Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
301 results
What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting ...
386,775 views
5 years ago
No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.
2,487,803 views
4 years ago
Alptekin Küpçü, Koç University, TURKEY. Cryptography, Cyber Security, and Privacy Research Group crypto.ku.edu.tr ...
361 views
1 year ago
RailsConf 2017: The Art & Craft of Secrets: Using the Cryptographic Toolbox by Michael Swieton Picking an encryption algorithm ...
1,832 views
7 years ago
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...
225 views
8 years ago
Since HMAC functions really just end up using their underlying hash function - `SHA-1` in this case, the output is 160 bits, or 20 ...
18,742 views
3 years ago
Paper by Huijia Lin, Ji Luo presented at Asiacrypt 2020 See https://iacr.org/cryptodb/data/paper.php?pubkey=30729.
266 views
This stream is (probably) the last segment in our journey into porting Java's ConcurrentHashMap to Rust. We start writing some ...
10,229 views
To deal with this problem, 25 years ago, Microsoft designed its own Dynamic Hashing algorithm and applied it everywhere in IIS, ...
1,093 views
Do optional passphrases protect against leaks or compromises of mnemonic seed words? Why are brain wallets usually insecure ...
62,266 views
What is a Digital Signature? In this animation, we will explain how digital signatures work using cryptography. In some ways ...
757,364 views
In this lecture we finish our discussion of Distributed File Systems and cache consistency, and then dive into a discussion of ...
1,624 views
Hacking is hard. It takes passion, dedication, and an unwavering attention to detail. Hacking requires a breadth of knowledge ...
55,187 views
00:00 Intro and Disclaimer 01:00 "Images R Us" - the imaginary website we're going to hack 02:19 Source code for "Images R Us" ...
206 views
6 months ago
The subtitles have been translated automatically. We apologize for any errors. If you want, you can help us translate them ...
2,469 views
Rails comes with protection against SQL injection, cross site scripting, and cross site request forgery. It provides strong ...
3,730 views
Who generates the nonce? What makes it random? How is nonce-guessing important to the competitive process of mining?
16,454 views
6 years ago
220 views
227 views
Both the signing and hashing algorithms can be upgraded in Bitcoin if there is a need to do that. Quantum cryptography ...
23,187 views