ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

4,146 results

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,062 views

9 years ago

Steven Gordon
Authentication with Hash Functions (ITS335, L05, Y14)

Authentication with hash functions and symmetric key cryptography. Introduction to public key cryptography. Course material via: ...

1:19:07
Authentication with Hash Functions (ITS335, L05, Y14)

552 views

11 years ago

Steven Gordon
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

Hash functions used in authentication. Lecture 16 ofCSS322 Security and Cryptography at Sirindhorn International Institute of ...

1:14:31
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

614 views

12 years ago

LernenInVerschiedenenFormen
Challenge Response Authentication Method (and its problem)

Created with SimpleScreenRecorder, Audacity, Xournal.

5:36
Challenge Response Authentication Method (and its problem)

16,244 views

5 years ago

Steven Gordon
Security of MAC Functions (CSS322, L18, Y14)

Brute Force attacks on Message Authentication Codes; attacking the key versus attack the tag/code. Course material via: ...

37:05
Security of MAC Functions (CSS322, L18, Y14)

864 views

10 years ago

Ariel Weinberger
JWT Explained In Under 10 Minutes (JSON Web Tokens)

JWT (JSON Web Tokens) explained in under 10 minutes! Authentication, authorization, refresh tokens, statelessness, and more.

9:18
JWT Explained In Under 10 Minutes (JSON Web Tokens)

50,784 views

1 year ago

media.ccc.de
PUFs, protection, privacy, PRNGs (33c3)

https://media.ccc.de/v/33c3-8231-pufs_protection_privacy_prngs an overview of physically unclonable functions A physically ...

31:44
PUFs, protection, privacy, PRNGs (33c3)

1,184 views

9 years ago

Steven Gordon
Authentication with MACs and Hash Functions (CSS322, Lecture 15, 2013)

Brute force attacks on MACs; Hash Function concepts. Lecture 15 of CSS322 Security and Cryptography at Sirindhorn ...

1:16:02
Authentication with MACs and Hash Functions (CSS322, Lecture 15, 2013)

1,096 views

12 years ago

IACR
Secure Message Authentication Against Related-Key Attack

Talk at FSE 2013. Rishiraj Bhattacharyya and Arnab Roy. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=25061.

24:21
Secure Message Authentication Against Related-Key Attack

193 views

10 years ago

Steven Gordon
Authentication and Public Key Cryptography (ITS335, Lecture 5, 2013)

MAC and hash functions for authentication; Introduction to public key cryptography. Lecture 5 of ITS335 IT Security at Sirindhorn ...

1:18:04
Authentication and Public Key Cryptography (ITS335, Lecture 5, 2013)

1,274 views

12 years ago

Steven Gordon
Hash Functions and Digital Signatures (CSS322, L19, Y14)

Use of cryptographic hash functions for authentication. Digital signatures with public key crypto and hash functions. Required ...

1:16:53
Hash Functions and Digital Signatures (CSS322, L19, Y14)

2,859 views

10 years ago

Code Geek
How to Call an Azure Function after a User Authenticates

This tutorial will show how easy it is to call an Azure function after a user authenticates. Integrating Azure Functions Using Auth0 ...

9:29
How to Call an Azure Function after a User Authenticates

93 views

3 years ago

MathMesh
Covid Cryptography 6: Message Authentication Codes and Authenticated Encryption

In this module, PHB describes the use of a secret key to protect integrity. A standalone integrity check is called a Message ...

39:03
Covid Cryptography 6: Message Authentication Codes and Authenticated Encryption

124 views

5 years ago

Wael Alnahari
Public Key Cryptography and Message Authentication

Enterprise Information Systems Security Topics CYS602 Public-Key Cryptography and Message Authentication: § Secure Hash ...

26:26
Public Key Cryptography and Message Authentication

108 views

5 years ago

WSO2
Adaptive authentication functions with WSO2 Identity Server #Identityin15

Adaptive authentication is an evolved form of MFA where the authentication mechanism is decided depending on the user's risk ...

19:19
Adaptive authentication functions with WSO2 Identity Server #Identityin15

682 views

Streamed 3 years ago

Lawrence Systems
How TOTP  (Time-based One-time Password Algorithm) Works for 2 Factor Authentication

Amazon Affiliate Store ➡️ https://www.amazon.com/shop/lawrencesystemspcpickup Gear we used on Kit (affiliate Links) ...

10:12
How TOTP (Time-based One-time Password Algorithm) Works for 2 Factor Authentication

74,505 views

8 years ago

IACR
Message Authentication, Revisited.

Talk at eurocrypt 2012. Authors: Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs.

21:10
Message Authentication, Revisited.

374 views

13 years ago

Steven Gordon
CSS322, Lecture 20, 18 Jan 2013 - Message Authentication Codes

Lecture 19 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

1:11:55
CSS322, Lecture 20, 18 Jan 2013 - Message Authentication Codes

1,161 views

13 years ago

Steven Gordon
Digital Signatures (CSS441, L18, Y15)

Hash functions and public key crypto for digital signatures. Course material via: http://sandilands.info/sgordon/teaching.

18:09
Digital Signatures (CSS441, L18, Y15)

2,119 views

9 years ago

Steven Gordon
Digital Signatures and Hash Functions (CSS322, Lecture 17, 2013)

Digital signatures and properties of cryptographic hash functions; birthday problem. Lecture 17 of CSS322 Security and ...

1:15:32
Digital Signatures and Hash Functions (CSS322, Lecture 17, 2013)

2,105 views

12 years ago