ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

519 results

Cube Drone
CascadiaJS Presentation: Hash Functions Taste Great with Anything

I haven't GIVEN this presentation yet, but it's.. the slides and the words and the voice bits. Sorry about the visible cursor.

32:42
CascadiaJS Presentation: Hash Functions Taste Great with Anything

2,639 views

11 years ago

Lucas Layman
Hash Functions and Hash Tables

... hash function and in this video we're gonna see some different examples of what different hash functions are so a hash function ...

22:50
Hash Functions and Hash Tables

711 views

5 years ago

Tanja Lange: Intro to crypto
Hash functions

Part of Introduction to Cryptology https://hyperelliptic.org/tanja/teaching/CS20/ Slides at ...

29:03
Hash functions

971 views

5 years ago

Mark C. Wilson
AofA Lecture 16: Hashing basics

Hashing is a way of implementing a dictionary abstract data type, allowing easy insertion and finding of elements.

23:34
AofA Lecture 16: Hashing basics

1,337 views

6 years ago

IACR
Trapdoor Hash Functions and Their Applications

Paper by Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky presented at Crypto 2019 See ...

22:45
Trapdoor Hash Functions and Their Applications

900 views

6 years ago

Arul Treesa Mathew
HASHING   HASH FUNCTIONS

CST201- Data Structures - KTU.

42:32
HASHING HASH FUNCTIONS

67 views

5 years ago

Steven Gordon
Cryptographic Hash Functions (CSS441, L17, Y15)

Hash functions and use for cryptographic. Hash functions for authentication, and attacks. Course material via: ...

1:29:57
Cryptographic Hash Functions (CSS441, L17, Y15)

2,937 views

9 years ago

Steven Gordon
CSS322, Lecture 17, 11 Jan 2013 - Hash Functions

Lecture 17 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

43:17
CSS322, Lecture 17, 11 Jan 2013 - Hash Functions

854 views

13 years ago

Steven Gordon
Hash Functions and Digital Signatures (CSS322, L19, Y14)

Use of cryptographic hash functions for authentication. Digital signatures with public key crypto and hash functions. Required ...

1:16:53
Hash Functions and Digital Signatures (CSS322, L19, Y14)

2,857 views

10 years ago

Chris Powell
Hash algorithms, error detection, error correction and password cracking — 0x0000

0:00 — Hash functions 3:30 — Parity functions are hashes 8:50 — Error correction 15:18 — Mathematical functions, injective ...

37:04
Hash algorithms, error detection, error correction and password cracking — 0x0000

273 views

4 years ago

IACR
On Distributional Collision Resistant Hashing

Paper by Ilan Komargodski and Eylon Yogev presented at Crypto 2018.

24:17
On Distributional Collision Resistant Hashing

301 views

7 years ago

IACR
Memory-Hard Functions from Cryptographic Primitives

Paper by Binyi Chen, Stefano Tessaro presented at Crypto 2019 See https://iacr.org/cryptodb/data/paper.php?pubkey=29898.

22:54
Memory-Hard Functions from Cryptographic Primitives

1,400 views

6 years ago

Linux.conf.au 2016 -- Geelong, Australia
Five* non-cryptographic hash functions enter. One hash function leaves.

Adam Harvey https://linux.conf.au/schedule/30208/view_talk When you say “hash function” in a room full of developers, people ...

37:31
Five* non-cryptographic hash functions enter. One hash function leaves.

4,899 views

9 years ago

IACR
Blockchains from Non-Idealized Hash Functions

Paper by Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos presented at TCC 2020 See ...

23:11
Blockchains from Non-Idealized Hash Functions

108 views

5 years ago

Tanja Lange: Cryptology
Cryptographic hash functions IV - Proofs by reduction

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

22:28
Cryptographic hash functions IV - Proofs by reduction

344 views

4 years ago

Cooper
Kill MD5 - Demystifying Hash Collisions - Ange Albertini

... is a hash collision especially in non cryptographically secure hashes for example here with a small easier hash function so what ...

30:17
Kill MD5 - Demystifying Hash Collisions - Ange Albertini

2,175 views

6 years ago

GaneshKumar Pugalendhi
Unit-V: Searching Sorting Hashing - Topics: Hashing-Hash Function-Separate Chaining-Open Addressing

... given 500 7 550 700 76 85 92 7311 so what is the hash function I have defined if the hash function defined is key mod 7 what is ...

43:25
Unit-V: Searching Sorting Hashing - Topics: Hashing-Hash Function-Separate Chaining-Open Addressing

99 views

5 years ago

Steven Gordon
Passwords, Hashes and Salt (ITS335, Lecture 8, 2013)

Password storage. Attacks on hashed passwords. Rainbow tables. Salted passwords. Password selection. Lecture 8 of ITS335 IT ...

1:21:29
Passwords, Hashes and Salt (ITS335, Lecture 8, 2013)

11,517 views

12 years ago

IACR
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions

Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Mingwu Zhang. Talk at Asiacrypt 2016.

31:25
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions

398 views

9 years ago

zaanpenguin
Digital Forensics - Acquisition and Hashing - Elmer Hoeksema

Acquisition and Hashing by Elmer Hoeksema, February 12th 2014.

2:02:52
Digital Forensics - Acquisition and Hashing - Elmer Hoeksema

246 views

11 years ago