ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,117 results

Jesse Warden
Hash Function

I cover what a hash function is, 2 of the many use cases for it, passwords and file differences, and show some examples in code.

4:13
Hash Function

588 views

7 years ago

Steven Gordon
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

Applying the pigeonhole principle to (cryptographic) hash functions to determine how many inputs collide on a single hash value.

4:39
Pigeonhole Principle and Hash Functions (Statistics Examples 5)

2,731 views

10 years ago

Forti Tip
Hash functions in certificates

In this Fortigate Firewall video " hash functions in certificates " we will look at how a hash function works and why it is important for ...

6:36
Hash functions in certificates

1,731 views

6 years ago

The Linux Foundation
Better hash functions for BPF maps - Anton Protopopov

Better hash functions for BPF maps - Anton Protopopov.

14:19
Better hash functions for BPF maps - Anton Protopopov

137 views

2 years ago

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

You can find it here: https://youtu.be/LzhJjSRad5A ) Bitcoin and other "crypto-currencies" rely on one-way hash functions like the ...

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,455 views

6 years ago

Tanja Lange: Cryptology
Cryptographic hash functions I - Practical aspects and generic hardness

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

17:17
Cryptographic hash functions I - Practical aspects and generic hardness

309 views

4 years ago

Center for Cybersecurity Innovation & Outreach
Lesson 9: Passwords and Hash Functions

Discusses why passwords are so prevalent today and how organizations use hash functions to secure stored passwords.

8:17
Lesson 9: Passwords and Hash Functions

2,766 views

9 years ago

internet-class
What is a crytographically secure hash function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

5:45
What is a crytographically secure hash function?

1,303 views

9 years ago

Lucas Layman
Hash Collisions and Load Factor

22 and we'll just use the modulo method okay that'll be our hash function because it's the simplest method so if we hash 22 that's ...

18:47
Hash Collisions and Load Factor

5,432 views

5 years ago

Forti Tip
Your first hash function

Your first hash function In this hash function guide, you will learn, what are hash function, why are they being used ( data integrity ) ...

5:18
Your first hash function

445 views

5 years ago

MMqd
The Function Every Graphics Programmer Gets Wrong

Find out why sine‑based hashes fall short and how uint‑based hashes outperform them. I'll walk you through my extensible uint ...

12:36
The Function Every Graphics Programmer Gets Wrong

1,112 views

8 months ago

Tanja Lange: Cryptology
Cryptographic hash functions III - Formal security notions

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

18:29
Cryptographic hash functions III - Formal security notions

187 views

4 years ago

Steven Gordon
Properties of Hash Functions (CSS441, L18, Y15)

One-way property, weak collision resistant and strong collision resistant hash functions. Course material via: ...

15:57
Properties of Hash Functions (CSS441, L18, Y15)

7,099 views

9 years ago

Unidad de Innovación UMU
Module 1 - Digital Hash Functions

MOOC Course in Mathematical Cryptology

8:36
Module 1 - Digital Hash Functions

5,027 views

10 years ago

Stack Equation
Hash Function Kmodm

A simple hash function where K is the input divided by M , M is the number of slots , it returns a remainder which is the index ...

4:10
Hash Function Kmodm

270 views

5 years ago

IACR
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agree...

Paper by Shahar Cohen, Moni Naor presented at Crypto 2022 See https://iacr.org/cryptodb/data/paper.php?pubkey=32206.

4:49
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agree...

134 views

3 years ago

The Coding Gopher
Hashing Explained (SHA-256, MD5)

Check out Clerk: https://go.clerk.com/X1kC4pR ❤️ Get 40% OFF CodeCrafters: ...

11:27
Hashing Explained (SHA-256, MD5)

24,228 views

2 months ago

WIT Solapur - Professional Learning Community
Hashing and hash functions

Mr. N. S. Gajjam, Assistant Professor, Walchand Institute of Technology, Solapur.

12:55
Hashing and hash functions

613 views

6 years ago

IACR
Hash Functions Based on Three Permutations: A Generic Se ...

Talk at crypto 2012. Authors: Bart Mennink, Bart Preneel. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=24288.

16:55
Hash Functions Based on Three Permutations: A Generic Se ...

441 views

13 years ago

pwn.college
Cryptography: Hashing

... hashing so hashing works by taking some message throwing it through a hash function and producing some hash value now for ...

11:33
Cryptography: Hashing

2,462 views

3 years ago