ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

684 results

Vu Hung Nguyen (Hưng)
05 Decoding AES: Structure, Functions, & Key Expansion #AI #NLP #Tech #Podcast #Learning

Advanced Encryption Standard (AES): Deep Dive into Modern Symmetric Encryption Overview: Explore the Advanced Encryption ...

6:50
05 Decoding AES: Structure, Functions, & Key Expansion #AI #NLP #Tech #Podcast #Learning

0 views

3 months ago

IACR
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits

Paper by Zhenyu Huang, Siwei Sun presented at Asiacrypt 2022 See https://iacr.org/cryptodb/data/paper.php?pubkey=32453.

4:52
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits

104 views

3 years ago

STMicroelectronics
STM32G4 OLT - 22 . Security Advanced Encryption Standard HW Accelerator AES

Find out more information: http://bit.ly/STM32G4 The STM32G4 Series combines a 32-bit Arm® Cortex®-M4 core (with FPU and ...

12:05
STM32G4 OLT - 22 . Security Advanced Encryption Standard HW Accelerator AES

872 views

6 years ago

STMicroelectronics
STM32L5 OLT -  24 . Security Advanced Encryption Standard HW Accelerator AES

Find out more information: http://bit.ly/STM32L5-Series The STM32L5 microcontroller series is the solution for embedded and IoT ...

12:10
STM32L5 OLT - 24 . Security Advanced Encryption Standard HW Accelerator AES

458 views

5 years ago

MemoryCorruption
AES CBC bit flipping attack

... exploration 01:24 AES introduction 02:35 AES Encryption 03:51 AES Decryption 05:03 Bit flip attack 06:57 Exploit writing 09:04 ...

9:30
AES CBC bit flipping attack

3,505 views

1 year ago

IACR
New Yoyo Tricks with AES-based Permutations

Paper by Dhiman Saha, Mostafizar Rahman, Goutam Paul presented at Fast Software Encryption Conference 2019 See ...

17:02
New Yoyo Tricks with AES-based Permutations

221 views

6 years ago

Danny Chen
Implementing AES Encryption on Programmable Switches via Scrambled Lookup Tables

Recorded talk for SIGCOMM 2020 Workshop on Secure Programmable Network Infrastructure. Paper link: ...

11:54
Implementing AES Encryption on Programmable Switches via Scrambled Lookup Tables

275 views

5 years ago

Department of Computer Engineering
Working of AES algorithm.

Working of AES algorithm.

14:46
Working of AES algorithm.

8 views

3 years ago

IACR
Implementing Grover oracles for quantum key search on AES and LowMC

Paper by Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia presented at Eurocrypt 2020 See ...

15:31
Implementing Grover oracles for quantum key search on AES and LowMC

687 views

5 years ago

IACR
New Insights on AES Like SPN Ciphers

Bing Sun and Meicheng Liu and Jian Guo and Longjiang Qu and Vincent Rijmen, Crypto 2016.

19:28
New Insights on AES Like SPN Ciphers

292 views

9 years ago

STMicroelectronics
STM32WB OLT - 24. Security Advanced Encryption Standard HW Accelerator AES

Find out more information: http://bit.ly/ST-STM32WB Based on an Arm® Cortex®‐M4 core running at 64 MHz (application ...

12:05
STM32WB OLT - 24. Security Advanced Encryption Standard HW Accelerator AES

537 views

6 years ago

IACR
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G

Paper by Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe presented at Fast Software Encryption ...

19:02
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G

232 views

3 years ago

Roel Van de Paar
AES implementation (3 Solutions!!)

AES implementation Helpful? Please support me on Patreon: https://www.patreon.com/roelvandepaar With thanks & praise to God ...

5:19
AES implementation (3 Solutions!!)

7 views

3 years ago

IACR
The design of scalar AES Instruction Set Extensions for RISC-V

Paper by Ben Marshall, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen, Claire Wolf presented at CHES 2020 See ...

17:46
The design of scalar AES Instruction Set Extensions for RISC-V

717 views

4 years ago

bugswriter
Encryption with Linux with AES-256 (secure AF) feat. Mr Robot

How to AES 256 algorithm with openssl in linux Don't comment - you gave me spoiler cause it was not! If you don't watch Mr ...

9:53
Encryption with Linux with AES-256 (secure AF) feat. Mr Robot

9,847 views

4 years ago

IACR
Cryptanalysis of Forkciphers

Paper by Augustin Bariant, Nicolas David, Gaëtan Leurent presented at FSE 2020 See ...

18:14
Cryptanalysis of Forkciphers

202 views

5 years ago

IACR
Boomerang Connectivity Table Revisited. Application to SKINNY and AES

Paper by Ling Song, Xianrui Qin, Lei Hu presented at Fast Software Encryption Conference 2019 See ...

19:33
Boomerang Connectivity Table Revisited. Application to SKINNY and AES

260 views

6 years ago

IACR
A New Structural Differential Property of 5 Round AES

Paper by Lorenzo Grassi and Christian Rechberger and Sondre Rønjom presented at Eurocrypt 2017.

15:12
A New Structural Differential Property of 5 Round AES

252 views

8 years ago

IACR
Multiplicative Masking for AES in Hardware

Paper by Lauren De Meyer, Oscar Reparaz, Begül Bilgin, presented at CHES 2018.

17:25
Multiplicative Masking for AES in Hardware

916 views

7 years ago

IACR
Improved Key Recovery Attacks on Reduced Round AES with Practical Data and Memory Complexities

Paper by Achiya Bar-On and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir, presented at Crypto 2018.

18:26
Improved Key Recovery Attacks on Reduced Round AES with Practical Data and Memory Complexities

1,196 views

7 years ago

EduSense
4 Common Encryption and Decryption Algorithms

4 Common Encryption and Decryption Algorithms.

7:43
4 Common Encryption and Decryption Algorithms

118 views

2 years ago

IACR
Homomorphic Evaluation of the AES Circuit

Talk at crypto 2012. Authors: Craig Gentry, Shai Halevi, Nigel P. Smart.

18:04
Homomorphic Evaluation of the AES Circuit

1,512 views

13 years ago

IACR
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Ciphers

Paper by Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu presented at Crypto 2022 See ...

5:36
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Ciphers

330 views

3 years ago

IACR
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key D...

Paper by Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu presented at Asiacrypt 2021 See ...

10:39
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key D...

113 views

4 years ago

Roel Van de Paar
Code Review: AES Implementation in C++ (6 Solutions!!)

Code Review: AES Implementation in C++ Helpful? Please support me on Patreon: https://www.patreon.com/roelvandepaar With ...

6:26
Code Review: AES Implementation in C++ (6 Solutions!!)

156 views

3 years ago