Computerphile

Videos from Computerphile

Page 2 of 4 • 83 total videos

Feistel Cipher - Computerphile
7:31

Feistel Cipher - Computerphile

Computerphile
265.0K views
Regular Expressions - Computerphile
17:19

Regular Expressions - Computerphile

Computerphile
262.8K views
AES Explained (Advanced Encryption Standard) - Computerphile
14:14

AES Explained (Advanced Encryption Standard) - Computerphile

Computerphile
1.4M views
One Encryption Standard to Rule Them All! - Computerphile
9:11

One Encryption Standard to Rule Them All! - Computerphile

Computerphile
443.4K views
Almost All Web Encryption Works Like This (SP Networks) - Computerphile
12:19

Almost All Web Encryption Works Like This (SP Networks) - Computerphile

Computerphile
247.5K views
Data Analysis 0: Introduction to Data Analysis - Computerphile
14:08

Data Analysis 0: Introduction to Data Analysis - Computerphile

Computerphile
279.5K views
Understanding Dynamic Data - Computerphile
17:25

Understanding Dynamic Data - Computerphile

Computerphile
83.7K views
Understanding Big Data: An Explanation by Rebecca Tickle
11:53

Understanding Big Data: An Explanation by Rebecca Tickle

Computerphile
218.9K views
How Password Managers Work - Computerphile
12:09

How Password Managers Work - Computerphile

Computerphile
491.9K views
MapReduce - Computerphile
6:41

MapReduce - Computerphile

Computerphile
276.7K views
Double Ratchet Messaging Encryption - Computerphile
11:39

Double Ratchet Messaging Encryption - Computerphile

Computerphile
172.8K views
How Signal Instant Messaging Protocol Works (& WhatsApp etc) - Computerphile
9:44

How Signal Instant Messaging Protocol Works (& WhatsApp etc) - Computerphile

Computerphile
521.1K views
The Importance of Colossus in Codebreaking: Insights from Bill Tutte
8:06

The Importance of Colossus in Codebreaking: Insights from Bill Tutte

Computerphile
99.4K views
Exploiting the Tiltman Break - Computerphile
25:33

Exploiting the Tiltman Break - Computerphile

Computerphile
310.6K views
Understanding the Elliptic Curve Back Door with Dr. Mike Pound
12:24

Understanding the Elliptic Curve Back Door with Dr. Mike Pound

Computerphile
538.5K views
Elliptic Curves - Computerphile
8:42

Elliptic Curves - Computerphile

Computerphile
605.9K views
Key Exchange Problems - Computerphile
9:18

Key Exchange Problems - Computerphile

Computerphile
377.0K views
Diffie Hellman -the Mathematics bit- Computerphile
7:05

Diffie Hellman -the Mathematics bit- Computerphile

Computerphile
545.8K views
Secret Key Exchange (Diffie-Hellman) - Computerphile
8:40

Secret Key Exchange (Diffie-Hellman) - Computerphile

Computerphile
1.1M views
Zero Knowledge Proofs - Computerphile
9:39

Zero Knowledge Proofs - Computerphile

Computerphile
227.3K views
Securing Stream Ciphers (HMAC) - Computerphile
9:24

Securing Stream Ciphers (HMAC) - Computerphile

Computerphile
326.5K views
Essentials: Functional Programming's Y Combinator - Computerphile
13:26

Essentials: Functional Programming's Y Combinator - Computerphile

Computerphile
340.0K views
How WanaCrypt Encrypts Your Files - Computerphile
17:22

How WanaCrypt Encrypts Your Files - Computerphile

Computerphile
371.3K views
SHA: Secure Hashing Algorithm - Computerphile
10:21

SHA: Secure Hashing Algorithm - Computerphile

Computerphile
1.3M views