ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

8,664 results

Introduction to Cryptography by Christof Paar
Lecture 20: Hash Functions by Christof Paar

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com.

1:05:04
Lecture 20: Hash Functions by Christof Paar

72,780 views

11 years ago

MIT OpenCourseWare
21. Cryptography: Hash Functions

MIT 6.046J Design and Analysis of Algorithms, Spring 2015 View the complete course: http://ocw.mit.edu/6-046JS15 Instructor: ...

1:22:01
21. Cryptography: Hash Functions

192,447 views

9 years ago

PyCon AU
Four* non-cryptographic hash functions enter. One leaves. by Adam Harvey

When you say “hash function” in a room full of Python developers, people tend to think of the classics you get in hashlib: MD5, ...

32:39
Four* non-cryptographic hash functions enter. One leaves. by Adam Harvey

870 views

10 years ago

Cryptosense
Learn Cryptography | Part 5 - Hash Functions

Find out more about Cryptosense: https://cryptosense.com Follow us on Twitter: https://twitter.com/cryptosense ///// Cryptosense ...

24:26
Learn Cryptography | Part 5 - Hash Functions

1,445 views

3 years ago

Introduction to Cryptography by Christof Paar
Lecture 22: SHA-3 Hash Function by Christof Paar

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com.

1:38:17
Lecture 22: SHA-3 Hash Function by Christof Paar

70,326 views

8 years ago

Satish C J
Introduction to Hash Functions  and Application of Hash Functions in Cryptography - CSE4003

We will be looking at the following concepts in this lecture 1. What are hash functions 2. Properties of a good hash function 3.

44:53
Introduction to Hash Functions and Application of Hash Functions in Cryptography - CSE4003

25,405 views

5 years ago

Bill Buchanan OBE
SHA-3, Keccak and SHAKE (Sponge Function)

https://asecuritysite.com/hash/s3 https://asecuritysite.com/hash/gokang https://asecuritysite.com/hash/goshake Article: ...

22:17
SHA-3, Keccak and SHAKE (Sponge Function)

26,526 views

6 years ago

Matt Thomas
Cryptography/SSL 101 #2: Cryptographic hash functions

This video builds on the first one and introduces hash functions as a way to create a "unique" finger print of any digital entity like a ...

28:25
Cryptography/SSL 101 #2: Cryptographic hash functions

15,622 views

9 years ago

Introduction to Cryptography by Christof Paar
Lecture 21: SHA-1 Hash Function by Christof Paar

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com.

1:18:35
Lecture 21: SHA-1 Hash Function by Christof Paar

59,060 views

11 years ago

Computerphile
The Next Big SHA? SHA3 Sponge Function Explained - Computerphile

Learn more about the Jane Street internship at https://jane-st.co/internship-computerphile-25 If a bug is found in SHA2, SHA3 is ...

27:37
The Next Big SHA? SHA3 Sponge Function Explained - Computerphile

153,221 views

4 months ago

Santhosh M
Hash-Functions-basic
42:05
Hash-Functions-basic

174 views

5 years ago

Hicham Elmongui
[CompNetSec] - 13 - Cryptographic Hash Functions

Intro (time: 0:00) * Hash Functions (time: 1:06, slide(s): 3-6) * Message Authentication Code (MAC) (time: 1:11, slide(s): 7) * Digital ...

1:00:43
[CompNetSec] - 13 - Cryptographic Hash Functions

7,708 views

5 years ago

Sundeep Saradhi Kanthety
13-Message Authentication in Cryptography 🔐 | MAC vs Hash Functions vs Encryption

Three types of Authentications 1. Message Encryption 2. Message Authentication Code 3. Hash Functions.

40:57
13-Message Authentication in Cryptography 🔐 | MAC vs Hash Functions vs Encryption

239,499 views

7 years ago

Linux.conf.au 2016 -- Geelong, Australia
Five* non-cryptographic hash functions enter. One hash function leaves.

Adam Harvey https://linux.conf.au/schedule/30208/view_talk When you say “hash function” in a room full of developers, people ...

37:31
Five* non-cryptographic hash functions enter. One hash function leaves.

4,887 views

9 years ago

Internetwork Security
Cryptographic Hash Function
31:44
Cryptographic Hash Function

15,159 views

8 years ago

3Blue1Brown
But how does bitcoin actually work?

... The ledger is the currency 10:06 - Decentralization 12:26 - Cryptographic hash functions 14:38 - Proof of work and blockchains ...

25:16
But how does bitcoin actually work?

17,674,351 views

8 years ago

Cihangir Tezcan
Cryptographic Hash Functions

Full Course: https://www.youtube.com/playlist?list=PLUoixF7agmItZuTTXCFfY4J4p0ad2qbKs Cryptographic Hash Functions.

20:28
Cryptographic Hash Functions

400 views

3 years ago

nptelhrd
Cryptographic Hash Functions

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur.

49:37
Cryptographic Hash Functions

16,297 views

13 years ago

Zero Knowledge
ZK Whiteboard Sessions - S3M1: How to Build Hash Functions, with Jean-Philippe (JP) Aumasson

S3M1: How to Build Hash Functions, with Jean-Philippe (JP) Aumasson. For all additional info and resources watch it here: ...

1:14:50
ZK Whiteboard Sessions - S3M1: How to Build Hash Functions, with Jean-Philippe (JP) Aumasson

1,308 views

4 months ago

The Helpful Hacker
TryHackMe Hashing Basics Walkthrough | Step-by-Step CTF Guide

This is a walkthrough of the Hashing Basics room from TryHackMe. In this TryHackMe walkthrough I will explain the content and ...

1:04:29
TryHackMe Hashing Basics Walkthrough | Step-by-Step CTF Guide

18,971 views

1 year ago