ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

485 results

MMqd
The Function Every Graphics Programmer Gets Wrong

Find out why sine‑based hashes fall short and how uint‑based hashes outperform them. I'll walk you through my extensible uint ...

12:36
The Function Every Graphics Programmer Gets Wrong

1,115 views

9 months ago

Decred
Blake-256 Transaction Hashing Process

Decred employs Blake-256r14, a cryptographic hash function that transforms transaction data into secure, fixed-length identifiers.

4:54
Blake-256 Transaction Hashing Process

53 views

4 months ago

Decred
Blake-256 Hashing Algorithm - Transaction hashing

In this video, we dive into the BLAKE-256 algorithm and how it powers our transaction hashing process. We'll break down: The ...

5:07
Blake-256 Hashing Algorithm - Transaction hashing

71 views

3 months ago

The Coding Gopher
Hashing Explained (SHA-256, MD5)

Check out Clerk: https://go.clerk.com/X1kC4pR ❤️ Get 40% OFF CodeCrafters: ...

11:27
Hashing Explained (SHA-256, MD5)

24,274 views

2 months ago

Gnar Coding
learn HASHING with CAT Pics

cybersecurity #linux #hacker.

1:02
learn HASHING with CAT Pics

2,559 views

11 months ago

Peter Schneider
Codereview: Desperately seeking a hashing function

Desperately seeking a hashing function I hope you found a solution that worked for you :) The Content is licensed under ...

4:36
Codereview: Desperately seeking a hashing function

1 view

8 months ago

DEEPTI SHARMA: Let's Learn Programming
Hash Function in Data Structure | Types Of Hash Functions #datastructuresandalgorithmsinpython

Hash Function in Data Structure | Types Of Hash Functions #datastructuresandalgorithmsinpython #exam #datastructures ...

1:35
Hash Function in Data Structure | Types Of Hash Functions #datastructuresandalgorithmsinpython

523 views

7 months ago

Gnar Coding
Hackers get SALTY with these HASHES

cybersecurity #hacker #linux #python.

1:58
Hackers get SALTY with these HASHES

2,986 views

6 months ago

Department of Decentralization
Protocol Berg v2: Paul Dylan-Ennis - No friends but the hash function: Descent into the Social Layer

This talk is about the fringes of my Ethereum Social Layer research project. Despite six months research, the central question ...

24:25
Protocol Berg v2: Paul Dylan-Ennis - No friends but the hash function: Descent into the Social Layer

198 views

5 months ago

Peter Schneider
Codereview: Custom hash function as Bash script

Custom hash function as Bash script I hope you found a solution that worked for you :) The Content is licensed under ...

5:38
Codereview: Custom hash function as Bash script

7 views

8 months ago

DEEPTI SHARMA: Let's Learn Programming
Folding Method in Hashing #datastructuresandalgorithmsinpython #datastructures #exam #hashing #cute

Folding Method in Hashing #datastructuresandalgorithmsinpython #datastructures #exam #hashing #cute #datastructures ...

2:48
Folding Method in Hashing #datastructuresandalgorithmsinpython #datastructures #exam #hashing #cute

939 views

7 months ago

Single-line
Why tuple hash function itself, i.e., operator(), needs to be const?

Source: https://stackoverflow.com/questions/79673004 Question Author: - PkDrew https://stackoverflow.com/users/17567231 ...

0:31
Why tuple hash function itself, i.e., operator(), needs to be const?

0 views

6 months ago

CH 30: IIT KHARAGPUR 02: Computer Science & Others
Lecture 40: Hash Function #CH30SP #swayamprabha

Subject : Computer Science Course Name : Cryptography and Network Security Welcome to Swayam Prabha! Description: ...

34:28
Lecture 40: Hash Function #CH30SP #swayamprabha

18 views

10 months ago

CH 30: IIT KHARAGPUR 02: Computer Science & Others
Lecture 42: Cryptographic Hash Function #CH30SP #swayamprabha

Subject : Computer Science Course Name : Cryptography and Network Security Welcome to Swayam Prabha! Description: ...

31:58
Lecture 42: Cryptographic Hash Function #CH30SP #swayamprabha

3 views

10 months ago

Peter Schneider
Why does the tuple hash function itself, i.e., operator(), need to be const?

Why does the tuple hash function itself, i.e., operator(), need to be const? I hope you found a solution that worked for you :) The ...

2:27
Why does the tuple hash function itself, i.e., operator(), need to be const?

0 views

6 months ago

PQCrypto conference videos
Lattice Based Sanitizable Signature Schemes: Chameleon Hash Functions and More

Video from PQCrypto 2025 conference https://pqcrypto2025.iis.sinica.edu.tw/program.php.

19:56
Lattice Based Sanitizable Signature Schemes: Chameleon Hash Functions and More

81 views

9 months ago

Soumil Speaks
3.Hash Tables: Hash Functions, Sets, & Maps | DSA in Python | Tamil | Soumil Speaks

Video Description: In this video, we dive deep into Hash Tables, one of the most important data structures in computer science.

33:41
3.Hash Tables: Hash Functions, Sets, & Maps | DSA in Python | Tamil | Soumil Speaks

83 views

6 months ago

Decred
Endianness in Decred Transaction Hashing

Endianness plays a subtle yet critical role in how transaction data is serialized and hashed. It determines how numeric values are ...

2:24
Endianness in Decred Transaction Hashing

50 views

2 months ago

Craig Piercy
Python built-in function: hash()

In this video, we will discuss the function: hash() Hi Python enthusiasts! Today, we're diving into the `hash()` function —a built-in ...

4:46
Python built-in function: hash()

168 views

10 months ago

Peter Schneider
Security: What is the best way to transmit password hash over unreliable TLS?

What is the best way to transmit password hash over unreliable TLS? I hope you found a solution that worked for you :) The ...

4:54
Security: What is the best way to transmit password hash over unreliable TLS?

1 view

7 months ago