ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,444 results

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Theoretical Computer ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

63,678 views

2 years ago

DEFCONConference
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis

NIST is betting it won't happen before 2035, setting that deadline for companies to migrate to post-quantum cryptography (PQC).

39:29
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis

135,999 views

2 months ago

IBM Research
The next big leap in cryptography: NIST’s post-quantum cryptography standards

The next big leap in encryption has officially been shared in this special webcast. IBM Fellow Ray Harishankar discusses the ...

25:26
The next big leap in cryptography: NIST’s post-quantum cryptography standards

13,513 views

1 year ago

TüftelLab
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1

Our cell phones and computers are constantly sending and receiving information. To ensure that only the right recipients can read ...

5:01
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1

43,824 views

3 years ago

Q-Leap Edu Quantum Communications
9-3 BB84 Protocol

Lesson 9 BB84: Single-photon QKD Step 3: BB84 Protocol We take a closer look at BB84, the first example of a cryptographic ...

13:39
9-3 BB84 Protocol

10,240 views

4 years ago

Q-Leap Edu Quantum Communications
10-1 Introduction to entanglement-based QKD

Lesson 10 E91: Entanglement-based QKD Step 1: Introduction to entanglement-based QKD In this lesson, we explore the first ...

4:10
10-1 Introduction to entanglement-based QKD

6,555 views

4 years ago

EFForg
EFF Fireside Chat: Bruce Schneier on Quantum Cryptography

... it is titled cryptography after the aliens land my name and you'll find it the short answer is quantum cryptography is not the end of ...

0:42
EFF Fireside Chat: Bruce Schneier on Quantum Cryptography

142 views

5 years ago

media.ccc.de
35C3 -  The year in post-quantum crypto

Post-quantum cryptography has become one of the most active areas in cryptography, trying to address important questions from ...

1:10:01
35C3 - The year in post-quantum crypto

8,301 views

6 years ago

media.ccc.de
36C3 -  (Post-Quantum) Isogeny Cryptography

https://media.ccc.de/v/36c3-10543-post-quantum_isogeny_cryptography There are countless post-quantum buzzwords to list: ...

52:23
36C3 - (Post-Quantum) Isogeny Cryptography

5,621 views

5 years ago

IBM Research
Understanding the NIST standards and IBM's contributions to post-quantum cryptography

In this brief animated video, we unpack why the NIST standards are important, discuss IBM's contributions to quantum-safe ...

2:18
Understanding the NIST standards and IBM's contributions to post-quantum cryptography

2,154 views

1 year ago

Brainwave Lab
Quantum Cryptography Explained 🔐 How Physics Makes Hacking Impossible!

Quantum computers could one day crack today's passwords in seconds . That's why we need Quantum ...

0:39
Quantum Cryptography Explained 🔐 How Physics Makes Hacking Impossible!

169 views

3 months ago

Epicenter Podcast
What will Quantum Computing Change?

Quantum computing is often dismissed as a distant sci-fi future, but Ethereum OG John Lilic and Oxford physicist Stefano Gogioso ...

1:21:42
What will Quantum Computing Change?

127 views

3 weeks ago

aantonop
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography ...

6:47
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

23,518 views

8 years ago

DEFCONConference
DEF CON 23 -  Jean Philippe Aumasson - Quantum Computers vs Computers Security

And we heard about a commercial quantum computer, and we heard vendors of quantum key distribution or quantum random ...

32:16
DEF CON 23 - Jean Philippe Aumasson - Quantum Computers vs Computers Security

4,806 views

9 years ago

Tanja Lange: Post-quantum cryptography
Post-quantum cryptography -- trailer

This channel provides the lectures for the "Post-quantum cryptography" part of the MasterMath course "Selected Areas in ...

0:49
Post-quantum cryptography -- trailer

3,758 views

4 years ago

media.ccc.de
Christian Schaffner: Quantum Cryptography

I will entertain the audience with a science talk about quantum cryptography, covering both some classics (Quantum Key ...

1:00:26
Christian Schaffner: Quantum Cryptography

2,459 views

9 years ago

Ben
Quantum Cryptography

Swansea University CS-130 Coursework 1 This video focuses on how a quantum computer works, how it compares to a classical ...

2:31
Quantum Cryptography

87 views

6 years ago

TüftelLab
What is Quantum Cryptography | Quantum 1x1

When you send a message via Messenger, it is encrypted using mathematical principles. To ensure that your messages continue ...

2:11
What is Quantum Cryptography | Quantum 1x1

1,220 views

3 years ago

Tanja Lange: Post-quantum cryptography
What is post-quantum crypto and why should we care?

This lecture is part of Post-quantum cryptography" part of the MasterMath course "Selected Areas in Cryptology" For details see ...

15:35
What is post-quantum crypto and why should we care?

3,149 views

4 years ago

Mental Outlaw
Signal Just Published Post Quantum E2E Encryption

In this video I discuss how the Signal foundation developed PQXDH (Post Quantum Extended Diffie Helmen) an encryption ...

8:32
Signal Just Published Post Quantum E2E Encryption

259,691 views

2 years ago

Mental Outlaw
Apple Updates iMessage with Post Quantum Encryption

In this video I discuss how Apple added post quantum encryption to their message app. iMessage is still proprietary, and still only ...

14:53
Apple Updates iMessage with Post Quantum Encryption

144,649 views

1 year ago

BCSSouthWest
BCS South West - Quantum Cryptography - December 2015

From 2000bc right to Enigma in WWII, cryptography was based upon substitution ciphers and was relying on a key exchange.

54:54
BCS South West - Quantum Cryptography - December 2015

109 views

9 years ago

The 5 PM Podcast
Quantum-Safe Encryption Explained | Episode 201

In this episode, we dive into quantum-safe encryption and its revolutionary technology of photon polarization. Discover how ...

1:56
Quantum-Safe Encryption Explained | Episode 201

22 views

10 months ago

IBM Research
What does quantum-safe cryptography look like?

The easiest example that gives you a taste of the kind of mathematical problems quantum-safe cryptography is based on is the ...

0:33
What does quantum-safe cryptography look like?

3,651 views

6 years ago

Chaos-West TV
#rC3 2021 Kyber and Post-Quantum Crypto - How does it work?

Post-Quantum Crypto is the art of inventing asymmetric cryptography that can withstand large quantum computers. This relatively ...

1:02:41
#rC3 2021 Kyber and Post-Quantum Crypto - How does it work?

12,839 views

3 years ago