ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

227 results

Cooper
Kill MD5 - Demystifying Hash Collisions - Ange Albertini

So this talk is about understanding the impact of current hash collision attack and as a side effect show that md5 is really broken ...

30:17
Kill MD5 - Demystifying Hash Collisions - Ange Albertini

2,179 views

6 years ago

The Dojo MX
Algoritmos de hashing para passwords

En este plática hablaremos de las cosas que todo programador debe de saber acerca de los algoritmos correctos para ...

1:14:08
Algoritmos de hashing para passwords

599 views

Streamed 5 years ago

Class4crypt
Class4crypt c4c7.4 Colisiones en funciones hash MD5 y SHA-1

Todas las diapositivas del curso: https://www.criptored.es/paginas/Criptograf%C3%ADa%20para%20Ingenier@s.html Resumen.

1:13:26
Class4crypt c4c7.4 Colisiones en funciones hash MD5 y SHA-1

1,707 views

4 years ago

Zaki Malik
Hashing

Introduction to hashing.

34:02
Hashing

54 views

7 years ago

Cube Drone
CascadiaJS Presentation: Hash Functions Taste Great with Anything

I haven't GIVEN this presentation yet, but it's.. the slides and the words and the voice bits. Sorry about the visible cursor.

32:42
CascadiaJS Presentation: Hash Functions Taste Great with Anything

2,639 views

11 years ago

Steven Gordon
Cryptography Hash Functions (CSS322, L18, Y14)

Introduction to hash functions and the properties required for their use in cryptography; Examples of MD5 and SHA of files, ...

39:09
Cryptography Hash Functions (CSS322, L18, Y14)

1,057 views

10 years ago

Jeremy Clark
Lecture 01

Hash functions (part 1 of 3)

35:53
Lecture 01

2,538 views

7 years ago

MathMesh
Covid Cryptography Part 3: Using Message Digests

The third part of PHB's cryptography course describes the use of message digest functions and introduces the idea of one way ...

39:05
Covid Cryptography Part 3: Using Message Digests

92 views

5 years ago

Linux.conf.au 2016 -- Geelong, Australia
Five* non-cryptographic hash functions enter. One hash function leaves.

Adam Harvey https://linux.conf.au/schedule/30208/view_talk When you say “hash function” in a room full of developers, people ...

37:31
Five* non-cryptographic hash functions enter. One hash function leaves.

4,911 views

9 years ago

Per Thorsheim
Optimizing the Computation of Hash Algorithms as an Attacker

Jens Steube (atom, author of @hashcat), speaking at Passwordscon in Las Vegas, July 30-31, 2013. -- Details are presented that ...

30:20
Optimizing the Computation of Hash Algorithms as an Attacker

2,106 views

12 years ago

Jeremy Clark
Lecture 02

Hash functions (part 2 of 3)

28:18
Lecture 02

1,954 views

7 years ago

Chris Powell
Hash algorithms, error detection, error correction and password cracking — 0x0000

0:00 — Hash functions 3:30 — Parity functions are hashes 8:50 — Error correction 15:18 — Mathematical functions, injective ...

37:04
Hash algorithms, error detection, error correction and password cracking — 0x0000

273 views

4 years ago

Steven Gordon
Digital Signatures and Hash Functions (CSS322, Lecture 17, 2013)

Digital signatures and properties of cryptographic hash functions; birthday problem. Lecture 17 of CSS322 Security and ...

1:15:32
Digital Signatures and Hash Functions (CSS322, Lecture 17, 2013)

2,105 views

11 years ago

NLPW::2014
Digest::SHA is broken

NLPW::2014::Utrecht — Nederlandse Perl Workshop 25 April by Mark Overmeer (MARKOV) New programmers all forgot about ...

24:38
Digest::SHA is broken

327 views

11 years ago

Steven Gordon
Cryptographic Hash Functions (CSS441, L17, Y15)

Hash functions and use for cryptographic. Hash functions for authentication, and attacks. Course material via: ...

1:29:57
Cryptographic Hash Functions (CSS441, L17, Y15)

2,938 views

9 years ago

Steven Gordon
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

Hash functions used in authentication. Lecture 16 ofCSS322 Security and Cryptography at Sirindhorn International Institute of ...

1:14:31
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

614 views

11 years ago

CH 30: IIT KHARAGPUR 02: Computer Science & Others
Lecture 42: Cryptographic Hash Function #CH30SP #swayamprabha

Subject : Computer Science Course Name : Cryptography and Network Security Welcome to Swayam Prabha! Description: ...

31:58
Lecture 42: Cryptographic Hash Function #CH30SP #swayamprabha

3 views

11 months ago

SecurityHackingVideo
NOTACON 2  Recent Attacks Against Hash Functions

Check out the following: http://solidshellsecurity.com/ (quality dedicated/vps servers and IT services) ...

54:48
NOTACON 2 Recent Attacks Against Hash Functions

2 views

12 years ago

Tanja Lange: Intro to crypto
Hash functions

Part of Introduction to Cryptology https://hyperelliptic.org/tanja/teaching/CS20/ Slides at ...

29:03
Hash functions

980 views

5 years ago

AlShark Sultan
TuTo Création Config MD5 Decryption

Objectif 50 Abonnées OK Objectif 100 Abonnées OK Objectif 150 Abonnées X Lien de mon site WEB (provisoire) ...

20:29
TuTo Création Config MD5 Decryption

352 views

8 years ago