ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

272,790 results

Computerphile
Chacha Cipher - Computerphile

The only viable alternative to AES? Dr Mike Pound unravels the clever ChaCha cipher. https://www.facebook.com/computerphile ...

13:45
Chacha Cipher - Computerphile

192,977 views

4 years ago

Computerphile
Generative AI's Greatest Flaw - Computerphile

Described as GenAIs greatest flaw, indirect prompt injection is a big problem, Mike Pound from University of Nottingham explains ...

12:23
Generative AI's Greatest Flaw - Computerphile

580,663 views

11 months ago

Computerphile
'Forbidden' AI Technique - Computerphile

The so-called 'Forbidden Technique' with Chana Messinger -- Check out Brilliant's courses and start for free at ...

9:49
'Forbidden' AI Technique - Computerphile

228,046 views

8 months ago

Computerphile
Where GREP Came From - Computerphile

Commonly used grep was written overnight, but why and how did it get its name? Professor Brian Kernighan explains. EXTRA ...

10:07
Where GREP Came From - Computerphile

1,291,096 views

7 years ago

Computerphile
The Most Difficult Program to Compute? - Computerphile

The story of recursion continues as Professor Brailsford explains one of the most difficult programs to compute: Ackermann's ...

14:55
The Most Difficult Program to Compute? - Computerphile

1,441,214 views

11 years ago

Computerphile
Transport Layer Security (TLS) - Computerphile

It's absolutely everywhere, but what is TLS and where did it come from? Dr Mike Pound explains the background behind this ...

15:33
Transport Layer Security (TLS) - Computerphile

541,392 views

5 years ago

Computerphile
How Secure Shell Works (SSH) - Computerphile

Connecting via SSH to a remote machine is second nature to some, but how does it work? Dr Steve Bagley. Dr Mike Pound on ...

9:20
How Secure Shell Works (SSH) - Computerphile

903,210 views

7 years ago

Computerphile
Implementing Passkeys in Practice - Computerphile

Build your own passkey system like Mike! -- Check out Brilliant for free at https://brilliant.org/computerphile/ (30-day free trial and ...

14:53
Implementing Passkeys in Practice - Computerphile

82,531 views

10 days ago

Computerphile
What's Your Least Favourite Programming Language? (2024 soundcheck question) - Computerphile

Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: ...

6:50
What's Your Least Favourite Programming Language? (2024 soundcheck question) - Computerphile

435,870 views

1 year ago

Computerphile
Secret Key Exchange (Diffie-Hellman) - Computerphile

How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens. Mathematics ...

8:40
Secret Key Exchange (Diffie-Hellman) - Computerphile

1,072,471 views

8 years ago

Computerphile
Internationalis(z)ing Code - Computerphile

Audible free book: http://www.audible.com/computerphile Catering for a global audience is difficult, Tom takes us through a ...

8:18
Internationalis(z)ing Code - Computerphile

1,108,702 views

11 years ago

Computerphile
Why C is so Influential - Computerphile

Why is C such an influential language? We asked ardent C fan Professor Brailsford. Brian Kernighan Playlist: ...

10:50
Why C is so Influential - Computerphile

1,996,861 views

8 years ago

Computerphile
HyperLogLog Hit Counter - Computerphile

How do huge websites keep track of the traffic numbers? Buck Shlegeris outlines the probabilistic counting algorithm 'Hyperloglog ...

4:20
HyperLogLog Hit Counter - Computerphile

29,896 views

4 months ago

Computerphile
Network Layers Model (Networking Basics) - Computerphile

"The best-laid plans of mice and men often go awry" - as the ISO team were designing a beautiful, structured layered model, ...

12:54
Network Layers Model (Networking Basics) - Computerphile

69,508 views

3 months ago

Computerphile
"C" Programming Language: Brian Kernighan - Computerphile

"C" is one of the most widely used programming languages of all time. Prof Brian Kernighan wrote the book on "C", well, co-wrote ...

8:26
"C" Programming Language: Brian Kernighan - Computerphile

2,014,748 views

10 years ago

Computerphile
How TOR Works- Computerphile

What goes on TOR stays on TOR, or so we hope. Dr Mike Pound takes us through how Onion Routing works. This video was ...

14:19
How TOR Works- Computerphile

1,820,298 views

8 years ago

Computerphile
Hash Collisions & The Birthday Paradox - Computerphile

Mike Pound discusses hash collisions & the birthday paradox -- Learn more and apply to Jane Street's WiSE program in New York ...

14:21
Hash Collisions & The Birthday Paradox - Computerphile

225,726 views

8 months ago

Computerphile
Characters, Symbols and the Unicode Miracle - Computerphile

Audible free book: http://www.audible.com/computerphile Representing symbols, characters and letters that are used worldwide is ...

9:37
Characters, Symbols and the Unicode Miracle - Computerphile

2,096,371 views

12 years ago

Computerphile
How NOT to Store Passwords! - Computerphile

Security of users' passwords should be at the forefront of every web developer's mind. Tom takes us through the insecure ways in ...

9:24
How NOT to Store Passwords! - Computerphile

2,415,336 views

12 years ago

Computerphile
Sleeper Agents in Large Language Models - Computerphile

It's an older paper, but it checks out. Rob Miles discusses the problem of 'Sleeper Agents' - where LLMs could have hidden traits ...

13:38
Sleeper Agents in Large Language Models - Computerphile

271,618 views

4 months ago