ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

756 results

Sophia Danesino
Message Authentication Code

MAC: differenza con hash e firma digitale.

4:55
Message Authentication Code

1,090 views

6 years ago

Vu Hung Nguyen (Hưng)
12 Secure Your Messages: Understanding Message Authentication Codes (MACs) #AI #NLP #Tech #Podcast

Understanding Message Authentication Codes (MACs) Explained Overview: This episode dives deep into Message ...

7:06
12 Secure Your Messages: Understanding Message Authentication Codes (MACs) #AI #NLP #Tech #Podcast

2 views

3 months ago

Tanja Lange: Intro to crypto
Message Authentication Codes (MACs)

Slides are updated to correct an error for the formulas for OFB mode. Part of Introduction to Cryptology ...

10:06
Message Authentication Codes (MACs)

889 views

5 years ago

Lady Tasnim
what is MAC? why is it used? Applied Cryptography

please use the comments section to comment, and like and subscribe if you would like me to post more videos like this.

13:51
what is MAC? why is it used? Applied Cryptography

193 views

4 years ago

IACR
Known key Distinguisher on Full PRESENT
17:38
Known key Distinguisher on Full PRESENT

275 views

10 years ago

Dr. Sara BARJ
An Innovative Quantum-Proof Message Authentication Code and Enhanced Key Exchange Protocol

MAC-LWE and KEP-LWE solutions: an InnovativeQuantum-Proof Message Authentication Code andEnhanced Key Exchange ...

11:16
An Innovative Quantum-Proof Message Authentication Code and Enhanced Key Exchange Protocol

27 views

1 year ago

DEFCONConference
DEF CON 32 - Mutual authentication is optional - Xavier Zhang

Physical access control systems are often exploited in a number of ways. It could be weaknesses found within the credential itself, ...

17:11
DEF CON 32 - Mutual authentication is optional - Xavier Zhang

533 views

1 year ago

Felix Weber
TOTP vs Azure MFA vs FIDO2 Security Keys

Get an insider's perspective on Multi-Factor Authentication (MFA) in this detailed comparison of Time-Based One-Time Passwords ...

5:27
TOTP vs Azure MFA vs FIDO2 Security Keys

429 views

2 years ago

IACR
Categorization of Faulty Nonce Misuse Resistant Message Authentication

Paper by Yu Long Chen, Bart Mennink, Bart Preneel presented at Asiacrypt 2021 See ...

18:06
Categorization of Faulty Nonce Misuse Resistant Message Authentication

86 views

4 years ago

UTeM MOOC
LECTURE 2 - AUTHENTICATION AND BASIC CRYPTOGRAPHY (PART 4)

INFORMATION TECHNOLOGY SECURITY_UTEM_MOOC.

6:54
LECTURE 2 - AUTHENTICATION AND BASIC CRYPTOGRAPHY (PART 4)

30 views

9 years ago

IACR
Hierarchical Identity Based Encryption from Affine Messafe Authentication

Presentation at Crypto 2014. Paper by Olivier Blazy and Eike Kiltz and Jiaxin Pan.

18:04
Hierarchical Identity Based Encryption from Affine Messafe Authentication

1,495 views

11 years ago

Vu Hung Nguyen (Hưng)
11 Cryptographic Hashes: Your Data's Digital Fingerprint #AI #NLP #Tech #Podcast #Learning

Cryptographic Hash Functions Explained: SHA, Security & Applications Overview: This episode provides a comprehensive look ...

7:21
11 Cryptographic Hashes: Your Data's Digital Fingerprint #AI #NLP #Tech #Podcast #Learning

8 views

3 months ago

PaceIT Online
PACE-IT: Security + 6.1 - Introduction to Cryptography (part 2)

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

7:44
PACE-IT: Security + 6.1 - Introduction to Cryptography (part 2)

234 views

10 years ago

Chrome for Developers
SMS OTP form best practices

SMS OTP is widely used for phone number verification, 2 step verification, account recovery, and payment verification. However ...

8:25
SMS OTP form best practices

34,409 views

5 years ago

Trial & Error - Self Paced Learning
S3 Object Encryption

aws #Cloud #CloudSeekho #CloudComputing #HandsOnLearning #HandsOnLabs Lets Learn macOS - Big Sur ...

5:54
S3 Object Encryption

64 views

3 years ago

AISSMS INSTITUTE OF INFORMATION TECHNOLOGYY - IOIT
Message Authentication   1

Presenter: Ms.S.D.Kadu Message Authentication is concerned with: protecting the integrity of a message, validating identity of ...

4:26
Message Authentication 1

11 views

2 years ago

Vu Hung Nguyen (Hưng)
21 A Toolkit for Digital Trust

Deep Dive into Cryptography: SHA, HMAC, RSA & Diffie-Hellman Explained Overview: This episode provides a detailed technical ...

9:11
21 A Toolkit for Digital Trust

2 views

3 months ago

IACR
The Exact Security of PMAC with Two Powering-Up Masks

Paper by Yusuke Naito presented at FSE 2020 See https://iacr.org/cryptodb/data/paper.php?pubkey=29507. The conference ...

17:55
The Exact Security of PMAC with Two Powering-Up Masks

125 views

5 years ago

dotconferences
dotSwift 2020 - Cory Benfield - Cryptography in Swift

Filmed at https://2020.dotswift.io on February 3, 2020 in Paris. More talks on https://dotconferences.com/talks In this session, Cory ...

17:58
dotSwift 2020 - Cory Benfield - Cryptography in Swift

3,307 views

5 years ago

U-tube
CEH19-4 Cryptographic protocol

CEH Ethical Hacking Course! Please Subscribe my channel !!!!!

6:51
CEH19-4 Cryptographic protocol

130 views

6 years ago