15:09
CPUs Are Out of Order - Computerphile
by Computerph...
2 days ago ∗ Views: 71,547
Spectre and Meltdown showed up holes in the hardware implementation of CPUs, but what exactly are the exploits targetting? Dr Bagley dives into the de...
08:42
Elliptic Curves - Computerphile
by Computerph...
5 days ago ∗ Views: 66,878
Just what are elliptic curves and why use a graph shape in cryptography? Dr Mike Pound explains. Mike's myriad Diffie-Hellman videos: https://www.yout...
04:38
Compaq Portable (Halt & Catch Fire) - Computerphile
by Computerph...
1 week ago ∗ Views: 33,539
The Compaq portable was the first IBM compatible machine and its creation inspired the AMC TV Show "Halt and Catch Fire." See more of the Centre for C...
32:01
The Archive (Centre For Computing History) - Computerphile
by Computerph...
2 weeks ago ∗ Views: 32,318
A rare chance to look at the archives behind the Centre for Computing History (this is probably ten videos in one!) - thanks to Museum director Jason ...
13:45
Spectre & Meltdown - Computerphile
by Computerph...
2 weeks ago ∗ Views: 226,046
Spectre refers to a whole family of potential weaknesses of which Meltdown is just one. Dr Steve Bagley talks about CPU hardware design flaws on an un...
09:18
Key Exchange Problems - Computerphile
by Computerph...
3 weeks ago ∗ Views: 66,216
Diffie Hellman has a flaw. Dr Mike Pound explains how a man in the middle could be a big problem, unless we factor it in... Public Key Cryptography: h...
21:37
Festive Fractals - Computerphile
by Computerph...
4 weeks ago ∗ Views: 59,815
Fractals aren't just fascinating computer generated patterns, they could also be the key to future computer architecture. Professor Phil Moriarty expl...
07:05
Diffie Hellman -the Mathematics bit- Computerphile
by Computerph...
1 month ago ∗ Views: 71,827
Correction : as oodles of commenters have pointed out, the clock face should go from 0 to n-1. Also, worth reminding people that Mike has simplified t...
08:40
Secret Key Exchange (Diffie-Hellman) - Computerphile
by Computerph...
1 month ago ∗ Views: 87,797
How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens. Mathematics bit: https://youtu.be/Yjrfm...
13:24
Bluetooth & Sync - Computerphile
by Computerph...
1 month ago ∗ Views: 68,968
How do Bluetooth devices maintain audio/video sync? Dr Steve Bagley on the subtleties of sync. Net Neutrality: https://youtu.be/SC-7fyBfvsw Diffie Hel...
12:01
Anti Bank-Fraud Technology - Computerphile
by Computerph...
1 month ago ∗ Views: 51,995
What's being done to stop criminals in online banking? Dr Steven Murdoch (Principal Research Fellow) in the UCL Info Security Group. EXTRA BITS: https...
10:17
The Anonymisation Problem - Computerphile
by Computerph...
2 months ago ∗ Views: 57,473
Keeping data anonymous seems easy, but keeping identities separate is a big problem. Professor Derek McAuley explains. EXTRA BITS: https://youtu.be/4D...
13:58
Malware Overview - Computerphile
by Computerph...
2 months ago ∗ Views: 59,426
Malware comes in many shapes and sizes, here's an overview of how some of it works. Enrico Mariconti is part of the UCL Security group. UCL Link: http...
12:35
Net Neutrality - Computerphile
by Computerph...
2 months ago ∗ Views: 89,417
The current debate about Net Neutrality may not be as clear cut as you'd imagine. Professor Derek McAuley lays out the details. https://www.facebook.c...
21:50
What is a Monad? - Computerphile
by Computerph...
2 months ago ∗ Views: 94,544
Monads sound scary, but Professor Graham Hutton breaks down how handy they can be. https://www.facebook.com/computerphile https://twitter.com/computer...