Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
61,438 results
Go to http://www.dashlane.com/minutephysics to download Dashlane for free, and use offer code minutephysics for 10% off ...
3,297,760 views
6 years ago
This episode is brought to you by Squarespace: http://www.squarespace.com/physicsgirl With recent high-profile security ...
420,999 views
9 years ago
Quantum computing threatens to break today's encryption standards, and cybersecurity experts are racing to develop ...
4,859 views
5 months ago
[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Theoretical Computer ...
65,071 views
2 years ago
... (www.wire.com) ______ Post-Quantum Cryptography: https://youtu.be/_C5dkUiiQnw Learning with Errors: Coming January 5, ...
233,548 views
3 years ago
GET NORDVPN: https://nordvpn.org/sabine USE COUPON CODE: sabine USE THE CODE SO YOU CAN GET 68% off 2-year ...
115,949 views
5 years ago
Learn more about current threats: https://ibm.biz/BdP3Cv Learn how to build a quantum-safe future: https://ibm.biz/BdP3Cm If your ...
42,812 views
Quantum Cryptography explained simply. Regular encryption is breakable, but not quantum cryptography. Today we'll look at the ...
112,045 views
8 years ago
How do you secure messages over the internet? How do quantum computers break it? How do you fix it? Why don't you watch the ...
1,447,249 views
What's the current status of the NIST Post-Quantum Cryptography Standardization? Find out here: ...
67,233 views
PBS Member Stations rely on viewers like you. To support your local station, go to: http://to.pbs.org/DonateSPACE ↓ More info ...
261,983 views
The threat of quantum computing is one of the most common concerns raised regarding the security and longevity of the Bitcoin ...
284,501 views
In this video I discuss the new updates to OpenSSH 10.0 including post quantum encryption enabled by default. Read the full ...
99,734 views
9 months ago
Lesson 10 E91: Entanglement-based QKD Step 1: Introduction to entanglement-based QKD In this lesson, we explore the first ...
6,639 views
4 years ago
Quantum computers use the principles of quantum mechanics to process information in ways that classical computers can't.
674,643 views
1 year ago
A quantum computer isn't just a more powerful version of the computers we use today; it's something else entirely, based on ...
2,577,781 views
Jeff Crume explains the risks of 'Harvest Now, Decrypt Later' and how post-quantum cryptography can secure sensitive data.
30,667 views
6 months ago
Discover how AWS simplifies post-quantum cryptography (PQC) implementation to protect your data from future quantum ...
2,770 views
Where are the limits of human technology? And can we somehow avoid them? This is where quantum computers become very ...
19,234,862 views
10 years ago
Learn more about the IBM Quantum Safe program → https://ibm.biz/BdPzaE IBM Quantum Computing Roadmap ...
24,321 views