ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,105 results

Lisk
Cryptography Explained: Public-Key vs Symmetric Cryptography

Cryptography Explained for Beginners: This Lisk Academy video breaks down how cryptography works in blockchain and ...

2:12
Cryptography Explained: Public-Key vs Symmetric Cryptography

14,819 views

7 years ago

Lisk
What is Hashing? Hash Functions Explained Simply

What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting ...

2:36
What is Hashing? Hash Functions Explained Simply

448,646 views

7 years ago

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,970 views

6 years ago

Improbable Matter
How Quantum Key Distribution Works (BB84 & E91)

Discussion about how quantum key distribution methods based on measuring the polarization of photons can be used to keep ...

12:41
How Quantum Key Distribution Works (BB84 & E91)

67,062 views

2 years ago

aantonop
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography ...

6:47
Bitcoin Q&A: Migrating to Post-Quantum Cryptography

23,540 views

8 years ago

Trezor
Passphrase: How it works

Learn how to protect your accounts with the Passphrase feature. Always remember to choose a strong Passphrase! To learn more ...

2:02
Passphrase: How it works

98,142 views

5 years ago

Cointelegraph
Smart contracts for beginners, explained (in 6 minutes) | Cryptopedia

We explain what smart contracts are and how they work. #Cointelegraph #crypto #smartcontracts Subscribe to Cointelegraph: ...

6:14
Smart contracts for beginners, explained (in 6 minutes) | Cryptopedia

73,093 views

3 years ago

Q-Leap Edu Quantum Communications
10-1 Introduction to entanglement-based QKD

Lesson 10 E91: Entanglement-based QKD Step 1: Introduction to entanglement-based QKD In this lesson, we explore the first ...

4:10
10-1 Introduction to entanglement-based QKD

6,763 views

4 years ago

Lisk
What are Digital Signatures and How Do They Work?

What is a Digital Signature? In this animation, we will explain how digital signatures work using cryptography. In some ways ...

2:52
What are Digital Signatures and How Do They Work?

827,424 views

7 years ago

Q-Leap Edu Quantum Communications
9-3 BB84 Protocol

Lesson 9 BB84: Single-photon QKD Step 3: BB84 Protocol We take a closer look at BB84, the first example of a cryptographic ...

13:39
9-3 BB84 Protocol

10,463 views

4 years ago

IBM Research
Computing Responsibly in the Era of Post Quantum Cryptography

IBM Quantum is committed to the responsible development of quantum computing, and is developing this technology guided by a ...

36:15
Computing Responsibly in the Era of Post Quantum Cryptography

4,574 views

2 years ago

Chrome for Developers
Understand passkeys in 4 minutes

Are you still using passwords? Passkeys are a new authentication technology that enables creating online accounts and signing ...

3:49
Understand passkeys in 4 minutes

728,438 views

2 years ago

aantonop
Cryptocurrency Explained: What is a Mnemonic phrase? [Understanding Bitcoin Ethereum Crypto Keys]

What is a cryptocurrency mnemonic phrase? How does it relate to a bitcoin or ethereum private key? Are they the same thing?

9:50
Cryptocurrency Explained: What is a Mnemonic phrase? [Understanding Bitcoin Ethereum Crypto Keys]

23,152 views

5 years ago

Tom Olzak
Cryptography Part 3: Asymmetric Encryption

In this lesson, I walk through how asymmetric encryption works, how it is managed with PKI, and how it is used. You can download ...

13:06
Cryptography Part 3: Asymmetric Encryption

870 views

4 years ago

IBM Research
Understanding the NIST standards and IBM's contributions to post-quantum cryptography

In this brief animated video, we unpack why the NIST standards are important, discuss IBM's contributions to quantum-safe ...

2:18
Understanding the NIST standards and IBM's contributions to post-quantum cryptography

2,193 views

1 year ago

Q-Leap Edu Quantum Communications
9-4 Eavesdropper detection

Lesson 9 BB84: Single-photon QKD Step 4: Eavesdropper detection In this step, we discuss how the laws of quantum mechanics ...

7:15
9-4 Eavesdropper detection

3,623 views

4 years ago

Haren
Public Key Cryptography - Number Theory

The number theory behind how public key cryptography works. This includes an introduction to modular arithmetic and Fermat's ...

8:43
Public Key Cryptography - Number Theory

609 views

4 years ago

aantonop
Bitcoin Q&A: Public Keys vs. Addresses

What is the difference between public keys and addresses? How are new addresses generated? How are change addresses ...

12:43
Bitcoin Q&A: Public Keys vs. Addresses

54,836 views

7 years ago

TüftelLab
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1

Our cell phones and computers are constantly sending and receiving information. To ensure that only the right recipients can read ...

5:01
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1

44,439 views

3 years ago

ReasonTV
Cryptography vs. Big Brother: How Math Became a Weapon Against Tyranny

Watch the whole series: https://www.youtube.com/playlist?list=PLBuns9Evn1w-T2RwqMhUnTZbTTe-M-g42 Part two of a four-part ...

7:26
Cryptography vs. Big Brother: How Math Became a Weapon Against Tyranny

36,907 views

5 years ago