ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

520 results

Lucas Layman
Hash Functions and Hash Tables

... hash function and in this video we're gonna see some different examples of what different hash functions are so a hash function ...

22:50
Hash Functions and Hash Tables

711 views

5 years ago

Steven Gordon
Cryptographic Hash Functions (CSS441, L17, Y15)

Hash functions and use for cryptographic. Hash functions for authentication, and attacks. Course material via: ...

1:29:57
Cryptographic Hash Functions (CSS441, L17, Y15)

2,937 views

9 years ago

Cube Drone
CascadiaJS Presentation: Hash Functions Taste Great with Anything

I haven't GIVEN this presentation yet, but it's.. the slides and the words and the voice bits. Sorry about the visible cursor.

32:42
CascadiaJS Presentation: Hash Functions Taste Great with Anything

2,639 views

11 years ago

Steven Gordon
CSS322, Lecture 17, 11 Jan 2013 - Hash Functions

Lecture 17 of CSS322 Security and Cryptography at Sirindhorn International Institute of Technology, Thammasat University.

43:17
CSS322, Lecture 17, 11 Jan 2013 - Hash Functions

854 views

13 years ago

Mark C. Wilson
AofA Lecture 16: Hashing basics

Hashing is a way of implementing a dictionary abstract data type, allowing easy insertion and finding of elements.

23:34
AofA Lecture 16: Hashing basics

1,337 views

6 years ago

Tanja Lange: Intro to crypto
Hash functions

Part of Introduction to Cryptology https://hyperelliptic.org/tanja/teaching/CS20/ Slides at ...

29:03
Hash functions

971 views

5 years ago

Steven Gordon
Hash Functions and Digital Signatures (CSS322, L19, Y14)

Use of cryptographic hash functions for authentication. Digital signatures with public key crypto and hash functions. Required ...

1:16:53
Hash Functions and Digital Signatures (CSS322, L19, Y14)

2,857 views

10 years ago

GaneshKumar Pugalendhi
Unit-V: Searching Sorting Hashing - Topics: Hashing-Hash Function-Separate Chaining-Open Addressing

... given 500 7 550 700 76 85 92 7311 so what is the hash function I have defined if the hash function defined is key mod 7 what is ...

43:25
Unit-V: Searching Sorting Hashing - Topics: Hashing-Hash Function-Separate Chaining-Open Addressing

99 views

5 years ago

IACR
Trapdoor Hash Functions and Their Applications

Paper by Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky presented at Crypto 2019 See ...

22:45
Trapdoor Hash Functions and Their Applications

900 views

6 years ago

Association Francophone Python
PyConFR 2018 - Leveraging consistent hashing in your python applications - Alexys Jacob

PyConFR 2018 - Leveraging consistent hashing in your python applications - Alexys Jacob.

49:18
PyConFR 2018 - Leveraging consistent hashing in your python applications - Alexys Jacob

91 views

7 years ago

Arul Treesa Mathew
HASHING   HASH FUNCTIONS

CST201- Data Structures - KTU.

42:32
HASHING HASH FUNCTIONS

67 views

5 years ago

Linux.conf.au 2016 -- Geelong, Australia
Five* non-cryptographic hash functions enter. One hash function leaves.

Adam Harvey https://linux.conf.au/schedule/30208/view_talk When you say “hash function” in a room full of developers, people ...

37:31
Five* non-cryptographic hash functions enter. One hash function leaves.

4,899 views

9 years ago

Steven Gordon
MAC and Encryption (CSS441, L17, Y15)

MAC-then-Encrypt vs Encrypt-then-MAC for authenticated encryption. Course material via: http://sandilands.info/sgordon/teaching.

25:44
MAC and Encryption (CSS441, L17, Y15)

5,051 views

9 years ago

Per Thorsheim
How To Screw Up Password Hashing: Secrets of a Password Cracker Author

Russell Graves (@Bitweasil) speaking at Passwordscon in Las Vegas, July 30-31, 2013. -- Password storage is one of the major ...

29:45
How To Screw Up Password Hashing: Secrets of a Password Cracker Author

877 views

12 years ago

Confreaks
GoGaRuCo 2014- Reimplementing Ruby's Hash

By, Nathan Long Hashes are very useful for labeling little bits of data. But do you know how cool they really are? For instance ...

27:04
GoGaRuCo 2014- Reimplementing Ruby's Hash

703 views

11 years ago

Tanja Lange: Cryptology
Cryptographic hash functions IV - Proofs by reduction

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

22:28
Cryptographic hash functions IV - Proofs by reduction

344 views

4 years ago

Yusuf Sahillioğlu
data structures - hash tables

Favorite algorithm of this class: Rabin-Karp string matching (1:00:46). Course website: ...

1:28:17
data structures - hash tables

1,342 views

5 years ago

Coding with Verrol
ep24.5 - Hashing (Extended)

In this video, we take a log at how to hash a string to a number. NOTE: This is the extended version, I show a bit more details ...

1:00:33
ep24.5 - Hashing (Extended)

336 views

5 years ago

Chris Powell
Hash algorithms, error detection, error correction and password cracking — 0x0000

0:00 — Hash functions 3:30 — Parity functions are hashes 8:50 — Error correction 15:18 — Mathematical functions, injective ...

37:04
Hash algorithms, error detection, error correction and password cracking — 0x0000

273 views

4 years ago

Coding with Verrol
ep24.5 - Hashing

golang #striversity #go-language In this video, we take a log at how to hash a string to a number. NOTE: This is the abridged ...

27:08
ep24.5 - Hashing

292 views

5 years ago