ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

387 results

INI Seminar Room 1
Prof. Bart Preneel | Theory and practice for hash functions

Title: Theory and practice for hash functions Speaker: Professor Bart Preneel (KU Leuven) Date: 1st Feb 2012 - 14:00 to 14:45 ...

48:46
Prof. Bart Preneel | Theory and practice for hash functions

0 views

3 weeks ago

THE FACT FACTORY
Why Hashes Prove Integrity: Everything You Need to Know

What you'll learn: 0:00 - Introduction to Cryptographic Hashing 2:35 - Understanding Data Integrity 6:15 - Types of Hash Functions ...

1:36
Why Hashes Prove Integrity: Everything You Need to Know

0 views

6 days ago

Solomon Timiso
The difference between Hashing, Digital signature, Asymmetric and Symmetric Encryption techniques

Hashing vs Digital Signature – What's the Difference? In this video, we break down two essential concepts in cybersecurity and ...

2:19
The difference between Hashing, Digital signature, Asymmetric and Symmetric Encryption techniques

69 views

13 days ago

INI Seminar Room 1
Prof. Thomas Ristenpart | Practice-Driven Cryptographic Theory

Title: Practice-Driven Cryptographic Theory Speaker: Professor Thomas Ristenpart (University of Wisconsin-Madison) Date: 2nd ...

47:45
Prof. Thomas Ristenpart | Practice-Driven Cryptographic Theory

6 views

3 weeks ago

INI Seminar Room 1
Dr. David Pointcheval | Efficient Smooth Projective Hash Functions and Applications

Title: Efficient Smooth Projective Hash Functions and Applications Speaker: Dr David Pointcheval (ENS - Paris) Date: 12th Apr ...

1:01:18
Dr. David Pointcheval | Efficient Smooth Projective Hash Functions and Applications

0 views

3 weeks ago

EAFIT+
Latin Crypt school in cryptography - Hash-based accumulation

Latin Crypt school in cryptography - Hash-based accumulation Benedikt Bünz Medellin en alianza Internacional Association for ...

1:09:34
Latin Crypt school in cryptography - Hash-based accumulation

4 views

3 weeks ago

CyberTodd
Hashing Basics | Task 2 - Hash Functions

Path: Cyber Security 101 Room: Hashing Basics Learn about hashing functions and their uses in password verification and file ...

9:57
Hashing Basics | Task 2 - Hash Functions

146 views

2 weeks ago

louisbetsch
1BRC Cold Boot: Hash Functions, Profiling, and more

After I've seen Jon Gjengset recently implementing a solution for the 1 Billion Row Challenge in Rust, I wanted to put something ...

4:21:15
1BRC Cold Boot: Hash Functions, Profiling, and more

134 views

Streamed 2 weeks ago

Ali Blockchain Lab
Cryptography Foundations for Blockchain: Hash Functions, Commitments, Merkle Trees  Consensus Layers

In this lecture, we build the essential cryptographic background required to truly understand how blockchain works. We start with ...

1:41:07
Cryptography Foundations for Blockchain: Hash Functions, Commitments, Merkle Trees Consensus Layers

35 views

2 weeks ago

INI Seminar Room 1
Dr. Graham Steel | Analysis of Cryptographic Security APIs

Title: Analysis of Cryptographic Security APIs Speaker: Dr Graham Steel (CNRS - Ecole Normale Superieure Paris) Date: 31st Jan ...

55:57
Dr. Graham Steel | Analysis of Cryptographic Security APIs

3 views

3 weeks ago

nayyyr
Phones shouldn't send hashes (Crypto 101)

Sometimes doing less is more, and sometimes using random cryptographic algorithms doesn't really help your security at all.

7:13
Phones shouldn't send hashes (Crypto 101)

42 views

2 weeks ago

Elkadhi Oussama
Cryptography Explained Simply Symmetric, Asymmetric & Hashing  Security+ SY 701

In this video, you will learn cryptography explained in a simple and clear way, specially for CompTIA Security+ (SY-701) ...

30:06
Cryptography Explained Simply Symmetric, Asymmetric & Hashing Security+ SY 701

0 views

13 days ago

StudyBeLike
What is Hashing? 🤔 Hash Functions & Real-World Uses Explained

... Hashing Load Factor & Rehashing Hash Tables & Databases Password Hashing & Salting Cryptographic Hash Functions (SHA ...

14:25
What is Hashing? 🤔 Hash Functions & Real-World Uses Explained

14 views

12 days ago

BitcoinII-BC2
SHA-256 explained

The Bitcoin SHA-256 cryptography explained.

2:38
SHA-256 explained

59 views

2 weeks ago

Annette Evelynn Paul
The One-Way Math That Protects Your Passwords

Sources: Computerphile. Hash Functions. YouTube, uploaded by Computerphile, www.youtube.com/watch?v=b4b8ktEV4Bg.

2:57
The One-Way Math That Protects Your Passwords

6 views

3 weeks ago

The Right Politics
Can Cryptographic Hashes Ensure File Authenticity?

... of cryptographic hashing and how they create unique digital fingerprints. ▻ Learn why hash functions are essential for detecting ...

3:30
Can Cryptographic Hashes Ensure File Authenticity?

2 views

3 weeks ago

The Right Politics
How Does Hashing Prevent Data Corruption?

Learn how hashing quickly detects any unauthorized changes to data. ▻ Explore the security benefits of using hash functions in ...

2:59
How Does Hashing Prevent Data Corruption?

0 views

3 weeks ago

Server Logic Simplified
How Do You Select Modern Slow Hashing Algorithms?

Choosing the right slow hashing algorithm is critical for securing your data against modern attacks. This video breaks down the ...

3:53
How Do You Select Modern Slow Hashing Algorithms?

2 views

3 weeks ago

Weskill ™
L28. Hashing and Digital Integrity

L28: Hashing and Integrity Checks | SHA-256 Explained In this video, L28: Hashing and Integrity Checks, we explain how hashing ...

5:53
L28. Hashing and Digital Integrity

1 view

3 weeks ago

Akhil Sharma
Hashing Explained: The Backbone of Security & Scalability (System Design for Beginners – Episode 12)

Algoroq — The CTO Accelerator™ Program Join my 3-month cohort — master real production-grade system design and ...

5:04
Hashing Explained: The Backbone of Security & Scalability (System Design for Beginners – Episode 12)

124 views

3 days ago