ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

874 results

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Theoretical Computer ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

65,234 views

2 years ago

DEFCONConference
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis

NIST is betting it won't happen before 2035, setting that deadline for companies to migrate to post-quantum cryptography (PQC).

39:29
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis

144,647 views

3 months ago

HITCON
HITCON 2020 Post-Quantum Cryptography

Cryptography is rarely the weakest link in a system. Adi Shamir famously said "Cryptography is typically bypassed, not penetrated.

53:31
HITCON 2020 Post-Quantum Cryptography

816 views

5 years ago

Okinawa Institute of Science and Technology (OIST)
OSP2025 | Mina Doosti | Quantum Cryptography 103: Limitations and Beyond Key Distribution

Invited Lecture by Dr. Mina Doosti (The University of Edinburgh, Scotland) at OSP2025. Date: September 26, 2025 Location: ...

1:51:32
OSP2025 | Mina Doosti | Quantum Cryptography 103: Limitations and Beyond Key Distribution

22 views

1 month ago

IBM Research
The next big leap in cryptography: NIST’s post-quantum cryptography standards

The next big leap in encryption has officially been shared in this special webcast. IBM Fellow Ray Harishankar discusses the ...

25:26
The next big leap in cryptography: NIST’s post-quantum cryptography standards

13,680 views

1 year ago

CityTV.nl
Implementing Post Quantum Crypto for SaltStack - Justin Findlay

https://cfgmgmtcamp.eu Talk: Implementing Post Quantum Crypto for SaltStack - Justin Findlay ...

5:17
Implementing Post Quantum Crypto for SaltStack - Justin Findlay

29 views

1 year ago

PKI Consortium
Preparing the United States for Post Quantum Cryptography

Considering the rapidly evolving landscape in the realm of quantum computing and its potential implications for cybersecurity, this ...

25:41
Preparing the United States for Post Quantum Cryptography

241 views

2 years ago

Mental Outlaw
OpenSSH Gets Post Quantum Encryption

In this video I discuss the new updates to OpenSSH 10.0 including post quantum encryption enabled by default. Read the full ...

8:17
OpenSSH Gets Post Quantum Encryption

99,747 views

9 months ago

media.ccc.de
36C3 -  (Post-Quantum) Isogeny Cryptography

https://media.ccc.de/v/36c3-10543-post-quantum_isogeny_cryptography There are countless post-quantum buzzwords to list: ...

52:23
36C3 - (Post-Quantum) Isogeny Cryptography

5,624 views

6 years ago

aantonop
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography ...

6:47
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

23,525 views

8 years ago

Brainwave Lab
Quantum Cryptography Explained 🔐 How Physics Makes Hacking Impossible!

Quantum computers could one day crack today's passwords in seconds . That's why we need Quantum ...

0:39
Quantum Cryptography Explained 🔐 How Physics Makes Hacking Impossible!

186 views

4 months ago

DEFCONConference
DEF CON 23 -  Jean Philippe Aumasson - Quantum Computers vs Computers Security

And we heard about a commercial quantum computer, and we heard vendors of quantum key distribution or quantum random ...

32:16
DEF CON 23 - Jean Philippe Aumasson - Quantum Computers vs Computers Security

4,813 views

10 years ago

NorthSec
NorthSec 2019 – Christian Paquin – Post-Quantum Cryptography

Post-Quantum Cryptography: today's defense against tomorrow's quantum hackers Christian Paquin I am a cryptography ...

26:58
NorthSec 2019 – Christian Paquin – Post-Quantum Cryptography

62 views

5 years ago

TüftelLab
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1

Our cell phones and computers are constantly sending and receiving information. To ensure that only the right recipients can read ...

5:01
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1

44,056 views

3 years ago

PKI Consortium
Post-Quantum Crypto Integration for Enterprise Applications

Quantum computing promises to build computers capable of solving complex problems much faster than today's computers.

30:23
Post-Quantum Crypto Integration for Enterprise Applications

182 views

2 years ago

NUS Hackers
Friday Hacks #230: The Making of Precursor | Post-quantum algorithms or quantum key distribution?

... Making of Precursor: AMA (by Andrew "bunnie" Huang) 38:06 Q&A 54:09 Post-quantum algorithms or quantum key distribution?

1:48:45
Friday Hacks #230: The Making of Precursor | Post-quantum algorithms or quantum key distribution?

198 views

3 years ago

NorthSec
NorthSec 2020 – Christian Paquin – Stay quantum safe: future-proofing encrypted secrets

I present last year's progress on the development of quantum-safe cryptography to protect communications susceptible to being ...

35:59
NorthSec 2020 – Christian Paquin – Stay quantum safe: future-proofing encrypted secrets

101 views

5 years ago

media.ccc.de
Christian Schaffner: Quantum Cryptography

I will entertain the audience with a science talk about quantum cryptography, covering both some classics (Quantum Key ...

1:00:26
Christian Schaffner: Quantum Cryptography

2,461 views

10 years ago

OWASP Foundation
AppSec EU 2017 Everything Is Quantum! by Jaya Baloo

As the race for quantum computing systems rapidly evolves, the threat to modern cryptography becomes more pressing.

43:08
AppSec EU 2017 Everything Is Quantum! by Jaya Baloo

523 views

8 years ago

IACR
The ship has sailed: the NIST Post-Quantum Cryptography "competition"

Invited talk by Dustin Moody at Asiacrypt 2017.

51:51
The ship has sailed: the NIST Post-Quantum Cryptography "competition"

874 views

7 years ago

Thinking On Paper
IBM: What Is Post-Quantum Cryptography (And Why Are Apple Using It In i-Messenger?)

IBM's Lory Thorpe breaks down post-quantum cryptography and how quantum computers will impact current encryption systems.

55:11
IBM: What Is Post-Quantum Cryptography (And Why Are Apple Using It In i-Messenger?)

319 views

1 year ago

DEFCONConference
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Christian Paquin - Integrating Post Quantum Crypto

... post quantum cryptography research and today I'll be talking about our experiments and incubation projects of integrating post ...

46:46
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Christian Paquin - Integrating Post Quantum Crypto

779 views

7 years ago

CNCF [Cloud Native Computing Foundation]
Navigating the Quantum Readiness Journey: Securing Kubernetes with Quantum-Resis... Tomas Gustavsson

Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon North America in Salt Lake City from ...

30:26
Navigating the Quantum Readiness Journey: Securing Kubernetes with Quantum-Resis... Tomas Gustavsson

274 views

1 year ago

PKI Consortium
Implementing the Post-Quantum Survivors: A Retrospective

An often overlooked fact about Bouncy Castle's addition of the Round 3 NIST PQC Finalists in 2021/2022 was that, in addition to ...

24:29
Implementing the Post-Quantum Survivors: A Retrospective

32 views

1 month ago

Quantum Flagship
CiViQ: Quantum Key Distribution to secure our communications

The CiViQ project opens a radically novel avenue towards flexible and cost-effective integration of quantum communication ...

1:36
CiViQ: Quantum Key Distribution to secure our communications

980 views

5 years ago