All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
#prodigyinfotech #cybersecurity #imageencryption #pythonprogra
…
5 days ago
linkedin.com
In our Format Preserving Encryption MasterLabs series, Chris S. break
…
1 month ago
linkedin.com
Candidate Indistinguishability Obfuscation and Functional Encry
…
Feb 21, 2014
Microsoft
Functional encryption from LWE
Mar 27, 2014
Microsoft
Verifiable Functional Encryption - Microsoft Research
Jul 22, 2016
Microsoft
Computing on Encryption Data: Functional Encryption and More
Mar 10, 2015
Microsoft
Encryption and Cryptography for Professionals
1.2K views
Nov 16, 2023
git.ir
5:49
Database Encryption: Techniques & Applications
6.4K views
Jul 28, 2023
Study.com
2:03:14
Predicate Encryption; Structured Encryption and Controlled Disclos
…
Sep 8, 2010
Microsoft
7 Common Encryption Algorithms: Explained
Sep 22, 2020
cbtnuggets.com
[Hot Item] Ham Radio 10W Walkie Talkie Iradio R6000 Two Way Radi
…
2 months ago
made-in-china.com
2:55
Cryptography and Network Security Week 3 | NPTEL ANSWERS 2026 #
…
890 views
1 month ago
YouTube
MY SWAYAM
57:11
Sept 12 2025 Tutte Colloquium - Roman Langrehr
2 views
5 months ago
YouTube
Combinatorics & Optimization University of Wat…
2:53
Cryptography and Network Security Week 4 | NPTEL ANSWERS 2026 #
…
346 views
3 weeks ago
YouTube
MY SWAYAM
1:42:45
TOSCA Testing in SAP Project Delivery Lifecycle
11 views
3 weeks ago
YouTube
LKCloudTech
5:47
LINE (Japanese Communication App)
3 views
2 weeks ago
YouTube
ChipTask
2:45
Cryptography and Network Security Week 5 | NPTEL ANSWERS 2026 #
…
404 views
2 weeks ago
YouTube
MY SWAYAM
1:36:42
Build a Modular Payload Encryptor in Rust (AES-GCM & XOR)
146 views
1 month ago
YouTube
RootNRoute
9:24
Caesar Cipher in Haskell
16 views
2 months ago
YouTube
Agneay B Nair
0:56
How Encryption Works
32 views
1 month ago
YouTube
Tech Stack Daily
1:41
Uboat 110 That Ended WWII Early Enigma machine #shorts
1.6K views
2 months ago
YouTube
ViralVideoFlix
18:32
Beyond RSA: Exploring Prime Number Generation for Data Secur
…
28 views
1 month ago
YouTube
Wolfram
1:26:52
Watermarking and Traitor Tracing for PRFs
7 views
2 weeks ago
bilibili
3cH0_Nu1L
1:17:32
Mixed Functional Encryption Applications to Traitor Tracing
10 views
2 weeks ago
bilibili
3cH0_Nu1L
1:27:23
Laconic Function Evaluation
6 views
2 weeks ago
bilibili
3cH0_Nu1L
1:16:53
Optimal Broadcast Encryption from Pairings and LWE
13 views
2 weeks ago
bilibili
3cH0_Nu1L
1:09:11
Sieving in practice The Generalized Sieve Kernel (G6K)
2 weeks ago
bilibili
3cH0_Nu1L
1:04
Nav on Instagram: "Let’s talk about encryption in cybersecurity! Encry
…
5.6K views
4 months ago
Instagram
itsnav.k
1:15:05
Post-Quantum Multi-Party Computation in Constant Rounds
8 views
2 weeks ago
bilibili
3cH0_Nu1L
1:38:40
NIZK from LPN and Trapdoor Hash via Correlation Intractability for Ap
…
9 views
2 weeks ago
bilibili
3cH0_Nu1L
See more videos
More like this
Feedback