ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

3,966 results

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,066 views

9 years ago

Steven Gordon
Security of MAC Functions (CSS322, L18, Y14)

Brute Force attacks on Message Authentication Codes; attacking the key versus attack the tag/code. Course material via: ...

37:05
Security of MAC Functions (CSS322, L18, Y14)

864 views

10 years ago

LernenInVerschiedenenFormen
Challenge Response Authentication Method (and its problem)

Created with SimpleScreenRecorder, Audacity, Xournal.

5:36
Challenge Response Authentication Method (and its problem)

16,271 views

5 years ago

Steven Gordon
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

Hash functions used in authentication. Lecture 16 ofCSS322 Security and Cryptography at Sirindhorn International Institute of ...

1:14:31
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

614 views

12 years ago

media.ccc.de
PUFs, protection, privacy, PRNGs (33c3)

https://media.ccc.de/v/33c3-8231-pufs_protection_privacy_prngs an overview of physically unclonable functions A physically ...

31:44
PUFs, protection, privacy, PRNGs (33c3)

1,184 views

9 years ago

Steven Gordon
Authentication with MACs and Hash Functions (CSS322, Lecture 15, 2013)

Brute force attacks on MACs; Hash Function concepts. Lecture 15 of CSS322 Security and Cryptography at Sirindhorn ...

1:16:02
Authentication with MACs and Hash Functions (CSS322, Lecture 15, 2013)

1,096 views

12 years ago

Steven Gordon
Hash Functions and Digital Signatures (CSS322, L19, Y14)

Use of cryptographic hash functions for authentication. Digital signatures with public key crypto and hash functions. Required ...

1:16:53
Hash Functions and Digital Signatures (CSS322, L19, Y14)

2,859 views

10 years ago

Steven Gordon
Digital Signatures and Hash Functions (CSS322, Lecture 17, 2013)

Digital signatures and properties of cryptographic hash functions; birthday problem. Lecture 17 of CSS322 Security and ...

1:15:32
Digital Signatures and Hash Functions (CSS322, Lecture 17, 2013)

2,105 views

12 years ago

Steven Gordon
CSS322, Lecture 20, 18 Jan 2013 - Message Authentication Codes

Lecture 19 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

1:11:55
CSS322, Lecture 20, 18 Jan 2013 - Message Authentication Codes

1,161 views

13 years ago

Steven Gordon
Authentication with Hash Functions (ITS335, L05, Y14)

Authentication with hash functions and symmetric key cryptography. Introduction to public key cryptography. Course material via: ...

1:19:07
Authentication with Hash Functions (ITS335, L05, Y14)

552 views

11 years ago

Steven Gordon
Digital Signatures (CSS441, L18, Y15)

Hash functions and public key crypto for digital signatures. Course material via: http://sandilands.info/sgordon/teaching.

18:09
Digital Signatures (CSS441, L18, Y15)

2,120 views

9 years ago

Lawrence Systems
How TOTP  (Time-based One-time Password Algorithm) Works for 2 Factor Authentication

Amazon Affiliate Store ➡️ https://www.amazon.com/shop/lawrencesystemspcpickup Gear we used on Kit (affiliate Links) ...

10:12
How TOTP (Time-based One-time Password Algorithm) Works for 2 Factor Authentication

74,546 views

8 years ago

Steven Gordon
Authentication and Public Key Cryptography (ITS335, Lecture 5, 2013)

MAC and hash functions for authentication; Introduction to public key cryptography. Lecture 5 of ITS335 IT Security at Sirindhorn ...

1:18:04
Authentication and Public Key Cryptography (ITS335, Lecture 5, 2013)

1,274 views

12 years ago

Steven Gordon
Cryptographic Hash Functions (CSS441, L17, Y15)

Hash functions and use for cryptographic. Hash functions for authentication, and attacks. Course material via: ...

1:29:57
Cryptographic Hash Functions (CSS441, L17, Y15)

2,943 views

9 years ago

VTU e-Shikshana Programme
04  Cryptography Network Security & Cyber Law Module III Session 4

Now this is a three message one way authentication technique now let's see what we mean by the function f in the function f there ...

46:08
04 Cryptography Network Security & Cyber Law Module III Session 4

213 views

5 years ago

Steven Gordon
CSS322, Lecture 18, 11 Jan 2013 - Hash Functions

Lecture 18 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

1:13:50
CSS322, Lecture 18, 11 Jan 2013 - Hash Functions

1,331 views

13 years ago

Faris Durrani
Authentication and Password Hashing

A short lecture topic on what authentication is and the standard theory of password-based authentication procedures.

9:47
Authentication and Password Hashing

55 views

2 years ago

IACR
Secure Message Authentication Against Related-Key Attack

Talk at FSE 2013. Rishiraj Bhattacharyya and Arnab Roy. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=25061.

24:21
Secure Message Authentication Against Related-Key Attack

193 views

10 years ago

Steven Gordon
CSS322, Lecture 17, 11 Jan 2013 - Hash Functions

Lecture 17 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

43:17
CSS322, Lecture 17, 11 Jan 2013 - Hash Functions

854 views

13 years ago

Steven Gordon
CSS322, Lecture 19, 18 Jan 2013 - Hash Functions

Lecture 19 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

1:09:02
CSS322, Lecture 19, 18 Jan 2013 - Hash Functions

659 views

13 years ago