ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,442 results

EduShine Classes - Arman Ali
Cryptography and Network Security BCS072 Unit 3 One shot | Message Authentication Codes Unit 3 AKTU

Cryptography and Network Security BCS072 Unit 3 One shot | Message Authentication Codes Unit 3 AKTU Cryptography ...

1:04:28
Cryptography and Network Security BCS072 Unit 3 One shot | Message Authentication Codes Unit 3 AKTU

10,609 views

3 months ago

HellasQCI
Authentication in QKD

QKD Architecture and Infrastructure.

20:08
Authentication in QKD

6 views

3 months ago

Bill Buchanan OBE
Applied Cryptography

Slides: https://asecuritysite.com/public/workshop_01.pdf.

1:08:56
Applied Cryptography

1,343 views

10 months ago

ayman mohamed
[Cryptography] MACs - Message Authentication Codes | HMAC | CMAC | CCM
47:08
[Cryptography] MACs - Message Authentication Codes | HMAC | CMAC | CCM

196 views

8 months ago

Carlo N. Romero, ASEAN Eng, M.Eng., PECE,LPT,CMAE
Cryptography

Okay ah sa authentication codes ah the message that just created with a key Ah create security by requiring a secret key So yung ...

28:54
Cryptography

73 views

2 months ago

Stir Trek
Authentication Demystified: Basic Auth to Web Tokens in 60 minutes - Stir Trek 2025

Recorded at Stir Trek 2025 https://stirtrek.com/speakers/2025 Seth Petry-Johnson Have you ever searched for "how to ...

45:32
Authentication Demystified: Basic Auth to Web Tokens in 60 minutes - Stir Trek 2025

58 views

7 months ago

Network Technician
Deconstructing HMAC: A Technical Deep Dive into Message Integrity and Authenticity

This presentation provides a comprehensive, 50-slide masterclass on HMAC (Hash-based Message Authentication Code), the ...

41:03
Deconstructing HMAC: A Technical Deep Dive into Message Integrity and Authenticity

31 views

2 months ago

Texyland
Hash Functions and MACs (SN)

4:32 The Pidgeonhole Principle 7:33 Attacks on hash functions 15:13 Message Authentication Codes 18:46 Measuring ...

25:19
Hash Functions and MACs (SN)

814 views

9 months ago

Jamal Diab
Message Authentication – Hashing, MACs, Digital Signatures & PKI

Message Authentication: Ensuring Integrity, Authenticity, and Non-Repudiation In this video, we explore Message ...

33:52
Message Authentication – Hashing, MACs, Digital Signatures & PKI

297 views

10 months ago

Ervin Simon Uadan
HASH FUNCTIONS ANDMESSAGEAUTHENTICATION

1. Cryptographic hash functions (MD5, SHA-1, SHA-2, SHA-3) 2. HMAC (Hash-based Message Authentication Code)

45:37
HASH FUNCTIONS ANDMESSAGEAUTHENTICATION

17 views

7 months ago

NPTEL IIT Bombay
Week 4 : Lecture 20 : Authentication: Part 1

Lecture 20 : Authentication: Part 1.

31:19
Week 4 : Lecture 20 : Authentication: Part 1

512 views

11 months ago

NPTEL IIT Bombay
Week 4 : Lecture 23 : Authentication: Part 4

Lecture 23 : Authentication: Part 4.

30:13
Week 4 : Lecture 23 : Authentication: Part 4

333 views

11 months ago

KenCodes
Cybersecurity #3
31:00
Cybersecurity #3

14 views

5 months ago

IACR
Key Exchange (Eurocrypt 2025)

Key Exchange is a session presented at Eurocrypt 2025 and chaired by Bernardo Magri. More information, including links to ...

1:03:38
Key Exchange (Eurocrypt 2025)

127 views

7 months ago

Sam Bowne
Ch 7 CNIT 141

A college course in Cryptography See: https://samsclass.info/141/141_S25.shtml.

35:27
Ch 7 CNIT 141

32 views

10 months ago

Sam Bowne
Ch 8 CNIT 141

A college course in Cryptography See: https://samsclass.info/141/141_S25.shtml.

29:58
Ch 8 CNIT 141

41 views

10 months ago

NDC Conferences
Practical cryptography with Tink - Neil Madden - NDC Security 2025

This talk was recorded at NDC Security in Oslo, Norway. #ndcsecurity #ndcconferences #security #developer #softwaredeveloper ...

42:41
Practical cryptography with Tink - Neil Madden - NDC Security 2025

1,750 views

10 months ago

CS 161 (Computer Security) at UC Berkeley
[CS161 FA25] Phone Security

Course website: https://fa25.cs161.org Slides: ...

2:37:46
[CS161 FA25] Phone Security

332 views

1 month ago

Nile
3. Nile Authentication Types

Authentication is at the heart of Zero Trust. In this session, we break down the advanced authentication types Nile supports to ...

24:14
3. Nile Authentication Types

174 views

7 months ago

Nafith Salama
ClearPass configuration Part 4 - Wired Authentication

nafithsalama This video is a continuation of previous videos talk about Aruba ClearPass Configuration training. in this part the ...

39:30
ClearPass configuration Part 4 - Wired Authentication

1,459 views

10 months ago