ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,433 results

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Theoretical Computer ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

65,449 views

2 years ago

DEFCONConference
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis

NIST is betting it won't happen before 2035, setting that deadline for companies to migrate to post-quantum cryptography (PQC).

39:29
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis

145,220 views

3 months ago

Q-Leap Edu Quantum Communications
10-1 Introduction to entanglement-based QKD

Lesson 10 E91: Entanglement-based QKD Step 1: Introduction to entanglement-based QKD In this lesson, we explore the first ...

4:10
10-1 Introduction to entanglement-based QKD

6,664 views

4 years ago

TüftelLab
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1

Our cell phones and computers are constantly sending and receiving information. To ensure that only the right recipients can read ...

5:01
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1

44,102 views

3 years ago

Q-Leap Edu Quantum Communications
9-3 BB84 Protocol

Lesson 9 BB84: Single-photon QKD Step 3: BB84 Protocol We take a closer look at BB84, the first example of a cryptographic ...

13:39
9-3 BB84 Protocol

10,377 views

4 years ago

IBM Research
Understanding the NIST standards and IBM's contributions to post-quantum cryptography

In this brief animated video, we unpack why the NIST standards are important, discuss IBM's contributions to quantum-safe ...

2:18
Understanding the NIST standards and IBM's contributions to post-quantum cryptography

2,172 views

1 year ago

media.ccc.de
35C3 -  The year in post-quantum crypto

Post-quantum cryptography has become one of the most active areas in cryptography, trying to address important questions from ...

1:10:01
35C3 - The year in post-quantum crypto

8,307 views

7 years ago

Q-Leap Edu Quantum Communications
9-4 Eavesdropper detection

Lesson 9 BB84: Single-photon QKD Step 4: Eavesdropper detection In this step, we discuss how the laws of quantum mechanics ...

7:15
9-4 Eavesdropper detection

3,594 views

4 years ago

media.ccc.de
36C3 -  (Post-Quantum) Isogeny Cryptography

https://media.ccc.de/v/36c3-10543-post-quantum_isogeny_cryptography There are countless post-quantum buzzwords to list: ...

52:23
36C3 - (Post-Quantum) Isogeny Cryptography

5,624 views

6 years ago

EFForg
EFF Fireside Chat: Bruce Schneier on Quantum Cryptography

... it is titled cryptography after the aliens land my name and you'll find it the short answer is quantum cryptography is not the end of ...

0:42
EFF Fireside Chat: Bruce Schneier on Quantum Cryptography

143 views

5 years ago

Mental Outlaw
Signal Just Published Post Quantum E2E Encryption

In this video I discuss how the Signal foundation developed PQXDH (Post Quantum Extended Diffie Helmen) an encryption ...

8:32
Signal Just Published Post Quantum E2E Encryption

259,738 views

2 years ago

IBM Research
The next big leap in cryptography: NIST’s post-quantum cryptography standards

The next big leap in encryption has officially been shared in this special webcast. IBM Fellow Ray Harishankar discusses the ...

25:26
The next big leap in cryptography: NIST’s post-quantum cryptography standards

13,714 views

1 year ago

IACR
The ship has sailed: the NIST Post-Quantum Cryptography "competition"

Invited talk by Dustin Moody at Asiacrypt 2017.

51:51
The ship has sailed: the NIST Post-Quantum Cryptography "competition"

874 views

8 years ago

aantonop
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography ...

6:47
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

23,526 views

8 years ago

TüftelLab
What is Quantum Cryptography | Quantum 1x1

When you send a message via Messenger, it is encrypted using mathematical principles. To ensure that your messages continue ...

2:11
What is Quantum Cryptography | Quantum 1x1

1,221 views

3 years ago

Epicenter Podcast
What will Quantum Computing Change?

Quantum computing is often dismissed as a distant sci-fi future, but Ethereum OG John Lilic and Oxford physicist Stefano Gogioso ...

1:21:42
What will Quantum Computing Change?

146 views

1 month ago

Tanja Lange: Post-quantum cryptography
Post-quantum cryptography -- trailer

This channel provides the lectures for the "Post-quantum cryptography" part of the MasterMath course "Selected Areas in ...

0:49
Post-quantum cryptography -- trailer

3,774 views

4 years ago

DEFCONConference
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference

Shor's Algorithm for factoring integer numbers is the big threat to cryptography (RSA/ECC) as it reduces the complexity from ...

48:42
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference

14,398 views

6 years ago

DEFCONConference
DEF CON 23 -  Jean Philippe Aumasson - Quantum Computers vs Computers Security

And we heard about a commercial quantum computer, and we heard vendors of quantum key distribution or quantum random ...

32:16
DEF CON 23 - Jean Philippe Aumasson - Quantum Computers vs Computers Security

4,813 views

10 years ago

Tanja Lange: Post-quantum cryptography
What is post-quantum crypto and why should we care?

This lecture is part of Post-quantum cryptography" part of the MasterMath course "Selected Areas in Cryptology" For details see ...

15:35
What is post-quantum crypto and why should we care?

3,160 views

4 years ago