All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
Endomorphisms, isogeny graphs, and moduli
Oct 24, 2010
Microsoft
52:22
(Post-Quantum) Isogeny Cryptography
Jan 4, 2020
ccc.de
Hard problems for isogeny-based cryptography
Mar 31, 2022
univ-lille.fr
Efficient Algorithms for Supersingular Isogeny Diffie Hell
…
Feb 24, 2017
Microsoft
IP07: Supersingular Isogeny Graphs in Cryptography
May 5, 2020
Microsoft
1:01
Royal Travels makes visa applications simple and hassle-fre
…
2.1B views
4 months ago
Facebook
Arvinder Singh
1:07:50
The Isogeny Club #7.1 Large smooth twins from short lattice vectors
5 months ago
YouTube
The Isogeny Club
53:12
PQC (Isogeny Signatures) (CHES 2025)
29 views
2 months ago
YouTube
IACR
1:16:23
The Isogeny Club #7.3 On the security of SQIsign and the Algebr
…
102 views
4 months ago
YouTube
The Isogeny Club
1:05:22
Wouter Castryck, An efficient key recovery attack on supersingular i
…
5 views
1 month ago
bilibili
热爱数学的小渣渣
23:46
Computing newforms using supersingular isogeny graphs
99 views
1 month ago
bilibili
热爱数学的小渣渣
1:02:44
Steven Galbraith, Isogeny graphs, computational problems, and appl
…
18 views
1 month ago
bilibili
热爱数学的小渣渣
19090105
Aug 25, 2021
pirsa.org
5:08
CADWorx-ISOGEN
37.1K views
Dec 3, 2014
YouTube
CAD Corner
Are Isogenies for Real
2.1K views
Jan 12, 2021
YouTube
Luca De Feo
clip-1052138509-two-medical-scientist-working-laboratory--young
May 10, 2020
shutterstock
Isogeny-basd cryptography III - Isogenies
1.6K views
Mar 10, 2021
YouTube
Tanja Lange: Post-quantum cryptography
8:12
Exponential Application
43K views
Nov 8, 2011
YouTube
Khan Academy
11:29
Elliptic Curve Cryptography Overview
529.8K views
Oct 14, 2015
YouTube
F5 DevCentral Community
1:37
video
20 views
Sep 19, 2018
Vimeo
synergyfinder
4:24
Real life applications of trigonometry
342.8K views
Oct 19, 2014
YouTube
Tech Lover
52:07
Lecture 1 | The Fourier Transforms and its Applications
1.4M views
Jul 3, 2008
YouTube
Stanford
2:58
Tai Chi Taiji Application for Self-defense in Form 24
197.3K views
Nov 6, 2007
YouTube
Jesse Tsao Tai Chi
1:45
Rizzoli & Isles - Season 4 Photoshoot (Behind The Scenes)
68.2K views
May 9, 2013
YouTube
Rizzoli & Isles Brasil
2:30
[ What Is A Superconductor ] - Application of Superconductors
100.8K views
Jul 10, 2013
YouTube
SHArPEdgeGlobal
1:08:49
Post-quantum cryptography: Supersingular isogenies for begin
…
7.8K views
May 24, 2021
YouTube
Microsoft Research
5:53
Example 4: Applying the quadratic formula | Quadratic equations | Al
…
533.9K views
Jul 13, 2011
YouTube
Khan Academy
45:50
Private AI: Machine Learning on Encrypted Data - Kristin Lauter, Mi
…
3.7K views
Mar 26, 2020
YouTube
SAIConference
20:32
Introduction to the Post-Quantum Supersingular Isogeny Diffie-Hell
…
7.2K views
Sep 12, 2016
YouTube
David Urbanik
4:33
ABB Robotics - 10 most popular applications for robots
315.8K views
Jul 7, 2010
YouTube
ABB Robotics
See more videos
More like this
Feedback