Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
281 results
IBM Quantum is committed to the responsible development of quantum computing, and is developing this technology guided by a ...
3,271 views
6 months ago
Bitcoin no es demasiado difícil de aprender, si tienes un gran maestro. ¡Por eso quieres aprender de los mejores, Andreas! En ...
317,782 views
4 years ago
Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ...
82,801 views
9 months ago
Shor's Algorithm for factoring integer numbers is the big threat to cryptography (RSA/ECC) as it reduces the complexity from ...
14,147 views
In this video, Prof. Aggelos Kiayias explains the research behind Ouroboros, the blockchain protocol underpinning Cardano, a top ...
33,918 views
6 years ago
Firmware and software binaries are littered with private keys, legitimate CA-blessed certificates, and encryption keys—but hardly ...
49,764 views
Have you ever wondered how you can access your family pictures on your home network-attached storage (NAS) device remotely ...
19,437 views
Ésta es la primera parte de una charla que tuvo lugar el 22 de febrero de 2017 en el pre-evento inaugural de Bloktex ...
448,524 views
7 years ago
Public transportation payment systems have undergone significant changes over the years. Recently, mobile payment solutions ...
20,116 views
Y la tremenda infraestructura que hace que el Internet funcione. De por sí es impresionante la logística que opera detrás de la ...
8,497 views
3 years ago
This talk covers tag-side attacks against NFC communication protocols, including cracking of Mifare encryption keys and ...
5,575 views
In December 2021, some ISPs in Russia started blocking Tor's website, along with protocol-level (DPI) and network-level (IP ...
62,779 views
1 year ago
In this lesson, I take a deep dive into the identity lifecycle, including identity creation, identification, authentication, authorization, ...
1,024 views
In recent years, the use of internet-connected devices has become more prevalent in the healthcare sector, particularly as a ...
1,734 views
Imagine a bank that, by design, made everyone's password hashes and balances public. No two-factor authentication, ...
61,140 views
8 years ago
The enigmatic privacy obsessive is fighting to keep the cypherpunk dream alive.
5,319 views
11 months ago
Presentado en Programa de Asociación de Innovación (IPP) de la Universidad Singularity,, esta es una charla de nivel de ...
1,126,229 views
We take a scenic tour through the origins of the UK train ticket, from the original BR specification in the 1980s through to modern ...
3,052 views
In this talk we will discuss the radio jailbreaking journey that enabled us to perform the first public disclosure and analysis of the ...
5,794 views
ECDSA is a widely used digital signature algorithm. ECDSA signatures can be found everywhere since they are public. In this talk ...
1,060 views