ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

789 results

Steven Gordon
CSS322, Lecture 19, 18 Jan 2013 - Hash Functions

Lecture 19 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

1:09:02
CSS322, Lecture 19, 18 Jan 2013 - Hash Functions

659 views

13 years ago

Cube Drone
CascadiaJS Presentation: Hash Functions Taste Great with Anything

I haven't GIVEN this presentation yet, but it's.. the slides and the words and the voice bits. Sorry about the visible cursor.

32:42
CascadiaJS Presentation: Hash Functions Taste Great with Anything

2,639 views

11 years ago

Linux.conf.au 2016 -- Geelong, Australia
Five* non-cryptographic hash functions enter. One hash function leaves.

Adam Harvey https://linux.conf.au/schedule/30208/view_talk When you say “hash function” in a room full of developers, people ...

37:31
Five* non-cryptographic hash functions enter. One hash function leaves.

4,904 views

9 years ago

Missing Semester
Lecture 9: Security and Cryptography (2020)

You can find the lecture notes and exercises for this lecture at https://missing.csail.mit.edu/2020/security/ Help us caption ...

1:01:00
Lecture 9: Security and Cryptography (2020)

75,468 views

5 years ago

Steven Gordon
CSS322, Lecture 17, 11 Jan 2013 - Hash Functions

Lecture 17 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

43:17
CSS322, Lecture 17, 11 Jan 2013 - Hash Functions

854 views

13 years ago

Steven Gordon
CSS322, Lecture 18, 11 Jan 2013 - Hash Functions

Lecture 18 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

1:13:50
CSS322, Lecture 18, 11 Jan 2013 - Hash Functions

1,331 views

13 years ago

Tanja Lange: Intro to crypto
Hash functions

Part of Introduction to Cryptology https://hyperelliptic.org/tanja/teaching/CS20/ Slides at ...

29:03
Hash functions

973 views

5 years ago

Steven Gordon
Cryptographic Hash Functions (CSS441, L17, Y15)

Hash functions and use for cryptographic. Hash functions for authentication, and attacks. Course material via: ...

1:29:57
Cryptographic Hash Functions (CSS441, L17, Y15)

2,937 views

9 years ago

DEFCONConference
DEF CON 25 Crypto and Privacy Village - David Wong - SHA 3 vs The World

Since Keccak has been selected as the winner of the SHA-3 competition in 2012, a myriad of different hash functions have been ...

57:03
DEF CON 25 Crypto and Privacy Village - David Wong - SHA 3 vs The World

3,643 views

8 years ago

Tanja Lange: Cryptology
Cryptographic hash functions IV - Proofs by reduction

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

22:28
Cryptographic hash functions IV - Proofs by reduction

344 views

4 years ago

Steven Gordon
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

Hash functions used in authentication. Lecture 16 ofCSS322 Security and Cryptography at Sirindhorn International Institute of ...

1:14:31
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

614 views

11 years ago

IACR
Trapdoor Hash Functions and Their Applications

Paper by Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky presented at Crypto 2019 See ...

22:45
Trapdoor Hash Functions and Their Applications

900 views

6 years ago

OWASP London
"SHA-3 vs the World" - David Wong

Since Keccak has been selected as the winner of the SHA-3 competition in 2012, a myriad of different hash functions have been ...

1:05:05
"SHA-3 vs the World" - David Wong

1,314 views

8 years ago

bostonpython
A Conceptual Introduction to Cryptography - Scott Sanderson

Boston Python Presentation Night 11 December 2023 "A Conceptual Introduction to Cryptography" Scott Sanderson Talk ...

1:13:53
A Conceptual Introduction to Cryptography - Scott Sanderson

113 views

2 years ago

Steven Gordon
Collision Resistance and Birthday Paradox (CSS322, L20, Y14)

Birthday paradox as example of collisions. Properties of cryptographic hash functions. Course material via: ...

47:46
Collision Resistance and Birthday Paradox (CSS322, L20, Y14)

4,286 views

10 years ago

Steven Gordon
Hash Functions and Digital Signatures (CSS322, L19, Y14)

Use of cryptographic hash functions for authentication. Digital signatures with public key crypto and hash functions. Required ...

1:16:53
Hash Functions and Digital Signatures (CSS322, L19, Y14)

2,858 views

10 years ago

Steven Gordon
Digital Signatures and Hash Functions (CSS322, Lecture 17, 2013)

Digital signatures and properties of cryptographic hash functions; birthday problem. Lecture 17 of CSS322 Security and ...

1:15:32
Digital Signatures and Hash Functions (CSS322, Lecture 17, 2013)

2,105 views

11 years ago

Steven Gordon
Cryptography Hash Functions (CSS322, L18, Y14)

Introduction to hash functions and the properties required for their use in cryptography; Examples of MD5 and SHA of files, ...

39:09
Cryptography Hash Functions (CSS322, L18, Y14)

1,057 views

10 years ago

IPFS
Double Hashing in IPNI: Reader Privacy at scale - Ivan Schasny

In this talk I'd like to speak about IPNI's journey to implementing Double Hashing at scale. I'll cover: what double hashing is and ...

32:57
Double Hashing in IPNI: Reader Privacy at scale - Ivan Schasny

182 views

2 years ago

IACR
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing

Paper by Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs presented at Eurocrypt 2019 See ...

28:46
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing

361 views

6 years ago