Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
86,341 results
This episode is brought to you by Squarespace: http://www.squarespace.com/physicsgirl With recent high-profile security ...
421,167 views
9 years ago
Quantum computing threatens to break today's encryption standards, and cybersecurity experts are racing to develop ...
5,149 views
6 months ago
Discussion about how quantum key distribution methods based on measuring the polarization of photons can be used to keep ...
65,837 views
2 years ago
Quantum Cryptography explained simply. Regular encryption is breakable, but not quantum cryptography. Today we'll look at the ...
112,145 views
8 years ago
GET NORDVPN: https://nordvpn.org/sabine USE COUPON CODE: sabine USE THE CODE SO YOU CAN GET 68% off 2-year ...
116,017 views
5 years ago
Go to http://www.dashlane.com/minutephysics to download Dashlane for free, and use offer code minutephysics for 10% off ...
3,299,626 views
6 years ago
PBS Member Stations rely on viewers like you. To support your local station, go to: http://to.pbs.org/DonateSPACE ↓ More info ...
262,029 views
What's the current status of the NIST Post-Quantum Cryptography Standardization? Find out here: ...
67,510 views
3 years ago
... (www.wire.com) ______ Post-Quantum Cryptography: https://youtu.be/_C5dkUiiQnw Learning with Errors: Coming January 5, ...
234,705 views
Learn more about current threats: https://ibm.biz/BdP3Cv Learn how to build a quantum-safe future: https://ibm.biz/BdP3Cm If your ...
42,960 views
Learn more about the IBM Quantum Safe program → https://ibm.biz/BdPzaE IBM Quantum Computing Roadmap ...
24,461 views
MSc students Aaron Fitzpatrick, Matea Leahy, and Liam Lysaght explain how the quantum cryptography protocol BB84 works.
10,282 views
Quantum cryptography, BB84 protocol, E91 protocol.
14,470 views
How do you secure messages over the internet? How do quantum computers break it? How do you fix it? Why don't you watch the ...
1,447,346 views
Jeff Crume explains the risks of 'Harvest Now, Decrypt Later' and how post-quantum cryptography can secure sensitive data.
31,370 views
The threat of quantum computing is one of the most common concerns raised regarding the security and longevity of the Bitcoin ...
284,967 views
In this episode of Qiskit in the Classroom, Katie McCormick will discuss quantum key distribution (QKD) and its role in creating ...
8,427 views
8 months ago
All IBM Quantum Safe tools mentioned in this video are available today. Learn more → https://ibm.biz/BdSSU8 Every digital ...
7,811 views
Read Post-Quantum Cryptography Preparedness Solution Brief: ...
12,166 views
Konstantinos Karagiannis proves why lattice-based ML-KEM secures data after quantum computers arrive. SANS Emerging ...
886 views
7 months ago
Learn more about Audible at: https://www.audible.com/spacetime or text spacetime to 500 500! PBS Member Stations rely on ...
461,219 views
quantum #computer #cybersecurity The latest developments in quantum computing have raised concerns about breaking ...
65,175 views
Discover how AWS simplifies post-quantum cryptography (PQC) implementation to protect your data from future quantum ...
2,910 views
Quantum key distribution leverages quantum mechanics to create encryption keys that are theoretically impossible to intercept ...
1,816 views
5 months ago
You want to send somebody a message, but you want it to be IMPOSSIBLE for anyone else to read it. No problem: quantum ...
1,112 views