ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,711 results

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,040 views

9 years ago

Sophia Danesino
Message Authentication Code

MAC: differenza con hash e firma digitale.

4:55
Message Authentication Code

1,090 views

6 years ago

IACR
Quantum-access-secure message authentication via blind-unforgeability

Paper by Gorjan Alagic, Christian Majenz, Alexander Russell, Fang Song presented at Eurocrypt 2020 See ...

22:59
Quantum-access-secure message authentication via blind-unforgeability

266 views

5 years ago

IACR
Secure Message Authentication Against Related-Key Attack

Talk at FSE 2013. Rishiraj Bhattacharyya and Arnab Roy. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=25061.

24:21
Secure Message Authentication Against Related-Key Attack

191 views

10 years ago

Steven Gordon
Message Authentication Codes (CSS441, L16, Y15)

MACs for authentication; modification and masquerade attacks on MACs; assumptions of MACs and collisions. Course material ...

1:07:07
Message Authentication Codes (CSS441, L16, Y15)

2,855 views

9 years ago

IACR
Message Authentication, Revisited.

Talk at eurocrypt 2012. Authors: Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs.

21:10
Message Authentication, Revisited.

373 views

13 years ago

IACR
Updatable Signatures and Message Authentication Codes

Paper by Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi presented at PKC 2021 See ...

23:41
Updatable Signatures and Message Authentication Codes

265 views

4 years ago

CNCF [Cloud Native Computing Foundation]
Handling JWTs: Understanding Common Pitfalls - Bruce MacDonald, InfraHQ

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon Europe in Amsterdam, The Netherlands from 18 - 21 ...

24:56
Handling JWTs: Understanding Common Pitfalls - Bruce MacDonald, InfraHQ

662 views

2 years ago

Steven Gordon
Security of MAC Functions (CSS322, L18, Y14)

Brute Force attacks on Message Authentication Codes; attacking the key versus attack the tag/code. Course material via: ...

37:05
Security of MAC Functions (CSS322, L18, Y14)

861 views

10 years ago

Tanja Lange: Intro to crypto
Message Authentication Codes (MACs)

Slides are updated to correct an error for the formulas for OFB mode. Part of Introduction to Cryptology ...

10:06
Message Authentication Codes (MACs)

886 views

5 years ago

Vu Hung Nguyen (Hưng)
12 Secure Your Messages: Understanding Message Authentication Codes (MACs) #AI #NLP #Tech #Podcast

Understanding Message Authentication Codes (MACs) Explained Overview: This episode dives deep into Message ...

7:06
12 Secure Your Messages: Understanding Message Authentication Codes (MACs) #AI #NLP #Tech #Podcast

2 views

2 months ago

media.ccc.de
36C3 -  Cryptography demystified

https://media.ccc.de/v/36c3-10627-cryptography_demystified An introduction without maths This talk will explain the basic building ...

53:25
36C3 - Cryptography demystified

3,500 views

5 years ago

IACR
Efficient Side-Channel Secure Message Authentication with Better Bounds

Paper by Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu presented at FSE 2020 See ...

26:07
Efficient Side-Channel Secure Message Authentication with Better Bounds

69 views

5 years ago

Steven Gordon
Authentication and MACs (CSS322, Lecture 14, 2013)

Authentication concepts and message authentication codes. Lecture 14 of CSS322 Security and Cryptography at Sirindhorn ...

1:19:30
Authentication and MACs (CSS322, Lecture 14, 2013)

640 views

11 years ago

Wael Alnahari
Public Key Cryptography and Message Authentication

Enterprise Information Systems Security Topics CYS602 Public-Key Cryptography and Message Authentication: § Secure Hash ...

26:26
Public Key Cryptography and Message Authentication

103 views

5 years ago

MathMesh
Covid Cryptography 6: Message Authentication Codes and Authenticated Encryption

In this module, PHB describes the use of a secret key to protect integrity. A standalone integrity check is called a Message ...

39:03
Covid Cryptography 6: Message Authentication Codes and Authenticated Encryption

123 views

5 years ago

Tanja Lange: Cryptology
Symmetric-key cryptography VII - Message authentication codes (MACs)

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

28:39
Symmetric-key cryptography VII - Message authentication codes (MACs)

199 views

4 years ago

Lady Tasnim
what is MAC? why is it used? Applied Cryptography

please use the comments section to comment, and like and subscribe if you would like me to post more videos like this.

13:51
what is MAC? why is it used? Applied Cryptography

186 views

4 years ago

IACR
ZMAC  A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication

Paper by Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin, presented at Crypto 2017.

22:49
ZMAC A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication

236 views

8 years ago

DEFCONConference
DEF CON 32 - Mutual authentication is optional - Xavier Zhang

Physical access control systems are often exploited in a number of ways. It could be weaknesses found within the credential itself, ...

17:11
DEF CON 32 - Mutual authentication is optional - Xavier Zhang

531 views

1 year ago