Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
3,145 results
Homomorphic encryption vs confidential computing explained to help you choose the right data protection. Work with me: ...
692 views
1 year ago
In this video I discuss how the hacker responsible for the Vastaamo data breach incident was caught due to numerous OPSEC ...
773,149 views
Discussion about how quantum key distribution methods based on measuring the polarization of photons can be used to keep ...
66,584 views
2 years ago
No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.
2,510,813 views
6 years ago
Video walkthrough of code implementation: https://youtu.be/50XM-h3h6Fw Explanation of converting from decimal to binary: ...
52,265 views
5 years ago
Lesson 10 E91: Entanglement-based QKD Step 1: Introduction to entanglement-based QKD In this lesson, we explore the first ...
6,735 views
4 years ago
In this video I discuss how Chainalysis has been able to trace some monero transactions by running compromised nodes and ...
188,510 views
Bitcoin uses a specific elliptic curve called "secp256k1". Understanding how this curve is defined will make it easy to understand ...
113 views
DISCLAIMER: Researchers have recently discovered a major vulnerability with PGP encryption. We recommend that you stop ...
27,158 views
8 years ago
Cryptography has a fascinating history going back thousands of years. However, until relatively recently all cryptographic ...
10,211 views
9 years ago
blockchain #crypto #hacker #cyberattack #bitcoin Every type of blockchain attack, explain in 8 minutes, by animation.
558 views
6 months ago
In this video I discuss how the Signal foundation developed PQXDH (Post Quantum Extended Diffie Helmen) an encryption ...
259,760 views
Lesson 9 BB84: Single-photon QKD Step 3: BB84 Protocol We take a closer look at BB84, the first example of a cryptographic ...
10,425 views
Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...
19,513 views
In this video I explain how you can make any messaging or text service end to end encrypted and completely private by ...
94,577 views
8 months ago
Full article on https://tinkerspark.org/encryption-simply-explained-not-technical/ A technological beauty, learn how encryption ...
379 views
7 years ago
We explain what smart contracts are and how they work. #Cointelegraph #crypto #smartcontracts Subscribe to Cointelegraph: ...
72,865 views
3 years ago
In this lesson we'll be looking at a new type of encryption that's known as a block cipher so far in this course we've covered ...
3,156 views
Establishing a secure communication channel is important—but how do you know you are communicating with the right entity?
73,137 views
What is a cryptocurrency mnemonic phrase? How does it relate to a bitcoin or ethereum private key? Are they the same thing?
23,148 views
Lesson 9 BB84: Single-photon QKD Step 4: Eavesdropper detection In this step, we discuss how the laws of quantum mechanics ...
3,614 views
In this lesson, I describe methods of protecting and safely using private and symmetric keys, including secure key generation, ...
8,640 views
This lesson looks at attack models that are used to test the strength of cryptographic ciphers and hashing, including ...
6,480 views
Learn the basics of cryptography and its role in ethical hacking. Explore symmetric and asymmetric encryption, hash functions, ...
263 views
I show you how to setup an encrypted USB drive with a LUKS partition and cryptsetup. I wrote a script to automatically decrypt and ...
87,363 views