ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

3,611 results

DEFCONConference
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis

Quantum computers will crack RSA and ECC and weaken symmetric encryption, but when? NIST is betting it won't happen before ...

39:29
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis

143,616 views

3 months ago

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Theoretical Computer ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

64,849 views

2 years ago

Mental Outlaw
OpenSSH Gets Post Quantum Encryption

In this video I discuss the new updates to OpenSSH 10.0 including post quantum encryption enabled by default. Read the full ...

8:17
OpenSSH Gets Post Quantum Encryption

99,718 views

8 months ago

Q-Leap Edu Quantum Communications
10-1 Introduction to entanglement-based QKD

Lesson 10 E91: Entanglement-based QKD Step 1: Introduction to entanglement-based QKD In this lesson, we explore the first ...

4:10
10-1 Introduction to entanglement-based QKD

6,627 views

4 years ago

Okinawa Institute of Science and Technology (OIST)
OSP2025 | Mina Doosti | Quantum Cryptography 103: Limitations and Beyond Key Distribution

Invited Lecture by Dr. Mina Doosti (The University of Edinburgh, Scotland) at OSP2025. Date: September 26, 2025 Location: ...

1:51:32
OSP2025 | Mina Doosti | Quantum Cryptography 103: Limitations and Beyond Key Distribution

22 views

1 month ago

Brainwave Lab
Quantum Cryptography Explained 🔐 How Physics Makes Hacking Impossible!

Quantum computers could one day crack today's passwords in seconds . That's why we need Quantum ...

0:39
Quantum Cryptography Explained 🔐 How Physics Makes Hacking Impossible!

176 views

4 months ago

IBM Research
The next big leap in cryptography: NIST’s post-quantum cryptography standards

The next big leap in encryption has officially been shared in this special webcast. IBM Fellow Ray Harishankar discusses the ...

25:26
The next big leap in cryptography: NIST’s post-quantum cryptography standards

13,645 views

1 year ago

Q-Leap Edu Quantum Communications
9-3 BB84 Protocol

Lesson 9 BB84: Single-photon QKD Step 3: BB84 Protocol We take a closer look at BB84, the first example of a cryptographic ...

13:39
9-3 BB84 Protocol

10,331 views

4 years ago

Mental Outlaw
Signal Just Published Post Quantum E2E Encryption

In this video I discuss how the Signal foundation developed PQXDH (Post Quantum Extended Diffie Helmen) an encryption ...

8:32
Signal Just Published Post Quantum E2E Encryption

259,725 views

2 years ago

DEFCONConference
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference

Shor's Algorithm for factoring integer numbers is the big threat to cryptography (RSA/ECC) as it reduces the complexity from ...

48:42
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference

14,397 views

6 years ago

Cybersecurity and Privacy Institute UWaterloo
How can we use Blockchain and what is Post-Quantum cryptography? - Behind the Firewall

In this episode of "Behind the Firewall", we sat down with Guang Gong, CPI member and professor at the department of Electrical ...

4:24
How can we use Blockchain and what is Post-Quantum cryptography? - Behind the Firewall

88 views

2 years ago

media.ccc.de
36C3 -  (Post-Quantum) Isogeny Cryptography

https://media.ccc.de/v/36c3-10543-post-quantum_isogeny_cryptography There are countless post-quantum buzzwords to list: ...

52:23
36C3 - (Post-Quantum) Isogeny Cryptography

5,624 views

6 years ago

The Linux Foundation
Why Quantum Safe Encryption Is the Next Y2K, and How To Be Prepared - Joe Winchester, IBM

Don't miss out! Join us at the next Open Source Summit in Seoul, South Korea (November 4-5). Join us at the premier ...

43:54
Why Quantum Safe Encryption Is the Next Y2K, and How To Be Prepared - Joe Winchester, IBM

64 views

4 months ago

Thinking On Paper
IBM: What Is Post-Quantum Cryptography (And Why Are Apple Using It In i-Messenger?)

IBM's Lory Thorpe breaks down post-quantum cryptography and how quantum computers will impact current encryption systems.

55:11
IBM: What Is Post-Quantum Cryptography (And Why Are Apple Using It In i-Messenger?)

318 views

1 year ago

IACR
Quantum Fully Homomorphic Encryption with Verification

Paper by Gorjan Alagic and Yfke Dulek and Christian Schaffner and Florian Speelman, presented at Asiacrypt 2017.

31:58
Quantum Fully Homomorphic Encryption with Verification

394 views

7 years ago

aantonop
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography ...

6:47
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

23,524 views

8 years ago

IACR
Quantum Authentication and Encryption with Key Recycling

Paper by Serge Fehr and Louis Salvail presented at Eurocrypt 2017. See.

22:55
Quantum Authentication and Encryption with Key Recycling

270 views

8 years ago

The Linux Foundation
Why Quantum Safe Encryption Is the Next Y2K and How to Be Prepared - Joe Winchester, IBM

Why Quantum Safe Encryption Is the Next Y2K and How to Be Prepared - Joe Winchester, IBM Client server computing relies on ...

39:49
Why Quantum Safe Encryption Is the Next Y2K and How to Be Prepared - Joe Winchester, IBM

169 views

1 year ago

media.ccc.de
Christian Schaffner: Quantum Cryptography

I will entertain the audience with a science talk about quantum cryptography, covering both some classics (Quantum Key ...

1:00:26
Christian Schaffner: Quantum Cryptography

2,461 views

10 years ago

WHY2025
WHY 2025 - Quantum cryptography and its certification against attacks

https://media.ccc.de/v/why2025-217-quantum-cryptography-and-its-certification-against-attacks I briefly explain quantum ...

52:09
WHY 2025 - Quantum cryptography and its certification against attacks

74 views

5 months ago