ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

625 results

internet-class
What is a crytographically secure hash function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

5:45
What is a crytographically secure hash function?

1,302 views

9 years ago

Steven Gordon
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

Applying the pigeonhole principle to (cryptographic) hash functions to determine how many inputs collide on a single hash value.

4:39
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

2,729 views

10 years ago

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,250 views

6 years ago

aantonop
Bitcoin Q&A: Hash Functions, Mining, and Addresses

How does a hash function work? Can you reverse a hash function? Are there risks of dependence on SHA-256? What is the ...

12:20
Bitcoin Q&A: Hash Functions, Mining, and Addresses

9,752 views

6 years ago

Tanja Lange: Cryptology
Cryptographic hash functions I - Practical aspects and generic hardness

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

17:17
Cryptographic hash functions I - Practical aspects and generic hardness

308 views

4 years ago

Tanja Lange: Cryptology
Cryptographic hash functions III - Formal security notions

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

18:29
Cryptographic hash functions III - Formal security notions

186 views

4 years ago

pwn.college
Cryptography: Hashing

... hash function out comes the hash value now there's a few properties that are super important for a cryptographic hash function ...

11:33
Cryptography: Hashing

2,454 views

3 years ago

The Coding Gopher
Hashing Explained (SHA-256, MD5)

Check out Clerk: https://go.clerk.com/X1kC4pR ❤️ Get 40% OFF CodeCrafters: ...

11:27
Hashing Explained (SHA-256, MD5)

24,061 views

2 months ago

Jesse Warden
Hash Function

I cover what a hash function is, 2 of the many use cases for it, passwords and file differences, and show some examples in code.

4:13
Hash Function

588 views

7 years ago

Smart Contract Programmer
Learning Solidity (0.5) - Hash Function (Keccak256)

Keccak256 is a cryptographic hash function available in Solidity. In this video, I will show you how you can create a guessing ...

7:09
Learning Solidity (0.5) - Hash Function (Keccak256)

15,694 views

5 years ago

Lucas Layman
Hash Collisions and Load Factor

... many of the cryptographic algorithms for hashing they're close to perfect we're pretty sure and there's no perfect hash functions ...

18:47
Hash Collisions and Load Factor

5,424 views

5 years ago

Tanja Lange: Cryptology
Cryptographic hash functions V - Sponge functions

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

15:19
Cryptographic hash functions V - Sponge functions

1,897 views

4 years ago

Steven Gordon
Properties of Hash Functions (CSS441, L18, Y15)

One-way property, weak collision resistant and strong collision resistant hash functions. Course material via: ...

15:57
Properties of Hash Functions (CSS441, L18, Y15)

7,096 views

9 years ago

chaintuts
Bitcoin Cryptography – Hashing Algorithms

Learn the properties of hashing algorithms, which algorithms are used in Bitcoin, and how hashes help secure cryptocurrency ...

10:56
Bitcoin Cryptography – Hashing Algorithms

99 views

5 years ago

Tom Olzak
Cryptography Part 4: Hashing

In this lesson, I explain cryptographic hashing, message digests, digital signatures, rainbow table attacks, and salted password ...

7:58
Cryptography Part 4: Hashing

788 views

4 years ago

Forti Tip
Hash functions in certificates

In this Fortigate Firewall video " hash functions in certificates " we will look at how a hash function works and why it is important for ...

6:36
Hash functions in certificates

1,730 views

6 years ago

Forti Tip
Your first hash function

Your first hash function In this hash function guide, you will learn, what are hash function, why are they being used ( data integrity ) ...

5:18
Your first hash function

445 views

5 years ago

Decred
Blake-256 Transaction Hashing Process

Decred employs Blake-256r14, a cryptographic hash function that transforms transaction data into secure, fixed-length identifiers.

4:54
Blake-256 Transaction Hashing Process

51 views

3 months ago

Tanja Lange: Post-quantum cryptography
Hash-based signatures I - Basic concepts

This lecture is part of Post-quantum cryptography" part of the MasterMath course "Selected Areas in Cryptology" For details see ...

16:17
Hash-based signatures I - Basic concepts

4,720 views

4 years ago

IACR
The PHOTON Family of Lightweight Hash Functions (Crypto 2011)

Jian Guo, Thomas Peyrin, and Axel Poschmann Institute for Infocomm Research, Singapore; Nanyang Technological University, ...

17:52
The PHOTON Family of Lightweight Hash Functions (Crypto 2011)

1,943 views

14 years ago