ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

464 results

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Theoretical Computer ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

65,597 views

2 years ago

Q-Leap Edu Quantum Communications
10-1 Introduction to entanglement-based QKD

Lesson 10 E91: Entanglement-based QKD Step 1: Introduction to entanglement-based QKD In this lesson, we explore the first ...

4:10
10-1 Introduction to entanglement-based QKD

6,674 views

4 years ago

TüftelLab
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1

Our cell phones and computers are constantly sending and receiving information. To ensure that only the right recipients can read ...

5:01
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1

44,132 views

3 years ago

Q-Leap Edu Quantum Communications
9-3 BB84 Protocol

Lesson 9 BB84: Single-photon QKD Step 3: BB84 Protocol We take a closer look at BB84, the first example of a cryptographic ...

13:39
9-3 BB84 Protocol

10,386 views

4 years ago

Q-Leap Edu Quantum Communications
9-4 Eavesdropper detection

Lesson 9 BB84: Single-photon QKD Step 4: Eavesdropper detection In this step, we discuss how the laws of quantum mechanics ...

7:15
9-4 Eavesdropper detection

3,599 views

4 years ago

Mental Outlaw
Signal Just Published Post Quantum E2E Encryption

In this video I discuss how the Signal foundation developed PQXDH (Post Quantum Extended Diffie Helmen) an encryption ...

8:32
Signal Just Published Post Quantum E2E Encryption

259,739 views

2 years ago

aantonop
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography ...

6:47
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

23,527 views

8 years ago

Mental Outlaw
OpenSSH Gets Post Quantum Encryption

In this video I discuss the new updates to OpenSSH 10.0 including post quantum encryption enabled by default. Read the full ...

8:17
OpenSSH Gets Post Quantum Encryption

99,779 views

9 months ago

Tanja Lange: Post-quantum cryptography
What is post-quantum crypto and why should we care?

This lecture is part of Post-quantum cryptography" part of the MasterMath course "Selected Areas in Cryptology" For details see ...

15:35
What is post-quantum crypto and why should we care?

3,160 views

4 years ago

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,567 views

6 years ago

dotconferences
dotSecurity 2017 - Tanja Lange - Post-Quantum Cryptography

Filmed at https://2017.dotsecurity.io on April 21st in Paris. More talks on https://dotconferences.com/talks By 2025, quantum ...

19:01
dotSecurity 2017 - Tanja Lange - Post-Quantum Cryptography

1,835 views

7 years ago

Mwaki Insights
Did Chinese Researchers Crack RSA Encryption with Quantum Computing?

Did Chinese Researchers Crack RSA Encryption with Quantum Computing? How Quantum Computing Threatens Modern ...

11:30
Did Chinese Researchers Crack RSA Encryption with Quantum Computing?

174 views

1 year ago

Q-Leap Edu Quantum Communications
10-3 Protocol

Lesson 10 E91: Entanglement-based QKD Step 3: E91 Protocol In this step, we learn about the full E91 protocol and discuss the ...

13:33
10-3 Protocol

3,711 views

4 years ago

Canadian Coding
Animated Explanation of the one-time pad

Video walkthrough of code implementation: https://youtu.be/50XM-h3h6Fw Explanation of converting from decimal to binary: ...

4:33
Animated Explanation of the one-time pad

51,805 views

5 years ago

World Economic Forum
Unbreakable quantum enabled cybersecurity | Amelia Tan

... University of Singapore explores the potential to create a new cybersecurity paradigm, quantum key distribution, using quantum ...

5:45
Unbreakable quantum enabled cybersecurity | Amelia Tan

3,154 views

7 years ago

aantonop
Bitcoin Q&A: Is Quantum Computing a Threat?

Is quantum computing a threat to Bitcoin? How can Bitcoin become more secure against a quantum computing attack? Will this ...

9:18
Bitcoin Q&A: Is Quantum Computing a Threat?

77,673 views

7 years ago

IACR
Merkle Puzzles in a Quantum World

Talk at crypto 2011. Authors: Gilles Brassard, Louis Salvail, Peter Høyer, Kassem Kalach, Marc Kaplan, Sophie Laplante.

18:37
Merkle Puzzles in a Quantum World

609 views

14 years ago

MTA Channel
Quantum Computing Explained: The Technology of the Future

Curious about Quantum Computing? This video explains the technology of the future in simple terms, so you can understand this ...

10:49
Quantum Computing Explained: The Technology of the Future

80 views

1 year ago

World Economic Forum
Establishing a secure global quantum communications network | Francis Bennet

Much research is being done into quantum encryption over fibreoptic cables, but could quantum-encrypted information also be ...

4:41
Establishing a secure global quantum communications network | Francis Bennet

1,109 views

7 years ago

Art of the Problem
Public Key Cryptography: RSA Encryption

RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime ...

16:31
Public Key Cryptography: RSA Encryption

976,719 views

13 years ago