ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

86,341 results

Physics Girl
Quantum Cryptography Explained

This episode is brought to you by Squarespace: http://www.squarespace.com/physicsgirl With recent high-profile security ...

8:13
Quantum Cryptography Explained

421,167 views

9 years ago

Eye on Tech
What is Post-Quantum Cryptography?

Quantum computing threatens to break today's encryption standards, and cybersecurity experts are racing to develop ...

5:11
What is Post-Quantum Cryptography?

5,149 views

6 months ago

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

Discussion about how quantum key distribution methods based on measuring the polarization of photons can be used to keep ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

65,837 views

2 years ago

Up and Atom
Quantum Cryptography in 6 Minutes

Quantum Cryptography explained simply. Regular encryption is breakable, but not quantum cryptography. Today we'll look at the ...

5:58
Quantum Cryptography in 6 Minutes

112,145 views

8 years ago

Sabine Hossenfelder
What is Quantum Cryptography?

GET NORDVPN: https://nordvpn.org/sabine USE COUPON CODE: sabine USE THE CODE SO YOU CAN GET 68% off 2-year ...

12:41
What is Quantum Cryptography?

116,017 views

5 years ago

minutephysics
How Quantum Computers Break Encryption | Shor's Algorithm Explained

Go to http://www.dashlane.com/minutephysics to download Dashlane for free, and use offer code minutephysics for 10% off ...

17:31
How Quantum Computers Break Encryption | Shor's Algorithm Explained

3,299,626 views

6 years ago

PBS Space Time
Solving Quantum Cryptography

PBS Member Stations rely on viewers like you. To support your local station, go to: http://to.pbs.org/DonateSPACE ↓ More info ...

17:43
Solving Quantum Cryptography

262,029 views

5 years ago

Chalk Talk
Post-quantum cryptography: Security after Shor’s algorithm

What's the current status of the NIST Post-Quantum Cryptography Standardization? Find out here: ...

7:17
Post-quantum cryptography: Security after Shor’s algorithm

67,510 views

3 years ago

Chalk Talk
Lattice-based cryptography: The tricky math of dots

... (www.wire.com) ______ Post-Quantum Cryptography: https://youtu.be/_C5dkUiiQnw Learning with Errors: Coming January 5, ...

8:39
Lattice-based cryptography: The tricky math of dots

234,705 views

3 years ago

IBM Technology
Your Encryption Isn't Quantum Safe

Learn more about current threats: https://ibm.biz/BdP3Cv Learn how to build a quantum-safe future: https://ibm.biz/BdP3Cm If your ...

9:22
Your Encryption Isn't Quantum Safe

42,960 views

2 years ago

IBM Technology
What is Quantum Safe?

Learn more about the IBM Quantum Safe program → https://ibm.biz/BdPzaE IBM Quantum Computing Roadmap ...

8:45
What is Quantum Safe?

24,461 views

3 years ago

PhysicsTCD
Quantum cryptography explained

MSc students Aaron Fitzpatrick, Matea Leahy, and Liam Lysaght explain how the quantum cryptography protocol BB84 works.

4:47
Quantum cryptography explained

10,282 views

3 years ago

핑퐁
Quantum cryptography

Quantum cryptography, BB84 protocol, E91 protocol.

12:07
Quantum cryptography

14,470 views

6 years ago

Frame of Essence
Will Quantum Computers break encryption?

How do you secure messages over the internet? How do quantum computers break it? How do you fix it? Why don't you watch the ...

15:45
Will Quantum Computers break encryption?

1,447,346 views

8 years ago

IBM Technology
Defeat the Quantum Menace: Protecting Data from Quantum Computers

Jeff Crume explains the risks of 'Harvest Now, Decrypt Later' and how post-quantum cryptography can secure sensitive data.

19:16
Defeat the Quantum Menace: Protecting Data from Quantum Computers

31,370 views

6 months ago

CoinGecko
Will Quantum Computing KILL Bitcoin??

The threat of quantum computing is one of the most common concerns raised regarding the security and longevity of the Bitcoin ...

4:30
Will Quantum Computing KILL Bitcoin??

284,967 views

2 years ago

Qiskit
Outsmarting Hackers: Quantum Key Distribution Explained

In this episode of Qiskit in the Classroom, Katie McCormick will discuss quantum key distribution (QKD) and its role in creating ...

17:08
Outsmarting Hackers: Quantum Key Distribution Explained

8,427 views

8 months ago

IBM Technology
3 Steps to Become Quantum Safe with Crypto-agility

All IBM Quantum Safe tools mentioned in this video are available today. Learn more → https://ibm.biz/BdSSU8 Every digital ...

6:08
3 Steps to Become Quantum Safe with Crypto-agility

7,811 views

2 years ago

Cryptosense
What is Post-Quantum Cryptography?

Read Post-Quantum Cryptography Preparedness Solution Brief: ...

6:13
What is Post-Quantum Cryptography?

12,166 views

5 years ago

SANS Institute
Post-Quantum Cryptography: Why It’s Secure

Konstantinos Karagiannis proves why lattice-based ML-KEM secures data after quantum computers arrive. SANS Emerging ...

14:03
Post-Quantum Cryptography: Why It’s Secure

886 views

7 months ago

PBS Space Time
Why Quantum Computing Requires Quantum Cryptography

Learn more about Audible at: https://www.audible.com/spacetime or text spacetime to 500 500! PBS Member Stations rely on ...

17:15
Why Quantum Computing Requires Quantum Cryptography

461,219 views

6 years ago

RoboShadow
Quantum Computing vs Encryption: Hype or Real Threat?

quantum #computer #cybersecurity The latest developments in quantum computing have raised concerns about breaking ...

5:21
Quantum Computing vs Encryption: Hype or Real Threat?

65,175 views

6 months ago

AWS Events
AWS re:Inforce 2025 - Post-quantum cryptography demystified (DAP222)

Discover how AWS simplifies post-quantum cryptography (PQC) implementation to protect your data from future quantum ...

18:25
AWS re:Inforce 2025 - Post-quantum cryptography demystified (DAP222)

2,910 views

7 months ago

Eye on Tech
What is Quantum Key Distribution (QKD)?

Quantum key distribution leverages quantum mechanics to create encryption keys that are theoretically impossible to intercept ...

4:10
What is Quantum Key Distribution (QKD)?

1,816 views

5 months ago

QuantumFractureEN
How to Send a Secret Message Using Quantum Physics | Quantum Cryptography

You want to send somebody a message, but you want it to be IMPOSSIBLE for anyone else to read it. No problem: quantum ...

14:31
How to Send a Secret Message Using Quantum Physics | Quantum Cryptography

1,112 views

3 years ago