ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,020,436 results

Practical Networking
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

... vs Encryption (two different problems) 2:37 - MAC Simply Explained 3:58 - MACs vs HMACs 5:38 - MAC Algorithms 5:57 - MACs ...

6:52
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

35,488 views

1 year ago

JayPMedia
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

... Attack 1:14 Hashing 1:55 The problem with Hashing 2:19 What is HMAC 3:25 MAC algorithms 3:51 HMAC in TLS 4:07 HMAC is ...

6:09
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

9,039 views

2 years ago

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

329,873 views

8 years ago

Cybersecurity at St. Cloud State University
16. Message Authentication Code MAC

... she uses a publicly known mac algorithm to generate a message of authentication code the message authentication code takes ...

1:21
16. Message Authentication Code MAC

29,536 views

3 years ago

Introduction to Cryptography by Christof Paar
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com.

1:15:07
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

64,514 views

11 years ago

Practical Networking
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is ...

7:24
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

80,321 views

4 years ago

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,051 views

9 years ago

People also watched

NetworkChuck
Ethernet is DEAD?? Mac Studio is 100x FASTER!!

Hey…just try Twingate….you'll never look at VPN the same: https://ntck.co/twingate-networkchuck I built another AI supercomputer ...

33:14
Ethernet is DEAD?? Mac Studio is 100x FASTER!!

407,993 views

3 weeks ago

Underscore_
The Astonishing Algorithm That Reads the Future
33:46
The Astonishing Algorithm That Reads the Future

275,537 views

3 months ago

jakkuh
Apple did what NVIDIA wouldn't

Check out Boot.dev at https://boot.dev/?promo=JAKKUH and use code JAKKUH to get 25% off your first plan! Support me on ...

20:04
Apple did what NVIDIA wouldn't

849,292 views

3 weeks ago

RandomTech
Disable Weak Algorithms in OpenSSH (Alma Redhat Rocky)

How to disable weak algorithms used by openssh. System used is almalinux, but rocky, redhat, centos, and oracle linux are the ...

23:04
Disable Weak Algorithms in OpenSSH (Alma Redhat Rocky)

6,553 views

3 years ago

David Wong
What is GCM? Galois Counter Mode (of operation) (usually seen as AES-GCM)

In this video I'm explaining what is that Galois Counter Mode that provides Authenticated Encryption with Associated Data (AEAD).

16:02
What is GCM? Galois Counter Mode (of operation) (usually seen as AES-GCM)

71,068 views

10 years ago

NetworkChuck
50 macOS Tips and Tricks Using Terminal (the last one is CRAZY!)

I know your password. Change it with Dashlane: https://www.dashlane.com/networkchuck50 (Use code networkchuck50 to get ...

11:11
50 macOS Tips and Tricks Using Terminal (the last one is CRAZY!)

937,766 views

3 years ago

KnowHowiT
SSH vulnerabilities MAC algorithms and CBC ciphers - , Disable Weak Ciphers (RC4 & TripleDES)Windows

This video is following on from the previous one (Disabling SSLv3 and TLS v1.0) The video covers removing support for RC4 and ...

12:51
SSH vulnerabilities MAC algorithms and CBC ciphers - , Disable Weak Ciphers (RC4 & TripleDES)Windows

1,731 views

3 years ago

MIT OpenCourseWare
21. Cryptography: Hash Functions

MIT 6.046J Design and Analysis of Algorithms, Spring 2015 View the complete course: http://ocw.mit.edu/6-046JS15 Instructor: ...

1:22:01
21. Cryptography: Hash Functions

192,492 views

9 years ago

ByteByteGo
Session Vs JWT: The Differences You May Not Know!

Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bit.ly/bytebytegoytTopic Animation ...

7:00
Session Vs JWT: The Differences You May Not Know!

582,594 views

1 year ago

Jeff Geerling
Apple didn't have to go this hard...

RDMA over Thunderbolt support landed in macOS 26.2. Is it good for HPC? For Exo and LLMs? Find out in this video. Resources ...

14:25
Apple didn't have to go this hard...

479,157 views

3 weeks ago

Jan Goebel
HMAC explained | keyed hash message authentication code

More exclusive content: https://productioncoder.com/you-decide-what-we-build-next Twitter: https://twitter.com/_jgoebel Blog: ...

6:33
HMAC explained | keyed hash message authentication code

87,132 views

4 years ago

Practical Networking
Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials

In this video, we dive into the fascinating world of hashing and how it transforms data. You'll learn how hashing algorithms, like ...

6:03
Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials

29,646 views

1 year ago

Trouble- Free
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

7:13
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|

240,513 views

4 years ago

Computerphile
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

Your browser is using this system right now! (at time of typing!) - Dr Mike Pound explains this ubiquitous system! EXTRA BITS with ...

18:02
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

132,806 views

1 year ago

Sebastian Lague
Algorithms Explained – minimax and alpha-beta pruning

This video covers the minimax search algorithm, as well as how it can be sped up using alpha-beta pruning. Pseudocode: ...

11:01
Algorithms Explained – minimax and alpha-beta pruning

1,333,094 views

7 years ago

Gizmo & Mac
Stoner Algorithm

Provided to YouTube by ONErpm Stoner Algorithm · Gizmo & Mac · HNGT · Max Krause · Nikolaus Nagel · Ricardo Hingst Stoner ...

4:18
Stoner Algorithm

470 views

0

WIRED
Harvard Professor Explains Algorithms in 5 Levels of Difficulty | WIRED

From the physical world to the virtual world, algorithms are seemingly everywhere. David J. Malan, Professor of Computer Science ...

25:47
Harvard Professor Explains Algorithms in 5 Levels of Difficulty | WIRED

4,746,598 views

2 years ago

COSIC - Computer Security and Industrial Cryptography
"Rotational Cryptanalysis on MAC Algorithm Chaskey" (ACNS 2020)

Title: "Rotational Cryptanalysis on MAC Algorithm Chaskey" Authors: Liliya Kraleva, Tomer Ashur and Vincent Rijmen Venue: ...

17:05
"Rotational Cryptanalysis on MAC Algorithm Chaskey" (ACNS 2020)

245 views

5 years ago

Sundeep Saradhi Kanthety
16-HMAC Algorithm Explained 🔐 | Hash-Based Message Authentication Code in Network Security

Hi Friends, SUPER THANKS is enabled by YouTube and if any viewer want to contribute any financial support (not mandatory) ...

20:58
16-HMAC Algorithm Explained 🔐 | Hash-Based Message Authentication Code in Network Security

175,023 views

7 years ago

Hack Sphere X
Build a Python MAC Changer Algorithm - 27

Ready to take your Python hacking skills to the next level? In this power-packed video, we build a full MAC Address Changer ...

29:09
Build a Python MAC Changer Algorithm - 27

105 views

7 months ago