Cryptography contests

Password Hashing Competition

The Password Hashing Competition was an open competition announced in 2013 to select one or more password hash functions that can be recognized as a recommended standard. It was modeled after the successful Advanced Encryption Standard process and NIST hash function competition, but directly organized by cryptographers and security practitioners. On 20 July 2015, Argon2 was selected as the final PHC winner, with special recognition given to four other password hashing schemes: Catena, Lyra2, yescrypt and Makwa. One goal of the Password Hashing Competition was to raise awareness of the need for strong password hash algorithms, hopefully avoiding a repeat of previous password breaches involving weak or no hashing, such as the ones involvingRockYou (2009),JIRA,Gawker (2010),PlayStation Network outage,Battlefield Heroes (2011),eHarmony,LinkedIn,Adobe,ASUS,South Carolina Department of Revenue (2012),Evernote,Ubuntu Forums (2013),etc. The organizers were in contact with NIST, expecting an impact on its recommendations. (Wikipedia).

Video thumbnail

Excel Hash - Interactive Bug Menu

This is my entry in the Excel Hash competition using the FREQUENCY and MAX Functions, plus 3D Models and Form Controls. VOTE for your favourite entry here: https://tinyurl.com/y9hmvelp WATCH the other awesome entries from my fellow Excel MVPs in the playlist here: https://www.youtube.com

From playlist Excel Hash 2018

Video thumbnail

Excel Hash 2021 Challenge - Secret Formula for Sales Commission

In this Excel Hash Challenge 2021, we have some great ingredients to mashup and provide solutions. This is the third edition of Excel Hash Challenge and there are some great participants around the globe. Please feel to check other participant's videos & don't forget to give a vote, like &

From playlist Excel Hash 2021

Video thumbnail

Top Hashing Algorithms In Cryptography | MD5 and SHA 256 Algorithms Explained | Simplilearn

In this video on Top Hashing Algorithms In Cryptography, we will cover the technical aspects of hashing while going through some well-known hash functions and algorithms at the end. We cover the basics of cryptography and its applications. We also have detailed MD5 and SHA265 Explained sec

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

Challenge Question - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Top Hashing Techniques | Popular Hashing Techniques | Network Security | #Shorts | Simplilearn

🔥FREE Cyber Security Course: https://www.simplilearn.com/learn-cyber-security-basics-skillup?utm_campaign=TopHashingTechniquesShorts&utm_medium=ShortsDescription&utm_source=youtube In this video on the top hashing techniques, we are going to take a look at the five most secure hashing alg

From playlist #Shorts | #Simplilearn

Video thumbnail

Cryptographic Hash Functions: Part 1

Cryptographic Hash Functions Applications of Crypto Hash Functions Birthday Problem Secure Hash Algorithm (SHA)

From playlist Network Security

Video thumbnail

RSA Conference 2010 USA: The Cryptographers Panel 2/6

Clip 2/6 MODERATOR: Ari Juels, Chief Scientist and Director, RSA Laboratories PANELISTS: Whitfield Diffie, Martin Hellman, Ronald Rivest, Adi Shamir, Brian Snow Join the founders of the field for an engaging discussion about the latest advances in cryptography, research areas to wa

From playlist RSA Conference USA 2010

Video thumbnail

Password Exploitation Class: Part 2: Hashcat and OCLHashcat 1/6

Clip 1/6 Credits: irongeek.com This is a class we gave for the Kentuckiana ISSA on the the subject of password exploitation. The Password Exploitation Class was put on as a charity event for the Matthew Shoemaker Memorial Fund ( http://www.shoecon.org/ ). The speakers were Dakykilla,

From playlist Password Exploitation Class

Video thumbnail

The algorithm at the heart of other algorithms

This video was made as part of 3b1b's SoME2 competition. Here we look at hashing - a simple yet effective idea at the heart of so many algorithms and applications. Typo at 1:14: Last digit of bucket hash was supposed to be 3 not 4.

From playlist Summer of Math Exposition 2 videos

Video thumbnail

Cryptographic Hash Functions: Part 2

Cryptographic Hash Functions Applications of Crypto Hash Functions Birthday Problem Secure Hash Algorithm (SHA)

From playlist Network Security

Video thumbnail

Cyber Security Week Day - 1 |Cryptography Full Course | Cryptography & Network Security| Simplilearn

🔥Advanced Executive Program In Cybersecurity: https://www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security 🔥Caltech Cybersecurity Bootcamp(US Only): https://www.simplilearn.com/cybersecurity-bootcamp This video on Cryptography full course will acquaint you with cryptograph

From playlist Simplilearn Live

Video thumbnail

Password Exploitation Class: Part 2: Hashcat and OCLHashcat 6/6

Clip 6/6 Credits: irongeek.com This is a class we gave for the Kentuckiana ISSA on the the subject of password exploitation. The Password Exploitation Class was put on as a charity event for the Matthew Shoemaker Memorial Fund ( http://www.shoecon.org/ ). The speakers were Dakykilla,

From playlist Password Exploitation Class

Video thumbnail

C Programming: Cracking hashed passwords using brute-force

In this session we'll learn how to write a program that cracks an MD5 hash using a brute-force technique. We'll also learn how to debug the program and manage the memory it uses with the valgrind tool.

From playlist C Programming, Fall 2022

Video thumbnail

Cryptography Full Course | Cryptography And Network Security | Cryptography | Simplilearn

🔥Advanced Executive Program In Cybersecurity: https://www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?utm_campaign=CryptographyFCAug17&utm_medium=DescriptionFirstFold&utm_source=youtube 🔥Caltech Cybersecurity Bootcamp(US Only): https://www.simplilearn.com/cybersecurity

From playlist Simplilearn Live

Video thumbnail

SHA 256 | SHA 256 Algorithm Explanation | How SHA 256 Algorithm Works | Cryptography | Simplilearn

🔥Advanced Executive Program In Cybersecurity: https://www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?utm_campaign=SHA256&utm_medium=Descriptionff&utm_source=youtube 🔥Caltech Cybersecurity Bootcamp(US Only): https://www.simplilearn.com/cybersecurity-bootcamp?utm_campai

From playlist Big Data Hadoop Tutorial Videos For Beginners [2022 Updated]

Video thumbnail

🔥Cryptography And Network Security Full Course 2022 | Cryptography | Network Security | Simplilearn

🔥Free Cyber Security Course With Completion Certificate: https://www.simplilearn.com/learn-cyber-security-basics-skillup?utm_campaign=CryptographyNetworkSecurityFC4Aug22&utm_medium=DescriptionFirstFold&utm_source=youtube This video on the Cryptography and network security full course will

From playlist Simplilearn Live

Video thumbnail

Raphael Mudge -- Dirty Red Team tricks

All videos at: http://www.irongeek.com/i.php?page=videos/derbycon1/mainlist

From playlist DerbyCon 2011

Video thumbnail

Symmetric Key Cryptography | Stream Cipher & Block Cipher Explained | Network Security | Simplilearn

This video on Symmetric Key Cryptography will acquaint you with the process of symmetric encryption and decryption. Here, we take a small recap into cryptography, the working and applications of symmetric key cryptography, and its advantages. We also have stream cipher and block cipher exp

From playlist Cyber Security Playlist [2023 Updated]🔥

Related pages

Lyra2 | NIST hash function competition | Argon2 | CAESAR Competition | Evernote | Advanced Encryption Standard process | Crypt (C)