Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
885,569 results
Today we're going to talk about how to keep information secret, and this isn't a new goal. From as early as Julius Caesar's Caesar ...
948,961 views
8 years ago
Cryptography is scary. In this tutorial, we get hands-on with Node.js to learn how common crypto concepts work, like hashing, ...
1,611,952 views
4 years ago
In this video, we'll explore the basics of Cryptography. We'll cover the fundamental concepts related to it, such as Encryption, ...
17,501 views
1 year ago
Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of ...
966,510 views
11 years ago
Go to http://www.dashlane.com/minutephysics to download Dashlane for free, and use offer code minutephysics for 10% off ...
3,306,618 views
6 years ago
Lattices are seemingly simple patterns of dots. But they are the basis for some seriously hard math problems. Created by Kelsey ...
238,268 views
3 years ago
Advanced Encryption Standard - Dr Mike Pound explains this ubiquitous encryption technique. n.b in the matrix multiplication ...
1,430,670 views
Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer ...
473,058 views
Information theory shows entropy works a little differently with encryption. Dr Tim Muller takes us through an example ...
63,917 views
How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from ...
1,589,909 views
Learn more about current threats: https://ibm.biz/BdP3Cv Learn how to build a quantum-safe future: https://ibm.biz/BdP3Cm If your ...
43,383 views
2 years ago
PATREON: https://www.patreon.com/generalistpapers Codes, ciphers, and mysterious plots. The history of cryptography, of hiding ...
111,020 views
Encryption is how data confidentiality is provided. Data before it is encrypted is referred to as Plaintext (or Cleartext) and the ...
225,921 views
The threat of quantum computing is one of the most common concerns raised regarding the security and longevity of the Bitcoin ...
287,070 views
Quantum computing threatens to break today's encryption standards, and cybersecurity experts are racing to develop ...
6,269 views
7 months ago
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea?
779,860 views
Wanting to learn what a Cryptographic Hashing Function is? Maybe you're wondering what exactly the math that is happening ...
143,598 views
Click here to enroll in Coursera's "Cryptography I" course (no pre-req's required): ...
443,546 views
7 years ago
Asymmetric Encryption requires two keys: a Public key and a Private key. These keys can be used to perform Encryption and ...
400,036 views
Audible free book: http://www.audible.com/computerphile Hashing Algorithms are used to ensure file authenticity, but how secure ...
1,620,671 views
12 years ago