ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

4,243 results

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,074 views

9 years ago

Steven Gordon
Authentication with Hash Functions (ITS335, L05, Y14)

Authentication with hash functions and symmetric key cryptography. Introduction to public key cryptography. Course material via: ...

1:19:07
Authentication with Hash Functions (ITS335, L05, Y14)

552 views

11 years ago

Ariel Weinberger
JWT Explained In Under 10 Minutes (JSON Web Tokens)

JWT (JSON Web Tokens) explained in under 10 minutes! Authentication, authorization, refresh tokens, statelessness, and more.

9:18
JWT Explained In Under 10 Minutes (JSON Web Tokens)

54,610 views

1 year ago

LernenInVerschiedenenFormen
Challenge Response Authentication Method (and its problem)

Created with SimpleScreenRecorder, Audacity, Xournal.

5:36
Challenge Response Authentication Method (and its problem)

16,296 views

5 years ago

Steven Gordon
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

Hash functions used in authentication. Lecture 16 ofCSS322 Security and Cryptography at Sirindhorn International Institute of ...

1:14:31
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

614 views

12 years ago

media.ccc.de
PUFs, protection, privacy, PRNGs (33c3)

https://media.ccc.de/v/33c3-8231-pufs_protection_privacy_prngs an overview of physically unclonable functions A physically ...

31:44
PUFs, protection, privacy, PRNGs (33c3)

1,184 views

9 years ago

IACR
Secure Message Authentication Against Related-Key Attack

Talk at FSE 2013. Rishiraj Bhattacharyya and Arnab Roy. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=25061.

24:21
Secure Message Authentication Against Related-Key Attack

193 views

10 years ago

Steven Gordon
Security of MAC Functions (CSS322, L18, Y14)

Brute Force attacks on Message Authentication Codes; attacking the key versus attack the tag/code. Course material via: ...

37:05
Security of MAC Functions (CSS322, L18, Y14)

864 views

10 years ago

IACR
Message Authentication, Revisited.

Talk at eurocrypt 2012. Authors: Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs.

21:10
Message Authentication, Revisited.

374 views

13 years ago

Steven Gordon
Authentication and Public Key Cryptography (ITS335, Lecture 5, 2013)

MAC and hash functions for authentication; Introduction to public key cryptography. Lecture 5 of ITS335 IT Security at Sirindhorn ...

1:18:04
Authentication and Public Key Cryptography (ITS335, Lecture 5, 2013)

1,274 views

12 years ago

Steven Gordon
Authentication with MACs and Hash Functions (CSS322, Lecture 15, 2013)

Brute force attacks on MACs; Hash Function concepts. Lecture 15 of CSS322 Security and Cryptography at Sirindhorn ...

1:16:02
Authentication with MACs and Hash Functions (CSS322, Lecture 15, 2013)

1,096 views

12 years ago

Lawrence Systems
How TOTP  (Time-based One-time Password Algorithm) Works for 2 Factor Authentication

Amazon Affiliate Store ➡️ https://www.amazon.com/shop/lawrencesystemspcpickup Gear we used on Kit (affiliate Links) ...

10:12
How TOTP (Time-based One-time Password Algorithm) Works for 2 Factor Authentication

74,625 views

8 years ago

Steven Gordon
Hash Functions and Digital Signatures (CSS322, L19, Y14)

Use of cryptographic hash functions for authentication. Digital signatures with public key crypto and hash functions. Required ...

1:16:53
Hash Functions and Digital Signatures (CSS322, L19, Y14)

2,860 views

10 years ago

MathMesh
Covid Cryptography 6: Message Authentication Codes and Authenticated Encryption

In this module, PHB describes the use of a secret key to protect integrity. A standalone integrity check is called a Message ...

39:03
Covid Cryptography 6: Message Authentication Codes and Authenticated Encryption

124 views

5 years ago

Marcin Haba
Bacularis - U2F security keys - Two-factor authentication - 2FA

Bacularis - The Bacula web interface Project website: https://bacularis.app Bacularis documentation: https://bacularis.app/doc This ...

2:38
Bacularis - U2F security keys - Two-factor authentication - 2FA

43 views

11 months ago

Code Geek
How to Call an Azure Function after a User Authenticates

This tutorial will show how easy it is to call an Azure function after a user authenticates. Integrating Azure Functions Using Auth0 ...

9:29
How to Call an Azure Function after a User Authenticates

93 views

3 years ago

WSO2
Adaptive authentication functions with WSO2 Identity Server #Identityin15

Adaptive authentication is an evolved form of MFA where the authentication mechanism is decided depending on the user's risk ...

19:19
Adaptive authentication functions with WSO2 Identity Server #Identityin15

683 views

Streamed 3 years ago

All Systems Go!
SSH authentication using user and machine identities

https://media.ccc.de/v/all-systems-go-2024-320-ssh-authentication-using-user-and-machine-identities Strong authentication ...

38:25
SSH authentication using user and machine identities

583 views

1 year ago

Wael Alnahari
Public Key Cryptography and Message Authentication

Enterprise Information Systems Security Topics CYS602 Public-Key Cryptography and Message Authentication: § Secure Hash ...

26:26
Public Key Cryptography and Message Authentication

108 views

5 years ago

NPTEL IIT Bombay
Week 4 : Lecture 20 : Authentication: Part 1

Lecture 20 : Authentication: Part 1.

31:19
Week 4 : Lecture 20 : Authentication: Part 1

804 views

1 year ago