ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,021,233 results

Practical Networking
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

... vs Encryption (two different problems) 2:37 - MAC Simply Explained 3:58 - MACs vs HMACs 5:38 - MAC Algorithms 5:57 - MACs ...

6:52
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

35,560 views

1 year ago

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

329,910 views

8 years ago

JayPMedia
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

... Attack 1:14 Hashing 1:55 The problem with Hashing 2:19 What is HMAC 3:25 MAC algorithms 3:51 HMAC in TLS 4:07 HMAC is ...

6:09
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

9,077 views

2 years ago

Cybersecurity at St. Cloud State University
16. Message Authentication Code MAC

... she uses a publicly known mac algorithm to generate a message of authentication code the message authentication code takes ...

1:21
16. Message Authentication Code MAC

29,548 views

3 years ago

Practical Networking
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is ...

7:24
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

80,354 views

4 years ago

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,051 views

9 years ago

Introduction to Cryptography by Christof Paar
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com.

1:15:07
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

64,523 views

11 years ago

Jan Goebel
HMAC explained | keyed hash message authentication code

More exclusive content: https://productioncoder.com/you-decide-what-we-build-next Twitter: https://twitter.com/_jgoebel Blog: ...

6:33
HMAC explained | keyed hash message authentication code

87,152 views

4 years ago

Computerphile
SHA2 Fatal Flaw? (Hash Length Extension Attack) - Computerphile

SHA2's weakness explained by Dr Mike Pound -- Check out Brilliant's courses and start for free at ...

12:24
SHA2 Fatal Flaw? (Hash Length Extension Attack) - Computerphile

116,061 views

3 months ago

People also watched

NetworkChuck
50 macOS Tips and Tricks Using Terminal (the last one is CRAZY!)

I know your password. Change it with Dashlane: https://www.dashlane.com/networkchuck50 (Use code networkchuck50 to get ...

11:11
50 macOS Tips and Tricks Using Terminal (the last one is CRAZY!)

938,136 views

3 years ago

Lattice
A wake up call for computer science students

To learn for free on Brilliant, go to https://brilliant.org/Lattice/. You'll also get 20% off an annual premium subscription. This video is ...

8:37
A wake up call for computer science students

309,793 views

2 months ago

freeCodeCamp.org
Algorithmic Trading Using Python - Full Course

Learn how to perform algorithmic trading using Python in this complete course. Algorithmic trading means using computers to ...

4:33:03
Algorithmic Trading Using Python - Full Course

3,076,491 views

5 years ago

NetworkChuck
I built an AI supercomputer with 5 Mac Studios

Get NordVPN 2Y plan + 4 months extra + 6 MORE months extra: https://nordvpn.com/networkchuck It's risk-free with Nord's 30-day ...

34:57
I built an AI supercomputer with 5 Mac Studios

1,897,541 views

10 months ago

MIT OpenCourseWare
21. Cryptography: Hash Functions

MIT 6.046J Design and Analysis of Algorithms, Spring 2015 View the complete course: http://ocw.mit.edu/6-046JS15 Instructor: ...

1:22:01
21. Cryptography: Hash Functions

192,507 views

9 years ago

KnowHowiT
SSH vulnerabilities MAC algorithms and CBC ciphers - , Disable Weak Ciphers (RC4 & TripleDES)Windows

This video is following on from the previous one (Disabling SSLv3 and TLS v1.0) The video covers removing support for RC4 and ...

12:51
SSH vulnerabilities MAC algorithms and CBC ciphers - , Disable Weak Ciphers (RC4 & TripleDES)Windows

1,731 views

3 years ago

Paul Turner
Intro to Digital Signatures & HMACs (and a little about TLS :)

Integrity and authentication are important to security. Digital signatures and HMACs serve as two of the primary means of ...

21:04
Intro to Digital Signatures & HMACs (and a little about TLS :)

5,050 views

3 years ago

Low Level Game Dev
The 5 Levels Of C++

Check out my Failproof OpenGL course for beginners: https://www.udemy.com/course/failproof-opengl-for-beginners/?

10:29
The 5 Levels Of C++

216,863 views

7 months ago

ByteByteGo
Session Vs JWT: The Differences You May Not Know!

Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bit.ly/bytebytegoytTopic Animation ...

7:00
Session Vs JWT: The Differences You May Not Know!

583,158 views

1 year ago

Mobilefish.com
Blockchain tutorial 30: HMAC

If you like this video and want to support me, go this page for my donation crypto addresses: ...

3:34
Blockchain tutorial 30: HMAC

17,160 views

7 years ago

Computerphile
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

Your browser is using this system right now! (at time of typing!) - Dr Mike Pound explains this ubiquitous system! EXTRA BITS with ...

18:02
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

132,879 views

1 year ago

Trouble- Free
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

7:13
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|

240,556 views

4 years ago

Practical Networking
Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials

In this video, we dive into the fascinating world of hashing and how it transforms data. You'll learn how hashing algorithms, like ...

6:03
Hashing and Hashing Algorithms - md5 sha1 sha256 sha2 sha3 - Cryptography Essentials

29,711 views

1 year ago

COSIC - Computer Security and Industrial Cryptography
"Rotational Cryptanalysis on MAC Algorithm Chaskey" (ACNS 2020)

Title: "Rotational Cryptanalysis on MAC Algorithm Chaskey" Authors: Liliya Kraleva, Tomer Ashur and Vincent Rijmen Venue: ...

17:05
"Rotational Cryptanalysis on MAC Algorithm Chaskey" (ACNS 2020)

245 views

5 years ago

Udacity
Hash Based Message Authentication

This video is part of the Udacity course "Intro to Information Security". Watch the full course at ...

2:20
Hash Based Message Authentication

59,366 views

9 years ago

Vidder, Inc.
Galois/Counter Mode (GCM) and GMAC

There's an updated video at https://www.youtube.com/watch?v=R2SodepLWLg Or search for 104 Galois/Counter Mode (GCM) ...

3:15
Galois/Counter Mode (GCM) and GMAC

38,946 views

9 years ago

Neso Academy
Multiple Access with Collision Avoidance (MACA)

Computer Networks: Multiple Access with Collision Avoidance (MACA) Topics Discussed: 1) Hidden and Exposed Terminal ...

9:53
Multiple Access with Collision Avoidance (MACA)

91,687 views

5 years ago

Liliya Stoykova
Rotational Cryptanalysis on MAC Algorithm Chaskey,  ACNS2020
17:05
Rotational Cryptanalysis on MAC Algorithm Chaskey, ACNS2020

38 views

5 years ago

Sundeep Saradhi Kanthety
16-HMAC Algorithm Explained 🔐 | Hash-Based Message Authentication Code in Network Security

Hi Friends, SUPER THANKS is enabled by YouTube and if any viewer want to contribute any financial support (not mandatory) ...

20:58
16-HMAC Algorithm Explained 🔐 | Hash-Based Message Authentication Code in Network Security

175,034 views

7 years ago

Hack Sphere X
Build a Python MAC Changer Algorithm - 27

Ready to take your Python hacking skills to the next level? In this power-packed video, we build a full MAC Address Changer ...

29:09
Build a Python MAC Changer Algorithm - 27

105 views

7 months ago