ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

95 results

Lisk
What is Hashing? Hash Functions Explained Simply

What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting ...

2:36
What is Hashing? Hash Functions Explained Simply

447,407 views

7 years ago

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,559 views

6 years ago

aantonop
Bitcoin Q&A: How Is the Number of Zeros in the Target Hash Determined?

How is the Bitcoin mining difficulty target hash determined? Why are the number of zeros at the beginning of the number used to ...

5:25
Bitcoin Q&A: How Is the Number of Zeros in the Target Hash Determined?

9,045 views

5 years ago

Rafiq Bouhsen
14.Cryptography: Cryptographic Hashing Demo

A hash function is a mathematical equation with four important properties: Hash functions can take anything as input and create ...

6:40
14.Cryptography: Cryptographic Hashing Demo

191 views

4 years ago

VaNTAGe
Benjamin Smith, Isogenies in genus 2 for cryptographic applications

VaNTAGe seminar, October 4, 2022 License: CC-BY-NC-SA.

1:02:03
Benjamin Smith, Isogenies in genus 2 for cryptographic applications

234 views

3 years ago

aantonop
Bitcoin Q&A: Cryptographic Primitives

How are cryptographic primitives employed in Bitcoin? What are hashes and digital signatures? How does elliptic curve ...

6:12
Bitcoin Q&A: Cryptographic Primitives

9,511 views

7 years ago

NPTEL IIT Bombay
Week 3 : Lecture 19 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4

Lecture 19 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4.

27:53
Week 3 : Lecture 19 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4

314 views

11 months ago

Horizen
Beyond the Horizen Episode 6: Diving into Cryptography

In episode six of the Beyond the Horizen podcast, we welcome Markus and Serena from the Horizen Lab's cryptography team to ...

18:39
Beyond the Horizen Episode 6: Diving into Cryptography

896 views

2 years ago

Rafiq Bouhsen
8.Cryptography: From Distributed Ledger to Cryptography

Source: EDX LinuxFoundationX LFS170x Blockchain: Understanding Its Uses and Implications ...

1:17
8.Cryptography: From Distributed Ledger to Cryptography

4 views

4 years ago

MalwareAnalysisForHedgehogs
Malware Theory - Imphash algorithm explained

The imphash or import hash by Mandiant has been widely adopted by malware databases, security software and PE tools. What is ...

5:43
Malware Theory - Imphash algorithm explained

5,854 views

4 years ago

NPTEL IIT Bombay
Week 3 : Lecture 16 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 1

Lecture 16 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 1.

26:55
Week 3 : Lecture 16 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 1

470 views

11 months ago

Cube Drone
Cube Drone - Bloom Filters

... "How do I generate all of these different hash functions anyways?" For other questions, like "who taught you how to do math?

3:32
Cube Drone - Bloom Filters

36,392 views

11 years ago

aantonop
Bitcoin Q&A: Data Integrity and Validation of Keys

How is SHA-256 used to verify data integrity in Bitcoin? What does it mean to sign a message? Is there a difference in the ...

11:23
Bitcoin Q&A: Data Integrity and Validation of Keys

5,435 views

6 years ago

Jon Gjengset
Live-coding a linked hash map in Rust

Following another Twitter poll (https://twitter.com/Jonhoo/status/1000102031925956610), we're building a simple hash map in ...

2:29:40
Live-coding a linked hash map in Rust

39,441 views

7 years ago

NPTEL IIT Bombay
Week 12 : Lecture 74 : Post-Quantum Cryptography

Lecture 74 : Post-Quantum Cryptography.

15:55
Week 12 : Lecture 74 : Post-Quantum Cryptography

1,465 views

9 months ago

Rafiq Bouhsen
13.Cryptography: Zero-Knowledge Proof - Cave Example

Source: EDX LinuxFoundationX LFS170x Blockchain: Understanding Its Uses and Implications ...

2:35
13.Cryptography: Zero-Knowledge Proof - Cave Example

9 views

4 years ago

wikipedia tts
NIST hash function competition | Wikipedia audio article

This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/NIST_hash_function_competition 00:01:13 1 Process ...

8:02
NIST hash function competition | Wikipedia audio article

29 views

7 years ago

aantonop
Bitcoin Q&A: Nonces, Mining, and Quantum Computing

Who generates the nonce? What makes it random? How is nonce-guessing important to the competitive process of mining?

15:23
Bitcoin Q&A: Nonces, Mining, and Quantum Computing

17,005 views

7 years ago

Rafiq Bouhsen
9.Cryptography: Rose Greenhow

Source: EDX LinuxFoundationX LFS170x Blockchain: Understanding Its Uses and Implications ...

2:06
9.Cryptography: Rose Greenhow

8 views

4 years ago

Rafiq Bouhsen
19.Immutability: Hashing and Chaining with Proof of Work

Source: EDX LinuxFoundationX LFS170x Blockchain: Understanding Its Uses and Implications ...

7:43
19.Immutability: Hashing and Chaining with Proof of Work

12 views

4 years ago