ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,796 results

Lisk
What is Hashing? Hash Functions Explained Simply

What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting ...

2:36
What is Hashing? Hash Functions Explained Simply

445,683 views

7 years ago

Steven Gordon
CSS322, Lecture 19, 18 Jan 2013 - Hash Functions

Lecture 19 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

1:09:02
CSS322, Lecture 19, 18 Jan 2013 - Hash Functions

659 views

12 years ago

Cube Drone
CascadiaJS Presentation: Hash Functions Taste Great with Anything

I haven't GIVEN this presentation yet, but it's.. the slides and the words and the voice bits. Sorry about the visible cursor.

32:42
CascadiaJS Presentation: Hash Functions Taste Great with Anything

2,639 views

11 years ago

Steven Gordon
CSS322, Lecture 18, 11 Jan 2013 - Hash Functions

Lecture 18 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

1:13:50
CSS322, Lecture 18, 11 Jan 2013 - Hash Functions

1,331 views

12 years ago

Linux.conf.au 2016 -- Geelong, Australia
Five* non-cryptographic hash functions enter. One hash function leaves.

Adam Harvey https://linux.conf.au/schedule/30208/view_talk When you say “hash function” in a room full of developers, people ...

37:31
Five* non-cryptographic hash functions enter. One hash function leaves.

4,857 views

9 years ago

internet-class
What is a crytographically secure hash function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

5:45
What is a crytographically secure hash function?

1,300 views

9 years ago

pwn.college
Cryptography: Hashing

... hash function out comes the hash value now there's a few properties that are super important for a cryptographic hash function ...

11:33
Cryptography: Hashing

2,427 views

3 years ago

Steven Gordon
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

Applying the pigeonhole principle to (cryptographic) hash functions to determine how many inputs collide on a single hash value.

4:39
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

2,729 views

10 years ago

Steven Gordon
CSS322, Lecture 17, 11 Jan 2013 - Hash Functions

Lecture 17 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

43:17
CSS322, Lecture 17, 11 Jan 2013 - Hash Functions

850 views

12 years ago

Tanja Lange: Intro to crypto
Hash functions

Part of Introduction to Cryptology https://hyperelliptic.org/tanja/teaching/CS20/ Slides at ...

29:03
Hash functions

962 views

5 years ago

Tanja Lange: Cryptology
Cryptographic hash functions III - Formal security notions

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

18:29
Cryptographic hash functions III - Formal security notions

186 views

4 years ago

IACR
Trapdoor Hash Functions and Their Applications

Paper by Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky presented at Crypto 2019 See ...

22:45
Trapdoor Hash Functions and Their Applications

897 views

6 years ago

Steven Gordon
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

Hash functions used in authentication. Lecture 16 ofCSS322 Security and Cryptography at Sirindhorn International Institute of ...

1:14:31
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

614 views

11 years ago

Steven Gordon
Cryptographic Hash Functions (CSS441, L17, Y15)

Hash functions and use for cryptographic. Hash functions for authentication, and attacks. Course material via: ...

1:29:57
Cryptographic Hash Functions (CSS441, L17, Y15)

2,928 views

9 years ago

Steven Gordon
Collision Resistance and Birthday Paradox (CSS322, L20, Y14)

Birthday paradox as example of collisions. Properties of cryptographic hash functions. Course material via: ...

47:46
Collision Resistance and Birthday Paradox (CSS322, L20, Y14)

4,281 views

10 years ago

Tanja Lange: Cryptology
Cryptographic hash functions IV - Proofs by reduction

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

22:28
Cryptographic hash functions IV - Proofs by reduction

335 views

4 years ago

The Coding Gopher
Hashing Explained (SHA-256, MD5)

Check out Clerk: https://go.clerk.com/X1kC4pR ❤️ Get 40% OFF CodeCrafters: ...

11:27
Hashing Explained (SHA-256, MD5)

23,831 views

2 months ago

IACR
Memory-Hard Functions from Cryptographic Primitives

Paper by Binyi Chen, Stefano Tessaro presented at Crypto 2019 See https://iacr.org/cryptodb/data/paper.php?pubkey=29898.

22:54
Memory-Hard Functions from Cryptographic Primitives

1,395 views

6 years ago

Steven Gordon
Hash Functions and Digital Signatures (CSS322, L19, Y14)

Use of cryptographic hash functions for authentication. Digital signatures with public key crypto and hash functions. Required ...

1:16:53
Hash Functions and Digital Signatures (CSS322, L19, Y14)

2,856 views

10 years ago

Steven Gordon
Cryptography Hash Functions (CSS322, L18, Y14)

Introduction to hash functions and the properties required for their use in cryptography; Examples of MD5 and SHA of files, ...

39:09
Cryptography Hash Functions (CSS322, L18, Y14)

1,057 views

10 years ago

Cry.College
Introduction to Hash Functions (Week 6)

This video introduces hash functions. [06 01 01]

2:04
Introduction to Hash Functions (Week 6)

319 views

4 years ago

Tanja Lange: Cryptology
Cryptographic hash functions I - Practical aspects and generic hardness

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

17:17
Cryptographic hash functions I - Practical aspects and generic hardness

308 views

4 years ago

Cry.College
Hash Function Requirements

This video sums up the introduced important security notions. [06 01 06]

0:33
Hash Function Requirements

340 views

4 years ago

IACR
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions

Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Mingwu Zhang. Talk at Asiacrypt 2016.

31:25
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions

395 views

9 years ago

Smart Contract Programmer
Learning Solidity (0.5) - Hash Function (Keccak256)

Keccak256 is a cryptographic hash function available in Solidity. In this video, I will show you how you can create a guessing ...

7:09
Learning Solidity (0.5) - Hash Function (Keccak256)

15,688 views

5 years ago