Тёмный
No video :(

Authentication functions and 3 ways to produce authentication | Message authentication 

Abhishek Sharma
Подписаться 130 тыс.
Просмотров 213 тыс.
50% 1

Hello friends! Welcome to my channel.
My name is Abhishek Sharma.
#abhics789
If you learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)
There are lectures related to different subjects on this channel.Do check them out, guys.
Link is given below:
computer graphics:
• Computer Graphics
engineering economics:
• Engineering Economics
Cryptography :
• Playfair Cipher Algorithm
.Net C# :
• .NET C#
Pointers in C :
• Pointers in C Introduc...
Linked List for Interviews :
• Introduction to Linked...
Java Tricky videos/programs for interviews :
• Java Labelled For Loop...
File Handling in C :
• Reading the contents o...
pointers playlist:
• Pointers in C
C Programming tips and tricks:
• C tricky programs/videos
Abhishek VLOGS :
• #VLOG-1 Riding through...
Concerts :
• Khushboo Grewal concer...

Опубликовано:

 

5 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 52   
@abbufaisal6094
@abbufaisal6094 3 года назад
Explanation is very good i understand each and every concept thank you sir 👍
@farrukhalamvirk1717
@farrukhalamvirk1717 2 года назад
sharma sab zinda bad
@dipakshelke5517
@dipakshelke5517 Год назад
Thanks so much brother everyone and each video is best and helpfull ❤
@RohanVasava
@RohanVasava 2 года назад
you are doing very well man
@AnkiitOp
@AnkiitOp Год назад
Purane jamane vala example 😅 lit 🔥
@areebafayyaz6417
@areebafayyaz6417 2 года назад
excellent...!! THANK YOU! :)
@mangeshgaikwad1744
@mangeshgaikwad1744 4 месяца назад
NIce and pin point.
@meghakumari364
@meghakumari364 3 года назад
Thank you so much sir 👍🙏🙏
@instalover4504
@instalover4504 2 года назад
Thank you sir 🙏 ❤
@VISHALSINGH-mr5xg
@VISHALSINGH-mr5xg 4 года назад
bhai bacha liya:)
@shivangitripathi4816
@shivangitripathi4816 4 года назад
Nice sir😎😎
@dipakshelke5517
@dipakshelke5517 Год назад
Very nice brother 🎉
@foodiecaloriess
@foodiecaloriess 3 года назад
Awesome video sir
@nitikalaad7975
@nitikalaad7975 3 года назад
Thank you sir 👍
@kdsouza4507
@kdsouza4507 Год назад
Thank you so much sir
@kunalsoni7681
@kunalsoni7681 4 года назад
Really very well explanation 😊
@xyz-pc3tl
@xyz-pc3tl 2 года назад
Thanks a lot sir....🙏🙏
@nehalsingh785
@nehalsingh785 2 года назад
awesome tutorial sir
@shreyasankar5328
@shreyasankar5328 4 года назад
Thanks❤️❤️❤️
@saikiransaikiran4753
@saikiransaikiran4753 Год назад
Super
@dhaneshpt8641
@dhaneshpt8641 11 месяцев назад
Thank you
@anjalijainaj4827
@anjalijainaj4827 4 года назад
🙃🤩🤩
@anam7952
@anam7952 2 года назад
Thank you 🙏
@TheJasleen99
@TheJasleen99 4 года назад
Hello! This was really helpful. Do you have the pdf of your notes? It would be a great help. Thank you so much. Your videos are great!
@subhajeetchakraborty1791
@subhajeetchakraborty1791 3 года назад
Take ss
@heenabarot4329
@heenabarot4329 3 года назад
@@subhajeetchakraborty1791 place note provide kijiye
@subhajeetchakraborty1791
@subhajeetchakraborty1791 3 года назад
@@heenabarot4329 arey nai keh rha jab ,smjhane wle ka hath thode time ke liye , considerable amount ke liye copy se side pe hota hai tb video pause krke ,screenshot lelo
@prodiptamondal1758
@prodiptamondal1758 3 года назад
Do we achieve both authentication and confidentiality at symmetric encryption?
@chatrunaik4243
@chatrunaik4243 3 года назад
I think yes. bcz key shared only b/w sender and receiver
@mrbeastwithnomoney
@mrbeastwithnomoney 2 года назад
Yes
@darlingharish9338
@darlingharish9338 2 года назад
authntication functions and requirements both are same or what?
@sindujapolana4254
@sindujapolana4254 7 месяцев назад
What are algorithms we can use
@tanveerahmed2930
@tanveerahmed2930 7 месяцев назад
symmetric asymatric or baqi konse method hai
@DIVAKARM-ec6vf
@DIVAKARM-ec6vf 4 года назад
Thank you sir
@zeeshanali4015
@zeeshanali4015 2 года назад
Sir I want to know "if sender use public key of sender for encryption and receiver use private key of receiver for description " is it possible?
@b2_5b0mdali2
@b2_5b0mdali2 Год назад
yes, it is possible using asymmetric cryptography. hope your query has solved inshallah.
@DIVAKARM-ec6vf
@DIVAKARM-ec6vf 4 года назад
Maine jis jis topic pr video bnane bole hn plzz jldi bna dijiye 10 ko exam hh Ye video bnane ke liye dhanyawad
@shaeimakter8008
@shaeimakter8008 4 года назад
bro CBC-MAC ar review dasakoga
@trickgamer110
@trickgamer110 2 года назад
Can any one please tell the message authentication requirements?
@kandwalbrothers6180
@kandwalbrothers6180 Год назад
Idea is done but thoda clear writing kijiye
@nostalgean
@nostalgean 2 года назад
authenti authenti authenti authenti
@KalyaniSahu-rt1qg
@KalyaniSahu-rt1qg 8 месяцев назад
sir note ke pdf mil skte hai kya
@its_gourav09
@its_gourav09 3 года назад
Sir I am Confused kyuke Pta Nhi Chlta Konsi Video keske baad hai #example ke Ley Types Of Cryptography ke Baad Konsi video hai Pta Nhi chlta Sir Plzzz Slove my Problem
@AbhishekSharmaDit
@AbhishekSharmaDit 3 года назад
Follow the. Playlist :)
@harshsolanki1716
@harshsolanki1716 3 года назад
Hamre nam pe koi use Kare to vo Kya Kya kr sakta hai
@purusottam234
@purusottam234 4 года назад
Shall you provide us whole notes by making its pdf
@shekhar2784
@shekhar2784 Год назад
Can we get your pdf of lectures?
@Onizukaash
@Onizukaash 3 года назад
Bro thoda slow bolo
@Gopal-pn4kg
@Gopal-pn4kg Год назад
bhai pahle aapne shikh lo ok
@FirstLearningthanEarning
@FirstLearningthanEarning 4 года назад
Bro MAC AND HMAC ARE SAME
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
There is a little bit difference i will make a video soon
Далее
Hash Functions in Cryptography
16:59
Просмотров 440 тыс.
Средневековый киборг
00:39
Просмотров 493 тыс.
Паук
01:01
Просмотров 2,4 млн
What are Digital Signatures? - Computerphile
10:17
Просмотров 332 тыс.
AES: How to Design Secure Encryption
15:37
Просмотров 160 тыс.
Kerberos Authentication Explained | A deep dive
16:52
Просмотров 341 тыс.