ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

8,235 results

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

329,913 views

8 years ago

CS 161 (Computer Security) at UC Berkeley
[Cryptography4, Video 7] MACs Definition

Course website: https://sp25.cs161.org Slides: ...

6:34
[Cryptography4, Video 7] MACs Definition

536 views

10 months ago

Udacity
Hash Based Message Authentication

This video is part of the Udacity course "Intro to Information Security". Watch the full course at ...

2:20
Hash Based Message Authentication

59,366 views

9 years ago

Cyrill Gössi
Cryptography with Python 30: HMAC, Encrypt-then-MAC and GCM

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4--SmpzgswTvxLkZqC9QWn ⏰ Timestamps for ...

12:51
Cryptography with Python 30: HMAC, Encrypt-then-MAC and GCM

1,174 views

3 years ago

CS 161 (Computer Security) at UC Berkeley
[Cryptography4, Video 13] Combining Encryption and MAC Schemes

Course website: https://sp25.cs161.org Slides: ...

6:50
[Cryptography4, Video 13] Combining Encryption and MAC Schemes

414 views

10 months ago

WIRED
Harvard Professor Explains Algorithms in 5 Levels of Difficulty | WIRED

From the physical world to the virtual world, algorithms are seemingly everywhere. David J. Malan, Professor of Computer Science ...

25:47
Harvard Professor Explains Algorithms in 5 Levels of Difficulty | WIRED

4,747,298 views

2 years ago

Professor Messer
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

Security+ Training Course Index: https://professormesser.link/701videos Professor Messer's Course Notes: ...

10:25
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

261,787 views

2 years ago

Osiris Salazar
5   2   MACs Based On PRFs 10 min
9:59
5 2 MACs Based On PRFs 10 min

768 views

13 years ago

Michael Sambol
Ford-Fulkerson in 5 minutes

Step by step instructions showing how to run Ford-Fulkerson on a flow network.

5:15
Ford-Fulkerson in 5 minutes

1,146,846 views

10 years ago

Simply Explained
Asymmetric Encryption - Simply explained

How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from ...

4:40
Asymmetric Encryption - Simply explained

1,579,360 views

8 years ago

Osiris Salazar
6   6   Timing attacks on MAC verification 9 min
8:29
6 6 Timing attacks on MAC verification 9 min

492 views

13 years ago

Udacity
Secure Hash Algorithm

This video is part of the Udacity course "Intro to Information Security". Watch the full course at ...

2:14
Secure Hash Algorithm

43,744 views

9 years ago

Osiris Salazar
5   5   PMAC and the Carter Wegman MAC 16 min
15:27
5 5 PMAC and the Carter Wegman MAC 16 min

1,065 views

13 years ago

Osiris Salazar
5   1   Message Authentication Codes 16 min
15:16
5 1 Message Authentication Codes 16 min

2,885 views

13 years ago

RSA Conference
Symmetric Cryptography 1

Presenters: Jiali Shi, PhD Candidate, National University of Defense Technology Naito Yusuke, Head Researcher, Mitsubishi ...

19:07
Symmetric Cryptography 1

65 views

1 year ago

PowerCert Animated Videos
CSMA/CD and CSMA/CA Explained

What is CSMA/CD & CSMA/CA? Have you ever wondered how computers send data on a network without interfering with the data ...

6:14
CSMA/CD and CSMA/CA Explained

691,421 views

6 years ago

Cyrill Gössi
Cryptography with Python 31: Using HMAC in Python

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4--SmpzgswTvxLkZqC9QWn ⏰ Timestamps for ...

7:10
Cryptography with Python 31: Using HMAC in Python

941 views

3 years ago

CS 161 (Computer Security) at UC Berkeley
[Cryptography4, Video 14] Encrypt-then-MAC is Better

Course website: https://sp25.cs161.org Slides: ...

3:56
[Cryptography4, Video 14] Encrypt-then-MAC is Better

496 views

10 months ago

PowerCert Animated Videos
Spanning Tree Protocol | CCNA - Explained

Visit http://brilliant.org/PowerCert/ for a free 30 day trial and a 20% discount on the annual premium subscription The Spanning ...

11:55
Spanning Tree Protocol | CCNA - Explained

220,065 views

1 year ago

Professor Messer
Hashing Algorithms - CompTIA Security+ SY0-501 - 6.2

Security+ Training Course Index: https://professormesser.link/sy0501 Professor Messer's Success Bundle: ...

3:36
Hashing Algorithms - CompTIA Security+ SY0-501 - 6.2

68,073 views

7 years ago