Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
3,154 results
Homomorphic encryption vs confidential computing explained to help you choose the right data protection. Work with me: ...
695 views
1 year ago
No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.
2,511,093 views
6 years ago
Discussion about how quantum key distribution methods based on measuring the polarization of photons can be used to keep ...
67,376 views
2 years ago
Video walkthrough of code implementation: https://youtu.be/50XM-h3h6Fw Explanation of converting from decimal to binary: ...
52,731 views
5 years ago
In this video I discuss how the hacker responsible for the Vastaamo data breach incident was caught due to numerous OPSEC ...
774,927 views
In this video I discuss how Chainalysis has been able to trace some monero transactions by running compromised nodes and ...
189,898 views
In this video I discuss how the Signal foundation developed PQXDH (Post Quantum Extended Diffie Helmen) an encryption ...
259,791 views
We explain what smart contracts are and how they work. #Cointelegraph #crypto #smartcontracts Subscribe to Cointelegraph: ...
73,274 views
3 years ago
In this video I explain how you can make any messaging or text service end to end encrypted and completely private by ...
95,464 views
8 months ago
Bitcoin uses a specific elliptic curve called "secp256k1". Understanding how this curve is defined will make it easy to understand ...
113 views
Lesson 10 E91: Entanglement-based QKD Step 1: Introduction to entanglement-based QKD In this lesson, we explore the first ...
6,790 views
4 years ago
Lesson 9 BB84: Single-photon QKD Step 3: BB84 Protocol We take a closer look at BB84, the first example of a cryptographic ...
10,482 views
Cryptography has a fascinating history going back thousands of years. However, until relatively recently all cryptographic ...
10,222 views
9 years ago
Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...
19,523 views
Full article on https://tinkerspark.org/encryption-simply-explained-not-technical/ A technological beauty, learn how encryption ...
379 views
7 years ago
In this lesson we'll be looking at a new type of encryption that's known as a block cipher so far in this course we've covered ...
3,202 views
blockchain #crypto #hacker #cyberattack #bitcoin Every type of blockchain attack, explain in 8 minutes, by animation.
650 views
6 months ago
DISCLAIMER: Researchers have recently discovered a major vulnerability with PGP encryption. We recommend that you stop ...
27,169 views
8 years ago
What is a cryptocurrency mnemonic phrase? How does it relate to a bitcoin or ethereum private key? Are they the same thing?
23,158 views
In this lesson, I describe methods of protecting and safely using private and symmetric keys, including secure key generation, ...
8,687 views