ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

745,927 results

IAS | PCMI Park City Mathematics Institute
Lecture #3 part1: Public Key Cryptography 101: A Brief Introduction | Joseph H. Silverman

Series of lectures on the Introduction to Lattices, Lattice Reduction, and Lattice-Based Cryptography. Lecture #3: Public Key ...

23:46
Lecture #3 part1: Public Key Cryptography 101: A Brief Introduction | Joseph H. Silverman

587 views

3 years ago

Rust Programming Language
RustConf 2017 - Fast, Safe, Pure-Rust Elliptic Curve Cryptography

Fast, Safe, Pure-Rust Elliptic Curve Cryptography by Isis Lovecruft & Henry De Valence This talk discusses the design and ...

34:22
RustConf 2017 - Fast, Safe, Pure-Rust Elliptic Curve Cryptography

7,167 views

8 years ago

AtlasTV
The Power of Cryptographic Primitives

In this video, we explore the power of cryptographic primitives, and how they can be used to secure data and protect against ...

2:12
The Power of Cryptographic Primitives

853 views

3 years ago

IBM Research
The next big leap in cryptography: NIST’s post-quantum cryptography standards

The next big leap in encryption has officially been shared in this special webcast. IBM Fellow Ray Harishankar discusses the ...

25:26
The next big leap in cryptography: NIST’s post-quantum cryptography standards

13,738 views

1 year ago

IBM Research
The Future of Cryptography ⛓

Join IBM to investigate the latest advances in cryptography technology and their role in shaping the future of data privacy. In a live ...

36:04
The Future of Cryptography ⛓

4,019 views

4 years ago

DEFCONConference
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference

Shor's Algorithm for factoring integer numbers is the big threat to cryptography (RSA/ECC) as it reduces the complexity from ...

48:42
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference

14,398 views

6 years ago

PKI Consortium
Lattice based cryptography - 2023 Post-Quantum Cryptography Conference Amsterdam

Léo Ducas - Researcher at Centrum Wiskunde & Informatica (CWI) and Professor at Leiden University Lattices are underlying ...

40:40
Lattice based cryptography - 2023 Post-Quantum Cryptography Conference Amsterdam

1,989 views

2 years ago

ReasonTV
Cryptography vs. Big Brother: How Math Became a Weapon Against Tyranny

Watch the whole series: https://www.youtube.com/playlist?list=PLBuns9Evn1w-T2RwqMhUnTZbTTe-M-g42 Part two of a four-part ...

7:26
Cryptography vs. Big Brother: How Math Became a Weapon Against Tyranny

36,877 views

5 years ago

aantonop
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography ...

6:47
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

23,529 views

8 years ago

dotconferences
dotSwift 2020 - Cory Benfield - Cryptography in Swift

Filmed at https://2020.dotswift.io on February 3, 2020 in Paris. More talks on https://dotconferences.com/talks In this session, Cory ...

17:58
dotSwift 2020 - Cory Benfield - Cryptography in Swift

3,309 views

5 years ago

Missing Semester
Lecture 9: Security and Cryptography (2020)

You can find the lecture notes and exercises for this lecture at https://missing.csail.mit.edu/2020/security/ Help us caption ...

1:01:00
Lecture 9: Security and Cryptography (2020)

75,570 views

5 years ago

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

Discussion about how quantum key distribution methods based on measuring the polarization of photons can be used to keep ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

65,749 views

2 years ago

media.ccc.de
36C3 -  Cryptography demystified

https://media.ccc.de/v/36c3-10627-cryptography_demystified An introduction without maths This talk will explain the basic building ...

53:25
36C3 - Cryptography demystified

3,509 views

6 years ago

pwn.college
Cryptography: Trust

Hello everyone and welcome back to cryptography in this video we will be discussing Trust so think back to the diffie-hellman key ...

13:13
Cryptography: Trust

2,425 views

3 years ago

DEFCONConference
DEF CON 25 Crypto Village - Ryan Lackey - Cypherpunks History

We will go over the history of the 1990s cypherpunks and major topics discussed during that period -- including remailers, the first ...

25:32
DEF CON 25 Crypto Village - Ryan Lackey - Cypherpunks History

7,001 views

8 years ago

media.ccc.de
Cryptography of Killing Proof-of-Work

https://media.ccc.de/v/thms-26-cryptography-of-killing-proof-of-work We briefly discuss the range of cryptographic primitives being ...

27:49
Cryptography of Killing Proof-of-Work

2,060 views

6 years ago

RevK
Uncrackable Pen & Paper Cryptography

Why there is always a safe place for PEOPLE to communicate. P.S. (please read before commenting)... 1. Yes, this is just a "one ...

12:00
Uncrackable Pen & Paper Cryptography

14,753 views

8 years ago

Mental Outlaw
OpenSSH Gets Post Quantum Encryption

In this video I discuss the new updates to OpenSSH 10.0 including post quantum encryption enabled by default. Read the full ...

8:17
OpenSSH Gets Post Quantum Encryption

99,790 views

9 months ago

media.ccc.de
36C3 -  (Post-Quantum) Isogeny Cryptography

https://media.ccc.de/v/36c3-10543-post-quantum_isogeny_cryptography There are countless post-quantum buzzwords to list: ...

52:23
36C3 - (Post-Quantum) Isogeny Cryptography

5,625 views

6 years ago

Next Day Video
Exploring Cryptography

John Downs https://2016.pygotham.org/talks/353/exploring-cryptography A hacker's introduction to cryptography.

48:17
Exploring Cryptography

277 views

9 years ago

DEFCONConference
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis

Quantum computers will crack RSA and ECC and weaken symmetric encryption, but when? NIST is betting it won't happen before ...

39:29
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis

145,776 views

3 months ago

Tanja Lange: Post-quantum cryptography
Code-based cryptography I -  Basic concepts and McElice system

This lecture is part of Post-quantum cryptography" part of the MasterMath course "Selected Areas in Cryptology" For details see ...

22:08
Code-based cryptography I - Basic concepts and McElice system

6,803 views

4 years ago

Mental Outlaw
Make ANY Messaging Service E2E Encrypted With PGP

In this video I explain how you can make any messaging or text service end to end encrypted and completely private by ...

9:06
Make ANY Messaging Service E2E Encrypted With PGP

93,553 views

7 months ago

Cryptography
Java Cryptography - Part 1

You can download all necessary Java code examples from my git repository. https://github.com/kasundezoysa/javacrypto.

1:31:13
Java Cryptography - Part 1

556 views

5 years ago

IACR
Invited Talk: Failures of secret key cryptography

Invited talk by Daniel Bernstein at FSE 2013.

1:00:57
Invited Talk: Failures of secret key cryptography

4,117 views

10 years ago