ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

643 results

internet-class
What is a crytographically secure hash function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

5:45
What is a crytographically secure hash function?

1,304 views

9 years ago

Steven Gordon
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

Applying the pigeonhole principle to (cryptographic) hash functions to determine how many inputs collide on a single hash value.

4:39
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

2,732 views

11 years ago

Jesse Warden
Hash Function

I cover what a hash function is, 2 of the many use cases for it, passwords and file differences, and show some examples in code.

4:13
Hash Function

589 views

7 years ago

Kai Hendry
3 interesting things about "hashes" for newbies

1. Fingerprints for file integrity 2. It's cryptographically equal, meaning it can be used to distribute load 3. It's one way, so it's good ...

4:02
3 interesting things about "hashes" for newbies

155 views

10 years ago

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,636 views

6 years ago

The Coding Gopher
Hashing Explained (SHA-256, MD5)

Check out Clerk: https://go.clerk.com/X1kC4pR ❤️ Get 40% OFF CodeCrafters: ...

11:27
Hashing Explained (SHA-256, MD5)

24,417 views

3 months ago

aantonop
Bitcoin Q&A: Hash Functions, Mining, and Addresses

How does a hash function work? Can you reverse a hash function? Are there risks of dependence on SHA-256? What is the ...

12:20
Bitcoin Q&A: Hash Functions, Mining, and Addresses

9,753 views

6 years ago

Tanja Lange: Cryptology
Cryptographic hash functions III - Formal security notions

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

18:29
Cryptographic hash functions III - Formal security notions

188 views

4 years ago

Tanja Lange: Cryptology
Cryptographic hash functions I - Practical aspects and generic hardness

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

17:17
Cryptographic hash functions I - Practical aspects and generic hardness

310 views

4 years ago

pwn.college
Cryptography: Hashing

... hash function out comes the hash value now there's a few properties that are super important for a cryptographic hash function ...

11:33
Cryptography: Hashing

2,493 views

3 years ago

Tanja Lange: Cryptology
Cryptographic hash functions V - Sponge functions

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

15:19
Cryptographic hash functions V - Sponge functions

1,901 views

4 years ago

IACR
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agree...

Paper by Shahar Cohen, Moni Naor presented at Crypto 2022 See https://iacr.org/cryptodb/data/paper.php?pubkey=32206.

4:49
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agree...

134 views

3 years ago

Lucas Layman
Hash Collisions and Load Factor

... many of the cryptographic algorithms for hashing they're close to perfect we're pretty sure and there's no perfect hash functions ...

18:47
Hash Collisions and Load Factor

5,443 views

5 years ago

Tom Olzak
Cryptography Part 4: Hashing

In this lesson, I explain cryptographic hashing, message digests, digital signatures, rainbow table attacks, and salted password ...

7:58
Cryptography Part 4: Hashing

794 views

4 years ago

Smart Contract Programmer
Learning Solidity (0.5) - Hash Function (Keccak256)

Keccak256 is a cryptographic hash function available in Solidity. In this video, I will show you how you can create a guessing ...

7:09
Learning Solidity (0.5) - Hash Function (Keccak256)

15,701 views

5 years ago

Center for Cybersecurity Innovation & Outreach
Lesson 9: Passwords and Hash Functions

Discusses why passwords are so prevalent today and how organizations use hash functions to secure stored passwords.

8:17
Lesson 9: Passwords and Hash Functions

2,766 views

9 years ago

Forti Tip
Your first hash function

Your first hash function In this hash function guide, you will learn, what are hash function, why are they being used ( data integrity ) ...

5:18
Your first hash function

446 views

5 years ago

Forti Tip
Hash functions in certificates

In this Fortigate Firewall video " hash functions in certificates " we will look at how a hash function works and why it is important for ...

6:36
Hash functions in certificates

1,736 views

6 years ago

chaintuts
Bitcoin Cryptography – Hashing Algorithms

Learn the properties of hashing algorithms, which algorithms are used in Bitcoin, and how hashes help secure cryptocurrency ...

10:56
Bitcoin Cryptography – Hashing Algorithms

99 views

6 years ago

IACR
The PHOTON Family of Lightweight Hash Functions (Crypto 2011)

Jian Guo, Thomas Peyrin, and Axel Poschmann Institute for Infocomm Research, Singapore; Nanyang Technological University, ...

17:52
The PHOTON Family of Lightweight Hash Functions (Crypto 2011)

1,944 views

14 years ago

Steven Gordon
Properties of Hash Functions (CSS441, L18, Y15)

One-way property, weak collision resistant and strong collision resistant hash functions. Course material via: ...

15:57
Properties of Hash Functions (CSS441, L18, Y15)

7,103 views

9 years ago

Smart Contract Programmer
Keccak256 Hash Function | Solidity 0.8

Keccak256 - cryptographic hash function in Solidity #Solidity #SmartContract #Ethereum #スマートコントラクト Remix ...

8:41
Keccak256 Hash Function | Solidity 0.8

18,666 views

4 years ago

Rafiq Bouhsen
14.Cryptography: Cryptographic Hashing Demo

A hash function is a mathematical equation with four important properties: Hash functions can take anything as input and create ...

6:40
14.Cryptography: Cryptographic Hashing Demo

192 views

4 years ago

internet-class
What is a trapdoor function?

One important kind is a trapdoor function. Trapdoor functions are somewhat similar to hash functions in that they are easy to ...

4:06
What is a trapdoor function?

19,498 views

9 years ago

saurabhschool
Message Digest and Digital Signature | Cryptographic Hash Function

This video lecture is produced by S. Saurabh. He is B.Tech from IIT and MS from USA. Message Digest and Digital Signature To ...

9:04
Message Digest and Digital Signature | Cryptographic Hash Function

16,369 views

10 years ago