ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

7,145 results

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,051 views

9 years ago

Steven Gordon
Security of MAC Functions (CSS322, L18, Y14)

Brute Force attacks on Message Authentication Codes; attacking the key versus attack the tag/code. Course material via: ...

37:05
Security of MAC Functions (CSS322, L18, Y14)

863 views

10 years ago

Cry.College
The BLAKE2 Hash Function

This video shows a real world hash function based on the HAIFA construction. [06 04 02]

2:25
The BLAKE2 Hash Function

2,726 views

4 years ago

secappdev.org
Cryptographic Algorithms - Bart Preneel

Messages have been encrypted for millennia. Successfully hiding the plaintext has required increasingly sophisticated algorithms ...

1:31:37
Cryptographic Algorithms - Bart Preneel

1,646 views

10 years ago

Devopedia
5G Security Algorithms

Smartphone usage has become ubiquitous but how secure are our communications? This talk gives an overview of the keys and ...

1:23:19
5G Security Algorithms

359 views

1 year ago

media.ccc.de
36C3 -  Cryptography demystified

https://media.ccc.de/v/36c3-10627-cryptography_demystified An introduction without maths This talk will explain the basic building ...

53:25
36C3 - Cryptography demystified

3,506 views

6 years ago

IACR
On the Security of Sponge-type Authenticated Encryption Modes

Paper by Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi presented at FSE 2020 See ...

24:47
On the Security of Sponge-type Authenticated Encryption Modes

269 views

5 years ago

Steven Gordon
Authentication with MACs and Hash Functions (CSS322, Lecture 15, 2013)

Brute force attacks on MACs; Hash Function concepts. Lecture 15 of CSS322 Security and Cryptography at Sirindhorn ...

1:16:02
Authentication with MACs and Hash Functions (CSS322, Lecture 15, 2013)

1,096 views

11 years ago

IACR
Known key Distinguisher on Full PRESENT
17:38
Known key Distinguisher on Full PRESENT

275 views

10 years ago

Cry.College
The HMAC Construction

In this video we learn about a hash based MAC. [06 05 03]

1:42
The HMAC Construction

1,075 views

4 years ago

IACR
Beyond Birthday Bound Secure MAC in Faulty Nonce Model

Paper by Avijit Dutta, Mridul Nandi, Suprita Talnikar presented at Eurocrypt 2019 See ...

20:22
Beyond Birthday Bound Secure MAC in Faulty Nonce Model

492 views

6 years ago

Lady Tasnim
MAC Constructions based on Hash and Block Ciphers

So this is the most secure and popular hash based mac algorithm used in these protocols so it's proven secure as long as the ...

16:09
MAC Constructions based on Hash and Block Ciphers

168 views

4 years ago

Lady Tasnim
what is MAC? why is it used? Applied Cryptography

please use the comments section to comment, and like and subscribe if you would like me to post more videos like this.

13:51
what is MAC? why is it used? Applied Cryptography

194 views

4 years ago

Cryptography
Block Cipher

Block Cipher.

1:30:14
Block Cipher

1,682 views

5 years ago

IACR
On the Adaptive Security of MACs and PRFs

Paper by Andrew Morgan, Rafael Pass, Elaine Shi presented at Asiacrypt 2020 See ...

23:12
On the Adaptive Security of MACs and PRFs

254 views

5 years ago

Steven Gordon
Authentication with Symmetric Key Crypto and MACs (CSS322, L17, Y14)

Introduction to authentication. Authentication with symmetric key encryption. Authentication with Message Authentication Codes.

1:19:10
Authentication with Symmetric Key Crypto and MACs (CSS322, L17, Y14)

1,523 views

10 years ago

IACR
Quantum authentication with key recycling

Paper by Christopher Portmann presented at Eurocrypt 2017. See https://iacr.org/cryptodb/data/paper.php?pubkey=28040.

23:21
Quantum authentication with key recycling

143 views

8 years ago

IACR
Ratcheted Encryption and Key Exchange  The Security of Messaging

Paper by Mihir Bellare and Asha Camper Singh and Joseph Jaeger and Maya Nyayapati and Igors Stepanovs, presented at ...

21:53
Ratcheted Encryption and Key Exchange The Security of Messaging

512 views

8 years ago

IACR
Efficient Side-Channel Secure Message Authentication with Better Bounds

Paper by Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu presented at FSE 2020 See ...

26:07
Efficient Side-Channel Secure Message Authentication with Better Bounds

69 views

5 years ago

IACR
Encrypt or Decrypt  To Make a Single Key Beyond Birthday Secure Nonce Based MAC

Paper by Nilanjan Datta and Avijit Dutta and Mridul Nandi and Kan Yasuda, presented at Crypto 2018.

21:25
Encrypt or Decrypt To Make a Single Key Beyond Birthday Secure Nonce Based MAC

365 views

7 years ago