Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Quantum Cryptography in 6 Minutes

Автор: Up and Atom

Загружено: 2017-10-24

Просмотров: 111641

Описание:

Quantum Cryptography explained simply. Regular encryption is breakable, but not quantum cryptography. Today we'll look at the simplest case of quantum cryptography, quantum key distribution. It uses the Heisenberg Uncertainty Principle to prevent eavesdroppers from cracking the code.

Hi! I'm Jade. Subscribe to Up and Atom for new physics, math and computer science videos every week!

SUBSCRIBE TO UP AND ATOM    / upandatom  


Let's be friends :)
TWITTER: https://twitter.com/upndatom?lang=en

QUANTUM PLAYLIST
   • Quantum Physics  

SOURCES
http://gva.noekeon.org/QCandSKD/QCand...
https://www.sans.org/reading-room/whi...
https://science.howstuffworks.com/sci...
The Code Book - Simon Singh

MUSIC
Prelude No. 14 by Chris Zabriskie is licensed under a Creative Commons Attribution license (https://creativecommons.org/licenses/...)
Source: http://chriszabriskie.com/preludes/
Artist: http://chriszabriskie.com/

Quantum Cryptography in 6 Minutes

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

How Quantum Physics Helps Chameleons Find Love 💕

How Quantum Physics Helps Chameleons Find Love 💕

How Quantum Key Distribution Works (BB84 & E91)

How Quantum Key Distribution Works (BB84 & E91)

The Heisenberg Uncertainty Principle Explained Intuitively

The Heisenberg Uncertainty Principle Explained Intuitively

What is Quantum Cryptography?

What is Quantum Cryptography?

What is The Quantum Wave Function, Exactly?

What is The Quantum Wave Function, Exactly?

A beginner's guide to quantum computing | Shohini Ghose

A beginner's guide to quantum computing | Shohini Ghose

Post-quantum cryptography: Security after Shor’s algorithm

Post-quantum cryptography: Security after Shor’s algorithm

Quantum cryptography: The BB 84 protocol (U3-02-03)

Quantum cryptography: The BB 84 protocol (U3-02-03)

The next big leap in cryptography: NIST’s post-quantum cryptography standards

The next big leap in cryptography: NIST’s post-quantum cryptography standards

Why I Left Quantum Computing Research

Why I Left Quantum Computing Research

How Quantum Computers Break Encryption | Shor's Algorithm Explained

How Quantum Computers Break Encryption | Shor's Algorithm Explained

But what is quantum computing?  (Grover's Algorithm)

But what is quantum computing? (Grover's Algorithm)

Defeat the Quantum Menace: Protecting Data from Quantum Computers

Defeat the Quantum Menace: Protecting Data from Quantum Computers

What is Quantum Tunneling, Exactly?

What is Quantum Tunneling, Exactly?

Russell's Paradox - A Ripple in the Foundations of Mathematics

Russell's Paradox - A Ripple in the Foundations of Mathematics

Quantum Cryptography Explained

Quantum Cryptography Explained

Quantum cryptography explained

Quantum cryptography explained

There Are 100s of Massive Structures in Our Galaxy's Centre, And We Don't Know What They Are

There Are 100s of Massive Structures in Our Galaxy's Centre, And We Don't Know What They Are

What makes quantum computers SO powerful?

What makes quantum computers SO powerful?

Объяснение квантовой запутанности. Как она работает на самом деле?

Объяснение квантовой запутанности. Как она работает на самом деле?

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]