Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Hash Functions
YouTube
education
Showing:
75
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Krish Naik
Blockchain Technology: Fundamentals and Functionality - Tutorial 3
0
rewiews
Explore blockchain technology fundamentals, including its structure, key players, transaction processes, and core concepts like hash keys and memory pools.
Add to list
10
Lesons
23 minutes
On-Demand
Free-Video
CIMPA UCR
Álgebras de Configuración de Brauer y sus Aplicaciones en Criptografía y Ciencias
0
rewiews
Explora las álgebras de configuración de Brauer, su origen y aplicaciones en criptografía, ecuaciones de Yang-Baxter, teoría de grafos y optimización combinatoria.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
TheIACR
Raccoon Attack - Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
0
rewiews
Explore the Raccoon Attack on TLS-DH(E), its impact on cryptographic protocols, and potential countermeasures. Learn about side-channel vulnerabilities in key derivation processes.
Add to list
26
Lesons
39 minutes
On-Demand
Free-Video
Linux Foundation
Privacy-preserving Approaches to Transparency Logs
0
rewiews
Explore append-only transparency logs, their applications in infrastructure, and privacy-preserving techniques to balance immutability with user rights and data protection.
Add to list
21
Lesons
39 minutes
On-Demand
Free-Video
Linux Foundation
OmniBOR: Bringing the Receipts for Supply Chain Security
0
rewiews
Explore OmniBOR, a new approach to capture full artifact dependency graphs in software development, enhancing supply chain security and addressing SBOM scanner limitations.
Add to list
47
Lesons
41 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
Network Security - Types of Authentication - Message Encryption, MAC, Hash Functions
0
rewiews
Explore three key authentication methods: message encryption, message authentication codes, and hash functions, enhancing your understanding of network security fundamentals.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
OffensiveCon
Password Cracking: Past, Present, Future - Keynote
0
rewiews
Explore the evolution and future of password cracking techniques with insights from a renowned security expert. Gain valuable knowledge on cybersecurity challenges and solutions.
Add to list
1
Lesons
1 hour 12 minutes
On-Demand
Free-Video
Caleb Curry
How Does Proof of Work Actually Work?
0
rewiews
Explore the mechanics of Proof of Work in cryptocurrencies, covering cryptographic hash functions and their role in blockchain security and mining processes.
Add to list
5
Lesons
22 minutes
On-Demand
Free-Video
The Cherno
Maps in C++ - std-map and std-unordered_map
0
rewiews
Explore std::map and std::unordered_map in C++, covering usage, custom types, operators, iteration, and performance considerations for efficient key-value pair management.
Add to list
10
Lesons
30 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
Introduction to Hashing in Data Structures - Hash Functions, Hash Tables, Hash Keys, and Hash Values
0
rewiews
Master the fundamentals of hashing in data structures, including hash functions, tables, keys, and values. Learn efficient data storage and retrieval techniques for optimized programming solutions.
Add to list
1
Lesons
11 minutes
On-Demand
Free-Video
Squid: Schools for Quantum Information Development
Quantum Advantage from One-Way Functions
0
rewiews
Delve into quantum advantage theory through one-way functions, exploring inefficient-verifier proofs of quantumness and their construction from classical bit commitments in cryptography.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
TheIACR
Hash Function Cryptanalysis - Eurocrypt 2023 Session
0
rewiews
Explore cutting-edge research and advancements in hash function cryptanalysis presented at Eurocrypt 2023, a premier cryptography conference.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
TheIACR
Cryptanalysis of Hash Functions, PRFs and PRGs
0
rewiews
Explore cryptanalysis techniques for hash functions, PRFs, and PRGs, covering attacks, round functions, and search methods for enhanced security understanding.
Add to list
15
Lesons
59 minutes
On-Demand
Free-Video
TheIACR
Correcting Subverted Random Oracles
0
rewiews
Explores techniques to correct subverted random oracles in cryptography, addressing security vulnerabilities and proposing solutions for preventing attacks on hash functions and chain takeovers.
Add to list
18
Lesons
26 minutes
On-Demand
Free-Video
IEEE
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
0
rewiews
Explores secure multiparty computation using fixed-key block ciphers, providing end-to-end security proofs and improving performance for implementations of secure-computation protocols.
Add to list
13
Lesons
17 minutes
On-Demand
Free-Video
Simple Snippets
What Is Hashing - Why Do We Need It - What Is a Hash Function - Example - Array vs Hash Table
0
rewiews
Explore hashing, hash functions, and hash tables. Learn their importance and benefits over arrays through practical examples and comparisons.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
CodeHelp - by Babbar
Hashmaps in C++ - C++ Placement Series
0
rewiews
Comprehensive exploration of hashmaps in C++, covering implementation, STL usage, hash functions, collision handling, and practical applications for efficient data storage and retrieval.
Add to list
11
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Simons Institute
How to Do Fiat-Shamir in the Standard Model
0
rewiews
Explore interactive protocols, Fiat-Shamir transformation, and delegation in cryptography. Learn about security assumptions, hash functions, and correlation intractability in probabilistic proof systems.
Add to list
15
Lesons
1 hour 10 minutes
On-Demand
Free-Video
Simons Institute
On Attacking Hash Functions in Cryptographic Schemes
0
rewiews
Explore quantum attacks on hash-based cryptography, covering applications, models, and techniques. Gain insights into post-quantum cryptography and the NIST competition.
Add to list
18
Lesons
43 minutes
On-Demand
Free-Video
Simons Institute
Collision-Resistance from Multi-Collision-Resistance
0
rewiews
Exploring the transformation of multi-collision-resistant hash functions into collision-resistant hash functions, with insights on Reed-Solomon codes and cryptographic primitives.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Paul G. Allen School
Hashing Five Inputs with Three Compression Calls
0
rewiews
Innovative hashing technique using three compression calls for five inputs, offering improved efficiency and security for Merkle-Damgård hashing and Merkle trees with potential applications in cryptography.
Add to list
12
Lesons
22 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Introduction to Cryptography Part 2 - Public Key and Key Exchange
0
rewiews
Explore public key cryptography, hash functions, and key exchange methods. Learn about block vs. stream ciphers, salting, and one-way hashing for enhanced digital security.
Add to list
9
Lesons
29 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
Network Security - MD5 Algorithm
0
rewiews
Explore the MD5 algorithm's structure and implementation, including padding, length appending, buffer initialization, block processing, and output generation.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
TheIACR
Fast Software Encryption 2023 - Rump Session
0
rewiews
Explore cutting-edge developments in fast software encryption at this dynamic session, featuring rapid-fire presentations on the latest research and innovations in cryptography.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
TheIACR
Hash Function Cryptanalysis - Techniques and Applications
0
rewiews
Explore cryptanalysis techniques for hash functions, focusing on block ciphers and double block length constructions in this advanced cryptography session.
Add to list
9
Lesons
56 minutes
On-Demand
Free-Video
TheIACR
Non-Interactive Zero Knowledge: Adaptive Security and Challenges - Asiacrypt 2022
0
rewiews
Explore non-interactive zero knowledge, adaptive security, and advanced cryptographic concepts in this comprehensive session from Asiacrypt 2022.
Add to list
24
Lesons
1 hour
On-Demand
Free-Video
TheIACR
Secure Hash Functions - Advances and Applications
0
rewiews
Explore cutting-edge developments in secure hash functions at Crypto 2022, featuring expert presentations on cryptographic advancements and their applications.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
TheIACR
Triangulating Rebound Attack on AES-like Hashing
0
rewiews
Explore advanced cryptographic techniques with a focus on triangulating rebound attacks on AES-like hashing, enhancing understanding of cryptanalysis methods.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
TheIACR
Hash Function Cryptanalysis - Session 14
0
rewiews
Explore cryptanalysis techniques for hash functions, including inner collision attacks, preimage attacks, and quantum collision attacks on various cryptographic constructions.
Add to list
38
Lesons
56 minutes
On-Demand
Free-Video
Energy Efficient BCrypt Cracking - Techniques and Strategies
0
rewiews
Explore energy-efficient techniques for cracking bcrypt hashes, focusing on optimizing hardware and software for improved performance and reduced power consumption.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
SHA-1 Backdooring and Exploitation
0
rewiews
Explore SHA-1 vulnerabilities, backdooring techniques, and exploitation methods in cryptographic systems with expert insights and practical demonstrations.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
TheIACR
On the Complexity of Collision Resistant Hash Functions
0
rewiews
Explore the intricacies and challenges of collision-resistant hash functions in cryptography, examining their complexity and implications for security systems.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
TheIACR
Hashing and Hash-and-Sign Techniques
0
rewiews
Explore cutting-edge cryptographic techniques in hashing and hash-and-sign protocols, presented by experts at PKC 2024, chaired by Eiichiro Fujisaki.
Add to list
1
Lesons
1 hour 22 minutes
On-Demand
Free-Video
IEEE
Efficient and Generic Microarchitectural Hash Function Recovery - Session 111
0
rewiews
Explore efficient techniques for recovering microarchitectural hash functions, enhancing understanding of hardware vulnerabilities and potential security implications.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
TheIACR
Classification of Designs and Components and AES-like Hashing Cryptanalysis
0
rewiews
Explore cryptographic design classification and AES-like hashing cryptanalysis in this FSE 2024 conference session, featuring expert discussions on cutting-edge research and methodologies.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
TheIACR
Universal Hashing and Authenticated Encryption - FSE 2024 Session
0
rewiews
Explore cutting-edge developments in universal hashing and authenticated encryption, advancing cryptographic techniques for enhanced data security and integrity.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
BSidesLV
PBKDF2 - Performance Matters
0
rewiews
Explore password hashing, PBKDF2, and performance optimization techniques for improved security in this informative talk by Joseph Birr-Pixton.
Add to list
11
Lesons
25 minutes
On-Demand
Free-Video
LASCON
Cryptography Pitfalls
0
rewiews
Explore common cryptography pitfalls, modern techniques, and tools to enhance system security. Learn about random number generation, hash functions, ciphers, and authentication protocols.
Add to list
32
Lesons
46 minutes
On-Demand
Free-Video
0xdade
High Confidence Malware Attribution Using the Rich Header
0
rewiews
Explore advanced malware attribution techniques using the Rich Header, including its generation, fingerprinting capabilities, and a novel metadata hash for large-scale sample detection.
Add to list
35
Lesons
50 minutes
On-Demand
Free-Video
USENIX
DistCache - Provable Load Balancing for Large-Scale Storage Systems with Distributed Caching
0
rewiews
Innovative distributed caching mechanism providing provable load balancing for large-scale storage systems. Partitions hot objects and adaptively routes queries, enabling linear cache throughput increase with node count.
Add to list
19
Lesons
25 minutes
On-Demand
Free-Video
Security BSides San Francisco
Break Crypto like a Pro
0
rewiews
Explore common cryptographic vulnerabilities and learn practical exploitation techniques in this engaging talk on breaking crypto systems effectively.
Add to list
25
Lesons
42 minutes
On-Demand
Free-Video
PHP UK Conference
More Secrets of Cryptography
0
rewiews
Explore advanced cryptography concepts like hash functions, elliptic curves, and quantum cryptography, with practical applications in web trust and blockchain technology.
Add to list
21
Lesons
52 minutes
On-Demand
Free-Video
Common Developer Crypto Mistakes with Illustrations in Java
0
rewiews
Explore common cryptographic mistakes in Java development, covering random number generation, hashing, encryption, and key management. Learn best practices to enhance security.
Add to list
42
Lesons
56 minutes
On-Demand
Free-Video
Comparing Malicious Files
0
rewiews
Explore techniques for comparing malicious files, including sample identification, shared engines, and various metadata analysis methods to enhance threat detection and incident response.
Add to list
38
Lesons
56 minutes
On-Demand
Free-Video
TheIACR
Time-Memory Trade-Offs for Near-Collisions
0
rewiews
Explore time-memory trade-offs in near-collision attacks on hash functions, analyzing complexity and discussing practical applications in cryptography.
Add to list
18
Lesons
24 minutes
On-Demand
Free-Video
TheIACR
Tweakable Blockciphers with Asymptotically Optimal Security
0
rewiews
Explore asymptotically optimal security in tweakable blockciphers, covering parameter hash functions, inquisition questions, and random permutation distribution views.
Add to list
11
Lesons
24 minutes
On-Demand
Free-Video
TheIACR
New Attacks on the Concatenation and XOR Hash Combiners
0
rewiews
Explore new attacks on concatenation and XOR hash combiners, focusing on cryptographic hash functions, iterated structures, and second preimage attacks. Gain insights into recent developments in hash function security.
Add to list
15
Lesons
24 minutes
On-Demand
Free-Video
TheIACR
Collisions and Semi Free Start Collisions for Round Reduced RIPEMD 160
0
rewiews
Explore cryptographic vulnerabilities in RIPEMD-160 hash function, examining collision attacks and semi-free-start collisions for reduced-round variants.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
TheIACR
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probabilities
0
rewiews
Explore quantum computing's impact on cryptography, focusing on hash collision detection using differential trails with reduced probabilities in this cutting-edge research presentation.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
ACCU Conference
Hashing - Hashing Values
0
rewiews
Comprehensive exploration of hashing techniques for efficient associative containers, covering hash functions, byte sequences, and considerations for user-defined types. Emphasizes best practices and common pitfalls.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
ACCU Conference
How to Build Digital Signatures From Hash Functions
0
rewiews
Explore the evolution of digital signatures, from traditional systems to hash-based alternatives, addressing quantum computing threats and introducing a new cryptographic protocol.
Add to list
1
Lesons
1 hour 34 minutes
On-Demand
Free-Video
EuroPython Conference
Leveraging Consistent Hashing in Your Python Applications
0
rewiews
Explore consistent hashing in Python applications, from standalone design to optimized clustering, with practical use cases and implementation strategies.
Add to list
18
Lesons
44 minutes
On-Demand
Free-Video
Linux Plumbers Conference
Unifying Secure Boot Code and Getting Additions into UEFI
0
rewiews
Explore unification of UEFI loaders, security protocol overrides, and manual loading approaches for secure boot, discussing potential UEFI standard revisions and improvements.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Gopher Academy
Inside the Map Implementation
0
rewiews
Explore Go's map implementation, including hash functions, buckets, and performance considerations for efficient data storage and retrieval.
Add to list
12
Lesons
27 minutes
On-Demand
Free-Video
Gopher Academy
Go for Crypto Developers
0
rewiews
Explore Go's cryptography capabilities, focusing on TLS, encryption, block ciphers, hash functions, and password hashing for secure application development.
Add to list
7
Lesons
31 minutes
On-Demand
Free-Video
Gopher Academy
Micro Optimizing Go Code
0
rewiews
Optimize Go code for peak performance through algorithmic improvements, profiling, and practical tips. Learn microbenchmarking, API design impact, and standard library optimization techniques.
Add to list
44
Lesons
38 minutes
On-Demand
Free-Video
JSConf
Keeping Passwords Safe in 2017
0
rewiews
Explore modern password security techniques, including hashing, salting, and key derivation functions. Learn best practices to protect user data from breaches and attacks.
Add to list
30
Lesons
27 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
Quadratic Probing and Collision Handling Techniques in Data Structures - Hashing
0
rewiews
Master hashing techniques in data structures, focusing on collision handling through quadratic probing and exploring both open and closed hashing methods for efficient data storage and retrieval.
Add to list
1
Lesons
11 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
Linear Probing and Collision Handling Techniques in Data Structures - Hashing Implementation
0
rewiews
Master hashing techniques in data structures, including collision handling through linear probing and open/closed hashing methods for efficient data storage and retrieval.
Add to list
1
Lesons
13 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
Hash Functions in Data Structures - Division, Mid Square, and Folding Methods
0
rewiews
Master essential hash function techniques in data structures, including division, mid-square, and folding methods for efficient data storage and retrieval optimization.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
Collision Handling Techniques and Hashing in Data Structures
0
rewiews
Master essential collision handling techniques in hashing, including separate chaining and open addressing methods, to efficiently store and retrieve data in data structures.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
DPDK Project
High Performance Elephant Flow Detection Algorithm on DPDK
0
rewiews
Discover high-performance network monitoring techniques using sketch-based algorithms for efficient elephant flow detection and DDOS prevention with optimized DPDK implementation.
Add to list
18
Lesons
24 minutes
On-Demand
Free-Video
NPTEL-NOC IITM
Perfect Hashing
0
rewiews
Explore perfect hashing techniques for efficient data retrieval and storage in computer science applications.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
nanohubtechtalks
Blockchain and Proof of Work Lab: Interactive Computing and Applications
0
rewiews
Explore blockchain concepts hands-on with interactive apps and computing, covering hash functions, proof of work, and creating your own blockchain.
Add to list
4
Lesons
21 minutes
On-Demand
Free-Video
GOTO Conferences
Cryptography Pitfalls
0
rewiews
Explore common cryptography pitfalls, their implications, and best practices for secure implementation in software development. Gain insights into vulnerabilities and effective security measures.
Add to list
14
Lesons
44 minutes
On-Demand
Free-Video
NDC Conferences
Hyper Speed! When Big Data Blooms
0
rewiews
Explore high-speed data processing using Bloom Filters, a powerful probabilistic data structure. Learn to handle massive data volumes efficiently, with real-world examples and advanced techniques.
Add to list
21
Lesons
48 minutes
On-Demand
Free-Video
Squid: Schools for Quantum Information Development
On the Necessity of Collapsing for Post-Quantum and Quantum Commitments
0
rewiews
Delve into quantum cryptography fundamentals through an award-winning exploration of collapse binding and post-quantum commitments, examining their necessity and implications for quantum security protocols.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
PKI Consortium
Stateful Hash-Based Signature Schemes: Challenges and Solutions for Post-Quantum Cryptography
0
rewiews
Explore stateful hash-based signatures, their security benefits, and challenges in state handling for post-quantum cryptography transition.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
TheIACR
Symmetric Cryptanalysis 2
0
rewiews
Explore advanced symmetric cryptanalysis techniques and their applications in modern cryptography, presented by leading experts at a prestigious conference.
Add to list
1
Lesons
1 hour 34 minutes
On-Demand
Free-Video
Dave Churchill
Introduction to Artificial Intelligence - Hash Functions - Lecture 7
0
rewiews
Explore hash functions in AI, covering algorithmic techniques and data structures for modern problem-solving in simple games.
Add to list
1
Lesons
1 hour 24 minutes
On-Demand
Free-Video
Dave Churchill
Introduction to Artificial Intelligence - Hash Functions and Tables - Lecture 7
0
rewiews
Explore hash functions and tables in AI, learning algorithmic techniques for efficient data storage and retrieval in modern problem-solving environments.
Add to list
1
Lesons
1 hour 13 minutes
On-Demand
Free-Video
Dave Churchill
Introduction to Artificial Intelligence: Hash Functions and Hash Tables - Lecture 6
0
rewiews
Explore hash functions and hash tables in AI, covering properties, algorithms, and collision resolution techniques. Learn to implement efficient closed lists for search algorithms.
Add to list
17
Lesons
1 hour 13 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
Rehashing and Collision Handling in Data Structures
0
rewiews
Master efficient data storage and retrieval techniques through hashing, including hash functions and collision handling methods like chaining and open addressing for optimized data structure performance.
Add to list
1
Lesons
10 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
Double Hashing and Collision Handling Techniques in Data Structures
0
rewiews
Master collision handling techniques in hashing, including double hashing and open/closed addressing methods for efficient data structure implementation and optimization.
Add to list
1
Lesons
11 minutes
On-Demand
Free-Video
USENIX
Attacking with Something That Does Not Exist: Proof of Non-Existence Can Exhaust DNS Resolver CPU
0
rewiews
Explore how NSEC3 proof of non-existence in DNSSEC can be exploited to exhaust DNS resolver CPU resources, with detailed attack implementation and performance analysis.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
load more...