ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,098 results

Cry.College
Message Authentication Codes (MACs)

This video introduces the concept of MACs. [06 05 01]

1:58
Message Authentication Codes (MACs)

560 views

4 years ago

Roel Van de Paar
How to config MAC(message authentication code) using curl command?

How to config MAC(message authentication code) using curl command? Helpful? Please support me on Patreon: ...

1:57
How to config MAC(message authentication code) using curl command?

3 views

5 years ago

Chrome for Developers
Understand passkeys in 4 minutes

Are you still using passwords? Passkeys are a new authentication technology that enables creating online accounts and signing ...

3:49
Understand passkeys in 4 minutes

713,988 views

2 years ago

Cry.College
Length Extension Attacks

In this video we construct a naive MAC and then break it. [06 05 02]

3:15
Length Extension Attacks

14,014 views

4 years ago

Erik
AES Encryption (ECB vs. CBC) Visualization

This visualization demonstrates the difference between AES Encryption using Electronic Code Book (ECB) and AES Encryption ...

0:31
AES Encryption (ECB vs. CBC) Visualization

7,785 views

7 years ago

AISSMS INSTITUTE OF INFORMATION TECHNOLOGYY - IOIT
Message Authentication  2

Presenter: Ms.S.D.Kadu An alternative authentication technique involves the use of a secret key to generate a small fixed-size ...

1:46
Message Authentication 2

9 views

2 years ago

Roel Van de Paar
Salesforce: Comparing Message Authentication Codes in Apex

Salesforce: Comparing Message Authentication Codes in Apex Helpful? Please support me on Patreon: ...

1:19
Salesforce: Comparing Message Authentication Codes in Apex

0 views

5 years ago

Cry.College
The HMAC Construction

In this video we learn about a hash based MAC. [06 05 03]

1:42
The HMAC Construction

1,077 views

4 years ago

99 questions about
cryptography - Difference between MAC(key, msg) and SHA(key || msg)

source at https://security.stackexchange.com/questions/226531/difference-between-mackey-msg-and-shakey-msg.

1:33
cryptography - Difference between MAC(key, msg) and SHA(key || msg)

3 views

5 years ago

Cry.College
Message Padding

This video shows how hash functions have to pad messages. [06 03 02]

3:18
Message Padding

502 views

4 years ago

Roel Van de Paar
Electronics: What is the technical term for a hardware message authentication code generator IC?

Electronics: What is the technical term for a hardware message authentication code generator IC? Helpful? Please support me on ...

1:14
Electronics: What is the technical term for a hardware message authentication code generator IC?

1 view

4 years ago

Cry.College
The BLAKE2 Hash Function

This video shows a real world hash function based on the HAIFA construction. [06 04 02]

2:25
The BLAKE2 Hash Function

2,733 views

4 years ago

Lisk
What are Digital Signatures and How Do They Work?

What is a Digital Signature? In this animation, we will explain how digital signatures work using cryptography. In some ways ...

2:52
What are Digital Signatures and How Do They Work?

826,450 views

7 years ago

Cry.College
Second Preimage Resistance

This video introduces an important security notion. [06 01 03]

2:06
Second Preimage Resistance

1,714 views

4 years ago

Roel Van de Paar
Unix & Linux: ssh_dispatch_run_fatal: message authentication code incorrect

Unix & Linux: ssh_dispatch_run_fatal: message authentication code incorrect Helpful? Please support me on Patreon: ...

2:04
Unix & Linux: ssh_dispatch_run_fatal: message authentication code incorrect

214 views

5 years ago

Forti Tip
Strong Encryption Algorithms

firewall training for beginners strong encryption or else...- firewall training hardening your firewall to use the strongest ciphers ...

3:13
Strong Encryption Algorithms

1,026 views

5 years ago

Roel Van de Paar
Software Engineering: How to secure my authentication code?

Software Engineering: How to secure my authentication code? Helpful? Please support me on Patreon: ...

2:42
Software Engineering: How to secure my authentication code?

1 view

3 years ago

OktaDev
Single sign-on flow explained (SSO)

Check out the full video here: https://youtu.be/Vp6kx4Sd_E0 #tech #developer #identity #security #apps #sso #login.

0:29
Single sign-on flow explained (SSO)

25,466 views

2 years ago

CyberSensei
14 Message Authentication Part2

http://www.olivenutrition.net.

0:31
14 Message Authentication Part2

19 views

11 years ago

Roel Van de Paar
How can i get past the authentication code stuff if i bought from a used computer vendor?

How can i get past the authentication code stuff if i bought from a used computer vendor? Helpful? Please support me on Patreon: ...

1:38
How can i get past the authentication code stuff if i bought from a used computer vendor?

0 views

6 years ago