SHA: Secure Hashing Algorithm - Computerphile
![](https://i.ytimg.com/vi/b4b8ktEV4Bg/mqdefault.jpg)
8:12
Karma Algoritmalar ve Güvenlik - Computerphile
![](https://i.ytimg.com/vi/O4xNJsjtN6E/mqdefault.jpg)
14:14
AES Explained (Advanced Encryption Standard) - Computerphile
![](https://i.ytimg.com/vi/JIhZWgJA-9o/mqdefault.jpg)
1:18:35
Lecture 21: SHA-1 Hash Function by Christof Paar
![](https://i.ytimg.com/vi/1S0aBV-Waeo/mqdefault.jpg)
17:30
Buffer Overflow Attack Arabellek Taşması Saldırısı - Computerphile
![](https://i.ytimg.com/vi/orIgy2MjqrA/mqdefault.jpg)
13:01
SHA-256 | COMPLETE Step-By-Step Explanation (W/ Example)
![](https://i.ytimg.com/vi/KqqOXndnvic/mqdefault.jpg)
1:22:01
21. Cryptography: Hash Functions
![](https://i.ytimg.com/vi/0TLDTodL7Lc/mqdefault.jpg)
15:33
Transport Layer Security (TLS) - Computerphile
![](https://i.ytimg.com/vi/nybVFJVXbww/mqdefault.jpg)
12:24