ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

77 results

Vu Hung Nguyen (Hưng)
05 Decoding AES: Structure, Functions, & Key Expansion #AI #NLP #Tech #Podcast #Learning

Advanced Encryption Standard (AES): Deep Dive into Modern Symmetric Encryption Overview: Explore the Advanced Encryption ...

6:50
05 Decoding AES: Structure, Functions, & Key Expansion #AI #NLP #Tech #Podcast #Learning

0 views

3 months ago

NorthSec
NorthSec 2025 - Félix Charette - Exploiting the not so misuse-resistant AES-GCM API of OpenSSL

AES-GCM is robust when used properly, but in practice, some APIs make it easy to introduce vulnerabilities giving the possibility ...

31:10
NorthSec 2025 - Félix Charette - Exploiting the not so misuse-resistant AES-GCM API of OpenSSL

32 views

2 months ago

PKI Consortium
Stateful Hash based Signatures: Practical Enhancements and Lessons learned

Stateful hash based signatures provide the best ratio of maturity and efficiency but require the handling of the state in a secure ...

30:12
Stateful Hash based Signatures: Practical Enhancements and Lessons learned

52 views

1 month ago

The Debug Zone
Understanding the Difference Between Aes and AesManaged in C# Encryption

In this video, we delve into the nuances of encryption in C# by exploring the differences between Aes and AesManaged.

1:30
Understanding the Difference Between Aes and AesManaged in C# Encryption

0 views

2 months ago

DevConf
Encryption Techniques From Traditional To Modern Encryption Technique - Devconf2025

AES algorithm is optimized for speed and efficiency, making them ideal for protecting large volumes of data. Meanwhile ...

43:20
Encryption Techniques From Traditional To Modern Encryption Technique - Devconf2025

82 views

9 months ago

Vu Hung Nguyen (Hưng)
20 Symmetric Encryption

Symmetric Encryption Fundamentals: Principles, Algorithms, and Modes Explained Overview: This episode provides a ...

6:31
20 Symmetric Encryption

2 views

3 months ago

Vu Hung Nguyen (Hưng)
02 The Tools of Cryptography

Mastering Cryptographic Tools: Symmetric, Asymmetric, Hashes & Digital Signatures Overview: This episode provides a ...

8:25
02 The Tools of Cryptography

21 views

3 months ago

Vu Hung Nguyen (Hưng)
03 DES & Block Ciphers: How They Work, How They Break #AI #NLP #Tech #Podcast #Learning

Block Ciphers & The Data Encryption Standard (DES) Explained! Overview: This episode delves into the core principles of block ...

7:29
03 DES & Block Ciphers: How They Work, How They Break #AI #NLP #Tech #Podcast #Learning

4 views

3 months ago

Vu Hung Nguyen (Hưng)
Computer Security Basics: Attacks, Services, & Mechanisms #AI #NLP #Tech #Podcast #Learning

Classical Encryption Techniques: Symmetric Ciphers Explained Overview: Dive deep into the foundational concepts of classical ...

7:50
Computer Security Basics: Attacks, Services, & Mechanisms #AI #NLP #Tech #Podcast #Learning

0 views

3 months ago

CH 30: IIT KHARAGPUR 02: Computer Science & Others
Lecture 21: Advanced Encryption Standard (AES) #CH30SP #swayamprabha

Subject : Computer Science Course Name : Cryptography and Network Security Welcome to Swayam Prabha! Description: ...

34:31
Lecture 21: Advanced Encryption Standard (AES) #CH30SP #swayamprabha

6 views

11 months ago

Eric Bariaux
Cryptography 101 - May 2025

In this quick introduction to cryptography, I explain the concepts of hashing, encryption and digital signature. I then provide a quick ...

6:48
Cryptography 101 - May 2025

25 views

7 months ago

Vu Hung Nguyen (Hưng)
06 Mastering Block Ciphers: Triple DES & Essential Operating Modes #AI #NLP #Tech #Podcast #Learning

Block Cipher Modes & Triple DES: Enhancing Data Encryption Overview: Dive deep into advanced symmetric encryption ...

8:37
06 Mastering Block Ciphers: Triple DES & Essential Operating Modes #AI #NLP #Tech #Podcast #Learning

1 view

3 months ago

NPTEL IIT Bombay
Week 2 : Lecture 12 : Principle of Cryptography: Part 2

Lecture 12 : Principle of Cryptography: Part 2.

20:41
Week 2 : Lecture 12 : Principle of Cryptography: Part 2

433 views

11 months ago

The Debug Zone
Java AES CTR Mode: Understanding IV and Counter for Secure Encryption

In this video, we delve into the intricacies of Java's AES encryption using Counter (CTR) mode. We'll explore the critical roles of ...

2:35
Java AES CTR Mode: Understanding IV and Counter for Secure Encryption

7 views

4 months ago

DevConf
Post-Quantum Cryptography for Digital Signing - DevConf.US 2025

Speaker(s): Arthur Savage As quantum computers rapidly increase in size and relevance, all public key systems that rely solely on ...

35:38
Post-Quantum Cryptography for Digital Signing - DevConf.US 2025

21 views

3 months ago

The Linux Foundation
Why Quantum Safe Encryption Is the Next Y2K, and How To Be Prepared - Joe Winchester, IBM

Don't miss out! Join us at the next Open Source Summit in Seoul, South Korea (November 4-5). Join us at the premier ...

43:54
Why Quantum Safe Encryption Is the Next Y2K, and How To Be Prepared - Joe Winchester, IBM

66 views

4 months ago

CH 30: IIT KHARAGPUR 02: Computer Science & Others
Lecture 22: Advanced Encryption Standard (AES)(Contd.) #CH30SP #swayamprabha

Subject : Computer Science Course Name : Cryptography and Network Security Welcome to Swayam Prabha! Description: ...

37:27
Lecture 22: Advanced Encryption Standard (AES)(Contd.) #CH30SP #swayamprabha

4 views

11 months ago

Gnar Coding
Cat Pics, MFA, and Encryption - oh my...

We combine steganography, AES encryption, and Time based one time passwords to create a furry and adorable cocktail of ...

31:42
Cat Pics, MFA, and Encryption - oh my...

1,013 views

8 months ago

Cisco DevNet
Preparing Security Teams for the Cryptographic Transition | The Quantum Unboxing

How Post-Quantum Cryptography Affects Security and Encryption Algorithms ...

4:57
Preparing Security Teams for the Cryptographic Transition | The Quantum Unboxing

242 views

4 months ago

PKI Consortium
Transitioning to Post-Quantum Cryptography in IAM

The quantum threat demands urgent upgrades to IAM systems, spanning TLS, PKI (encryption and digital signatures), and SSO ...

24:29
Transitioning to Post-Quantum Cryptography in IAM

78 views

1 month ago