ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

174 results

Vu Hung Nguyen (Hưng)
05 Decoding AES: Structure, Functions, & Key Expansion #AI #NLP #Tech #Podcast #Learning

Advanced Encryption Standard (AES): Deep Dive into Modern Symmetric Encryption Overview: Explore the Advanced Encryption ...

6:50
05 Decoding AES: Structure, Functions, & Key Expansion #AI #NLP #Tech #Podcast #Learning

0 views

3 months ago

PKI Consortium
Evaluating the Practical Capabilities of Contemporary Quantum Processors in Breaking AES Encryption

As quantum computing advances, assessing the potential of current architectures to threaten AES encryption is essential.

15:27
Evaluating the Practical Capabilities of Contemporary Quantum Processors in Breaking AES Encryption

43 views

1 month ago

NorthSec
NorthSec 2025 - Félix Charette - Exploiting the not so misuse-resistant AES-GCM API of OpenSSL

AES-GCM is robust when used properly, but in practice, some APIs make it easy to introduce vulnerabilities giving the possibility ...

31:10
NorthSec 2025 - Félix Charette - Exploiting the not so misuse-resistant AES-GCM API of OpenSSL

32 views

2 months ago

DevConf
Encryption Techniques From Traditional To Modern Encryption Technique - Devconf2025

AES algorithm is optimized for speed and efficiency, making them ideal for protecting large volumes of data. Meanwhile ...

43:20
Encryption Techniques From Traditional To Modern Encryption Technique - Devconf2025

82 views

9 months ago

Vu Hung Nguyen (Hưng)
02 The Tools of Cryptography

Mastering Cryptographic Tools: Symmetric, Asymmetric, Hashes & Digital Signatures Overview: This episode provides a ...

8:25
02 The Tools of Cryptography

21 views

3 months ago

Vu Hung Nguyen (Hưng)
20 Symmetric Encryption

Symmetric Encryption Fundamentals: Principles, Algorithms, and Modes Explained Overview: This episode provides a ...

6:31
20 Symmetric Encryption

2 views

3 months ago

The Debug Zone
Understanding the Difference Between Aes and AesManaged in C# Encryption

In this video, we delve into the nuances of encryption in C# by exploring the differences between Aes and AesManaged.

1:30
Understanding the Difference Between Aes and AesManaged in C# Encryption

0 views

2 months ago

Vu Hung Nguyen (Hưng)
03 DES & Block Ciphers: How They Work, How They Break #AI #NLP #Tech #Podcast #Learning

Block Ciphers & The Data Encryption Standard (DES) Explained! Overview: This episode delves into the core principles of block ...

7:29
03 DES & Block Ciphers: How They Work, How They Break #AI #NLP #Tech #Podcast #Learning

4 views

3 months ago

Vu Hung Nguyen (Hưng)
Computer Security Basics: Attacks, Services, & Mechanisms #AI #NLP #Tech #Podcast #Learning

Classical Encryption Techniques: Symmetric Ciphers Explained Overview: Dive deep into the foundational concepts of classical ...

7:50
Computer Security Basics: Attacks, Services, & Mechanisms #AI #NLP #Tech #Podcast #Learning

0 views

3 months ago

PKI Consortium
Stateful Hash based Signatures: Practical Enhancements and Lessons learned

Stateful hash based signatures provide the best ratio of maturity and efficiency but require the handling of the state in a secure ...

30:12
Stateful Hash based Signatures: Practical Enhancements and Lessons learned

52 views

1 month ago

CH 30: IIT KHARAGPUR 02: Computer Science & Others
Lecture 21: Advanced Encryption Standard (AES) #CH30SP #swayamprabha

Subject : Computer Science Course Name : Cryptography and Network Security Welcome to Swayam Prabha! Description: ...

34:31
Lecture 21: Advanced Encryption Standard (AES) #CH30SP #swayamprabha

6 views

11 months ago

Eric Bariaux
Cryptography 101 - May 2025

In this quick introduction to cryptography, I explain the concepts of hashing, encryption and digital signature. I then provide a quick ...

6:48
Cryptography 101 - May 2025

25 views

7 months ago

BrokenKeys
Programming lua luarocks resty-string AES cli

A brief demo of lua programming language AES encryption cli.

0:17
Programming lua luarocks resty-string AES cli

5 views

7 months ago

Vu Hung Nguyen (Hưng)
06 Mastering Block Ciphers: Triple DES & Essential Operating Modes #AI #NLP #Tech #Podcast #Learning

Block Cipher Modes & Triple DES: Enhancing Data Encryption Overview: Dive deep into advanced symmetric encryption ...

8:37
06 Mastering Block Ciphers: Triple DES & Essential Operating Modes #AI #NLP #Tech #Podcast #Learning

1 view

3 months ago

B Cyber H
Code Your Own AES File Encryption in Python!

Learn how to secure your files with AES encryption in Python! In this beginner-friendly tutorial, I walk you through coding a Python ...

21:24
Code Your Own AES File Encryption in Python!

811 views

5 months ago

Gnar Coding
Cat Pics, MFA, and Encryption - oh my...

We combine steganography, AES encryption, and Time based one time passwords to create a furry and adorable cocktail of ...

31:42
Cat Pics, MFA, and Encryption - oh my...

1,013 views

8 months ago

CH 30: IIT KHARAGPUR 02: Computer Science & Others
Lecture 22: Advanced Encryption Standard (AES)(Contd.) #CH30SP #swayamprabha

Subject : Computer Science Course Name : Cryptography and Network Security Welcome to Swayam Prabha! Description: ...

37:27
Lecture 22: Advanced Encryption Standard (AES)(Contd.) #CH30SP #swayamprabha

4 views

11 months ago

NPTEL IIT Bombay
Week 2 : Lecture 12 : Principle of Cryptography: Part 2

Lecture 12 : Principle of Cryptography: Part 2.

20:41
Week 2 : Lecture 12 : Principle of Cryptography: Part 2

433 views

11 months ago

The Debug Zone
Java AES CTR Mode: Understanding IV and Counter for Secure Encryption

In this video, we delve into the intricacies of Java's AES encryption using Counter (CTR) mode. We'll explore the critical roles of ...

2:35
Java AES CTR Mode: Understanding IV and Counter for Secure Encryption

7 views

4 months ago

DevConf
Post-Quantum Cryptography for Digital Signing - DevConf.US 2025

Speaker(s): Arthur Savage As quantum computers rapidly increase in size and relevance, all public key systems that rely solely on ...

35:38
Post-Quantum Cryptography for Digital Signing - DevConf.US 2025

21 views

3 months ago

Sophia Wagner
Security: Does bearssl contain AES-GCM implementation?

Does bearssl contain AES-GCM implementation? Hey guys! Hopefully you found a solution that helped you! The Content is ...

2:16
Security: Does bearssl contain AES-GCM implementation?

11 views

11 months ago

Nida Karagoz
AES-256 Encrypted Text Differs

AES-256 Encrypted Text Differs ✧ I really hope you found a helpful solution! ♡ The Content is licensed under CC ...

5:15
AES-256 Encrypted Text Differs

4 views

9 months ago

The Linux Foundation
Why Quantum Safe Encryption Is the Next Y2K, and How To Be Prepared - Joe Winchester, IBM

Don't miss out! Join us at the next Open Source Summit in Seoul, South Korea (November 4-5). Join us at the premier ...

43:54
Why Quantum Safe Encryption Is the Next Y2K, and How To Be Prepared - Joe Winchester, IBM

66 views

4 months ago

Cisco DevNet
Preparing Security Teams for the Cryptographic Transition | The Quantum Unboxing

How Post-Quantum Cryptography Affects Security and Encryption Algorithms ...

4:57
Preparing Security Teams for the Cryptographic Transition | The Quantum Unboxing

241 views

4 months ago

Peter Schneider
Security: Does bearssl contain AES-GCM implementation?

Does bearssl contain AES-GCM implementation? I hope you found a solution that worked for you :) The Content is licensed under ...

2:23
Security: Does bearssl contain AES-GCM implementation?

0 views

1 year ago