Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,444 results
[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Theoretical Computer ...
63,678 views
2 years ago
NIST is betting it won't happen before 2035, setting that deadline for companies to migrate to post-quantum cryptography (PQC).
135,999 views
2 months ago
The next big leap in encryption has officially been shared in this special webcast. IBM Fellow Ray Harishankar discusses the ...
13,513 views
1 year ago
Our cell phones and computers are constantly sending and receiving information. To ensure that only the right recipients can read ...
43,824 views
3 years ago
Lesson 9 BB84: Single-photon QKD Step 3: BB84 Protocol We take a closer look at BB84, the first example of a cryptographic ...
10,240 views
4 years ago
Lesson 10 E91: Entanglement-based QKD Step 1: Introduction to entanglement-based QKD In this lesson, we explore the first ...
6,555 views
... it is titled cryptography after the aliens land my name and you'll find it the short answer is quantum cryptography is not the end of ...
142 views
5 years ago
Post-quantum cryptography has become one of the most active areas in cryptography, trying to address important questions from ...
8,301 views
6 years ago
https://media.ccc.de/v/36c3-10543-post-quantum_isogeny_cryptography There are countless post-quantum buzzwords to list: ...
5,621 views
In this brief animated video, we unpack why the NIST standards are important, discuss IBM's contributions to quantum-safe ...
2,154 views
Quantum computers could one day crack today's passwords in seconds . That's why we need Quantum ...
169 views
3 months ago
Quantum computing is often dismissed as a distant sci-fi future, but Ethereum OG John Lilic and Oxford physicist Stefano Gogioso ...
127 views
3 weeks ago
Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography ...
23,518 views
8 years ago
And we heard about a commercial quantum computer, and we heard vendors of quantum key distribution or quantum random ...
4,806 views
9 years ago
This channel provides the lectures for the "Post-quantum cryptography" part of the MasterMath course "Selected Areas in ...
3,758 views
I will entertain the audience with a science talk about quantum cryptography, covering both some classics (Quantum Key ...
2,459 views
Swansea University CS-130 Coursework 1 This video focuses on how a quantum computer works, how it compares to a classical ...
87 views
When you send a message via Messenger, it is encrypted using mathematical principles. To ensure that your messages continue ...
1,220 views
This lecture is part of Post-quantum cryptography" part of the MasterMath course "Selected Areas in Cryptology" For details see ...
3,149 views
In this video I discuss how the Signal foundation developed PQXDH (Post Quantum Extended Diffie Helmen) an encryption ...
259,691 views
In this video I discuss how Apple added post quantum encryption to their message app. iMessage is still proprietary, and still only ...
144,649 views
From 2000bc right to Enigma in WWII, cryptography was based upon substitution ciphers and was relying on a key exchange.
109 views
In this episode, we dive into quantum-safe encryption and its revolutionary technology of photon polarization. Discover how ...
22 views
10 months ago
The easiest example that gives you a taste of the kind of mathematical problems quantum-safe cryptography is based on is the ...
3,651 views
Post-Quantum Crypto is the art of inventing asymmetric cryptography that can withstand large quantum computers. This relatively ...
12,839 views