ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

7,160 results

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,051 views

9 years ago

Steven Gordon
Message Authentication Codes (CSS441, L16, Y15)

MACs for authentication; modification and masquerade attacks on MACs; assumptions of MACs and collisions. Course material ...

1:07:07
Message Authentication Codes (CSS441, L16, Y15)

2,857 views

9 years ago

PQCrypto conference videos
Patrick Struck::Sponge-based Authenticated Encryption: Security against Quantum Attackers

Video from PQCrypto 2022 conference Title: Sponge-based Authenticated Encryption: Security against Quantum Attackers ...

21:31
Patrick Struck::Sponge-based Authenticated Encryption: Security against Quantum Attackers

51 views

3 years ago

Lady Tasnim
what is MAC? why is it used? Applied Cryptography

please use the comments section to comment, and like and subscribe if you would like me to post more videos like this.

13:51
what is MAC? why is it used? Applied Cryptography

194 views

4 years ago

IACR
Efficient Side-Channel Secure Message Authentication with Better Bounds

Paper by Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu presented at FSE 2020 See ...

26:07
Efficient Side-Channel Secure Message Authentication with Better Bounds

69 views

5 years ago

Steven Gordon
Security of MAC Functions (CSS322, L18, Y14)

Brute Force attacks on Message Authentication Codes; attacking the key versus attack the tag/code. Course material via: ...

37:05
Security of MAC Functions (CSS322, L18, Y14)

863 views

10 years ago

Steven Gordon
Cryptographic Hash Functions (CSS441, L17, Y15)

Hash functions and use for cryptographic. Hash functions for authentication, and attacks. Course material via: ...

1:29:57
Cryptographic Hash Functions (CSS441, L17, Y15)

2,937 views

9 years ago

Tanja Lange: Intro to crypto
Message Authentication Codes (MACs)

Slides are updated to correct an error for the formulas for OFB mode. Part of Introduction to Cryptology ...

10:06
Message Authentication Codes (MACs)

892 views

5 years ago

STMicroelectronics
Security Part2 - Basics of cryptography - 3 Integrity

Learn basic information about cryptography Intention of this training is to introduce main theory concerning cryptography basics ...

24:51
Security Part2 - Basics of cryptography - 3 Integrity

3,654 views

6 years ago

IACR
On the Security of Sponge-type Authenticated Encryption Modes

Paper by Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi presented at FSE 2020 See ...

24:47
On the Security of Sponge-type Authenticated Encryption Modes

269 views

5 years ago

Wael Alnahari
Public Key Cryptography and Message Authentication

Enterprise Information Systems Security Topics CYS602 Public-Key Cryptography and Message Authentication: § Secure Hash ...

26:26
Public Key Cryptography and Message Authentication

106 views

5 years ago

IACR
Known key Distinguisher on Full PRESENT
17:38
Known key Distinguisher on Full PRESENT

275 views

10 years ago

IACR
Authentication in the Bounded Storage Model

Paper by Willy Quach, Yevgeniy Dodis, Daniel Wichs presented at Eurocrypt 2022 See ...

23:49
Authentication in the Bounded Storage Model

167 views

3 years ago

Steven Gordon
Authentication with Symmetric Key Crypto and MACs (CSS322, L17, Y14)

Introduction to authentication. Authentication with symmetric key encryption. Authentication with Message Authentication Codes.

1:19:10
Authentication with Symmetric Key Crypto and MACs (CSS322, L17, Y14)

1,523 views

10 years ago

Lady Tasnim
MAC Constructions based on Hash and Block Ciphers

So this is the most secure and popular hash based mac algorithm used in these protocols so it's proven secure as long as the ...

16:09
MAC Constructions based on Hash and Block Ciphers

168 views

4 years ago

Lady Tasnim
AE (Authenticated Encryption)

briefly about authenticated encryption.

21:03
AE (Authenticated Encryption)

420 views

4 years ago

IACR
Tight Security Bounds for Double-block Hash-then-Sum MACs

Paper by Seongkwang Kim, Byeonghak Lee, Jooyoung Lee presented at Eurocrypt 2020 See ...

18:05
Tight Security Bounds for Double-block Hash-then-Sum MACs

189 views

5 years ago

IACR
Ratcheted Encryption and Key Exchange  The Security of Messaging

Paper by Mihir Bellare and Asha Camper Singh and Joseph Jaeger and Maya Nyayapati and Igors Stepanovs, presented at ...

21:53
Ratcheted Encryption and Key Exchange The Security of Messaging

512 views

8 years ago

PKI Consortium
Symmetric Key Exchange: Lightweight Alternatives for a Post-Quantum IoT

Symmetric cryptographic primitives such as AES are simple, efficient and secure – even in a post-quantum world – which makes ...

32:13
Symmetric Key Exchange: Lightweight Alternatives for a Post-Quantum IoT

102 views

2 years ago

IACR
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode

Paper by Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki presented at FSE ...

22:02
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode

97 views

5 years ago