Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
7,145 results
MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.
5,051 views
9 years ago
Brute Force attacks on Message Authentication Codes; attacking the key versus attack the tag/code. Course material via: ...
863 views
10 years ago
This video shows a real world hash function based on the HAIFA construction. [06 04 02]
2,726 views
4 years ago
Messages have been encrypted for millennia. Successfully hiding the plaintext has required increasingly sophisticated algorithms ...
1,646 views
Smartphone usage has become ubiquitous but how secure are our communications? This talk gives an overview of the keys and ...
359 views
1 year ago
https://media.ccc.de/v/36c3-10627-cryptography_demystified An introduction without maths This talk will explain the basic building ...
3,506 views
6 years ago
Paper by Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi presented at FSE 2020 See ...
269 views
5 years ago
Brute force attacks on MACs; Hash Function concepts. Lecture 15 of CSS322 Security and Cryptography at Sirindhorn ...
1,096 views
11 years ago
275 views
In this video we learn about a hash based MAC. [06 05 03]
1,075 views
Paper by Avijit Dutta, Mridul Nandi, Suprita Talnikar presented at Eurocrypt 2019 See ...
492 views
So this is the most secure and popular hash based mac algorithm used in these protocols so it's proven secure as long as the ...
168 views
please use the comments section to comment, and like and subscribe if you would like me to post more videos like this.
194 views
Block Cipher.
1,682 views
Paper by Andrew Morgan, Rafael Pass, Elaine Shi presented at Asiacrypt 2020 See ...
254 views
Introduction to authentication. Authentication with symmetric key encryption. Authentication with Message Authentication Codes.
1,523 views
Paper by Christopher Portmann presented at Eurocrypt 2017. See https://iacr.org/cryptodb/data/paper.php?pubkey=28040.
143 views
8 years ago
Paper by Mihir Bellare and Asha Camper Singh and Joseph Jaeger and Maya Nyayapati and Igors Stepanovs, presented at ...
512 views
Paper by Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu presented at FSE 2020 See ...
69 views
Paper by Nilanjan Datta and Avijit Dutta and Mridul Nandi and Kan Yasuda, presented at Crypto 2018.
365 views
7 years ago