ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

752 results

Sophia Danesino
Message Authentication Code

MAC: differenza con hash e firma digitale.

4:55
Message Authentication Code

1,090 views

6 years ago

Tanja Lange: Intro to crypto
Message Authentication Codes (MACs)

Slides are updated to correct an error for the formulas for OFB mode. Part of Introduction to Cryptology ...

10:06
Message Authentication Codes (MACs)

888 views

5 years ago

Vu Hung Nguyen (Hưng)
12 Secure Your Messages: Understanding Message Authentication Codes (MACs) #AI #NLP #Tech #Podcast

Understanding Message Authentication Codes (MACs) Explained Overview: This episode dives deep into Message ...

7:06
12 Secure Your Messages: Understanding Message Authentication Codes (MACs) #AI #NLP #Tech #Podcast

2 views

2 months ago

Lady Tasnim
what is MAC? why is it used? Applied Cryptography

please use the comments section to comment, and like and subscribe if you would like me to post more videos like this.

13:51
what is MAC? why is it used? Applied Cryptography

187 views

4 years ago

Dr. Sara BARJ
An Innovative Quantum-Proof Message Authentication Code and Enhanced Key Exchange Protocol

MAC-LWE and KEP-LWE solutions: an InnovativeQuantum-Proof Message Authentication Code andEnhanced Key Exchange ...

11:16
An Innovative Quantum-Proof Message Authentication Code and Enhanced Key Exchange Protocol

27 views

1 year ago

IACR
Known key Distinguisher on Full PRESENT
17:38
Known key Distinguisher on Full PRESENT

275 views

9 years ago

UTeM MOOC
LECTURE 2 - AUTHENTICATION AND BASIC CRYPTOGRAPHY (PART 4)

INFORMATION TECHNOLOGY SECURITY_UTEM_MOOC.

6:54
LECTURE 2 - AUTHENTICATION AND BASIC CRYPTOGRAPHY (PART 4)

30 views

9 years ago

IACR
Hierarchical Identity Based Encryption from Affine Messafe Authentication

Presentation at Crypto 2014. Paper by Olivier Blazy and Eike Kiltz and Jiaxin Pan.

18:04
Hierarchical Identity Based Encryption from Affine Messafe Authentication

1,495 views

11 years ago

PaceIT Online
PACE-IT: Security + 6.1 - Introduction to Cryptography (part 2)

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

7:44
PACE-IT: Security + 6.1 - Introduction to Cryptography (part 2)

233 views

10 years ago

IACR
Categorization of Faulty Nonce Misuse Resistant Message Authentication

Paper by Yu Long Chen, Bart Mennink, Bart Preneel presented at Asiacrypt 2021 See ...

18:06
Categorization of Faulty Nonce Misuse Resistant Message Authentication

86 views

4 years ago

Felix Weber
TOTP vs Azure MFA vs FIDO2 Security Keys

Get an insider's perspective on Multi-Factor Authentication (MFA) in this detailed comparison of Time-Based One-Time Passwords ...

5:27
TOTP vs Azure MFA vs FIDO2 Security Keys

424 views

2 years ago

AISSMS INSTITUTE OF INFORMATION TECHNOLOGYY - IOIT
Message Authentication   1

Presenter: Ms.S.D.Kadu Message Authentication is concerned with: protecting the integrity of a message, validating identity of ...

4:26
Message Authentication 1

11 views

2 years ago

Vu Hung Nguyen (Hưng)
11 Cryptographic Hashes: Your Data's Digital Fingerprint #AI #NLP #Tech #Podcast #Learning

Cryptographic Hash Functions Explained: SHA, Security & Applications Overview: This episode provides a comprehensive look ...

7:21
11 Cryptographic Hashes: Your Data's Digital Fingerprint #AI #NLP #Tech #Podcast #Learning

6 views

2 months ago

Trial & Error - Self Paced Learning
S3 Object Encryption

aws #Cloud #CloudSeekho #CloudComputing #HandsOnLearning #HandsOnLabs Lets Learn macOS - Big Sur ...

5:54
S3 Object Encryption

64 views

3 years ago

wikipedia tts
ISO/IEC 9797-1 | Wikipedia audio article

SUMMARY ======= ISO/IEC 9797-1 Information technology – Security techniques – Message Authentication Codes (MACs) ...

11:11
ISO/IEC 9797-1 | Wikipedia audio article

24 views

7 years ago

Vu Hung Nguyen (Hưng)
21 A Toolkit for Digital Trust

Deep Dive into Cryptography: SHA, HMAC, RSA & Diffie-Hellman Explained Overview: This episode provides a detailed technical ...

9:11
21 A Toolkit for Digital Trust

0 views

2 months ago

U-tube
CEH19-4 Cryptographic protocol

CEH Ethical Hacking Course! Please Subscribe my channel !!!!!

6:51
CEH19-4 Cryptographic protocol

127 views

6 years ago

DEFCONConference
DEF CON 32 - Mutual authentication is optional - Xavier Zhang

Physical access control systems are often exploited in a number of ways. It could be weaknesses found within the credential itself, ...

17:11
DEF CON 32 - Mutual authentication is optional - Xavier Zhang

532 views

1 year ago

IACR
The Exact Security of PMAC with Two Powering-Up Masks

Paper by Yusuke Naito presented at FSE 2020 See https://iacr.org/cryptodb/data/paper.php?pubkey=29507. The conference ...

17:55
The Exact Security of PMAC with Two Powering-Up Masks

125 views

5 years ago

Lady Tasnim
MAC Constructions based on Hash and Block Ciphers

... discuss the pre-mac the pre-mac pre stands for prepend the key and it means that we concatenate the key before the message ...

16:09
MAC Constructions based on Hash and Block Ciphers

168 views

4 years ago

dotconferences
dotSwift 2020 - Cory Benfield - Cryptography in Swift

Filmed at https://2020.dotswift.io on February 3, 2020 in Paris. More talks on https://dotconferences.com/talks In this session, Cory ...

17:58
dotSwift 2020 - Cory Benfield - Cryptography in Swift

3,304 views

5 years ago

internet-class
What is a crytographically secure hash function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

5:45
What is a crytographically secure hash function?

1,301 views

9 years ago

Geoffrey Schmit
02.18: add user authentication with Google

Web Application Frameworks. Naperville North High School, Software Engineering, 2024-2025.

15:19
02.18: add user authentication with Google

32 views

1 year ago

IACR
Indifferentiable Authenticated Encryption

Paper by Manuel Barbosa and Pooya Farshim, presented at Crypto 2018.

18:47
Indifferentiable Authenticated Encryption

293 views

7 years ago

PaceIT Online
PACE-IT: Security + 5.2 - Authentication and Authorization Basics (part 2)

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

9:37
PACE-IT: Security + 5.2 - Authentication and Authorization Basics (part 2)

187 views

10 years ago