Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
464 results
[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Theoretical Computer ...
65,597 views
2 years ago
Lesson 10 E91: Entanglement-based QKD Step 1: Introduction to entanglement-based QKD In this lesson, we explore the first ...
6,674 views
4 years ago
Our cell phones and computers are constantly sending and receiving information. To ensure that only the right recipients can read ...
44,132 views
3 years ago
Lesson 9 BB84: Single-photon QKD Step 3: BB84 Protocol We take a closer look at BB84, the first example of a cryptographic ...
10,386 views
Lesson 9 BB84: Single-photon QKD Step 4: Eavesdropper detection In this step, we discuss how the laws of quantum mechanics ...
3,599 views
In this video I discuss how the Signal foundation developed PQXDH (Post Quantum Extended Diffie Helmen) an encryption ...
259,739 views
Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography ...
23,527 views
8 years ago
In this video I discuss the new updates to OpenSSH 10.0 including post quantum encryption enabled by default. Read the full ...
99,779 views
9 months ago
This lecture is part of Post-quantum cryptography" part of the MasterMath course "Selected Areas in Cryptology" For details see ...
3,160 views
No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.
2,510,567 views
6 years ago
Filmed at https://2017.dotsecurity.io on April 21st in Paris. More talks on https://dotconferences.com/talks By 2025, quantum ...
1,835 views
7 years ago
Did Chinese Researchers Crack RSA Encryption with Quantum Computing? How Quantum Computing Threatens Modern ...
174 views
1 year ago
Lesson 10 E91: Entanglement-based QKD Step 3: E91 Protocol In this step, we learn about the full E91 protocol and discuss the ...
3,711 views
Video walkthrough of code implementation: https://youtu.be/50XM-h3h6Fw Explanation of converting from decimal to binary: ...
51,805 views
5 years ago
... University of Singapore explores the potential to create a new cybersecurity paradigm, quantum key distribution, using quantum ...
3,154 views
Is quantum computing a threat to Bitcoin? How can Bitcoin become more secure against a quantum computing attack? Will this ...
77,673 views
Talk at crypto 2011. Authors: Gilles Brassard, Louis Salvail, Peter Høyer, Kassem Kalach, Marc Kaplan, Sophie Laplante.
609 views
14 years ago
Curious about Quantum Computing? This video explains the technology of the future in simple terms, so you can understand this ...
80 views
Much research is being done into quantum encryption over fibreoptic cables, but could quantum-encrypted information also be ...
1,109 views
RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime ...
976,719 views
13 years ago