ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,433 results

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Theoretical Computer ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

64,740 views

2 years ago

DEFCONConference
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis

NIST is betting it won't happen before 2035, setting that deadline for companies to migrate to post-quantum cryptography (PQC).

39:29
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis

143,049 views

2 months ago

Q-Leap Edu Quantum Communications
10-1 Introduction to entanglement-based QKD

Lesson 10 E91: Entanglement-based QKD Step 1: Introduction to entanglement-based QKD In this lesson, we explore the first ...

4:10
10-1 Introduction to entanglement-based QKD

6,622 views

4 years ago

Q-Leap Edu Quantum Communications
9-3 BB84 Protocol

Lesson 9 BB84: Single-photon QKD Step 3: BB84 Protocol We take a closer look at BB84, the first example of a cryptographic ...

13:39
9-3 BB84 Protocol

10,325 views

4 years ago

Q-Leap Edu Quantum Communications
9-4 Eavesdropper detection

Lesson 9 BB84: Single-photon QKD Step 4: Eavesdropper detection In this step, we discuss how the laws of quantum mechanics ...

7:15
9-4 Eavesdropper detection

3,575 views

4 years ago

TüftelLab
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1

Our cell phones and computers are constantly sending and receiving information. To ensure that only the right recipients can read ...

5:01
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1

43,998 views

3 years ago

EFForg
EFF Fireside Chat: Bruce Schneier on Quantum Cryptography

... it is titled cryptography after the aliens land my name and you'll find it the short answer is quantum cryptography is not the end of ...

0:42
EFF Fireside Chat: Bruce Schneier on Quantum Cryptography

142 views

5 years ago

DEFCONConference
DEF CON 23 -  Jean Philippe Aumasson - Quantum Computers vs Computers Security

And we heard about a commercial quantum computer, and we heard vendors of quantum key distribution or quantum random ...

32:16
DEF CON 23 - Jean Philippe Aumasson - Quantum Computers vs Computers Security

4,813 views

10 years ago

IBM Research
Understanding the NIST standards and IBM's contributions to post-quantum cryptography

In this brief animated video, we unpack why the NIST standards are important, discuss IBM's contributions to quantum-safe ...

2:18
Understanding the NIST standards and IBM's contributions to post-quantum cryptography

2,167 views

1 year ago

media.ccc.de
35C3 -  The year in post-quantum crypto

Post-quantum cryptography has become one of the most active areas in cryptography, trying to address important questions from ...

1:10:01
35C3 - The year in post-quantum crypto

8,307 views

7 years ago

Brainwave Lab
Quantum Cryptography Explained 🔐 How Physics Makes Hacking Impossible!

Quantum computers could one day crack today's passwords in seconds . That's why we need Quantum ...

0:39
Quantum Cryptography Explained 🔐 How Physics Makes Hacking Impossible!

176 views

4 months ago

TüftelLab
What is Quantum Cryptography | Quantum 1x1

When you send a message via Messenger, it is encrypted using mathematical principles. To ensure that your messages continue ...

2:11
What is Quantum Cryptography | Quantum 1x1

1,220 views

3 years ago

Mental Outlaw
Signal Just Published Post Quantum E2E Encryption

In this video I discuss how the Signal foundation developed PQXDH (Post Quantum Extended Diffie Helmen) an encryption ...

8:32
Signal Just Published Post Quantum E2E Encryption

259,725 views

2 years ago

aantonop
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography ...

6:47
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

23,524 views

8 years ago

media.ccc.de
36C3 -  (Post-Quantum) Isogeny Cryptography

https://media.ccc.de/v/36c3-10543-post-quantum_isogeny_cryptography There are countless post-quantum buzzwords to list: ...

52:23
36C3 - (Post-Quantum) Isogeny Cryptography

5,624 views

6 years ago

Ben
Quantum Cryptography

Swansea University CS-130 Coursework 1 This video focuses on how a quantum computer works, how it compares to a classical ...

2:31
Quantum Cryptography

87 views

6 years ago

Epicenter Podcast
What will Quantum Computing Change?

Quantum computing is often dismissed as a distant sci-fi future, but Ethereum OG John Lilic and Oxford physicist Stefano Gogioso ...

1:21:42
What will Quantum Computing Change?

138 views

1 month ago

IBM Research
The next big leap in cryptography: NIST’s post-quantum cryptography standards

The next big leap in encryption has officially been shared in this special webcast. IBM Fellow Ray Harishankar discusses the ...

25:26
The next big leap in cryptography: NIST’s post-quantum cryptography standards

13,641 views

1 year ago

IBM Research
What does quantum-safe cryptography look like?

The easiest example that gives you a taste of the kind of mathematical problems quantum-safe cryptography is based on is the ...

0:33
What does quantum-safe cryptography look like?

3,652 views

6 years ago

IACR
The ship has sailed: the NIST Post-Quantum Cryptography "competition"

Invited talk by Dustin Moody at Asiacrypt 2017.

51:51
The ship has sailed: the NIST Post-Quantum Cryptography "competition"

871 views

7 years ago