ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,809 results

Lisk
What is Hashing? Hash Functions Explained Simply

What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting ...

2:36
What is Hashing? Hash Functions Explained Simply

446,851 views

7 years ago

Steven Gordon
CSS322, Lecture 19, 18 Jan 2013 - Hash Functions

Lecture 19 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

1:09:02
CSS322, Lecture 19, 18 Jan 2013 - Hash Functions

659 views

12 years ago

Cube Drone
CascadiaJS Presentation: Hash Functions Taste Great with Anything

I haven't GIVEN this presentation yet, but it's.. the slides and the words and the voice bits. Sorry about the visible cursor.

32:42
CascadiaJS Presentation: Hash Functions Taste Great with Anything

2,639 views

11 years ago

Linux.conf.au 2016 -- Geelong, Australia
Five* non-cryptographic hash functions enter. One hash function leaves.

Adam Harvey https://linux.conf.au/schedule/30208/view_talk When you say “hash function” in a room full of developers, people ...

37:31
Five* non-cryptographic hash functions enter. One hash function leaves.

4,894 views

9 years ago

Steven Gordon
CSS322, Lecture 18, 11 Jan 2013 - Hash Functions

Lecture 18 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

1:13:50
CSS322, Lecture 18, 11 Jan 2013 - Hash Functions

1,331 views

13 years ago

aantonop
Bitcoin Q&A: Hash Functions, Mining, and Addresses

How does a hash function work? Can you reverse a hash function? Are there risks of dependence on SHA-256? What is the ...

12:20
Bitcoin Q&A: Hash Functions, Mining, and Addresses

9,752 views

6 years ago

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,402 views

6 years ago

Steven Gordon
CSS322, Lecture 17, 11 Jan 2013 - Hash Functions

Lecture 17 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

43:17
CSS322, Lecture 17, 11 Jan 2013 - Hash Functions

854 views

13 years ago

Steven Gordon
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

Applying the pigeonhole principle to (cryptographic) hash functions to determine how many inputs collide on a single hash value.

4:39
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

2,731 views

10 years ago

pwn.college
Cryptography: Hashing

... hash function out comes the hash value now there's a few properties that are super important for a cryptographic hash function ...

11:33
Cryptography: Hashing

2,461 views

3 years ago

Tanja Lange: Cryptology
Cryptographic hash functions IV - Proofs by reduction

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

22:28
Cryptographic hash functions IV - Proofs by reduction

344 views

4 years ago

internet-class
What is a crytographically secure hash function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

5:45
What is a crytographically secure hash function?

1,303 views

9 years ago

The Coding Gopher
Hashing Explained (SHA-256, MD5)

Check out Clerk: https://go.clerk.com/X1kC4pR ❤️ Get 40% OFF CodeCrafters: ...

11:27
Hashing Explained (SHA-256, MD5)

24,191 views

2 months ago

Tanja Lange: Cryptology
Cryptographic hash functions III - Formal security notions

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

18:29
Cryptographic hash functions III - Formal security notions

187 views

4 years ago

Mano Paul
Hashing Simplified - By Reuben A Paul

Reuben A Paul (@RAPst4r) describes the complex security concept of hashing using an example that even a child can ...

1:03
Hashing Simplified - By Reuben A Paul

5,462 views

10 years ago

Steven Gordon
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

Hash functions used in authentication. Lecture 16 ofCSS322 Security and Cryptography at Sirindhorn International Institute of ...

1:14:31
Hash Functions in Authentication (CSS322, Lecture 16, 2013)

614 views

11 years ago

OWASP London
"SHA-3 vs the World" - David Wong

Since Keccak has been selected as the winner of the SHA-3 competition in 2012, a myriad of different hash functions have been ...

1:05:05
"SHA-3 vs the World" - David Wong

1,313 views

8 years ago

Tanja Lange: Intro to crypto
Hash functions

Part of Introduction to Cryptology https://hyperelliptic.org/tanja/teaching/CS20/ Slides at ...

29:03
Hash functions

971 views

5 years ago

IACR
Trapdoor Hash Functions and Their Applications

Paper by Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky presented at Crypto 2019 See ...

22:45
Trapdoor Hash Functions and Their Applications

900 views

6 years ago

Steven Gordon
Cryptographic Hash Functions (CSS441, L17, Y15)

Hash functions and use for cryptographic. Hash functions for authentication, and attacks. Course material via: ...

1:29:57
Cryptographic Hash Functions (CSS441, L17, Y15)

2,937 views

9 years ago