ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,801 results

Lisk
What is Hashing? Hash Functions Explained Simply

What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting ...

2:36
What is Hashing? Hash Functions Explained Simply

446,676 views

7 years ago

Steven Gordon
CSS322, Lecture 19, 18 Jan 2013 - Hash Functions

Lecture 19 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

1:09:02
CSS322, Lecture 19, 18 Jan 2013 - Hash Functions

659 views

12 years ago

Cube Drone
CascadiaJS Presentation: Hash Functions Taste Great with Anything

I haven't GIVEN this presentation yet, but it's.. the slides and the words and the voice bits. Sorry about the visible cursor.

32:42
CascadiaJS Presentation: Hash Functions Taste Great with Anything

2,639 views

11 years ago

Steven Gordon
CSS322, Lecture 18, 11 Jan 2013 - Hash Functions

Lecture 18 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

1:13:50
CSS322, Lecture 18, 11 Jan 2013 - Hash Functions

1,331 views

13 years ago

aantonop
Bitcoin Q&A: Hash Functions, Mining, and Addresses

How does a hash function work? Can you reverse a hash function? Are there risks of dependence on SHA-256? What is the ...

12:20
Bitcoin Q&A: Hash Functions, Mining, and Addresses

9,752 views

6 years ago

Linux.conf.au 2016 -- Geelong, Australia
Five* non-cryptographic hash functions enter. One hash function leaves.

Adam Harvey https://linux.conf.au/schedule/30208/view_talk When you say “hash function” in a room full of developers, people ...

37:31
Five* non-cryptographic hash functions enter. One hash function leaves.

4,891 views

9 years ago

internet-class
What is a crytographically secure hash function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

5:45
What is a crytographically secure hash function?

1,303 views

9 years ago

Steven Gordon
CSS322, Lecture 17, 11 Jan 2013 - Hash Functions

Lecture 17 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

43:17
CSS322, Lecture 17, 11 Jan 2013 - Hash Functions

854 views

13 years ago

Steven Gordon
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

Applying the pigeonhole principle to (cryptographic) hash functions to determine how many inputs collide on a single hash value.

4:39
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

2,731 views

10 years ago

pwn.college
Cryptography: Hashing

... hash function out comes the hash value now there's a few properties that are super important for a cryptographic hash function ...

11:33
Cryptography: Hashing

2,459 views

3 years ago

Steven Gordon
Collision Resistance and Birthday Paradox (CSS322, L20, Y14)

Birthday paradox as example of collisions. Properties of cryptographic hash functions. Course material via: ...

47:46
Collision Resistance and Birthday Paradox (CSS322, L20, Y14)

4,284 views

10 years ago

Steven Gordon
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

Hash functions used in authentication. Lecture 16 ofCSS322 Security and Cryptography at Sirindhorn International Institute of ...

1:14:31
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

614 views

11 years ago

Tanja Lange: Cryptology
Cryptographic hash functions III - Formal security notions

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

18:29
Cryptographic hash functions III - Formal security notions

187 views

4 years ago

The Coding Gopher
Hashing Explained (SHA-256, MD5)

Check out Clerk: https://go.clerk.com/X1kC4pR ❤️ Get 40% OFF CodeCrafters: ...

11:27
Hashing Explained (SHA-256, MD5)

24,131 views

2 months ago

Tanja Lange: Intro to crypto
Hash functions

Part of Introduction to Cryptology https://hyperelliptic.org/tanja/teaching/CS20/ Slides at ...

29:03
Hash functions

970 views

5 years ago

Tanja Lange: Cryptology
Cryptographic hash functions IV - Proofs by reduction

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

22:28
Cryptographic hash functions IV - Proofs by reduction

344 views

4 years ago

Mano Paul
Hashing Simplified - By Reuben A Paul

Reuben A Paul (@RAPst4r) describes the complex security concept of hashing using an example that even a child can ...

1:03
Hashing Simplified - By Reuben A Paul

5,462 views

10 years ago

IACR
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing

Paper by Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs presented at Eurocrypt 2019 See ...

28:46
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing

359 views

6 years ago

IACR
Trapdoor Hash Functions and Their Applications

Paper by Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky presented at Crypto 2019 See ...

22:45
Trapdoor Hash Functions and Their Applications

899 views

6 years ago

OWASP London
"SHA-3 vs the World" - David Wong

Since Keccak has been selected as the winner of the SHA-3 competition in 2012, a myriad of different hash functions have been ...

1:05:05
"SHA-3 vs the World" - David Wong

1,313 views

8 years ago

Smart Contract Programmer
Learning Solidity (0.5) - Hash Function (Keccak256)

Keccak256 is a cryptographic hash function available in Solidity. In this video, I will show you how you can create a guessing ...

7:09
Learning Solidity (0.5) - Hash Function (Keccak256)

15,695 views

5 years ago

Jesse Warden
Hash Function

I cover what a hash function is, 2 of the many use cases for it, passwords and file differences, and show some examples in code.

4:13
Hash Function

588 views

7 years ago

Steven Gordon
Hash Functions and Digital Signatures (CSS322, L19, Y14)

Use of cryptographic hash functions for authentication. Digital signatures with public key crypto and hash functions. Required ...

1:16:53
Hash Functions and Digital Signatures (CSS322, L19, Y14)

2,857 views

10 years ago

Steven Gordon
Cryptography Hash Functions (CSS322, L18, Y14)

Introduction to hash functions and the properties required for their use in cryptography; Examples of MD5 and SHA of files, ...

39:09
Cryptography Hash Functions (CSS322, L18, Y14)

1,057 views

10 years ago

Steven Gordon
Digital Signatures and Hash Functions (CSS322, Lecture 17, 2013)

Digital signatures and properties of cryptographic hash functions; birthday problem. Lecture 17 of CSS322 Security and ...

1:15:32
Digital Signatures and Hash Functions (CSS322, Lecture 17, 2013)

2,104 views

11 years ago