Quantum cryptography

List of quantum key distribution protocols

Quantum key distribution (QKD) protocols are used in quantum key distribution. The first protocol of that kind was BB84, introduced in 1984 by Charles H. Bennett and Gilles Brassard. After that, many other protocols have been defined. (Wikipedia).

Video thumbnail

Key Management & Distribution: Part 1

Fundamental concepts of Distribution of public & private keys are discussed. PKI and PKIX are analyzed. Digital certificates standards are presented

From playlist Network Security

Video thumbnail

Key Distribution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Network Security, Part 2 : Public Key Encryption

Fundamental concepts of public key encryption are discussed. RSA encryption method explained with an example. Confidentiality of message is presented.

From playlist Cryptography, Security

Video thumbnail

Cryptographic Hash Functions: Part 1

Cryptographic Hash Functions Applications of Crypto Hash Functions Birthday Problem Secure Hash Algorithm (SHA)

From playlist Network Security

Video thumbnail

Network Security: Classical Encryption Techniques

Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography

From playlist Network Security

Video thumbnail

Who Has The Best Quantum Computer?

This is a summary of all the main companies building quantum computers today, and what their most powerful machines are. You can get the digital image here: https://www.flickr.com/photos/95869671@N08/51849762629/in/dateposted-public/ But we can’t simply look at qubits counts because so man

From playlist Quantum Physics Videos - Domain of Science

Video thumbnail

Other Public Key Cryptosystems: Part 1

Fundamental concepts of Diffie-Hellman Key exchange are discussed. ElGamal Cryptosystem is presented. Elliptic curves are Analyzed.

From playlist Network Security

Video thumbnail

Quantum Cryptography in 6 Minutes

Quantum Cryptography explained simply. Regular encryption is breakable, but not quantum cryptography. Today we'll look at the simplest case of quantum cryptography, quantum key distribution. It uses the Heisenberg Uncertainty Principle to prevent eavesdroppers from cracking the code. Hi

From playlist Physics

Video thumbnail

True Randomness: Its Origin and Expansion - Yaoyun Shi

True Randomness: Its Origin and Expansion Yaoyun Shi University of Michigan April 21, 2014 How can we produce randomness of almost perfect quality, in large quantities, and under minimal assumptions? This question is fundamental not only to modern day information processing but also to phy

From playlist Mathematics

Video thumbnail

Public key cryptography - Diffie-Hellman Key Exchange (full version)

The history behind public key cryptography & the Diffie-Hellman key exchange algorithm. We also have a video on RSA here: https://www.youtube.com/watch?v=wXB-V_Keiu8

From playlist Cryptography, Security

Video thumbnail

Nexus Trimester - Stephanie Wehner (Delft University of Technology)

Device-independence in quantum cryptography Stephanie Wehner (Delft University of Technology) March 22, 2016 Abstract: While quantum cryptography offers interesting security guarantees, it is challenging to build good quantum devices. In practise, we will therefore typically rely on devi

From playlist Nexus Trimester - 2016 - Secrecy and Privacy Theme

Video thumbnail

Capacity Approaching Coding for Low Noise (...) - D. Touchette - Main Conference - CEB T3 2017

Dave Touchette (Waterloo) / 12.12.2017 Title: Capacity Approaching Coding for Low Noise Interactive Quantum Communication Abstract: We consider the problem of implementing two-party interactive quantum communication over noisy channels, a necessary endeavor if we wish to fully reap quan

From playlist 2017 - T3 - Analysis in Quantum Information Theory - CEB Trimester

Video thumbnail

M.K. Lords interviews Andreas Antonopoulos

I'll be speaking with security expert Andreas Antonopoulos about bitcoin and other topics. There were some connection issues that we worked through, but other than that it was very informative. Follow him on Twitter at @aantonop.

From playlist Interviews and Shows

Video thumbnail

Anne Broadbent - Information-Theoretic Quantum Cryptography Part 1 of 2 - IPAM at UCLA

Recorded 27 July 2022. Anne Broadbent of the University of Ottawa presents "Information-Theoretic Quantum Cryptography" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: These lectures are an introduction to the interplay between quantum information and cryp

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

Anne Broadbent - Information-Theoretic Quantum Cryptography Part 2 of 2 - IPAM at UCLA

Recorded 27 July 2022. Anne Broadbent of the University of Ottawa presents "Information-Theoretic Quantum Cryptography" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: These lectures are an introduction to the interplay between quantum information and cryp

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

What is Quantum Cryptography?

GET NORDVPN: https://nordvpn.org/sabine USE COUPON CODE: sabine USE THE CODE SO YOU CAN GET 68% off 2-year plan + 1 additional month FREE. You can learn more about NordVPN on their YouTube channel: https://www.youtube.com/channel/UCSZhRxyloC-qzURiOa3vbFQ Note: At 7 min 52 secs "vertical

From playlist Physics

Video thumbnail

The information cost of quantum memoryless protocols - M. Lauriere - Main Conference - CEB T3 2017

Mathieu Lauriere (NYU Shanghai) / 12.12.2017 Title: The information cost of quantum memoryless protocols Abstract: In this talk, we will consider memoryless quantum communication protocols, where the two parties do not possess any memory besides their classical input and they take turns

From playlist 2017 - T3 - Analysis in Quantum Information Theory - CEB Trimester

Video thumbnail

24C3: Quantum Cryptography and Possible Attacks

Speakers: Alexander Ling, Antia Lamas, Ilja Gerhardt, Christian Kurtsiefer Quantum cryptography is the oldest and best developed application of the field of quantum information science. Although it is frequently perceived as an encryption method, it is really a scheme to securely distri

From playlist 24C3: Full steam ahead

Video thumbnail

Pseudorandom Number Generation and Stream Ciphers

Fundamental concepts of Pseudorandom Number Generation are discussed. Pseudorandom Number Generation using a Block Cipher is explained. Stream Cipher & RC4 are presented.

From playlist Network Security

Video thumbnail

Non-equilibrium dynamics of closed quantum systems: a tale of two stories

Discussion Meeting: Quantum entanglement in macroscopic matter URL: http://www.icts.res.in/discussion_meeting/QEM2015/ Dates: Monday 12 Jan, 2015 - Friday 16 Jan, 2015 Description: Condensed matter systems display a wide variety of interesting low temperature phases that are the product

From playlist Discussion Meeting: Quantum entanglement in macroscopic matter

Related pages

BB84 | MSZ96 | SARG04 | Three-stage quantum cryptography protocol | Quantum key distribution | BBM92 protocol | KMB09 protocol