ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

75 results

MemoryCorruption
AES CBC bit flipping attack

... exploration 01:24 AES introduction 02:35 AES Encryption 03:51 AES Decryption 05:03 Bit flip attack 06:57 Exploit writing 09:04 ...

9:30
AES CBC bit flipping attack

3,505 views

1 year ago

DEFCONConference
Daniel Crowley - Key Search Attacks Against Modern Symmetric Ciphers - DEF CON 27 Conference

In theory, brute force key recovery attacks against modern ciphers like AES should be impractical with the current state of ...

49:06
Daniel Crowley - Key Search Attacks Against Modern Symmetric Ciphers - DEF CON 27 Conference

1,396 views

6 years ago

Tom Olzak
Cryptography Part 2: Symmetric Encryption

... how symmetric encryption achieves it, and the reason why it is not practical to crack AES encryption. Table of Contents: 00:00 ...

13:12
Cryptography Part 2: Symmetric Encryption

1,378 views

4 years ago

Mindful Machines
The Algorithm That Terrified OpenAI

Why did OpenAI's board go insane a couple of weeks ago and fire and then immediately rehire Sam Altman? We dive into the ...

20:00
The Algorithm That Terrified OpenAI

10,118 views

2 years ago

Tom Olzak
Cryptography Part 3: Asymmetric Encryption

In this lesson, I walk through how asymmetric encryption works, how it is managed with PKI, and how it is used. You can download ...

13:06
Cryptography Part 3: Asymmetric Encryption

863 views

4 years ago

Confreaks
RailsConf 2018: Encrypted Credentials on Rails 5.2: Secrets to Success by Christopher Rigor

RailsConf 2018: Encrypted Credentials on Rails 5.2: Secrets to Success by Christopher Rigor Secrets are out. Credentials are in.

34:10
RailsConf 2018: Encrypted Credentials on Rails 5.2: Secrets to Success by Christopher Rigor

1,057 views

7 years ago

Q-Leap Edu Quantum Communications
9-1 Three phases of cryptographically secure communication

Lesson 9 BB84: Single-photon QKD Step 1: Three phases of cryptographically secure communication We begin this lesson by ...

3:09
9-1 Three phases of cryptographically secure communication

1,884 views

4 years ago

DEFCONConference
Elie Bursztein  - Deep Learning  Revolutionizing Side Channel Cryptanalysis - DEF CON 27 Conference

This talk explores how AI is revolutionizing hardware side-channel attacks and what this new wave of attacks mean for the future ...

40:21
Elie Bursztein - Deep Learning Revolutionizing Side Channel Cryptanalysis - DEF CON 27 Conference

1,851 views

6 years ago

NPTEL IIT Bombay
Week 2 : Lecture 12 : Principle of Cryptography: Part 2

Lecture 12 : Principle of Cryptography: Part 2.

20:41
Week 2 : Lecture 12 : Principle of Cryptography: Part 2

448 views

11 months ago

IBM Research
The next big leap in cryptography: NIST’s post-quantum cryptography standards

The next big leap in encryption has officially been shared in this special webcast. IBM Fellow Ray Harishankar discusses the ...

25:26
The next big leap in cryptography: NIST’s post-quantum cryptography standards

13,745 views

1 year ago

Confreaks
RailsConf 2017: The Art & Craft of Secrets: Using the Cryptographic Toolbox by Michael  Swieton

RailsConf 2017: The Art & Craft of Secrets: Using the Cryptographic Toolbox by Michael Swieton Picking an encryption algorithm ...

36:15
RailsConf 2017: The Art & Craft of Secrets: Using the Cryptographic Toolbox by Michael Swieton

1,850 views

8 years ago

Tech Universe
"Quantum Computers: The End of Cybersecurity as We Know It?"

Is Quantum Computing the Answer to Cybersecurity Threats? Quantum Computing vs Cybersecurity: Are We Ready?

8:37
"Quantum Computers: The End of Cybersecurity as We Know It?"

6 views

9 months ago

PaceIT Online
PACE-IT: Security + 6.2 - Cryptographic Methods (part 2)

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

7:54
PACE-IT: Security + 6.2 - Cryptographic Methods (part 2)

250 views

10 years ago

Andy Freed
New Encryption Algorithm

Distance Ed has developed a new encryption algorithm and workflow to protect student data. Special thanks to Donna Swanson, ...

3:33
New Encryption Algorithm

355 views

10 years ago

NPTEL IIT Bombay
Week 12 : Lecture 74 : Post-Quantum Cryptography

Lecture 74 : Post-Quantum Cryptography.

15:55
Week 12 : Lecture 74 : Post-Quantum Cryptography

1,491 views

9 months ago

dotconferences
dotJS 2024 - Eleanor McHugh - Encrypt All Transports

A fast-paced introduction to networking and cryptography in JavaScript, demystify the use of standard network protocols and ...

6:09
dotJS 2024 - Eleanor McHugh - Encrypt All Transports

286 views

1 year ago

SiliconANGLE theCUBE
Keep Data Private - Prepare and Analyze Without Unencrypting with Voltage SecureData for Vertica

Rich Gaston, Global Solutions Architect, Security, Risk and Governance, Micro Focus Keep Data Private - Prepare and Analyze ...

33:38
Keep Data Private - Prepare and Analyze Without Unencrypting with Voltage SecureData for Vertica

864 views

5 years ago

DEFCONConference
DEF CON 24 - Jake Kambic - Cunning with CNG: Soliciting Secrets from Schannel

Secure Channel (Schannel) is Microsoft's standard SSL/TLS Library underpinning services like RDP, Outlook, Internet Explorer, ...

41:17
DEF CON 24 - Jake Kambic - Cunning with CNG: Soliciting Secrets from Schannel

1,643 views

9 years ago

B Cyber H
The Cipher No Computer Can Break (Unless You Mess Up…)

Hey everyone! Welcome to my latest video where we're cracking open the One-Time Pad—the only cipher out there that's 100% ...

14:04
The Cipher No Computer Can Break (Unless You Mess Up…)

308 views

5 months ago

gravelen
Quantum Computing: The End of Encryption

Quantum computing is no longer science fiction — it's a looming reality that threatens to dismantle the encryption protecting our ...

3:24
Quantum Computing: The End of Encryption

0 views

1 day ago