Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
4,243 results
MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.
5,074 views
9 years ago
Authentication with hash functions and symmetric key cryptography. Introduction to public key cryptography. Course material via: ...
552 views
11 years ago
JWT (JSON Web Tokens) explained in under 10 minutes! Authentication, authorization, refresh tokens, statelessness, and more.
54,610 views
1 year ago
Created with SimpleScreenRecorder, Audacity, Xournal.
16,296 views
5 years ago
Hash functions used in authentication. Lecture 16 ofCSS322 Security and Cryptography at Sirindhorn International Institute of ...
614 views
12 years ago
https://media.ccc.de/v/33c3-8231-pufs_protection_privacy_prngs an overview of physically unclonable functions A physically ...
1,184 views
Talk at FSE 2013. Rishiraj Bhattacharyya and Arnab Roy. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=25061.
193 views
10 years ago
Brute Force attacks on Message Authentication Codes; attacking the key versus attack the tag/code. Course material via: ...
864 views
Talk at eurocrypt 2012. Authors: Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs.
374 views
13 years ago
MAC and hash functions for authentication; Introduction to public key cryptography. Lecture 5 of ITS335 IT Security at Sirindhorn ...
1,274 views
Brute force attacks on MACs; Hash Function concepts. Lecture 15 of CSS322 Security and Cryptography at Sirindhorn ...
1,096 views
Amazon Affiliate Store ➡️ https://www.amazon.com/shop/lawrencesystemspcpickup Gear we used on Kit (affiliate Links) ...
74,625 views
8 years ago
Use of cryptographic hash functions for authentication. Digital signatures with public key crypto and hash functions. Required ...
2,860 views
In this module, PHB describes the use of a secret key to protect integrity. A standalone integrity check is called a Message ...
124 views
Bacularis - The Bacula web interface Project website: https://bacularis.app Bacularis documentation: https://bacularis.app/doc This ...
43 views
11 months ago
This tutorial will show how easy it is to call an Azure function after a user authenticates. Integrating Azure Functions Using Auth0 ...
93 views
3 years ago
Adaptive authentication is an evolved form of MFA where the authentication mechanism is decided depending on the user's risk ...
683 views
Streamed 3 years ago
https://media.ccc.de/v/all-systems-go-2024-320-ssh-authentication-using-user-and-machine-identities Strong authentication ...
583 views
Enterprise Information Systems Security Topics CYS602 Public-Key Cryptography and Message Authentication: § Secure Hash ...
108 views
Lecture 20 : Authentication: Part 1.
804 views