ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

96,788 results

DMZ KAM (Now Inegben)
Cryptography and Cyber Security Full Course for beginners

In this course you will learn about various cryptographic algorithms and it's application to cyber security. You will also learn how ...

9:45:20
Cryptography and Cyber Security Full Course for beginners

58 views

2 years ago

Mental Outlaw
Signal Just Published Post Quantum E2E Encryption

In this video I discuss how the Signal foundation developed PQXDH (Post Quantum Extended Diffie Helmen) an encryption ...

8:32
Signal Just Published Post Quantum E2E Encryption

259,816 views

2 years ago

DEFCONConference
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis

Quantum computers will crack RSA and ECC and weaken symmetric encryption, but when? NIST is betting it won't happen before ...

39:29
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis

150,795 views

4 months ago

Art of the Problem
Public Key Cryptography: RSA Encryption

RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime ...

16:31
Public Key Cryptography: RSA Encryption

978,979 views

13 years ago

Mental Outlaw
OpenSSH Gets Post Quantum Encryption

In this video I discuss the new updates to OpenSSH 10.0 including post quantum encryption enabled by default. Read the full ...

8:17
OpenSSH Gets Post Quantum Encryption

99,975 views

10 months ago

AtlasTV
The Power of Cryptographic Primitives

In this video, we explore the power of cryptographic primitives, and how they can be used to secure data and protect against ...

2:12
The Power of Cryptographic Primitives

881 views

3 years ago

Bitcoin and Cryptocurrency Technologies Online Course
Lecture 1 — Intro to Crypto and Cryptocurrencies

First lecture of the Bitcoin and cryptocurrency technologies online course. For the accompanying textbook, including the free draft ...

58:42
Lecture 1 — Intro to Crypto and Cryptocurrencies

357,628 views

11 years ago

Next Day Video
Exploring Cryptography

John Downs https://2016.pygotham.org/talks/353/exploring-cryptography A hacker's introduction to cryptography.

48:17
Exploring Cryptography

277 views

9 years ago

DEFCONConference
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference

Shor's Algorithm for factoring integer numbers is the big threat to cryptography (RSA/ECC) as it reduces the complexity from ...

48:42
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference

14,402 views

6 years ago

Ave Coders
Cryptography and Cyber Security || Full Course

In this course you will learn about various cryptographic algorithms and it's application to cyber security. You will also learn how ...

9:45:20
Cryptography and Cyber Security || Full Course

2,680 views

5 years ago

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

Discussion about how quantum key distribution methods based on measuring the polarization of photons can be used to keep ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

68,258 views

2 years ago

PKI Consortium
Code-based Cryptography

Last summer, several lattice-based schemes were chosen for standardization in NIST's effort to standardize post-quantum ...

42:32
Code-based Cryptography

1,449 views

2 years ago

Missing Semester
Lecture 9: Security and Cryptography (2020)

You can find the lecture notes and exercises for this lecture at https://missing.csail.mit.edu/2020/security/ Help us caption ...

1:01:00
Lecture 9: Security and Cryptography (2020)

76,149 views

6 years ago

IBM Research
The Future of Cryptography ⛓

Join IBM to investigate the latest advances in cryptography technology and their role in shaping the future of data privacy. In a live ...

36:04
The Future of Cryptography ⛓

4,037 views

4 years ago

IBM Research
Computing Responsibly in the Era of Post Quantum Cryptography

IBM Quantum is committed to the responsible development of quantum computing, and is developing this technology guided by a ...

36:15
Computing Responsibly in the Era of Post Quantum Cryptography

4,581 views

2 years ago

Lisk
Cryptography Explained: Public-Key vs Symmetric Cryptography

Cryptography Explained for Beginners: This Lisk Academy video breaks down how cryptography works in blockchain and ...

2:12
Cryptography Explained: Public-Key vs Symmetric Cryptography

14,835 views

7 years ago

IBM Research
IBM Research 5 in 5 Science Slam: Lattice Cryptography

During the IBM Research 5 in 5 Science Slam at IBM Think 2018, IBM researcher Cecilia Boschini explains one of the ...

8:04
IBM Research 5 in 5 Science Slam: Lattice Cryptography

10,430 views

7 years ago

Next Day Video
Cryptography in Python

Amirali Sanatinia https://2016.pygotham.org/talks/333/cryptography-in-python Today we use cryptography in almost everywhere.

21:50
Cryptography in Python

4,652 views

9 years ago

IBM Research
Understanding the NIST standards and IBM's contributions to post-quantum cryptography

In this brief animated video, we unpack why the NIST standards are important, discuss IBM's contributions to quantum-safe ...

2:18
Understanding the NIST standards and IBM's contributions to post-quantum cryptography

2,211 views

1 year ago

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,066 views

9 years ago