ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

7,711 results

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,051 views

9 years ago

Steven Gordon
Security of MAC Functions (CSS322, L18, Y14)

Brute Force attacks on Message Authentication Codes; attacking the key versus attack the tag/code. Course material via: ...

37:05
Security of MAC Functions (CSS322, L18, Y14)

863 views

10 years ago

Cry.College
Length Extension Attacks

In this video we construct a naive MAC and then break it. [06 05 02]

3:15
Length Extension Attacks

13,973 views

4 years ago

Devopedia
5G Security Algorithms

Smartphone usage has become ubiquitous but how secure are our communications? This talk gives an overview of the keys and ...

1:23:19
5G Security Algorithms

359 views

1 year ago

secappdev.org
Cryptographic Algorithms - Bart Preneel

Messages have been encrypted for millennia. Successfully hiding the plaintext has required increasingly sophisticated algorithms ...

1:31:37
Cryptographic Algorithms - Bart Preneel

1,646 views

10 years ago

media.ccc.de
36C3 -  Cryptography demystified

https://media.ccc.de/v/36c3-10627-cryptography_demystified An introduction without maths This talk will explain the basic building ...

53:25
36C3 - Cryptography demystified

3,506 views

6 years ago

Cry.College
The BLAKE2 Hash Function

This video shows a real world hash function based on the HAIFA construction. [06 04 02]

2:25
The BLAKE2 Hash Function

2,723 views

4 years ago

Steven Gordon
Authentication with MACs and Hash Functions (CSS322, Lecture 15, 2013)

Brute force attacks on MACs; Hash Function concepts. Lecture 15 of CSS322 Security and Cryptography at Sirindhorn ...

1:16:02
Authentication with MACs and Hash Functions (CSS322, Lecture 15, 2013)

1,096 views

11 years ago

Cry.College
The HMAC Construction

In this video we learn about a hash based MAC. [06 05 03]

1:42
The HMAC Construction

1,074 views

4 years ago

Lady Tasnim
what is MAC? why is it used? Applied Cryptography

please use the comments section to comment, and like and subscribe if you would like me to post more videos like this.

13:51
what is MAC? why is it used? Applied Cryptography

193 views

4 years ago

IACR
Beyond Birthday Bound Secure MAC in Faulty Nonce Model

Paper by Avijit Dutta, Mridul Nandi, Suprita Talnikar presented at Eurocrypt 2019 See ...

20:22
Beyond Birthday Bound Secure MAC in Faulty Nonce Model

492 views

6 years ago

Lady Tasnim
MAC Constructions based on Hash and Block Ciphers

So this is the most secure and popular hash based mac algorithm used in these protocols so it's proven secure as long as the ...

16:09
MAC Constructions based on Hash and Block Ciphers

168 views

4 years ago

Tanja Lange: Cryptology
Symmetric-key cryptography VII - Message authentication codes (MACs)

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

28:39
Symmetric-key cryptography VII - Message authentication codes (MACs)

199 views

4 years ago

IACR
On the Adaptive Security of MACs and PRFs

Paper by Andrew Morgan, Rafael Pass, Elaine Shi presented at Asiacrypt 2020 See ...

23:12
On the Adaptive Security of MACs and PRFs

254 views

5 years ago

Steven Gordon
Authentication with Symmetric Key Crypto and MACs (CSS322, L17, Y14)

Introduction to authentication. Authentication with symmetric key encryption. Authentication with Message Authentication Codes.

1:19:10
Authentication with Symmetric Key Crypto and MACs (CSS322, L17, Y14)

1,523 views

10 years ago

Cryptography
Block Cipher

Block Cipher.

1:30:14
Block Cipher

1,676 views

5 years ago

Tanja Lange: Intro to crypto
Message Authentication Codes (MACs)

Slides are updated to correct an error for the formulas for OFB mode. Part of Introduction to Cryptology ...

10:06
Message Authentication Codes (MACs)

889 views

5 years ago

IACR
On the Security of Sponge-type Authenticated Encryption Modes

Paper by Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi presented at FSE 2020 See ...

24:47
On the Security of Sponge-type Authenticated Encryption Modes

269 views

5 years ago

Cry.College
Message Authentication Codes (MACs)

This video introduces the concept of MACs. [06 05 01]

1:58
Message Authentication Codes (MACs)

559 views

4 years ago

CNCF [Cloud Native Computing Foundation]
Handling JWTs: Understanding Common Pitfalls - Bruce MacDonald, InfraHQ

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon Europe in Amsterdam, The Netherlands from 18 - 21 ...

24:56
Handling JWTs: Understanding Common Pitfalls - Bruce MacDonald, InfraHQ

662 views

2 years ago

IACR
Efficient Side-Channel Secure Message Authentication with Better Bounds

Paper by Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu presented at FSE 2020 See ...

26:07
Efficient Side-Channel Secure Message Authentication with Better Bounds

69 views

5 years ago

IACR
Encrypt or Decrypt  To Make a Single Key Beyond Birthday Secure Nonce Based MAC

Paper by Nilanjan Datta and Avijit Dutta and Mridul Nandi and Kan Yasuda, presented at Crypto 2018.

21:25
Encrypt or Decrypt To Make a Single Key Beyond Birthday Secure Nonce Based MAC

365 views

7 years ago

IACR
The Exact Security of PMAC with Two Powering-Up Masks

Paper by Yusuke Naito presented at FSE 2020 See https://iacr.org/cryptodb/data/paper.php?pubkey=29507. The conference ...

17:55
The Exact Security of PMAC with Two Powering-Up Masks

125 views

5 years ago

IACR
Tight Security Bounds for Double-block Hash-then-Sum MACs

Paper by Seongkwang Kim, Byeonghak Lee, Jooyoung Lee presented at Eurocrypt 2020 See ...

18:05
Tight Security Bounds for Double-block Hash-then-Sum MACs

189 views

5 years ago

Corpus & Repository of Writing
CIABATTA: Running the metadata script on Mac OS

Crow researcher Aleks Novikov describes how to run a script to process metadata in preparation to add metadata to corpus files.

6:58
CIABATTA: Running the metadata script on Mac OS

67 views

4 years ago