ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

56 results

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

... http://pgfplots.net/tikz/examples/author/jake/ Wikipedia Hash Function Algorithm illustrations: https://en.wikipedia.org/wiki/SHA-2 ...

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,556 views

6 years ago

wikipedia tts
NIST hash function competition | Wikipedia audio article

This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/NIST_hash_function_competition 00:01:13 1 Process ...

8:02
NIST hash function competition | Wikipedia audio article

29 views

7 years ago

MalwareAnalysisForHedgehogs
Malware Theory - Imphash algorithm explained

The imphash or import hash by Mandiant has been widely adopted by malware databases, security software and PE tools. What is ...

5:43
Malware Theory - Imphash algorithm explained

5,854 views

4 years ago

Programming threads
Python Dictionaries Explained: Hashing, Performance & Big O Notation

Master Python dictionaries from the ground up — from the basic structure to how they work behind the scenes. In this tutorial, we ...

13:57
Python Dictionaries Explained: Hashing, Performance & Big O Notation

229 views

1 year ago

aantonop
Bitcoin Q&A: How Is the Number of Zeros in the Target Hash Determined?

How is the Bitcoin mining difficulty target hash determined? Why are the number of zeros at the beginning of the number used to ...

5:25
Bitcoin Q&A: How Is the Number of Zeros in the Target Hash Determined?

9,045 views

5 years ago

Spoken-Tutorial IIT Bombay
MD5 Encryption - English

MD5 Encryption Calculates the MD5 hash of str using the RSA Data Security, Inc.'s MD5 Message-Digest Algorithm, and returns ...

9:34
MD5 Encryption - English

5,504 views

11 years ago

Rafiq Bouhsen
19.Immutability: Hashing and Chaining with Proof of Work

Source: EDX LinuxFoundationX LFS170x Blockchain: Understanding Its Uses and Implications ...

7:43
19.Immutability: Hashing and Chaining with Proof of Work

12 views

4 years ago

Spoken-Tutorial IIT Bombay
MD5 Encryption - Tamil

MD5 Encryption Calculates the MD5 hash of str using the RSA Data Security, Inc.'s MD5 Message-Digest Algorithm, and returns ...

9:33
MD5 Encryption - Tamil

2,918 views

11 years ago

84° Tech Studio
Computer Science Explained in 17 Minutes! 🎓💻

Ever wondered how computers work? Dive into (almost) all of Computer Science in just 17 minutes! ✨ We'll cover essential ...

16:49
Computer Science Explained in 17 Minutes! 🎓💻

76 views

1 year ago

Wisc-Online
CRC - Cyclic Redundancy Check

Learn what the CRC is, the technology behind it, and how it's performed.

6:05
CRC - Cyclic Redundancy Check

145,456 views

9 years ago

SiliconANGLE theCUBE
Leemon Baird, Hashgraph | Blockchain Unbound 2018

Leemon Baird, CTO Hashgraph, sits down with John Furrier at Blockchain Unbound 2018 #BlockChainUnbound #theCUBE ...

11:27
Leemon Baird, Hashgraph | Blockchain Unbound 2018

2,552 views

7 years ago

Sprouts
The Effects of Weed on Teenage Brains

When a person is smoking cannabis, one of the plant's chemicals known as THC, passes from the lungs into the bloodstream and ...

4:57
The Effects of Weed on Teenage Brains

1,145,309 views

3 years ago

Spoken-Tutorial IIT Bombay
MD5 Encryption - Telugu

MD5 Encryption Calculates the MD5 hash of str using the RSA Data Security, Inc.'s MD5 Message-Digest Algorithm, and returns ...

9:34
MD5 Encryption - Telugu

1,302 views

11 years ago

Relaxing With Code
Rust StatsD Proxy - 06 Bitwise Ops and Overflows

Beginning to port a hashing function from C to Rust. We'll use it in our sharding logic.

13:31
Rust StatsD Proxy - 06 Bitwise Ops and Overflows

36 views

4 years ago

Rafiq Bouhsen
18.Immutability: Immutability

Remember from earlier that one of the properties of a hash function is that it is extremely difficult to find two inputs to a hash ...

4:20
18.Immutability: Immutability

10 views

4 years ago

DFIRScience
Forensic Data Acquisition - Hardware Write Blockers

This video introduces external write blockers used to prevent changes to suspect disks during data acquisition. A software or ...

8:00
Forensic Data Acquisition - Hardware Write Blockers

62,753 views

9 years ago

Spoken-Tutorial IIT Bombay
Functions in Perl - English

Perl has its own functions plus allows us to write user-defined functions. Functions can be used to perform specific task. It can take ...

10:51
Functions in Perl - English

1,179 views

11 years ago

aantonop
Bitcoin Q&A: Cryptographic Primitives

How are cryptographic primitives employed in Bitcoin? What are hashes and digital signatures? How does elliptic curve ...

6:12
Bitcoin Q&A: Cryptographic Primitives

9,511 views

7 years ago

aantonop
Bitcoin Q&A: Difficulty Targeting and the "Death Spiral"

What is difficulty and how is it adjusted? What if the difficulty could not be satisfied? Would sudden changes in mining hash power ...

14:45
Bitcoin Q&A: Difficulty Targeting and the "Death Spiral"

21,968 views

7 years ago

aantonop
Bitcoin Q&A: Data Integrity and Validation of Keys

How is SHA-256 used to verify data integrity in Bitcoin? What does it mean to sign a message? Is there a difference in the ...

11:23
Bitcoin Q&A: Data Integrity and Validation of Keys

5,435 views

6 years ago