ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

94 results

Lisk
What is Hashing? Hash Functions Explained Simply

What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting ...

2:36
What is Hashing? Hash Functions Explained Simply

447,587 views

7 years ago

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

... http://pgfplots.net/tikz/examples/author/jake/ Wikipedia Hash Function Algorithm illustrations: https://en.wikipedia.org/wiki/SHA-2 ...

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,607 views

6 years ago

Programming threads
Python Dictionaries Explained: Hashing, Performance & Big O Notation

Master Python dictionaries from the ground up — from the basic structure to how they work behind the scenes. In this tutorial, we ...

13:57
Python Dictionaries Explained: Hashing, Performance & Big O Notation

229 views

1 year ago

CS 125 @ Illinois
CS 125 Fall 2018: Mon 12.3.2018. Hashing and Maps

Hash tables, maps, and some theory behind hashing. https://cs125.cs.illinois.edu/learn/2018_12_03_hashing_and_maps.

50:55
CS 125 Fall 2018: Mon 12.3.2018. Hashing and Maps

903 views

7 years ago

aantonop
Bitcoin Q&A: How Is the Number of Zeros in the Target Hash Determined?

How is the Bitcoin mining difficulty target hash determined? Why are the number of zeros at the beginning of the number used to ...

5:25
Bitcoin Q&A: How Is the Number of Zeros in the Target Hash Determined?

9,047 views

5 years ago

Cube Drone
Cube Drone - Bloom Filters

... "How do I generate all of these different hash functions anyways?" For other questions, like "who taught you how to do math?

3:32
Cube Drone - Bloom Filters

36,393 views

11 years ago

MalwareAnalysisForHedgehogs
Malware Theory - Imphash algorithm explained

The imphash or import hash by Mandiant has been widely adopted by malware databases, security software and PE tools. What is ...

5:43
Malware Theory - Imphash algorithm explained

5,855 views

4 years ago

wikipedia tts
NIST hash function competition | Wikipedia audio article

This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/NIST_hash_function_competition 00:01:13 1 Process ...

8:02
NIST hash function competition | Wikipedia audio article

29 views

7 years ago

Confreaks
RubyConf 2018 - Cache is King: Get the Most Bang for Your Buck From Ruby by Molly Struve

RubyConf 2018 - Cache is King: Get the Most Bang for Your Buck From Ruby by Molly Struve Sometimes your fastest queries can ...

33:20
RubyConf 2018 - Cache is King: Get the Most Bang for Your Buck From Ruby by Molly Struve

4,537 views

7 years ago

DEFCONConference
DEF CON 30 - Orange Tsai - Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS

To deal with this problem, 25 years ago, Microsoft designed its own Dynamic Hashing algorithm and applied it everywhere in IIS, ...

46:38
DEF CON 30 - Orange Tsai - Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS

1,327 views

3 years ago

Spoken-Tutorial IIT Bombay
MD5 Encryption - English

MD5 Encryption Calculates the MD5 hash of str using the RSA Data Security, Inc.'s MD5 Message-Digest Algorithm, and returns ...

9:34
MD5 Encryption - English

5,504 views

11 years ago

Rafiq Bouhsen
19.Immutability: Hashing and Chaining with Proof of Work

Source: EDX LinuxFoundationX LFS170x Blockchain: Understanding Its Uses and Implications ...

7:43
19.Immutability: Hashing and Chaining with Proof of Work

12 views

4 years ago

Programming threads
Why Python Dicts Use 33% Extra Memory

Key Performance Insights: ✓ Hash function maps keys to memory slots ✓ Open addressing handles collisions ✓ Load factor ...

0:57
Why Python Dicts Use 33% Extra Memory

1,123 views

2 months ago

Learn with Shikaar
Hash String to Whole Number

In this video, you'll learn: • How to create a simple hash function for strings. • Using character codes and mathematical operations ...

3:32
Hash String to Whole Number

11 views

8 months ago

Spoken-Tutorial IIT Bombay
MD5 Encryption - Tamil

MD5 Encryption Calculates the MD5 hash of str using the RSA Data Security, Inc.'s MD5 Message-Digest Algorithm, and returns ...

9:33
MD5 Encryption - Tamil

2,919 views

11 years ago

Wisc-Online
CRC - Cyclic Redundancy Check

Learn what the CRC is, the technology behind it, and how it's performed.

6:05
CRC - Cyclic Redundancy Check

145,617 views

9 years ago

84° Tech Studio
Computer Science Explained in 17 Minutes! 🎓💻

Ever wondered how computers work? Dive into (almost) all of Computer Science in just 17 minutes! ✨ We'll cover essential ...

16:49
Computer Science Explained in 17 Minutes! 🎓💻

76 views

1 year ago

Rafiq Bouhsen
15.Cryptography: Merkle Tree, Validation of Data

... type of data storage structure based on hash functions is called a Merkle tree: It is structured as a binary tree; the leaves contain ...

1:57
15.Cryptography: Merkle Tree, Validation of Data

139 views

4 years ago

SiliconANGLE theCUBE
Leemon Baird, Hashgraph | Blockchain Unbound 2018

Leemon Baird, CTO Hashgraph, sits down with John Furrier at Blockchain Unbound 2018 #BlockChainUnbound #theCUBE ...

11:27
Leemon Baird, Hashgraph | Blockchain Unbound 2018

2,552 views

7 years ago

Sprouts
The Effects of Weed on Teenage Brains

When a person is smoking cannabis, one of the plant's chemicals known as THC, passes from the lungs into the bloodstream and ...

4:57
The Effects of Weed on Teenage Brains

1,146,326 views

3 years ago