ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

224 results

Cooper
Kill MD5 - Demystifying Hash Collisions - Ange Albertini

So this talk is about understanding the impact of current hash collision attack and as a side effect show that md5 is really broken ...

30:17
Kill MD5 - Demystifying Hash Collisions - Ange Albertini

2,175 views

6 years ago

The Dojo MX
Algoritmos de hashing para passwords

En este plática hablaremos de las cosas que todo programador debe de saber acerca de los algoritmos correctos para ...

1:14:08
Algoritmos de hashing para passwords

598 views

Streamed 5 years ago

Class4crypt
Class4crypt c4c7.4 Colisiones en funciones hash MD5 y SHA-1

Todas las diapositivas del curso: https://www.criptored.es/paginas/Criptograf%C3%ADa%20para%20Ingenier@s.html Resumen.

1:13:26
Class4crypt c4c7.4 Colisiones en funciones hash MD5 y SHA-1

1,706 views

4 years ago

Zaki Malik
Hashing

Introduction to hashing.

34:02
Hashing

54 views

7 years ago

Steven Gordon
Cryptography Hash Functions (CSS322, L18, Y14)

Introduction to hash functions and the properties required for their use in cryptography; Examples of MD5 and SHA of files, ...

39:09
Cryptography Hash Functions (CSS322, L18, Y14)

1,057 views

10 years ago

MathMesh
Covid Cryptography Part 3: Using Message Digests

The third part of PHB's cryptography course describes the use of message digest functions and introduces the idea of one way ...

39:05
Covid Cryptography Part 3: Using Message Digests

92 views

5 years ago

Linux.conf.au 2016 -- Geelong, Australia
Five* non-cryptographic hash functions enter. One hash function leaves.

Adam Harvey https://linux.conf.au/schedule/30208/view_talk When you say “hash function” in a room full of developers, people ...

37:31
Five* non-cryptographic hash functions enter. One hash function leaves.

4,898 views

9 years ago

Jeremy Clark
Lecture 01

Hash functions (part 1 of 3)

35:53
Lecture 01

2,533 views

7 years ago

Per Thorsheim
Optimizing the Computation of Hash Algorithms as an Attacker

Jens Steube (atom, author of @hashcat), speaking at Passwordscon in Las Vegas, July 30-31, 2013. -- Details are presented that ...

30:20
Optimizing the Computation of Hash Algorithms as an Attacker

2,104 views

12 years ago

Jeremy Clark
Lecture 02

Hash functions (part 2 of 3)

28:18
Lecture 02

1,951 views

7 years ago

Chris Powell
Hash algorithms, error detection, error correction and password cracking — 0x0000

0:00 — Hash functions 3:30 — Parity functions are hashes 8:50 — Error correction 15:18 — Mathematical functions, injective ...

37:04
Hash algorithms, error detection, error correction and password cracking — 0x0000

273 views

4 years ago

NLPW::2014
Digest::SHA is broken

NLPW::2014::Utrecht — Nederlandse Perl Workshop 25 April by Mark Overmeer (MARKOV) New programmers all forgot about ...

24:38
Digest::SHA is broken

327 views

11 years ago

Tanja Lange: Intro to crypto
Hash functions

Part of Introduction to Cryptology https://hyperelliptic.org/tanja/teaching/CS20/ Slides at ...

29:03
Hash functions

971 views

5 years ago

Steven Gordon
Cryptographic Hash Functions (CSS441, L17, Y15)

Hash functions and use for cryptographic. Hash functions for authentication, and attacks. Course material via: ...

1:29:57
Cryptographic Hash Functions (CSS441, L17, Y15)

2,937 views

9 years ago

Steven Gordon
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

Hash functions used in authentication. Lecture 16 ofCSS322 Security and Cryptography at Sirindhorn International Institute of ...

1:14:31
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

614 views

11 years ago

CH 30: IIT KHARAGPUR 02: Computer Science & Others
Lecture 42: Cryptographic Hash Function #CH30SP #swayamprabha

Subject : Computer Science Course Name : Cryptography and Network Security Welcome to Swayam Prabha! Description: ...

31:58
Lecture 42: Cryptographic Hash Function #CH30SP #swayamprabha

3 views

10 months ago

SecurityHackingVideo
NOTACON 2  Recent Attacks Against Hash Functions

Check out the following: http://solidshellsecurity.com/ (quality dedicated/vps servers and IT services) ...

54:48
NOTACON 2 Recent Attacks Against Hash Functions

2 views

12 years ago

Class4crypt
Class4crypt c4c7.5 SHA 2, SHA 3 y resumen de funciones hash

Todas las diapositivas del curso: https://www.criptored.es/paginas/Criptograf%C3%ADa%20para%20Ingenier@s.html Resumen.

1:15:00
Class4crypt c4c7.5 SHA 2, SHA 3 y resumen de funciones hash

1,881 views

4 years ago

AlShark Sultan
TuTo Création Config MD5 Decryption

Objectif 50 Abonnées OK Objectif 100 Abonnées OK Objectif 150 Abonnées X Lien de mon site WEB (provisoire) ...

20:29
TuTo Création Config MD5 Decryption

352 views

8 years ago

Cube Drone
CascadiaJS Presentation: Hash Functions Taste Great with Anything

I haven't GIVEN this presentation yet, but it's.. the slides and the words and the voice bits. Sorry about the visible cursor.

32:42
CascadiaJS Presentation: Hash Functions Taste Great with Anything

2,639 views

11 years ago