Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
519 results
I haven't GIVEN this presentation yet, but it's.. the slides and the words and the voice bits. Sorry about the visible cursor.
2,639 views
11 years ago
... hash function and in this video we're gonna see some different examples of what different hash functions are so a hash function ...
711 views
5 years ago
Part of Introduction to Cryptology https://hyperelliptic.org/tanja/teaching/CS20/ Slides at ...
971 views
Hashing is a way of implementing a dictionary abstract data type, allowing easy insertion and finding of elements.
1,337 views
6 years ago
Paper by Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky presented at Crypto 2019 See ...
900 views
CST201- Data Structures - KTU.
67 views
Hash functions and use for cryptographic. Hash functions for authentication, and attacks. Course material via: ...
2,937 views
9 years ago
Lecture 17 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.
854 views
13 years ago
Use of cryptographic hash functions for authentication. Digital signatures with public key crypto and hash functions. Required ...
2,857 views
10 years ago
0:00 — Hash functions 3:30 — Parity functions are hashes 8:50 — Error correction 15:18 — Mathematical functions, injective ...
273 views
4 years ago
Paper by Ilan Komargodski and Eylon Yogev presented at Crypto 2018.
301 views
7 years ago
Paper by Binyi Chen, Stefano Tessaro presented at Crypto 2019 See https://iacr.org/cryptodb/data/paper.php?pubkey=29898.
1,400 views
Adam Harvey https://linux.conf.au/schedule/30208/view_talk When you say “hash function” in a room full of developers, people ...
4,899 views
Paper by Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos presented at TCC 2020 See ...
108 views
This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...
344 views
... is a hash collision especially in non cryptographically secure hashes for example here with a small easier hash function so what ...
2,175 views
... given 500 7 550 700 76 85 92 7311 so what is the hash function I have defined if the hash function defined is key mod 7 what is ...
99 views
Password storage. Attacks on hashed passwords. Rainbow tables. Salted passwords. Password selection. Lecture 8 of ITS335 IT ...
11,517 views
12 years ago
Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Mingwu Zhang. Talk at Asiacrypt 2016.
398 views
Acquisition and Hashing by Elmer Hoeksema, February 12th 2014.
246 views