ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,312 results

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Theoretical Computer ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

65,316 views

2 years ago

DEFCONConference
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis

NIST is betting it won't happen before 2035, setting that deadline for companies to migrate to post-quantum cryptography (PQC).

39:29
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis

144,867 views

3 months ago

Q-Leap Edu Quantum Communications
10-1 Introduction to entanglement-based QKD

Lesson 10 E91: Entanglement-based QKD Step 1: Introduction to entanglement-based QKD In this lesson, we explore the first ...

4:10
10-1 Introduction to entanglement-based QKD

6,655 views

4 years ago

TüftelLab
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1

Our cell phones and computers are constantly sending and receiving information. To ensure that only the right recipients can read ...

5:01
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1

44,069 views

3 years ago

Q-Leap Edu Quantum Communications
9-3 BB84 Protocol

Lesson 9 BB84: Single-photon QKD Step 3: BB84 Protocol We take a closer look at BB84, the first example of a cryptographic ...

13:39
9-3 BB84 Protocol

10,358 views

4 years ago

Q-Leap Edu Quantum Communications
9-4 Eavesdropper detection

Lesson 9 BB84: Single-photon QKD Step 4: Eavesdropper detection In this step, we discuss how the laws of quantum mechanics ...

7:15
9-4 Eavesdropper detection

3,586 views

4 years ago

IBM Research
Understanding the NIST standards and IBM's contributions to post-quantum cryptography

In this brief animated video, we unpack why the NIST standards are important, discuss IBM's contributions to quantum-safe ...

2:18
Understanding the NIST standards and IBM's contributions to post-quantum cryptography

2,171 views

1 year ago

Mental Outlaw
Signal Just Published Post Quantum E2E Encryption

In this video I discuss how the Signal foundation developed PQXDH (Post Quantum Extended Diffie Helmen) an encryption ...

8:32
Signal Just Published Post Quantum E2E Encryption

259,733 views

2 years ago

DEFCONConference
DEF CON 23 -  Jean Philippe Aumasson - Quantum Computers vs Computers Security

And we heard about a commercial quantum computer, and we heard vendors of quantum key distribution or quantum random ...

32:16
DEF CON 23 - Jean Philippe Aumasson - Quantum Computers vs Computers Security

4,813 views

10 years ago

Brainwave Lab
Quantum Cryptography Explained 🔐 How Physics Makes Hacking Impossible!

Quantum computers could one day crack today's passwords in seconds . That's why we need Quantum ...

0:39
Quantum Cryptography Explained 🔐 How Physics Makes Hacking Impossible!

186 views

4 months ago

media.ccc.de
36C3 -  (Post-Quantum) Isogeny Cryptography

https://media.ccc.de/v/36c3-10543-post-quantum_isogeny_cryptography There are countless post-quantum buzzwords to list: ...

52:23
36C3 - (Post-Quantum) Isogeny Cryptography

5,624 views

6 years ago

aantonop
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography ...

6:47
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

23,525 views

8 years ago

IBM Research
The next big leap in cryptography: NIST’s post-quantum cryptography standards

The next big leap in encryption has officially been shared in this special webcast. IBM Fellow Ray Harishankar discusses the ...

25:26
The next big leap in cryptography: NIST’s post-quantum cryptography standards

13,691 views

1 year ago

media.ccc.de
35C3 -  The year in post-quantum crypto

Post-quantum cryptography has become one of the most active areas in cryptography, trying to address important questions from ...

1:10:01
35C3 - The year in post-quantum crypto

8,307 views

7 years ago

TüftelLab
What is Quantum Cryptography | Quantum 1x1

When you send a message via Messenger, it is encrypted using mathematical principles. To ensure that your messages continue ...

2:11
What is Quantum Cryptography | Quantum 1x1

1,221 views

3 years ago

IACR
The ship has sailed: the NIST Post-Quantum Cryptography "competition"

Invited talk by Dustin Moody at Asiacrypt 2017.

51:51
The ship has sailed: the NIST Post-Quantum Cryptography "competition"

874 views

7 years ago

Ben
Quantum Cryptography

Swansea University CS-130 Coursework 1 This video focuses on how a quantum computer works, how it compares to a classical ...

2:31
Quantum Cryptography

87 views

6 years ago

Tanja Lange: Post-quantum cryptography
Post-quantum cryptography -- trailer

This channel provides the lectures for the "Post-quantum cryptography" part of the MasterMath course "Selected Areas in ...

0:49
Post-quantum cryptography -- trailer

3,773 views

4 years ago

IBM Research
What does quantum-safe cryptography look like?

The easiest example that gives you a taste of the kind of mathematical problems quantum-safe cryptography is based on is the ...

0:33
What does quantum-safe cryptography look like?

3,654 views

6 years ago

Epicenter Podcast
What will Quantum Computing Change?

Quantum computing is often dismissed as a distant sci-fi future, but Ethereum OG John Lilic and Oxford physicist Stefano Gogioso ...

1:21:42
What will Quantum Computing Change?

146 views

1 month ago