ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

66,612 results

CrashCourse
Cryptography: Crash Course Computer Science #33

Today we're going to talk about how to keep information secret, and this isn't a new goal. From as early as Julius Caesar's Caesar ...

12:33
Cryptography: Crash Course Computer Science #33

946,957 views

8 years ago

Simply Explained
Asymmetric Encryption - Simply explained

How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from ...

4:40
Asymmetric Encryption - Simply explained

1,587,500 views

8 years ago

SciShow
The Science of Codes: An Intro to Cryptography

Were you fascinated by The Da Vinci Code? You might be interested in Cryptography! There are lots of different ways to encrypt a ...

8:21
The Science of Codes: An Intro to Cryptography

1,220,461 views

10 years ago

WhiteboardDoodles
Cryptography Basics: Intro to Cybersecurity

In this video, we'll explore the basics of Cryptography. We'll cover the fundamental concepts related to it, such as Encryption, ...

12:11
Cryptography Basics: Intro to Cybersecurity

16,830 views

1 year ago

Khan Academy
Encryption and public keys | Internet 101 | Computer Science | Khan Academy

Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer ...

6:40
Encryption and public keys | Internet 101 | Computer Science | Khan Academy

471,883 views

6 years ago

minutephysics
How Quantum Computers Break Encryption | Shor's Algorithm Explained

Go to http://www.dashlane.com/minutephysics to download Dashlane for free, and use offer code minutephysics for 10% off ...

17:31
How Quantum Computers Break Encryption | Shor's Algorithm Explained

3,303,887 views

6 years ago

Computerphile
Public Key Cryptography - Computerphile

Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of ...

6:20
Public Key Cryptography - Computerphile

965,361 views

11 years ago

Physics Girl
Quantum Cryptography Explained

This episode is brought to you by Squarespace: http://www.squarespace.com/physicsgirl With recent high-profile security ...

8:13
Quantum Cryptography Explained

421,591 views

9 years ago

The New York Times
How Cryptocurrency Works | NYT

From Bitcoin to Litecoin to Ethereum, we explain how cryptocurrency transactions work. More from The New York Times Video: ...

2:14
How Cryptocurrency Works | NYT

424,241 views

7 years ago

Eye on Tech
What is Post-Quantum Cryptography?

Quantum computing threatens to break today's encryption standards, and cybersecurity experts are racing to develop ...

5:11
What is Post-Quantum Cryptography?

5,920 views

6 months ago

Eye on Tech
What is Quantum Cryptography? An Introduction

Try as we might, malicious actors can sometimes outsmart classical encryption methods, especially with accessible quantum ...

2:56
What is Quantum Cryptography? An Introduction

78,903 views

3 years ago

3Blue1Brown
How secure is 256 bit security?

How hard is it to find a 256-bit hash just by guessing and checking? Help fund future projects: ...

5:06
How secure is 256 bit security?

3,593,635 views

8 years ago

3Blue1Brown
But how does bitcoin actually work?

The math behind cryptocurrencies. Help fund future projects: https://www.patreon.com/3blue1brown An equally valuable form of ...

25:16
But how does bitcoin actually work?

17,773,552 views

8 years ago

Lisk
Cryptography Explained: Public-Key vs Symmetric Cryptography

Cryptography Explained for Beginners: This Lisk Academy video breaks down how cryptography works in blockchain and ...

2:12
Cryptography Explained: Public-Key vs Symmetric Cryptography

14,823 views

7 years ago

Chalk Talk
Lattice-based cryptography: The tricky math of dots

Lattices are seemingly simple patterns of dots. But they are the basis for some seriously hard math problems. Created by Kelsey ...

8:39
Lattice-based cryptography: The tricky math of dots

237,033 views

3 years ago

Altcoin Daily
The Greatest Bitcoin Explanation of ALL TIME (in Under 10 Minutes)

What is bitcoin? Explain ethereum like i'm five? Let's discuss the latest cryptocurrency news for bitcoin, ethereum, altcoins, ...

9:54
The Greatest Bitcoin Explanation of ALL TIME (in Under 10 Minutes)

3,270,833 views

2 years ago

National Institute of Standards and Technology
Post-Quantum Cryptography: the Good, the Bad, and the Powerful

This video featuring NIST's Matthew Scholl emphasizes how NIST is working with the brightest minds in government, academia, ...

2:50
Post-Quantum Cryptography: the Good, the Bad, and the Powerful

229,601 views

4 years ago

Chalk Talk
Post-quantum cryptography: Security after Shor’s algorithm

What's the current status of the NIST Post-Quantum Cryptography Standardization? Find out here: ...

7:17
Post-quantum cryptography: Security after Shor’s algorithm

68,081 views

3 years ago

Computerphile
Hashing Algorithms and Security - Computerphile

Audible free book: http://www.audible.com/computerphile Hashing Algorithms are used to ensure file authenticity, but how secure ...

8:12
Hashing Algorithms and Security - Computerphile

1,619,401 views

12 years ago

IBM Technology
Your Encryption Isn't Quantum Safe

Learn more about current threats: https://ibm.biz/BdP3Cv Learn how to build a quantum-safe future: https://ibm.biz/BdP3Cm If your ...

9:22
Your Encryption Isn't Quantum Safe

43,249 views

2 years ago