ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

102,826 results

Related queries

quantum encryption veritasium

quantum cryptography projects

what is post quantum cryptography

quantum cryptography bb84

quantum cryptography hindi

dna cryptography

quantum cryptography explained in tamil

Eye on Tech
What is Quantum Cryptography? An Introduction

Try as we might, malicious actors can sometimes outsmart classical encryption methods, especially with accessible quantum ...

2:56
What is Quantum Cryptography? An Introduction

77,216 views

3 years ago

Physics Girl
Quantum Cryptography Explained

This episode is brought to you by Squarespace: http://www.squarespace.com/physicsgirl With recent high-profile security ...

8:13
Quantum Cryptography Explained

420,685 views

9 years ago

Up and Atom
Quantum Cryptography in 6 Minutes

Quantum Cryptography explained simply. Regular encryption is breakable, but not quantum cryptography. Today we'll look at the ...

5:58
Quantum Cryptography in 6 Minutes

111,847 views

8 years ago

PhysicsTCD
Quantum cryptography explained

MSc students Aaron Fitzpatrick, Matea Leahy, and Liam Lysaght explain how the quantum cryptography protocol BB84 works.

4:47
Quantum cryptography explained

10,154 views

3 years ago

minutephysics
How Quantum Computers Break Encryption | Shor's Algorithm Explained

Go to http://www.dashlane.com/minutephysics to download Dashlane for free, and use offer code minutephysics for 10% off ...

17:31
How Quantum Computers Break Encryption | Shor's Algorithm Explained

3,294,445 views

6 years ago

National Institute of Standards and Technology
Post-Quantum Cryptography: the Good, the Bad, and the Powerful

This video featuring NIST's Matthew Scholl emphasizes how NIST is working with the brightest minds in government, academia, ...

2:50
Post-Quantum Cryptography: the Good, the Bad, and the Powerful

227,416 views

4 years ago

Veritasium
What makes quantum computers SO powerful?

Transitioning organizations to post-quantum cryptography. Nature, 605(7909), 237-243. - https://ve42.co/Joseph2022 Bernstein, ...

24:29
What makes quantum computers SO powerful?

11,709,647 views

2 years ago

ICFO People
How does quantum cryptography work?

Quantum computers already have a much higher computational capacity than those we use today. When established, quantum ...

3:55
How does quantum cryptography work?

10,534 views

3 years ago

Sabine Hossenfelder
What is Quantum Cryptography?

GET NORDVPN: https://nordvpn.org/sabine USE COUPON CODE: sabine USE THE CODE SO YOU CAN GET 68% off 2-year ...

12:41
What is Quantum Cryptography?

115,847 views

5 years ago

People also watched

RSA Conference
Understanding and Explaining Post-Quantum Crypto with Cartoons

Klaus Schmeh, Chief Editor Marketing, cryptovision Are you an IT security professional, but not a mathematician? This session will ...

40:24
Understanding and Explaining Post-Quantum Crypto with Cartoons

31,822 views

5 years ago

CrashCourse
Cryptography: Crash Course Computer Science #33

Today we're going to talk about how to keep information secret, and this isn't a new goal. From as early as Julius Caesar's Caesar ...

12:33
Cryptography: Crash Course Computer Science #33

938,210 views

8 years ago

Top Master
Ethical Hacker: "I'll Show You Why Google Has Just Shut Down Their Quantum Chip"

Initially celebrated for its groundbreaking speed and unmatched computational power, Willow suddenly became the center of ...

31:11
Ethical Hacker: "I'll Show You Why Google Has Just Shut Down Their Quantum Chip"

2,290,312 views

11 months ago

The Royal Institution
The mind-bending reality of quantum mechanics - with Jim Al Khalili

... entirely new technologies, from quantum computers and quantum sensors to quantum cryptography and the quantum internet.

1:01:27
The mind-bending reality of quantum mechanics - with Jim Al Khalili

213,535 views

8 days ago

Qiskit
The Story of Shor's Algorithm, Straight From the Source | Peter Shor

Your formal invite to weekly Qiskit videos ► https://ibm.biz/q-subscribe Though Shor’s Algorithm is widely known, the story ...

31:18
The Story of Shor's Algorithm, Straight From the Source | Peter Shor

594,827 views

4 years ago

Looking Glass Universe
Why I Left Quantum Computing Research

Donate to FarmKind at: https://www.farmkind.giving/donate?promo=lookingglass I finished my PhD in quantum computing in 2020 ...

21:14
Why I Left Quantum Computing Research

1,074,253 views

5 months ago

Coding Tech
A Beginner’s Guide To Quantum Computing

Dr. Talia Gershon, a materials scientist by training, came to IBM Research in 2012. After 4.5 years of developing next-generation ...

17:58
A Beginner’s Guide To Quantum Computing

1,091,730 views

8 years ago

Institute for Quantum Computing
Introduction to quantum cryptography - Vadim Makarov

I introduce the basic principles of quantum cryptography, and discuss today's status of its technology, with examples of optical ...

1:17:54
Introduction to quantum cryptography - Vadim Makarov

27,975 views

11 years ago

Q-munity
What is the BB84 Protocol? | Quantum Cryptography | Q-munity Tech

Instagram: https://www.instagram.com/qmunity.tech/ Facebook: https://www.facebook.com/qmunitytech Twitter: ...

28:18
What is the BB84 Protocol? | Quantum Cryptography | Q-munity Tech

2,885 views

4 years ago

Fireship
7 Cryptography Concepts EVERY Developer Should Know

Cryptography is scary. In this tutorial, we get hands-on with Node.js to learn how common crypto concepts work, like hashing, ...

11:55
7 Cryptography Concepts EVERY Developer Should Know

1,592,736 views

4 years ago

Eye on Tech
What is Post-Quantum Cryptography?

Quantum computing threatens to break today's encryption standards, and cybersecurity experts are racing to develop ...

5:11
What is Post-Quantum Cryptography?

4,279 views

5 months ago

Thales Cybersecurity Products
Understanding Post-Quantum Cryptography (PQC)

Learn how Quantum computers will impact the Data Security landscape and why organizations urgently need to adopt a ...

2:35
Understanding Post-Quantum Cryptography (PQC)

16,819 views

2 years ago

IBM Technology
Your Encryption Isn't Quantum Safe

Learn more about current threats: https://ibm.biz/BdP3Cv Learn how to build a quantum-safe future: https://ibm.biz/BdP3Cm If your ...

9:22
Your Encryption Isn't Quantum Safe

42,498 views

2 years ago

SandboxAQ
NIST's Post-Quantum Cryptography Standardization Explained

With quantum computing on the horizon, traditional encryption methods are at risk of becoming obsolete and/or incapable of ...

2:25
NIST's Post-Quantum Cryptography Standardization Explained

1,497,977 views

1 year ago

Centre for Quantum Technologies
Quantum cryptography, animated

This animation by the Centre for Quantum Technologies at the National University of Singapore illustrates the process of quantum ...

1:57
Quantum cryptography, animated

85,650 views

9 years ago

QuantumVisions
Quantum cryptography: The BB 84 protocol (U3-02-03)

A visual apporoach to the BB84 protocol of quantum cryptography. (日本語字幕有り) All videos of the project Quantum Visions can ...

3:45
Quantum cryptography: The BB 84 protocol (U3-02-03)

33,838 views

4 years ago

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Theoretical Computer ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

63,682 views

2 years ago

Azanaebi
Quantum Cryptography (explained in 90 seconds)
1:30
Quantum Cryptography (explained in 90 seconds)

380 views

6 months ago

DEFCONConference
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis

NIST is betting it won't happen before 2035, setting that deadline for companies to migrate to post-quantum cryptography (PQC).

39:29
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis

136,087 views

2 months ago

Chalk Talk
Post-quantum cryptography: Security after Shor’s algorithm

What's the current status of the NIST Post-Quantum Cryptography Standardization? Find out here: ...

7:17
Post-quantum cryptography: Security after Shor’s algorithm

66,683 views

2 years ago