Quantum key distribution (QKD) protocols are used in quantum key distribution. The first protocol of that kind was BB84, introduced in 1984 by Charles H. Bennett and Gilles Brassard. After that, many other protocols have been defined. (Wikipedia).
Key Management & Distribution: Part 1
Fundamental concepts of Distribution of public & private keys are discussed. PKI and PKIX are analyzed. Digital certificates standards are presented
From playlist Network Security
Key Distribution - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
Network Security, Part 2 : Public Key Encryption
Fundamental concepts of public key encryption are discussed. RSA encryption method explained with an example. Confidentiality of message is presented.
From playlist Cryptography, Security
Cryptographic Hash Functions: Part 1
Cryptographic Hash Functions Applications of Crypto Hash Functions Birthday Problem Secure Hash Algorithm (SHA)
From playlist Network Security
Network Security: Classical Encryption Techniques
Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography
From playlist Network Security
Who Has The Best Quantum Computer?
This is a summary of all the main companies building quantum computers today, and what their most powerful machines are. You can get the digital image here: https://www.flickr.com/photos/95869671@N08/51849762629/in/dateposted-public/ But we can’t simply look at qubits counts because so man
From playlist Quantum Physics Videos - Domain of Science
Other Public Key Cryptosystems: Part 1
Fundamental concepts of Diffie-Hellman Key exchange are discussed. ElGamal Cryptosystem is presented. Elliptic curves are Analyzed.
From playlist Network Security
Quantum Cryptography in 6 Minutes
Quantum Cryptography explained simply. Regular encryption is breakable, but not quantum cryptography. Today we'll look at the simplest case of quantum cryptography, quantum key distribution. It uses the Heisenberg Uncertainty Principle to prevent eavesdroppers from cracking the code. Hi
From playlist Physics
True Randomness: Its Origin and Expansion - Yaoyun Shi
True Randomness: Its Origin and Expansion Yaoyun Shi University of Michigan April 21, 2014 How can we produce randomness of almost perfect quality, in large quantities, and under minimal assumptions? This question is fundamental not only to modern day information processing but also to phy
From playlist Mathematics
Public key cryptography - Diffie-Hellman Key Exchange (full version)
The history behind public key cryptography & the Diffie-Hellman key exchange algorithm. We also have a video on RSA here: https://www.youtube.com/watch?v=wXB-V_Keiu8
From playlist Cryptography, Security
Nexus Trimester - Stephanie Wehner (Delft University of Technology)
Device-independence in quantum cryptography Stephanie Wehner (Delft University of Technology) March 22, 2016 Abstract: While quantum cryptography offers interesting security guarantees, it is challenging to build good quantum devices. In practise, we will therefore typically rely on devi
From playlist Nexus Trimester - 2016 - Secrecy and Privacy Theme
Capacity Approaching Coding for Low Noise (...) - D. Touchette - Main Conference - CEB T3 2017
Dave Touchette (Waterloo) / 12.12.2017 Title: Capacity Approaching Coding for Low Noise Interactive Quantum Communication Abstract: We consider the problem of implementing two-party interactive quantum communication over noisy channels, a necessary endeavor if we wish to fully reap quan
From playlist 2017 - T3 - Analysis in Quantum Information Theory - CEB Trimester
M.K. Lords interviews Andreas Antonopoulos
I'll be speaking with security expert Andreas Antonopoulos about bitcoin and other topics. There were some connection issues that we worked through, but other than that it was very informative. Follow him on Twitter at @aantonop.
From playlist Interviews and Shows
Anne Broadbent - Information-Theoretic Quantum Cryptography Part 1 of 2 - IPAM at UCLA
Recorded 27 July 2022. Anne Broadbent of the University of Ottawa presents "Information-Theoretic Quantum Cryptography" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: These lectures are an introduction to the interplay between quantum information and cryp
From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography
Anne Broadbent - Information-Theoretic Quantum Cryptography Part 2 of 2 - IPAM at UCLA
Recorded 27 July 2022. Anne Broadbent of the University of Ottawa presents "Information-Theoretic Quantum Cryptography" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: These lectures are an introduction to the interplay between quantum information and cryp
From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography
GET NORDVPN: https://nordvpn.org/sabine USE COUPON CODE: sabine USE THE CODE SO YOU CAN GET 68% off 2-year plan + 1 additional month FREE. You can learn more about NordVPN on their YouTube channel: https://www.youtube.com/channel/UCSZhRxyloC-qzURiOa3vbFQ Note: At 7 min 52 secs "vertical
From playlist Physics
The information cost of quantum memoryless protocols - M. Lauriere - Main Conference - CEB T3 2017
Mathieu Lauriere (NYU Shanghai) / 12.12.2017 Title: The information cost of quantum memoryless protocols Abstract: In this talk, we will consider memoryless quantum communication protocols, where the two parties do not possess any memory besides their classical input and they take turns
From playlist 2017 - T3 - Analysis in Quantum Information Theory - CEB Trimester
24C3: Quantum Cryptography and Possible Attacks
Speakers: Alexander Ling, Antia Lamas, Ilja Gerhardt, Christian Kurtsiefer Quantum cryptography is the oldest and best developed application of the field of quantum information science. Although it is frequently perceived as an encryption method, it is really a scheme to securely distri
From playlist 24C3: Full steam ahead
Pseudorandom Number Generation and Stream Ciphers
Fundamental concepts of Pseudorandom Number Generation are discussed. Pseudorandom Number Generation using a Block Cipher is explained. Stream Cipher & RC4 are presented.
From playlist Network Security
Non-equilibrium dynamics of closed quantum systems: a tale of two stories
Discussion Meeting: Quantum entanglement in macroscopic matter URL: http://www.icts.res.in/discussion_meeting/QEM2015/ Dates: Monday 12 Jan, 2015 - Friday 16 Jan, 2015 Description: Condensed matter systems display a wide variety of interesting low temperature phases that are the product
From playlist Discussion Meeting: Quantum entanglement in macroscopic matter