Quantum cryptography | Quantum cryptography protocols

KMB09 protocol

KMB09 protocol (named after Muhammad Mubashir Khan, Michael Murphy and Almut Beige) is an alternative quantum key distribution protocol, where Alice and Bob use two mutually unbiased bases with one of them encoding a ‘0’ and the other one encoding a ‘1’. The security of the scheme is due to a minimum index transmission error rate (ITER) and quantum bit error rate (QBER) introduced by an eavesdropper. The ITER increases significantly for higher-dimensional photon states. This allows for more noise in the transmission line, thereby increasing the possible distance between Alice and Bob without the need for intermediate nodes. (Wikipedia).

Video thumbnail

29C3: ISP's black box (EN)

Speaker: Luka Perkov provisioning behind the scene This talk is aimed to give an insight into CPE WAN Management Protocol (CWMP) and its GPLv2 implementations that were developed in the past year. CWMP (often called only TR-069) enables ISP to remotely configure, manage, upgrade and trou

From playlist 29C3: Not my department

Video thumbnail

Black Hat USA 2010: Attacking Kerberos Deployments 4/4

Speakers: Scott Stender, Brad Hill & Rachel Engel The Kerberos protocol is provides single sign-on authentication services for users and machines. Its availability on nearly every popular computing platform - Windows, Mac, and UNIX variants - makes it the primary choice for enterprise aut

From playlist BH USA 2010 - OS WARS

Video thumbnail

Nmap - NSE Syntax

In this video, I explain and demonstrate how to use the Nmap scripting engine (NSE). Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery

From playlist Nmap

Video thumbnail

Nmap - HTTP Enumeration - Detecting HTTP Methods

In this video, I demonstrate how to detect the active HTTP methods on a web server with Nmap. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host d

From playlist Nmap

Video thumbnail

Supermicro E300-9D-4CN8TP with Intel Xeon D-2123IT Review

STH Main Site Article: https://www.servethehome.com/supermicro-e300-9d-4cn8tp-review-a-4x-10gbe-and-4x-1gbe-server/ STH Merch on Teespring: https://the-sth-merch-shop.myteespring.co/ STH Top 5 Weekly Newsletter: https://eepurl.com/dryM09 In our Supermicro E300-9D-4C8TP review, we see what

From playlist Cool Server Hardware Series

Video thumbnail

Nmap - SMB Enumeration

In this video, I demonstrate how to perform SMB enumeration with Nmap. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service an

From playlist Nmap

Video thumbnail

Introduction to TCP/IP and Sockets, part 2: Example code Walk-Through

This is a walk-through of example C++ code for using Sockets to send and receive messages between programs using the Internet protocols. This is part 2 of the series. Part 1 is here: https://youtu.be/C7CpfL1p6y0 Here is a link to all the code: https://github.com/rhymu8354/SocketTutori

From playlist Introduction to TCP/IP and Sockets

Video thumbnail

MPC in the Head With Applications to Blockchain (Lecture 2) by Carmit Hazay

DISCUSSION MEETING : FOUNDATIONAL ASPECTS OF BLOCKCHAIN TECHNOLOGY ORGANIZERS : Pandu Rangan Chandrasekaran DATE : 15 to 17 January 2020 VENUE : Madhava Lecture Hall, ICTS, Bangalore Blockchain technology is among one of the most influential disruptive technologies of the current decade.

From playlist Foundational Aspects of Blockchain Technology 2020

Video thumbnail

A Tutorial on Network Protocols

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Communications and Network Security | CISSP Training Videos

🔥 Enroll for FREE CISSP Course & Get your Completion Certificate: https://www.simplilearn.com/learn-cloud-security-basics-skillup?utm_campaign=CCSP&utm_medium=DescriptionFirstFold&utm_source=youtube Communication and Network Security : Domain 4 of the CISSP certification course offered by

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

The information cost of quantum memoryless protocols - M. Lauriere - Main Conference - CEB T3 2017

Mathieu Lauriere (NYU Shanghai) / 12.12.2017 Title: The information cost of quantum memoryless protocols Abstract: In this talk, we will consider memoryless quantum communication protocols, where the two parties do not possess any memory besides their classical input and they take turns

From playlist 2017 - T3 - Analysis in Quantum Information Theory - CEB Trimester

Video thumbnail

Selective Repeat ARQ Explained | Selective Repeat Protocol | Networking Tutorial | Simplilearn

🔥Advanced Executive Program In Cybersecurity: https://www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?utm_campaign=SelectiveRepeatARQExplained-dUX8A6VTqdk&utm_medium=Descriptionff&utm_source=youtube🔥Caltech Cybersecurity Bootcamp(US Only): https://www.simplilearn.com/c

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

WebAssembly: The What, Why and How

WebAssembly is a portable, size, and load-time efficient binary format for the web. It is an emerging standard being developed in the WebAssembly community group, and supported by multiple browser vendors. This talk details what WebAssembly is, the problems it is trying to solve, exciting

From playlist Talks

Video thumbnail

Black Hat USA 2010: Burning Asgard: What Happens When Loki Breaks Free 2/5

Speakers: Enno Rey, Daniel Mende I personally remember the release of Yersinia at Black Hat Europe 2005. It was a ground breaking experience: a number of Layer 2 attacks regarded purely theoretical until then, was suddenly available in a mostly automated way. And those guys even showed so

From playlist BH USA 2010 - NETWORK

Video thumbnail

29C3: The future of protocol reversing and simulation applied on ZeroAccess botnet (EN)

Speakers: Frédéric Guihéry | Georges Bossert Mapping your enemy Botnet with Netzob Have you ever been staring for nights at binary or hexadecimal data flows extracted from an USB channel? Don't you remember yourself searching for some patterns and similarities in this fuc*g mess of zeros

From playlist 29C3: Not my department

Related pages

Mutually unbiased bases | Quantum key distribution