years ago

Liliya Stoykova
Rotational Cryptanalysis on MAC Algorithm Chaskey,  ACNS2020
17:05
Rotational Cryptanalysis on MAC Algorithm Chaskey, ACNS2020

38 views

5 years ago

Practical Networking
Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials

In this video, we dive into the fascinating world of hashing and how it transforms data. You'll learn how hashing algorithms, like ...

6:03
Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials

29,541 views

1 year ago

Udacity
Hash Based Message Authentication

This video is part of the Udacity course "Intro to Information Security". Watch the full course at ...

2:20
Hash Based Message Authentication

59,358 views

9 years ago

Sundeep Saradhi Kanthety
16-HMAC Algorithm Explained 🔐 | Hash-Based Message Authentication Code in Network Security

Hi Friends, SUPER THANKS is enabled by YouTube and if any viewer want to contribute any financial support (not mandatory) ...

20:58
16-HMAC Algorithm Explained 🔐 | Hash-Based Message Authentication Code in Network Security

174,991 views

7 years ago

Vidder, Inc.
Galois/Counter Mode (GCM) and GMAC

There's an updated video at https://www.youtube.com/watch?v=R2SodepLWLg Or search for 104 Galois/Counter Mode (GCM) ...

3:15
Galois/Counter Mode (GCM) and GMAC

38,934 views

9 years ago

Hack Sphere X
Build a Python MAC Changer Algorithm - 27

Ready to take your Python hacking skills to the next level? In this power-packed video, we build a full MAC Address Changer ...

29:09
Build a Python MAC Changer Algorithm - 27

105 views

7 months ago

HTMLconversions - Online Tutorials
6  Implementing The Algorithm to Check The Mac Did Change
6:13
6 Implementing The Algorithm to Check The Mac Did Change

1 view

1 year ago