ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

641 results

internet-class
What is a crytographically secure hash function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

5:45
What is a crytographically secure hash function?

1,304 views

9 years ago

Steven Gordon
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

Applying the pigeonhole principle to (cryptographic) hash functions to determine how many inputs collide on a single hash value.

4:39
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

2,732 views

10 years ago

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,592 views

6 years ago

Jesse Warden
Hash Function

I cover what a hash function is, 2 of the many use cases for it, passwords and file differences, and show some examples in code.

4:13
Hash Function

589 views

7 years ago

Kai Hendry
3 interesting things about "hashes" for newbies

1. Fingerprints for file integrity 2. It's cryptographically equal, meaning it can be used to distribute load 3. It's one way, so it's good ...

4:02
3 interesting things about "hashes" for newbies

155 views

10 years ago

pwn.college
Cryptography: Hashing

... hash function out comes the hash value now there's a few properties that are super important for a cryptographic hash function ...

11:33
Cryptography: Hashing

2,488 views

3 years ago

The Coding Gopher
Hashing Explained (SHA-256, MD5)

Check out Clerk: https://go.clerk.com/X1kC4pR ❤️ Get 40% OFF CodeCrafters: ...

11:27
Hashing Explained (SHA-256, MD5)

24,374 views

2 months ago

Tanja Lange: Cryptology
Cryptographic hash functions III - Formal security notions

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

18:29
Cryptographic hash functions III - Formal security notions

188 views

4 years ago

aantonop
Bitcoin Q&A: Hash Functions, Mining, and Addresses

How does a hash function work? Can you reverse a hash function? Are there risks of dependence on SHA-256? What is the ...

12:20
Bitcoin Q&A: Hash Functions, Mining, and Addresses

9,753 views

6 years ago

Tanja Lange: Cryptology
Cryptographic hash functions I - Practical aspects and generic hardness

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

17:17
Cryptographic hash functions I - Practical aspects and generic hardness

310 views

4 years ago

Tanja Lange: Cryptology
Cryptographic hash functions V - Sponge functions

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

15:19
Cryptographic hash functions V - Sponge functions

1,901 views

4 years ago

Smart Contract Programmer
Learning Solidity (0.5) - Hash Function (Keccak256)

Keccak256 is a cryptographic hash function available in Solidity. In this video, I will show you how you can create a guessing ...

7:09
Learning Solidity (0.5) - Hash Function (Keccak256)

15,701 views

5 years ago

Tom Olzak
Cryptography Part 4: Hashing

In this lesson, I explain cryptographic hashing, message digests, digital signatures, rainbow table attacks, and salted password ...

7:58
Cryptography Part 4: Hashing

793 views

4 years ago

Steven Gordon
Properties of Hash Functions (CSS441, L18, Y15)

One-way property, weak collision resistant and strong collision resistant hash functions. Course material via: ...

15:57
Properties of Hash Functions (CSS441, L18, Y15)

7,103 views

9 years ago

IACR
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agree...

Paper by Shahar Cohen, Moni Naor presented at Crypto 2022 See https://iacr.org/cryptodb/data/paper.php?pubkey=32206.

4:49
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agree...

134 views

3 years ago

Lucas Layman
Hash Collisions and Load Factor

... many of the cryptographic algorithms for hashing they're close to perfect we're pretty sure and there's no perfect hash functions ...

18:47
Hash Collisions and Load Factor

5,437 views

5 years ago

Center for Cybersecurity Innovation & Outreach
Lesson 9: Passwords and Hash Functions

Discusses why passwords are so prevalent today and how organizations use hash functions to secure stored passwords.

8:17
Lesson 9: Passwords and Hash Functions

2,766 views

9 years ago

Forti Tip
Hash functions in certificates

In this Fortigate Firewall video " hash functions in certificates " we will look at how a hash function works and why it is important for ...

6:36
Hash functions in certificates

1,734 views

6 years ago

Tanja Lange: Post-quantum cryptography
Hash-based signatures I - Basic concepts

This lecture is part of Post-quantum cryptography" part of the MasterMath course "Selected Areas in Cryptology" For details see ...

16:17
Hash-based signatures I - Basic concepts

4,734 views

4 years ago

chaintuts
Bitcoin Cryptography – Hashing Algorithms

Learn the properties of hashing algorithms, which algorithms are used in Bitcoin, and how hashes help secure cryptocurrency ...

10:56
Bitcoin Cryptography – Hashing Algorithms

99 views

6 years ago