ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,182 results

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

330,548 views

8 years ago

Computerphile
2FA: Two Factor Authentication - Computerphile

Just what's going on when your email provider wants to send you a text message? Dr Mike Pound talks about multi-factor ...

12:34
2FA: Two Factor Authentication - Computerphile

513,278 views

8 years ago

The Morpheus Tutorials
Kryptography #19 - Message Authentication Codes

Today I show you MACs in response to the attacks from last video. Book recommendation: Introduction to Modern Cryptography by ...

6:43
Kryptography #19 - Message Authentication Codes

6,653 views

9 years ago

Computerphile
SHA: Secure Hashing Algorithm - Computerphile

Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash ...

10:21
SHA: Secure Hashing Algorithm - Computerphile

1,321,725 views

8 years ago

Beyond Identity
8.Modern Authentication Architecture Based on Secure Enclaves-Zero Trust Authentication Master Class

Secure elements, signed keys, and hash-based machine authentication code (HMAC) guards are explained to provide ...

9:11
8.Modern Authentication Architecture Based on Secure Enclaves-Zero Trust Authentication Master Class

241 views

2 years ago

Learn with Whiteboard
All Major API Authentication Methods Explained | API Security 101

APIs power everything around us—from your favorite apps to online banking. But how do APIs know who's knocking on their door ...

9:00
All Major API Authentication Methods Explained | API Security 101

4,068 views

4 months ago

Professor Messer
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

Security+ Training Course Index: https://professormesser.link/701videos Professor Messer's Course Notes: ...

10:25
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

266,876 views

2 years ago

Professor Messer
Cryptographic Hash Functions - CompTIA Security+ SY0-401: 6.2

Security+ Training Course Index: http://professormesser.link/sy0401 Professor Messer's Course Notes: ...

7:04
Cryptographic Hash Functions - CompTIA Security+ SY0-401: 6.2

46,075 views

11 years ago

Cyrill Gössi
Cryptography with Python 30: HMAC, Encrypt-then-MAC and GCM

The lesson also presents, how a hash-based message authentication code (HMAC) as a cryptographic primitive is a specific type ...

12:51
Cryptography with Python 30: HMAC, Encrypt-then-MAC and GCM

1,183 views

3 years ago

2FAS
HOTP vs TOTP - what are the differences? Which one is better?

If you've found this video helpful, consider donating to 2FAS: https://2fas.com/donate/ Ever wonder what TOTP and HOTP stands ...

4:37
HOTP vs TOTP - what are the differences? Which one is better?

12,277 views

3 years ago

Ask Leo!
One-Time Code Contradiction: When to Share and When to Beware

You're told not to share your one-time two-factor or other authentication code. And then you're asked for it. ✏️ To share or not to ...

8:10
One-Time Code Contradiction: When to Share and When to Beware

2,935 views

1 year ago

Cyrill Gössi
Cryptography with Python 31: Using HMAC in Python

... hash-based message authentication code (HMAC) can be used in Python. All code demonstrated serves educational purposes ...

7:10
Cryptography with Python 31: Using HMAC in Python

947 views

3 years ago

RSA Conference
Symmetric Cryptography 1

Presenters: Jiali Shi, PhD Candidate, National University of Defense Technology Naito Yusuke, Head Researcher, Mitsubishi ...

19:07
Symmetric Cryptography 1

65 views

1 year ago

CS 161 (Computer Security) at UC Berkeley
[Cryptography4, Video 13] Combining Encryption and MAC Schemes

Course website: https://sp25.cs161.org Slides: ...

6:50
[Cryptography4, Video 13] Combining Encryption and MAC Schemes

414 views

10 months ago

Cyrill Gössi
Cryptography with Python 32: Implementing HMAC in Python

... of hash-based message authentication code (HMAC) 01:41 Introducing NIST FIPS PUB 198-1 as official HMAC standardization ...

9:18
Cryptography with Python 32: Implementing HMAC in Python

1,030 views

3 years ago

IST OnlineLearning
5.1 Introduction to Authentication

Another important concept is message origin authentication and message content authentication. Message authentication ...

8:02
5.1 Introduction to Authentication

518 views

9 years ago

CS 161 (Computer Security) at UC Berkeley
[MemSafety4, Video 15] Pointer Authentication

Course website: https://sp25.cs161.org Slides: ...

9:16
[MemSafety4, Video 15] Pointer Authentication

323 views

11 months ago

Manish Pillai
Understanding HOTP and TOTP in Two-Factor Authentication

This video explains how Two-Factor Authentication (2FA) works with authenticator apps like Google Authenticator: 1. HOTP ...

10:36
Understanding HOTP and TOTP in Two-Factor Authentication

72 views

3 months ago

Amazon Web Services
AWS Key Management Service - HMAC APIs | Amazon Web Services

... KMS) lets you create KMS keys that can be used to generate and verify Hash-Based Message Authentication Code (HMACs).

7:07
AWS Key Management Service - HMAC APIs | Amazon Web Services

2,156 views

3 years ago

Professor Sable
Demo of Public Key Crypto to encrypt a message.

A brief demonstration of public key / private key using two terminal sessions. One on the Mac and one on a Raspberry Pi.

12:55
Demo of Public Key Crypto to encrypt a message.

304 views

2 months ago