ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

12,773 results

Lisk
Cryptography Explained: Public-Key vs Symmetric Cryptography

Cryptography Explained for Beginners: This Lisk Academy video breaks down how cryptography works in blockchain and ...

2:12
Cryptography Explained: Public-Key vs Symmetric Cryptography

14,815 views

7 years ago

it learning
How Cryptography is used in IT Security - Explained

In this video, you will be able to learn how encryption-decryption works, what is Key management, symmetric key, public key, ...

56:46
How Cryptography is used in IT Security - Explained

19 views

6 years ago

Lisk
What is Hashing? Hash Functions Explained Simply

What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting ...

2:36
What is Hashing? Hash Functions Explained Simply

448,241 views

7 years ago

NTIPRIT
Cryptography - Explained with Live Demonstrations

In this session you will learn about : Fundamentals of Crypto-systems Steganography Symmetric and Asymmetric Encryptions ...

2:09:27
Cryptography - Explained with Live Demonstrations

134 views

4 years ago

Nelson Ford
The Encryption Tech That Could Change Everything

Homomorphic encryption vs confidential computing explained to help you choose the right data protection. Work with me: ...

4:50
The Encryption Tech That Could Change Everything

692 views

1 year ago

media.ccc.de
36C3 -  Cryptography demystified

https://media.ccc.de/v/36c3-10627-cryptography_demystified An introduction without maths This talk will explain the basic building ...

53:25
36C3 - Cryptography demystified

3,510 views

6 years ago

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

Discussion about how quantum key distribution methods based on measuring the polarization of photons can be used to keep ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

66,583 views

2 years ago

Canadian Coding
Animated Explanation of the one-time pad

Video walkthrough of code implementation: https://youtu.be/50XM-h3h6Fw Explanation of converting from decimal to binary: ...

4:33
Animated Explanation of the one-time pad

52,265 views

5 years ago

Bitcoin Explained
Bitcoin's Cryptography Explained - Finite Fields

Finite fields are one of the key mathematical building blocks behind the cryptography that Bitcoin uses. They form the basis for ...

38:20
Bitcoin's Cryptography Explained - Finite Fields

167 views

1 year ago

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,813 views

6 years ago

Mental Outlaw
How Monero Users Get Traced (RUN YOUR OWN NODE!)

In this video I discuss how Chainalysis has been able to trace some monero transactions by running compromised nodes and ...

11:11
How Monero Users Get Traced (RUN YOUR OWN NODE!)

188,510 views

1 year ago

Justice & Peace Netherlands
PGP Encryption Explained

DISCLAIMER: Researchers have recently discovered a major vulnerability with PGP encryption. We recommend that you stop ...

5:57
PGP Encryption Explained

27,158 views

8 years ago

Bitcoin Explained
Bitcoin's Cryptography Explained - Bitcoin's Curve

Bitcoin uses a specific elliptic curve called "secp256k1". Understanding how this curve is defined will make it easy to understand ...

14:43
Bitcoin's Cryptography Explained - Bitcoin's Curve

113 views

1 year ago

Mental Outlaw
Signal Just Published Post Quantum E2E Encryption

In this video I discuss how the Signal foundation developed PQXDH (Post Quantum Extended Diffie Helmen) an encryption ...

8:32
Signal Just Published Post Quantum E2E Encryption

259,760 views

2 years ago

Trezor
Public keys vs. Private keys (in less than a minute 😉)

What's the difference between public keys and private keys? #trezor #hardwarewallet #cryptosecurity #crypto #cryptocurrency ...

0:40
Public keys vs. Private keys (in less than a minute 😉)

2,516 views

10 months ago

internet-class
What is symmetric encryption?

Cryptography has a fascinating history going back thousands of years. However, until relatively recently all cryptographic ...

4:49
What is symmetric encryption?

10,211 views

9 years ago

Q-Leap Edu Quantum Communications
9-3 BB84 Protocol

Lesson 9 BB84: Single-photon QKD Step 3: BB84 Protocol We take a closer look at BB84, the first example of a cryptographic ...

13:39
9-3 BB84 Protocol

10,425 views

4 years ago

Q-Leap Edu Quantum Communications
10-1 Introduction to entanglement-based QKD

Lesson 10 E91: Entanglement-based QKD Step 1: Introduction to entanglement-based QKD In this lesson, we explore the first ...

4:10
10-1 Introduction to entanglement-based QKD

6,735 views

4 years ago

NorthSec
Introduction to Cryptographic Attacks

Using cryptography is often a subtle practice and mistakes can result in significant vulnerabilities. This workshop will cover many ...

2:22:20
Introduction to Cryptographic Attacks

499 views

Streamed 2 years ago

Chrome for Developers
Understand passkeys in 4 minutes

Are you still using passwords? Passkeys are a new authentication technology that enables creating online accounts and signing ...

3:49
Understand passkeys in 4 minutes

723,547 views

2 years ago

Cointelegraph
Smart contracts for beginners, explained (in 6 minutes) | Cryptopedia

We explain what smart contracts are and how they work. #Cointelegraph #crypto #smartcontracts Subscribe to Cointelegraph: ...

6:14
Smart contracts for beginners, explained (in 6 minutes) | Cryptopedia

72,865 views

3 years ago

Brainwave Lab
Quantum Cryptography Explained 🔐 How Physics Makes Hacking Impossible!

Quantum computers could one day crack today's passwords in seconds . That's why we need Quantum ...

0:39
Quantum Cryptography Explained 🔐 How Physics Makes Hacking Impossible!

199 views

5 months ago

Lisk
What are Digital Signatures and How Do They Work?

What is a Digital Signature? In this animation, we will explain how digital signatures work using cryptography. In some ways ...

2:52
What are Digital Signatures and How Do They Work?

827,117 views

7 years ago

DEFCONConference
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis

Quantum computers will crack RSA and ECC and weaken symmetric encryption, but when? NIST is betting it won't happen before ...

39:29
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis

147,311 views

3 months ago

internet-class
What is a trapdoor function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

4:06
What is a trapdoor function?

19,513 views

9 years ago