ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

570 results

internet-class
What is a crytographically secure hash function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

5:45
What is a crytographically secure hash function?

1,304 views

9 years ago

Steven Gordon
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

Applying the pigeonhole principle to (cryptographic) hash functions to determine how many inputs collide on a single hash value.

4:39
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

2,731 views

10 years ago

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,529 views

6 years ago

Kai Hendry
3 interesting things about "hashes" for newbies

1. Fingerprints for file integrity 2. It's cryptographically equal, meaning it can be used to distribute load 3. It's one way, so it's good ...

4:02
3 interesting things about "hashes" for newbies

155 views

10 years ago

pwn.college
Cryptography: Hashing

... hash function out comes the hash value now there's a few properties that are super important for a cryptographic hash function ...

11:33
Cryptography: Hashing

2,475 views

3 years ago

The Coding Gopher
Hashing Explained (SHA-256, MD5)

Check out Clerk: https://go.clerk.com/X1kC4pR ❤️ Get 40% OFF CodeCrafters: ...

11:27
Hashing Explained (SHA-256, MD5)

24,293 views

2 months ago

aantonop
Bitcoin Q&A: Hash Functions, Mining, and Addresses

How does a hash function work? Can you reverse a hash function? Are there risks of dependence on SHA-256? What is the ...

12:20
Bitcoin Q&A: Hash Functions, Mining, and Addresses

9,753 views

6 years ago

Jesse Warden
Hash Function

I cover what a hash function is, 2 of the many use cases for it, passwords and file differences, and show some examples in code.

4:13
Hash Function

588 views

7 years ago

Decred
Blake-256 Transaction Hashing Process

Decred employs Blake-256r14, a cryptographic hash function that transforms transaction data into secure, fixed-length identifiers.

4:54
Blake-256 Transaction Hashing Process

53 views

4 months ago

Smart Contract Programmer
Learning Solidity (0.5) - Hash Function (Keccak256)

Keccak256 is a cryptographic hash function available in Solidity. In this video, I will show you how you can create a guessing ...

7:09
Learning Solidity (0.5) - Hash Function (Keccak256)

15,700 views

5 years ago

Lucas Layman
Hash Collisions and Load Factor

... many of the cryptographic algorithms for hashing they're close to perfect we're pretty sure and there's no perfect hash functions ...

18:47
Hash Collisions and Load Factor

5,433 views

5 years ago

Steven Gordon
Properties of Hash Functions (CSS441, L18, Y15)

One-way property, weak collision resistant and strong collision resistant hash functions. Course material via: ...

15:57
Properties of Hash Functions (CSS441, L18, Y15)

7,101 views

9 years ago

IACR
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agree...

Paper by Shahar Cohen, Moni Naor presented at Crypto 2022 See https://iacr.org/cryptodb/data/paper.php?pubkey=32206.

4:49
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agree...

134 views

3 years ago

Center for Cybersecurity Innovation & Outreach
Lesson 9: Passwords and Hash Functions

Discusses why passwords are so prevalent today and how organizations use hash functions to secure stored passwords.

8:17
Lesson 9: Passwords and Hash Functions

2,766 views

9 years ago

Tom Olzak
Cryptography Part 4: Hashing

In this lesson, I explain cryptographic hashing, message digests, digital signatures, rainbow table attacks, and salted password ...

7:58
Cryptography Part 4: Hashing

793 views

4 years ago

Forti Tip
Hash functions in certificates

In this Fortigate Firewall video " hash functions in certificates " we will look at how a hash function works and why it is important for ...

6:36
Hash functions in certificates

1,732 views

6 years ago

Forti Tip
Your first hash function

Your first hash function In this hash function guide, you will learn, what are hash function, why are they being used ( data integrity ) ...

5:18
Your first hash function

446 views

5 years ago

chaintuts
Bitcoin Cryptography – Hashing Algorithms

Learn the properties of hashing algorithms, which algorithms are used in Bitcoin, and how hashes help secure cryptocurrency ...

10:56
Bitcoin Cryptography – Hashing Algorithms

99 views

5 years ago

Rafiq Bouhsen
14.Cryptography: Cryptographic Hashing Demo

A hash function is a mathematical equation with four important properties: Hash functions can take anything as input and create ...

6:40
14.Cryptography: Cryptographic Hashing Demo

191 views

4 years ago

Tanja Lange: Post-quantum cryptography
Hash-based signatures I - Basic concepts

This lecture is part of Post-quantum cryptography" part of the MasterMath course "Selected Areas in Cryptology" For details see ...

16:17
Hash-based signatures I - Basic concepts

4,729 views

4 years ago