ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

101,391 results

Related queries

quantum encryption veritasium

quantum cryptography projects

what is post quantum cryptography

quantum cryptography bb84

quantum cryptography explained in tamil

dna cryptography

quantum cryptography hindi

Eye on Tech
What is Quantum Cryptography? An Introduction

Try as we might, malicious actors can sometimes outsmart classical encryption methods, especially with accessible quantum ...

2:56
What is Quantum Cryptography? An Introduction

77,349 views

3 years ago

Physics Girl
Quantum Cryptography Explained

This episode is brought to you by Squarespace: http://www.squarespace.com/physicsgirl With recent high-profile security ...

8:13
Quantum Cryptography Explained

420,737 views

9 years ago

Up and Atom
Quantum Cryptography in 6 Minutes

Quantum Cryptography explained simply. Regular encryption is breakable, but not quantum cryptography. Today we'll look at the ...

5:58
Quantum Cryptography in 6 Minutes

111,888 views

8 years ago

Veritasium
What makes quantum computers SO powerful?

Transitioning organizations to post-quantum cryptography. Nature, 605(7909), 237-243. - https://ve42.co/Joseph2022 Bernstein, ...

24:29
What makes quantum computers SO powerful?

11,769,793 views

2 years ago

National Institute of Standards and Technology
Post-Quantum Cryptography: the Good, the Bad, and the Powerful

This video featuring NIST's Matthew Scholl emphasizes how NIST is working with the brightest minds in government, academia, ...

2:50
Post-Quantum Cryptography: the Good, the Bad, and the Powerful

227,607 views

4 years ago

PhysicsTCD
Quantum cryptography explained

MSc students Aaron Fitzpatrick, Matea Leahy, and Liam Lysaght explain how the quantum cryptography protocol BB84 works.

4:47
Quantum cryptography explained

10,187 views

3 years ago

People also watched

Looking Glass Universe
Why I Left Quantum Computing Research

Donate to FarmKind at: https://www.farmkind.giving/donate?promo=lookingglass I finished my PhD in quantum computing in 2020 ...

21:14
Why I Left Quantum Computing Research

1,090,755 views

6 months ago

Big Think and Big Think Clips
Physicist Brian Cox explains quantum physics in 22 minutes

Brian Cox is currently on-tour in North America and the UK. See upcoming dates at: https://briancoxlive.co.uk/#tour "Quantum ...

22:19
Physicist Brian Cox explains quantum physics in 22 minutes

3,057,550 views

8 months ago

Fireship
7 Cryptography Concepts EVERY Developer Should Know

Cryptography is scary. In this tutorial, we get hands-on with Node.js to learn how common crypto concepts work, like hashing, ...

11:55
7 Cryptography Concepts EVERY Developer Should Know

1,594,511 views

4 years ago

Institute for Quantum Computing
Introduction to quantum cryptography - Vadim Makarov

I introduce the basic principles of quantum cryptography, and discuss today's status of its technology, with examples of optical ...

1:17:54
Introduction to quantum cryptography - Vadim Makarov

27,980 views

11 years ago

Top Master
Ethical Hacker: "I'll Show You Why Google Has Just Shut Down Their Quantum Chip"

Initially celebrated for its groundbreaking speed and unmatched computational power, Willow suddenly became the center of ...

31:11
Ethical Hacker: "I'll Show You Why Google Has Just Shut Down Their Quantum Chip"

2,291,149 views

11 months ago

SANS Institute
Post-Quantum Cryptography: Why It’s Secure

Konstantinos Karagiannis proves why lattice-based ML-KEM secures data after quantum computers arrive. SANS Emerging ...

14:03
Post-Quantum Cryptography: Why It’s Secure

802 views

6 months ago

Qiskit
The Story of Shor's Algorithm, Straight From the Source | Peter Shor

Your formal invite to weekly Qiskit videos ► https://ibm.biz/q-subscribe Though Shor’s Algorithm is widely known, the story ...

31:18
The Story of Shor's Algorithm, Straight From the Source | Peter Shor

595,061 views

4 years ago

DEFCONConference
DEF CON 33 - RF Village - Tactical Flipper Zero You Have 1 Hour and No Other Equipment - Grey Fox

You just arrived in some city where the enemy is active. You have a mission to locate and identify a hostile team. They operate in ...

34:41
DEF CON 33 - RF Village - Tactical Flipper Zero You Have 1 Hour and No Other Equipment - Grey Fox

14,821 views

2 months ago

GATP Collin, Boden, and Armaan
Lattice Based Cryptography in the Style of 3B1B
5:04
Lattice Based Cryptography in the Style of 3B1B

3,745 views

1 year ago

IBM Research
The next big leap in cryptography: NIST’s post-quantum cryptography standards

The next big leap in encryption has officially been shared in this special webcast. IBM Fellow Ray Harishankar discusses the ...

25:26
The next big leap in cryptography: NIST’s post-quantum cryptography standards

13,547 views

1 year ago

minutephysics
How Quantum Computers Break Encryption | Shor's Algorithm Explained

Go to http://www.dashlane.com/minutephysics to download Dashlane for free, and use offer code minutephysics for 10% off ...

17:31
How Quantum Computers Break Encryption | Shor's Algorithm Explained

3,295,300 views

6 years ago

Thales Cybersecurity Products
Understanding Post-Quantum Cryptography (PQC)

Learn how Quantum computers will impact the Data Security landscape and why organizations urgently need to adopt a ...

2:35
Understanding Post-Quantum Cryptography (PQC)

16,943 views

2 years ago

Eye on Tech
What is Post-Quantum Cryptography?

Quantum computing threatens to break today's encryption standards, and cybersecurity experts are racing to develop ...

5:11
What is Post-Quantum Cryptography?

4,419 views

5 months ago

ICFO People
How does quantum cryptography work?

Quantum computers already have a much higher computational capacity than those we use today. When established, quantum ...

3:55
How does quantum cryptography work?

10,551 views

3 years ago

SandboxAQ
NIST's Post-Quantum Cryptography Standardization Explained

With quantum computing on the horizon, traditional encryption methods are at risk of becoming obsolete and/or incapable of ...

2:25
NIST's Post-Quantum Cryptography Standardization Explained

1,498,020 views

1 year ago

Centre for Quantum Technologies
Quantum cryptography, animated

This animation by the Centre for Quantum Technologies at the National University of Singapore illustrates the process of quantum ...

1:57
Quantum cryptography, animated

85,697 views

9 years ago

IBM Technology
Your Encryption Isn't Quantum Safe

Learn more about current threats: https://ibm.biz/BdP3Cv Learn how to build a quantum-safe future: https://ibm.biz/BdP3Cm If your ...

9:22
Your Encryption Isn't Quantum Safe

42,561 views

2 years ago

Sabine Hossenfelder
What is Quantum Cryptography?

GET NORDVPN: https://nordvpn.org/sabine USE COUPON CODE: sabine USE THE CODE SO YOU CAN GET 68% off 2-year ...

12:41
What is Quantum Cryptography?

115,877 views

5 years ago

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Theoretical Computer ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

63,997 views

2 years ago

Chalk Talk
Lattice-based cryptography: The tricky math of dots

... (www.wire.com) ______ Post-Quantum Cryptography: https://youtu.be/_C5dkUiiQnw Learning with Errors: Coming January 5, ...

8:39
Lattice-based cryptography: The tricky math of dots

231,928 views

2 years ago

Azanaebi
Quantum Cryptography (explained in 90 seconds)
1:30
Quantum Cryptography (explained in 90 seconds)

382 views

6 months ago

Chalk Talk
Post-quantum cryptography: Security after Shor’s algorithm

What's the current status of the NIST Post-Quantum Cryptography Standardization? Find out here: ...

7:17
Post-quantum cryptography: Security after Shor’s algorithm

66,830 views

2 years ago

QuantumVisions
Quantum cryptography: The BB 84 protocol (U3-02-03)

A visual apporoach to the BB84 protocol of quantum cryptography. (日本語字幕有り) All videos of the project Quantum Visions can ...

3:45
Quantum cryptography: The BB 84 protocol (U3-02-03)

33,903 views

4 years ago