• ClipSaver
ClipSaver
Русские видео
  • Смешные видео
  • Приколы
  • Обзоры
  • Новости
  • Тесты
  • Спорт
  • Любовь
  • Музыка
  • Разное
Сейчас в тренде
  • Фейгин лайф
  • Три кота
  • Самвел адамян
  • А4 ютуб
  • скачать бит
  • гитара с нуля
Иностранные видео
  • Funny Babies
  • Funny Sports
  • Funny Animals
  • Funny Pranks
  • Funny Magic
  • Funny Vines
  • Funny Virals
  • Funny K-Pop

Exposing Why Quantum Computers Are Already A Threat скачать в хорошем качестве

Exposing Why Quantum Computers Are Already A Threat 2 years ago

veritasium

science

physics

quantum computing

willow

google

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Exposing Why Quantum Computers Are Already A Threat
  • Поделиться ВК
  • Поделиться в ОК
  •  
  •  


Скачать видео с ютуб по ссылке или смотреть без блокировок на сайте: Exposing Why Quantum Computers Are Already A Threat в качестве 4k

У нас вы можете посмотреть бесплатно Exposing Why Quantum Computers Are Already A Threat или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:

  • Информация по загрузке:

Скачать mp3 с ютуба отдельным файлом. Бесплатный рингтон Exposing Why Quantum Computers Are Already A Threat в формате MP3:


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса ClipSaver.ru



Exposing Why Quantum Computers Are Already A Threat

A quantum computer in the next decade could crack the encryption our society relies on using Shor's Algorithm. Head to https://brilliant.org/veritasium to start your free 30-day trial, and the first 200 people get 20% off an annual premium subscription. The topic is especially relevant in the wake of Willow, the quantum computing chip unveiled by Google in December 2024. #quantumcomputing ▀▀▀ A huge thank you to those who helped us understand this complex field and ensure we told this story accurately - Dr. Lorenz Panny, Prof. Serge Fehr, Dr. Dustin Moody, Prof. Benne de Weger, Prof. Tanja Lange, PhD candidate Jelle Vos, Gorjan Alagic, and Jack Hidary. A huge thanks to those who helped us with the math behind Shor’s algorithm - Prof. David Elkouss, Javier Pagan Lacambra, Marc Serra Peralta, and Daniel Bedialauneta Rodriguez. ▀▀▀ References: Joseph, D., et al. (2022). Transitioning organizations to post-quantum cryptography. Nature, 605(7909), 237-243. - https://ve42.co/Joseph2022 Bernstein, D. J., & Lange, T. (2017). Post-quantum cryptography. Nature, 549(7671), 188-194. - https://ve42.co/Bernstein2017 An Insight, An Idea with Sundar Pichai - Quantum Computing, Wold Economic Forum via YouTube - https://ve42.co/QCWEFyt Migrating to Post-Quantum Cryptography, The White House - https://ve42.co/PQCWhiteHouse Kotas, W. A. (2000). A brief history of cryptography. University of Tennessee - https://ve42.co/Kotas2000 Hellman, M. (1976). New directions in cryptography. IEEE transactions on Information Theory, 22(6), 644-654. - https://ve42.co/Hellman1976 Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126. - https://ve42.co/Rivest1978 Kak, A. (2023). Lecture 12: Public-Key Cryptography and the RSA Algorithm - https://ve42.co/Kak2023 Calderbank, M. (2007). The RSA Cryptosystem: History, Algorithm, Primes. University of Chicago. - https://ve42.co/Calderbank2007 Cryptographic Key Length Recommendation, Keylength - https://ve42.co/KeyLength Coppersmith, D. (2002). An approximate Fourier transform useful in quantum factoring. arXiv preprint quant-ph/0201067. - https://ve42.co/Coppersmith2002 Quantum Fourier Transform, Qiskit - https://ve42.co/Qiskit Shor, P. W. (1994, November). Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings 35th annual symposium on foundations of computer science (pp. 124-134). IEEE. - https://ve42.co/Shor1994 Shor’s algorithm, Wikipedia - https://ve42.co/ShorWiki Euler’s totient function, Wikipedia - https://ve42.co/EulerWiki Asfaw, A. (2020). Shor’s Algorithm Lecture Series, Qiskit Summer School - https://ve42.co/ShorYT How Quantum Computers Break Encryption, minutephysics via YouTube - https://ve42.co/PQCmpyt Breaking RSA Encryption - an Update on the State-of-the-Art, QuintessenceLabs - https://ve42.co/QuintessenceLabs O'Gorman, J., & Campbell, E. T. (2017). Quantum computation with realistic magic-state factories. Physical Review A, 95(3), 032338. - https://ve42.co/OGorman2017 Gidney, C., & Ekerå, M. (2021). How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits. Quantum, 5, 433. - https://ve42.co/Gidney2021 2021 Quantum Threat Timeline Report, Global Risk Institute - https://ve42.co/QuantumRisk The IBM Quantum Development Roadmap, IBM - https://ve42.co/IBMQC Post-Quantum Cryptography, Computer Security Resource Center (NIST) - https://ve42.co/CSRCPQC Alagic, G., et al. (2022). Status report on the third round of the NIST post-quantum cryptography standardization process. US Department of Commerce, NIST. - https://ve42.co/Alagic2022 Thijs, L. (2015). Lattice cryptography and lattice cryptanalysis - https://ve42.co/Thijs2015 ▀▀▀ Special thanks to our Patreon supporters: Tj Steyn, Meg Noah, Bernard McGee, KeyWestr, Elliot Miller, Jerome Barakos, M.D., Amadeo Bee, TTST, Balkrishna Heroor, Chris LaClair, John H. Austin, Jr., Eric Sexton, john kiehl, Anton Ragin, Diffbot, Gnare, Dave Kircher, Burt Humburg, Blake Byers, Evgeny Skvortsov, Meekay, Bill Linder, Paul Peijzel, Josh Hibschman, Mac Malkawi, Juan Benet, Ubiquity Ventures, Richard Sundvall, Lee Redden, Stephen Wilcox, Marinus Kuivenhoven, Michael Krugman, Cy 'kkm' K'Nelson, Sam Lutfi. ▀▀▀ Written by Casper Mebius & Derek Muller Edited by Trenton Oliver Filmed by Raquel Nuno Animated by Ivy Tello & Mike Radjabov Additional video/photos supplied by Getty Images & Pond5 Music from Epidemic Sound & Jonny Hyman Produced by Derek Muller, Petr Lebedev, & Emily Zhang

Comments
  • Why no two people see the same rainbow 7 months ago
    Why no two people see the same rainbow
    Опубликовано: 7 months ago
    7568479
  • Future Computers Will Be Radically Different (Analog Computing) 3 years ago
    Future Computers Will Be Radically Different (Analog Computing)
    Опубликовано: 3 years ago
    12423787
  • How did they actually take this picture? (Very Long Baseline Interferometry) 3 years ago
    How did they actually take this picture? (Very Long Baseline Interferometry)
    Опубликовано: 3 years ago
    6932411
  • Квантовые компьютеры УЖЕ ломают интернет [Veritasium] 2 years ago
    Квантовые компьютеры УЖЕ ломают интернет [Veritasium]
    Опубликовано: 2 years ago
    1001585
  • Why The First Computers Were Made Out Of Light Bulbs 2 years ago
    Why The First Computers Were Made Out Of Light Bulbs
    Опубликовано: 2 years ago
    7034910
  • The Most Misunderstood Concept in Physics 2 years ago
    The Most Misunderstood Concept in Physics
    Опубликовано: 2 years ago
    23111090
  • The Universe is Hostile to Computers 3 years ago
    The Universe is Hostile to Computers
    Опубликовано: 3 years ago
    24199208
  • The Closest We’ve Come to a Theory of Everything 8 months ago
    The Closest We’ve Come to a Theory of Everything
    Опубликовано: 8 months ago
    13105664
  • V1a: Post-quantum cryptography (Kyber and Dilithium short course) 10 months ago
    V1a: Post-quantum cryptography (Kyber and Dilithium short course)
    Опубликовано: 10 months ago
    12296
  • Deep Dive into LLMs like ChatGPT 4 months ago
    Deep Dive into LLMs like ChatGPT
    Опубликовано: 4 months ago
    2876842

Контактный email для правообладателей: [email protected] © 2017 - 2025

Отказ от ответственности - Disclaimer Правообладателям - DMCA Условия использования сайта - TOS



Карта сайта 1 Карта сайта 2 Карта сайта 3 Карта сайта 4 Карта сайта 5