CRYPTO AND PRIVACY VILLAGE - Integrating post-quantum crypto into real-life applications
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 322 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/39860 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | |
Genre |
00:00
QuantumCryptographyFingerprintQuantum cryptographyQuantumCryptographyComputer fontReal numberProjective planeCartesian coordinate systemInformation privacySelf-organizationVideo gameGroup actionComputer animation
00:47
QuantumSurface of revolutionQuantumINTEGRALYouTubeWordQuantum computerSurface of revolutionMultiplication signStudent's t-testBit
01:35
QuantumSurface of revolutionStack (abstract data type)Software development kitSoftware developerPhysical systemTraffic reportingCryptographyQuantumKey (cryptography)BitResultantDistribution (mathematics)QubitMultiplication signQuantum cryptographyInformation privacyQuantum computerSlide ruleTrailProcess (computing)Programming languageStudent's t-testLink (knot theory)Visualization (computer graphics)NeuroinformatikComputer animation
03:33
PhysicsPhysical lawComputerQuantumMaxima and minimaClassical physicsQubitSuperposition principleState of matterParallel computingMeasurementAlgorithmSpacetimeResultantPattern languagePoint (geometry)NeuroinformatikPhysicalismSocial classDifferent (Kate Ryan album)Multiplication signCategory of beingQuantumBitSuperposition principleParallel portComputer-assisted translationDoubling the cubeArithmetic mean1 (number)Physical lawAlgorithmCausalityMaizeFerry CorstenQuantum mechanicsDisk read-and-write headState of matterAlpha (investment)Virtual machineSemiconductor memoryQubitQuantum computerQuantum entanglementParticle systemDoppelspaltSpacetimeWaveRandomizationFunction (mathematics)Dependent and independent variablesBeta functionDistanceClassical physics
07:18
PhysicsPhysical lawComputerClassical physicsQuantumSuperposition principleQubitState of matterMeasurementSpacetimeParallel computingAlgorithmAuto mechanicPhysicistNeuroinformatikSocial classAlgorithmBlack boxTelecommunicationComputer scienceOrientation (vector space)Image resolutionQuicksortVirtual machineQuantum mechanicsQuantum computerCategory of beingStability theoryComputer animation
07:58
QuantumQuantum computerField (computer science)CryptographyField (computer science)AlgorithmOptimization problemInformation securityCryptographyVirtual machineBitQuantum computerQuantumComputer animation
08:34
QuantumField (computer science)Quantum computerCryptographyPolynomialFrequencyReduction of orderElliptic curveAlgorithmCryptographyFrequencyInternetworkingPublic-key cryptographyNumberVarianceComputer animation
09:17
QuantumQuantum computerField (computer science)CryptographyFunction (mathematics)Inversion (music)DatabaseHash functionSymmetric matrixPolynomialBlock (periodic table)FrequencyAlgorithmInverse functionDatabaseForcing (mathematics)Key (cryptography)DivisorHash functionBlock (periodic table)EncryptionSquare numberRootComputer animation
10:07
DivisorHill differential equationAlgorithmEstimatorNeuroinformatikQuantum computerKey (cryptography)Distribution (mathematics)CryptographyInformation securityArithmetic meanField (computer science)Different (Kate Ryan album)QuantumNumberExterior algebraDiagramMechanism design2 (number)Observational studyBitQuantum cryptographyRSA (algorithm)Projective planeQuantum mechanicsComputer animation
12:45
QuantumService (economics)Public-key infrastructureStandard deviationIcosahedronHybrid computerQuantum cryptographyFunctional (mathematics)AlgorithmHybrid computerMultiplication signQuantum computerInternetworkingSoftwareConfiguration spaceWeightMalwareQuicksortCollisionAsynchronous Transfer ModeClassical physicsCryptographyStack (abstract data type)ChainStandard deviationActive contour modelEncryption
14:42
Graphical user interfaceStandard deviationProcess (computing)Quantum cryptographyNumbering schemeEncryptionLevel (video gaming)Electronic signatureMultilaterationNational Institute of Standards and TechnologyCryptographyStandard deviationElectronic signatureRevision controlMechanism designLevel (video gaming)QuantumSystem callLink (knot theory)Cartesian coordinate systemEncryptionNumbering schemeEncapsulation (object-oriented programming)Information securityKey (cryptography)Multiplication signAlgorithm
16:06
FamilyError messageSystem programmingLattice (group)Revision controlCodeMultivariate AnalyseHash functionPolynomialCurveEllipseCASE <Informatik>Automatic differentiationRing (mathematics)Category of beingNichtlineares GleichungssystemFunctional (mathematics)Numbering schemeRevision controlPhysical systemWeb pageElectronic signatureNetwork topologyFamily1 (number)Algorithm2 (number)List of unsolved problems in mathematicsField (computer science)DivisorVideo GeniePublic-key cryptographyMultiplication signError messageCodeNational Institute of Standards and TechnologyCryptosystemStress (mechanics)CodeStandard deviationInformation securityType theoryLattice (group)WebsiteCryptographyExterior algebraQuantum computerKey (cryptography)PolynomialSymmetric-key algorithmComputer clusterProof theoryCausalityIsogenieMathematicsComputer animation
20:08
EncryptionTwin primeElectronic signatureCurveAlgorithmic information theoryProof theoryKeilförmige AnordnungError messageCodeLattice (group)FamilyResultantMathematicianNational Institute of Standards and TechnologyRing (mathematics)Multiplication signDifferent (Kate Ryan album)Cartesian coordinate systemCollaborationismINTEGRALKey (cryptography)Electronic signatureSlide ruleMultiplicationBitNumbering schemeOpen sourcePublic-key cryptographyError messageOpen setVideo gameTransport Layer SecuritySelf-organizationCausalityReal numberComputer animation
22:30
DisintegrationOpen setLogarithmMenu (computing)Multiplication signBranch (computer science)Numbering schemeCore dumpLink (knot theory)Projective planeCodeRandom number generationOpen setINTEGRALSoftware frameworkTransport Layer SecurityAlgorithmConstructor (object-oriented programming)Cartesian coordinate systemQuantumPrototypeElectronic signatureBitFeedbackNational Institute of Standards and Technology
24:30
DisintegrationTransport Layer SecurityAuthenticationElectronic signatureHybrid computerIcosahedronLimit (category theory)Suite (music)EncryptionPointer (computer programming)General linear modelCue sportsTransport Layer SecurityElectronic signatureAsynchronous Transfer ModeProjective planeAuthenticationGreatest elementCryptographyEncryptionLevel (video gaming)Fitness functionSuite (music)FeedbackBranch (computer science)Functional (mathematics)QuantumPublic key certificateResultantNumbering schemeOpen setBitAlgorithmMathematicsNational Institute of Standards and TechnologyDerivation (linguistics)Multiplication signKey (cryptography)INTEGRALPoint (geometry)SchlüsselverteilungSlide rulePhishingHybrid computerComputer animation
27:21
Client (computing)Server (computing)MeasurementTransport Layer SecurityComputer networkWeb pageDisintegrationCodeINTEGRALLine (geometry)Ring (mathematics)Real numberCurveMultiplication signNumerical integrationFinite-state machineCommunications protocolQuantum computerAlgorithmPoint (geometry)Video gameComputer configurationWikiTransport Layer SecurityElliptic curveAsynchronous Transfer ModeInformationDiagramSimilarity (geometry)Key (cryptography)Server (computing)QuantumTwitterSet (mathematics)Shared memoryOpen setCryptographyComputer wormElectronic signatureMultiplicationWeb pageMechanism designWeb 2.0Branch (computer science)InjektivitätNormal (geometry)Error messageNumberSoftware testingDifferent (Kate Ryan album)PrototypeExtension (kinesiology)Information securityHybrid computerWebsite1 (number)Beta functionNational Institute of Standards and TechnologyLattice (group)Greatest elementGene cluster
32:19
Transport Layer SecurityDemo (music)Numbering schemeHybrid computerVirtual machineClassical physicsElectronic signaturePublic-key infrastructureExtension (kinesiology)Demo (music)Multiplication signPresentation of a groupDerivation (linguistics)Key (cryptography)Library (computing)AlgorithmBitResultantSchlüsselverteilungNumbering schemeHybrid computerQuantumQuantum computerMechanism designImplementationPublic key certificateExtension (kinesiology)Electronic signatureValidity (statistics)CodeAuthenticationCompilation albumMeasurementSeries (mathematics)Graph coloringShared memoryNumberLattice (group)INTEGRALPublic-key cryptographyGoodness of fitMultivariate AnalyseGame theoryDifferent (Kate Ryan album)Neuroinformatik
35:12
Transport Layer SecurityMeasurementComputer networkSocial classRevision controlClient (computing)SurfaceServer (computing)Ring (mathematics)Software testingPhysical lawBitNumbering schemeType theoryLattice (group)Electronic signatureElliptic curveVirtual machineField (computer science)Figurate numberHash functionCommunications protocolDrop (liquid)Local ring
36:42
DisintegrationAsynchronous Transfer ModeHybrid computerINTEGRALElectronic signatureSchlüsselverteilungQuantumAsynchronous Transfer ModeCryptographySoftwareCommunications protocolHybrid computerSimilarity (geometry)MereologyOpen setMultiplication signBitAlgorithmMusical ensemble1 (number)
37:38
DisintegrationPoint cloudClient (computing)Open setNumerical integrationInformation securityPublic key certificateTransport Layer SecurityMultiplication signSchlüsselverteilungPoint (geometry)Set (mathematics)Projective planeQuantumCartesian coordinate systemINTEGRALSoftwareCentralizer and normalizerWeb serviceClient (computing)Web pageQuantum computerWindow
39:25
Information securityServer (computing)Local area networkDisintegrationImplementationDecision tree learningRSA (algorithm)Library (computing)Computer hardwareBitCryptographyControl flowNational Institute of Standards and TechnologyPoint (geometry)SoftwareProjective planePublic key certificateImplementationQuantumStack (abstract data type)RootAlgorithmOpen setQuantum cryptographyComputer animation
40:43
Service (economics)EmpennageHand fanHybrid computerAlgorithmCategory of beingProof theoryDemo (music)BitSoftwareFeedbackCartesian coordinate systemQuantumCryptographyQuantum computerHybrid computerControl flowComputer animation
42:01
Real numberWeb 2.0Open setServer (computing)TunisPublic key certificateTransport Layer SecurityStandard deviationMultiplication signCodeKey (cryptography)Software testingComputer animation
42:56
AlgorithmTouchscreenCryptographyNumbering schemeKey (cryptography)Lattice (group)Server (computing)Video game consoleAuthenticationDatabase transactionQuantumQuantum computerClient (computing)Public key certificateWeb pageConfiguration spaceDefault (computer science)Asynchronous Transfer ModeConnected spaceDirectory servicePasswordCurveTelecommunicationSystem callSchlüsselverteilungHybrid computerCommunications protocolWeb 2.0Line (geometry)Transport Layer SecurityElectronic signatureComputer animation
46:29
Service (economics)EmpennageComputer animation
Transcript: English(auto-generated)