Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
272,790 results
The only viable alternative to AES? Dr Mike Pound unravels the clever ChaCha cipher. https://www.facebook.com/computerphile ...
192,977 views
4 years ago
Described as GenAIs greatest flaw, indirect prompt injection is a big problem, Mike Pound from University of Nottingham explains ...
580,663 views
11 months ago
The so-called 'Forbidden Technique' with Chana Messinger -- Check out Brilliant's courses and start for free at ...
228,046 views
8 months ago
Commonly used grep was written overnight, but why and how did it get its name? Professor Brian Kernighan explains. EXTRA ...
1,291,096 views
7 years ago
The story of recursion continues as Professor Brailsford explains one of the most difficult programs to compute: Ackermann's ...
1,441,214 views
11 years ago
It's absolutely everywhere, but what is TLS and where did it come from? Dr Mike Pound explains the background behind this ...
541,392 views
5 years ago
Connecting via SSH to a remote machine is second nature to some, but how does it work? Dr Steve Bagley. Dr Mike Pound on ...
903,210 views
Build your own passkey system like Mike! -- Check out Brilliant for free at https://brilliant.org/computerphile/ (30-day free trial and ...
82,531 views
10 days ago
Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: ...
435,870 views
1 year ago
How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens. Mathematics ...
1,072,471 views
8 years ago
Audible free book: http://www.audible.com/computerphile Catering for a global audience is difficult, Tom takes us through a ...
1,108,702 views
Why is C such an influential language? We asked ardent C fan Professor Brailsford. Brian Kernighan Playlist: ...
1,996,861 views
How do huge websites keep track of the traffic numbers? Buck Shlegeris outlines the probabilistic counting algorithm 'Hyperloglog ...
29,896 views
4 months ago
"The best-laid plans of mice and men often go awry" - as the ISO team were designing a beautiful, structured layered model, ...
69,508 views
3 months ago
"C" is one of the most widely used programming languages of all time. Prof Brian Kernighan wrote the book on "C", well, co-wrote ...
2,014,748 views
10 years ago
What goes on TOR stays on TOR, or so we hope. Dr Mike Pound takes us through how Onion Routing works. This video was ...
1,820,298 views
Mike Pound discusses hash collisions & the birthday paradox -- Learn more and apply to Jane Street's WiSE program in New York ...
225,726 views
Audible free book: http://www.audible.com/computerphile Representing symbols, characters and letters that are used worldwide is ...
2,096,371 views
12 years ago
Security of users' passwords should be at the forefront of every web developer's mind. Tom takes us through the insecure ways in ...
2,415,336 views
It's an older paper, but it checks out. Rob Miles discusses the problem of 'Sleeper Agents' - where LLMs could have hidden traits ...
271,618 views