ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

118 results

southeastlinuxfest
Bruce Momjian - Fundamentals of Modern Cryptography and TLS

2025 Southeast Linuxfest: This presentation covers the fundamentals of modern digital cryptography and TLS, including popular ...

1:43:27
Bruce Momjian - Fundamentals of Modern Cryptography and TLS

60 views

6 months ago

Vu Hung Nguyen (Hưng)
12 Secure Your Messages: Understanding Message Authentication Codes (MACs) #AI #NLP #Tech #Podcast

Understanding Message Authentication Codes (MACs) Explained Overview: This episode dives deep into Message ...

7:06
12 Secure Your Messages: Understanding Message Authentication Codes (MACs) #AI #NLP #Tech #Podcast

2 views

3 months ago

Vu Hung Nguyen (Hưng)
11 Cryptographic Hashes: Your Data's Digital Fingerprint #AI #NLP #Tech #Podcast #Learning

Cryptographic Hash Functions Explained: SHA, Security & Applications Overview: This episode provides a comprehensive look ...

7:21
11 Cryptographic Hashes: Your Data's Digital Fingerprint #AI #NLP #Tech #Podcast #Learning

10 views

3 months ago

Mental Outlaw
OpenSSH Gets Post Quantum Encryption

In this video I discuss the new updates to OpenSSH 10.0 including post quantum encryption enabled by default. Read the full ...

8:17
OpenSSH Gets Post Quantum Encryption

99,733 views

9 months ago

Vu Hung Nguyen (Hưng)
21 A Toolkit for Digital Trust

Deep Dive into Cryptography: SHA, HMAC, RSA & Diffie-Hellman Explained Overview: This episode provides a detailed technical ...

9:11
21 A Toolkit for Digital Trust

2 views

3 months ago

CH 30: IIT KHARAGPUR 02: Computer Science & Others
Lecture 36: Message Authentication. #CH30SP #swayamprabha

Subject : Computer Science Course Name : Cryptography and Network Security Welcome to Swayam Prabha! Description: ...

29:50
Lecture 36: Message Authentication. #CH30SP #swayamprabha

1 view

10 months ago

Matrixdotorg
Beyond Olm: About challenges and opportunities in Messaging Layer Security (MLS)

https://media.ccc.de/v/matrix-conf-2025-71182-beyond-olm-about-challenges-and-opportunities-in-messaging-layer-security-mls ...

37:33
Beyond Olm: About challenges and opportunities in Messaging Layer Security (MLS)

211 views

2 months ago

Aprily
💬How to COMMENT on WeVerse Live | SMS VERIFICATION✅️

Fixing the WeVerse comment problem. Let's Connect! Youtube: ...

0:22
💬How to COMMENT on WeVerse Live | SMS VERIFICATION✅️

4,546 views

4 months ago

NPTEL IIT Bombay
Week 4 : Lecture 20 : Authentication: Part 1

Lecture 20 : Authentication: Part 1.

31:19
Week 4 : Lecture 20 : Authentication: Part 1

509 views

11 months ago

NPTEL IIT Bombay
Week 4 : Lecture 23 : Authentication: Part 4

Lecture 23 : Authentication: Part 4.

30:13
Week 4 : Lecture 23 : Authentication: Part 4

330 views

11 months ago

NPTEL IIT Bombay
Week 3 : Lecture 19 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4

Lecture 19 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4.

27:53
Week 3 : Lecture 19 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4

311 views

11 months ago

Vu Hung Nguyen (Hưng)
02 The Tools of Cryptography

Mastering Cryptographic Tools: Symmetric, Asymmetric, Hashes & Digital Signatures Overview: This episode provides a ...

8:25
02 The Tools of Cryptography

21 views

3 months ago

Vu Hung Nguyen (Hưng)
15 Securing Access: User Authentication, Kerberos, & Federated ID #AI #NLP #Tech #Podcast #Learning

User authentication is the fundamental building block for access control and accountability, distinct from message authentication.

8:42
15 Securing Access: User Authentication, Kerberos, & Federated ID #AI #NLP #Tech #Podcast #Learning

11 views

3 months ago

Zeek
Zeek and Post-Quantum Cryptography Discovery – Vincent Stoffer | Field CTO at Corelight

What happens when quantum computers can break today's encryption? In this talk, Vince Stoffer (Corelight Field CTO) explains ...

18:13
Zeek and Post-Quantum Cryptography Discovery – Vincent Stoffer | Field CTO at Corelight

176 views

4 months ago

Prostobank TV
How to Generate HSBC Security Codes: Step-by-Step Guide

Learn the different methods to create a one-time authentication code, whether using the HSBC Security Device app, online ...

1:20
How to Generate HSBC Security Codes: Step-by-Step Guide

86 views

1 month ago

The Coding Gopher
99% of Developers Don't Get Sockets

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.

12:05
99% of Developers Don't Get Sockets

479,014 views

8 months ago

Tony's HowTos
How to Open Yahoo Mail Without Verification Code (2026)

In this video, I show you How to Open Yahoo Mail Without Verification Code in 2026. The quick and easy tutorial how to access ...

3:25
How to Open Yahoo Mail Without Verification Code (2026)

16,159 views

7 months ago

NPTEL IIT Bombay
Week 3 : Lecture 16 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 1

Lecture 16 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 1.

26:55
Week 3 : Lecture 16 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 1

467 views

11 months ago

The Coding Gopher
99% of Developers Don't Get PostgreSQL

Check out Supabase: https://supabase.plug.dev/qnxeTMY ❤️ Get 40% OFF CodeCrafters: ...

12:40
99% of Developers Don't Get PostgreSQL

165,089 views

2 months ago

Vu Hung Nguyen (Hưng)
13 Digital Signatures: Securing Authenticity & Trust #AI #NLP #Tech #Podcast #Learning

Demystifying Digital Signatures: From ElGamal to DSS Overview: This episode provides a comprehensive look into digital ...

7:20
13 Digital Signatures: Securing Authenticity & Trust #AI #NLP #Tech #Podcast #Learning

1 view

3 months ago