ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

7,528 results

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

329,972 views

8 years ago

CS 161 (Computer Security) at UC Berkeley
[Cryptography4, Video 7] MACs Definition

Course website: https://sp25.cs161.org Slides: ...

6:34
[Cryptography4, Video 7] MACs Definition

536 views

10 months ago

Udacity
Hash Based Message Authentication

This video is part of the Udacity course "Intro to Information Security". Watch the full course at ...

2:20
Hash Based Message Authentication

59,371 views

9 years ago

Cyrill Gössi
Cryptography with Python 30: HMAC, Encrypt-then-MAC and GCM

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4--SmpzgswTvxLkZqC9QWn ⏰ Timestamps for ...

12:51
Cryptography with Python 30: HMAC, Encrypt-then-MAC and GCM

1,174 views

3 years ago

CS 161 (Computer Security) at UC Berkeley
[Cryptography4, Video 13] Combining Encryption and MAC Schemes

Course website: https://sp25.cs161.org Slides: ...

6:50
[Cryptography4, Video 13] Combining Encryption and MAC Schemes

414 views

10 months ago

WIRED
Harvard Professor Explains Algorithms in 5 Levels of Difficulty | WIRED

From the physical world to the virtual world, algorithms are seemingly everywhere. David J. Malan, Professor of Computer Science ...

25:47
Harvard Professor Explains Algorithms in 5 Levels of Difficulty | WIRED

4,748,091 views

2 years ago

Michael Sambol
Ford-Fulkerson in 5 minutes

Step by step instructions showing how to run Ford-Fulkerson on a flow network.

5:15
Ford-Fulkerson in 5 minutes

1,147,395 views

10 years ago

Professor Messer
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

Security+ Training Course Index: https://professormesser.link/701videos Professor Messer's Course Notes: ...

10:25
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

262,501 views

2 years ago

CS 161 (Computer Security) at UC Berkeley
[Cryptography4, Video 10] HMAC Definition

Course website: https://sp25.cs161.org Slides: ...

8:21
[Cryptography4, Video 10] HMAC Definition

524 views

10 months ago

Udacity
Secure Hash Algorithm

This video is part of the Udacity course "Intro to Information Security". Watch the full course at ...

2:14
Secure Hash Algorithm

43,748 views

9 years ago

RSA Conference
Symmetric Cryptography 1

Presenters: Jiali Shi, PhD Candidate, National University of Defense Technology Naito Yusuke, Head Researcher, Mitsubishi ...

19:07
Symmetric Cryptography 1

65 views

1 year ago

Simply Explained
Asymmetric Encryption - Simply explained

How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from ...

4:40
Asymmetric Encryption - Simply explained

1,579,764 views

8 years ago

Cyrill Gössi
Cryptography with Python 31: Using HMAC in Python

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4--SmpzgswTvxLkZqC9QWn ⏰ Timestamps for ...

7:10
Cryptography with Python 31: Using HMAC in Python

942 views

3 years ago

Professor Messer
Hashing Algorithms - CompTIA Security+ SY0-501 - 6.2

Security+ Training Course Index: https://professormesser.link/sy0501 Professor Messer's Success Bundle: ...

3:36
Hashing Algorithms - CompTIA Security+ SY0-501 - 6.2

68,075 views

7 years ago

Pooja Patel
Chaining MAC algorithm || Information security and cyber security || Study easier by Pooja Patel

Thanks for watching my video...!☺️☺️☺️☺️☺️☺️ Hello guys ‍♀️ This is Pooja...! I'll try to explain the concept of ...

1:53
Chaining MAC algorithm || Information security and cyber security || Study easier by Pooja Patel

6 views

4 years ago

CS 161 (Computer Security) at UC Berkeley
[Cryptography4, Video 14] Encrypt-then-MAC is Better

Course website: https://sp25.cs161.org Slides: ...

3:56
[Cryptography4, Video 14] Encrypt-then-MAC is Better

497 views

10 months ago

PowerCert Animated Videos
CSMA/CD and CSMA/CA Explained

What is CSMA/CD & CSMA/CA? Have you ever wondered how computers send data on a network without interfering with the data ...

6:14
CSMA/CD and CSMA/CA Explained

691,637 views

7 years ago

Cyrill Gössi
Cryptography with Python 33: Implementing Encrypt-then-MAC in Python

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4--SmpzgswTvxLkZqC9QWn ⏰ Timestamps for ...

10:48
Cryptography with Python 33: Implementing Encrypt-then-MAC in Python

911 views

3 years ago

PowerCert Animated Videos
Routing Tables | CCNA - Explained

What is a routing table? A routing table is a file that contains a set of rules that shows information on what path a data packet takes ...

13:13
Routing Tables | CCNA - Explained

142,562 views

9 months ago

NPTEL - Indian Institute of Science, Bengaluru
Lec 55 ICP from Information-Theoretic MAC: I

Information-theoretic message authentication codes, ICP from information-theoretic MACs.

54:18
Lec 55 ICP from Information-Theoretic MAC: I

288 views

3 years ago