ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

427 results

MMqd
The Function Every Graphics Programmer Gets Wrong

Find out why sine‑based hashes fall short and how uint‑based hashes outperform them. I'll walk you through my extensible uint ...

12:36
The Function Every Graphics Programmer Gets Wrong

1,119 views

9 months ago

The Coding Gopher
Hashing Explained (SHA-256, MD5)

Check out Clerk: https://go.clerk.com/X1kC4pR ❤️ Get 40% OFF CodeCrafters: ...

11:27
Hashing Explained (SHA-256, MD5)

24,401 views

2 months ago

Peter Schneider
Codereview: Desperately seeking a hashing function

Desperately seeking a hashing function I hope you found a solution that worked for you :) The Content is licensed under ...

4:36
Codereview: Desperately seeking a hashing function

1 view

8 months ago

Single-line
Why tuple hash function itself, i.e., operator(), needs to be const?

Source: https://stackoverflow.com/questions/79673004 Question Author: - PkDrew https://stackoverflow.com/users/17567231 ...

0:31
Why tuple hash function itself, i.e., operator(), needs to be const?

0 views

7 months ago

Peter Schneider
Codereview: Custom hash function as Bash script

Custom hash function as Bash script I hope you found a solution that worked for you :) The Content is licensed under ...

5:38
Codereview: Custom hash function as Bash script

7 views

8 months ago

Department of Decentralization
Protocol Berg v2: Paul Dylan-Ennis - No friends but the hash function: Descent into the Social Layer

This talk is about the fringes of my Ethereum Social Layer research project. Despite six months research, the central question ...

24:25
Protocol Berg v2: Paul Dylan-Ennis - No friends but the hash function: Descent into the Social Layer

199 views

6 months ago

Decred
Blake-256 Transaction Hashing Process

Decred employs Blake-256r14, a cryptographic hash function that transforms transaction data into secure, fixed-length identifiers.

4:54
Blake-256 Transaction Hashing Process

54 views

4 months ago

Decred
Blake-256 Hashing Algorithm - Transaction hashing

In this video, we dive into the BLAKE-256 algorithm and how it powers our transaction hashing process. We'll break down: The ...

5:07
Blake-256 Hashing Algorithm - Transaction hashing

73 views

3 months ago

PQCrypto conference videos
Lattice Based Sanitizable Signature Schemes: Chameleon Hash Functions and More

Video from PQCrypto 2025 conference https://pqcrypto2025.iis.sinica.edu.tw/program.php.

19:56
Lattice Based Sanitizable Signature Schemes: Chameleon Hash Functions and More

82 views

9 months ago

CH 30: IIT KHARAGPUR 02: Computer Science & Others
Lecture 42: Cryptographic Hash Function #CH30SP #swayamprabha

Subject : Computer Science Course Name : Cryptography and Network Security Welcome to Swayam Prabha! Description: ...

31:58
Lecture 42: Cryptographic Hash Function #CH30SP #swayamprabha

3 views

11 months ago

Peter Schneider
Why does the tuple hash function itself, i.e., operator(), need to be const?

Why does the tuple hash function itself, i.e., operator(), need to be const? I hope you found a solution that worked for you :) The ...

2:27
Why does the tuple hash function itself, i.e., operator(), need to be const?

0 views

6 months ago

Nida Karagoz
Custom hash function as Bash script

Custom hash function as Bash script ✧ I really hope you found a helpful solution! ♡ The Content is licensed under CC ...

2:10
Custom hash function as Bash script

1 view

8 months ago

Peter Schneider
Security: Trouble Extracting Hash from PKCS#8 Encrypted Private Key for Cracking - OpenSSH

Trouble Extracting Hash from PKCS#8 Encrypted Private Key for Cracking - OpenSSH I hope you found a solution that worked for ...

3:04
Security: Trouble Extracting Hash from PKCS#8 Encrypted Private Key for Cracking - OpenSSH

5 views

11 months ago

CH 30: IIT KHARAGPUR 02: Computer Science & Others
Lecture 40: Hash Function #CH30SP #swayamprabha

Subject : Computer Science Course Name : Cryptography and Network Security Welcome to Swayam Prabha! Description: ...

34:28
Lecture 40: Hash Function #CH30SP #swayamprabha

18 views

11 months ago

Nida Karagoz
Desperately seeking a hashing function

Desperately seeking a hashing function ✧ I really hope you found a helpful solution! ♡ The Content is licensed under CC ...

5:04
Desperately seeking a hashing function

6 views

8 months ago

Nida Karagoz
Why are hash functions one way? If I know the algorithm, why can't I calculate the input from it? (3

Why are hash functions one way? If I know the algorithm, why can't I calculate the input from it? (3 ✧ I really hope you found a ...

2:55
Why are hash functions one way? If I know the algorithm, why can't I calculate the input from it? (3

1 view

9 months ago

Niv Dayan
Practical Perfect Hashing

This lecture looks at minimal and dynamic perfect hashing schemes. We cover the following two papers. Fast and Scalable ...

1:20:39
Practical Perfect Hashing

325 views

10 months ago

Sophia Wagner
Why does the tuple hash function itself, i.e., operator(), need to be const?

Why does the tuple hash function itself, i.e., operator(), need to be const? Hey guys! Hopefully you found a solution that helped ...

2:34
Why does the tuple hash function itself, i.e., operator(), need to be const?

3 views

3 weeks ago

CMU Database Group
#12 - Hash Joins, Sort-Merge Joins, Nested Loop Join Algorithms (CMU Intro to Database Systems)

Andy Pavlo (https://www.cs.cmu.edu/~pavlo/) Slides: https://15445.courses.cs.cmu.edu/fall2025/slides/12-joins.pdf Notes: ...

1:19:13
#12 - Hash Joins, Sort-Merge Joins, Nested Loop Join Algorithms (CMU Intro to Database Systems)

2,543 views

3 months ago

Nida Karagoz
Which ciphers and hash functions are easiest to conceal in compiled binaries?

Which ciphers and hash functions are easiest to conceal in compiled binaries? ✧ I really hope you found a helpful solution!

1:49
Which ciphers and hash functions are easiest to conceal in compiled binaries?

2 views

7 months ago