ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,230 results

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

330,520 views

8 years ago

Osiris Salazar
5   1   Message Authentication Codes 16 min
15:16
5 1 Message Authentication Codes 16 min

2,901 views

13 years ago

Computerphile
2FA: Two Factor Authentication - Computerphile

Just what's going on when your email provider wants to send you a text message? Dr Mike Pound talks about multi-factor ...

12:34
2FA: Two Factor Authentication - Computerphile

513,270 views

8 years ago

Osiris Salazar
6   5   HMAC 7 min
7:05
6 5 HMAC 7 min

1,561 views

13 years ago

Computerphile
SHA: Secure Hashing Algorithm - Computerphile

Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash ...

10:21
SHA: Secure Hashing Algorithm - Computerphile

1,321,688 views

8 years ago

The Morpheus Tutorials
Kryptography #19 - Message Authentication Codes

Today I show you MACs in response to the attacks from last video. Book recommendation: Introduction to Modern Cryptography by ...

6:43
Kryptography #19 - Message Authentication Codes

6,653 views

9 years ago

Beyond Identity
8.Modern Authentication Architecture Based on Secure Enclaves-Zero Trust Authentication Master Class

Secure elements, signed keys, and hash-based machine authentication code (HMAC) guards are explained to provide ...

9:11
8.Modern Authentication Architecture Based on Secure Enclaves-Zero Trust Authentication Master Class

241 views

2 years ago

Professor Messer
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

Security+ Training Course Index: https://professormesser.link/701videos Professor Messer's Course Notes: ...

10:25
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

266,721 views

2 years ago

Osiris Salazar
5   4   MAC padding 9 min
8:40
5 4 MAC padding 9 min

937 views

13 years ago

Learn with Whiteboard
All Major API Authentication Methods Explained | API Security 101

APIs power everything around us—from your favorite apps to online banking. But how do APIs know who's knocking on their door ...

9:00
All Major API Authentication Methods Explained | API Security 101

4,067 views

4 months ago

Jonah Aragon
Key Verification in iMessage has finally arrived!

In which I get excited about Key Transparency and Contact Key Verification, two security features added to iMessage in today's ...

6:14
Key Verification in iMessage has finally arrived!

17,631 views

2 years ago

Osiris Salazar
5   2   MACs Based On PRFs 10 min
9:59
5 2 MACs Based On PRFs 10 min

787 views

13 years ago

Osiris Salazar
5   5   PMAC and the Carter Wegman MAC 16 min
15:27
5 5 PMAC and the Carter Wegman MAC 16 min

1,082 views

13 years ago

Professor Messer
Cryptographic Hash Functions - CompTIA Security+ SY0-401: 6.2

Security+ Training Course Index: http://professormesser.link/sy0401 Professor Messer's Course Notes: ...

7:04
Cryptographic Hash Functions - CompTIA Security+ SY0-401: 6.2

46,074 views

11 years ago

Audiopedia
Hash-based message authentication code

In cryptography, a keyed-hash message authentication code (HMAC) is a specific construction for calculating a message ...

9:26
Hash-based message authentication code

6,626 views

11 years ago

Cyrill Gössi
Cryptography with Python 30: HMAC, Encrypt-then-MAC and GCM

The lesson also presents, how a hash-based message authentication code (HMAC) as a cryptographic primitive is a specific type ...

12:51
Cryptography with Python 30: HMAC, Encrypt-then-MAC and GCM

1,182 views

3 years ago

2FAS
HOTP vs TOTP - what are the differences? Which one is better?

If you've found this video helpful, consider donating to 2FAS: https://2fas.com/donate/ Ever wonder what TOTP and HOTP stands ...

4:37
HOTP vs TOTP - what are the differences? Which one is better?

12,272 views

3 years ago

Ask Leo!
One-Time Code Contradiction: When to Share and When to Beware

You're told not to share your one-time two-factor or other authentication code. And then you're asked for it. ✏️ To share or not to ...

8:10
One-Time Code Contradiction: When to Share and When to Beware

2,935 views

1 year ago

RSA Conference
Symmetric Cryptography 1

Presenters: Jiali Shi, PhD Candidate, National University of Defense Technology Naito Yusuke, Head Researcher, Mitsubishi ...

19:07
Symmetric Cryptography 1

65 views

1 year ago

Cyrill Gössi
Cryptography with Python 31: Using HMAC in Python

... hash-based message authentication code (HMAC) can be used in Python. All code demonstrated serves educational purposes ...

7:10
Cryptography with Python 31: Using HMAC in Python

947 views

3 years ago