Securing Stream Ciphers (HMAC) - Computerphile Securing Stream Ciphers (HMAC) - Computerphile begin-post-stats Computerphile • 84K views end-post-stats begin-duration 9:24 end-duration Math topics: _Binary_arithmetic_##Binary arithmetic##_Bit_##Bit##_Exclusive_or_##Exclusive or##_Hexadecimal_##Hexadecimal Other topics: _Checksum_algorithms_##Checksum algorithms##_Checksum_##Checksum##_SHA-1_##SHA-1##_SHA-2_##SHA-2##_Cryptography_##Cryptography##_Encryption_##Encryption##_Ciphertext_##Ciphertext##_Length_extension_attack_##Length extension attack##_Plaintext_##Plaintext##_Error_detection_and_correction_##Error detection and correction##_Message_authentication_code_##Message authentication code##_Hash_function_##Hash function##_Hash-based_message_authentication_code_##Hash-based message authentication code##_Ciphers_##Ciphers##_Block_cipher_##Block cipher##_Keystream_##Keystream##_Stream_cipher_##Stream cipher video-id: wlSG3pEiQdc channel_Computerphile_ So What Learning Binary arithmetic , Checksum algorithms , Ciphers , Cryptography , Error detection and correction Monday, January 22, 2018 Share Share