ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,860 results

Computerphile
Hashing Algorithms and Security - Computerphile

Audible free book: http://www.audible.com/computerphile Hashing Algorithms are used to ensure file authenticity, but how secure ...

8:12
Hashing Algorithms and Security - Computerphile

1,616,768 views

12 years ago

Michael Sambol
Hash tables in 4 minutes

Hash tables in 4 minutes. Code: https://github.com/msambol/dsa/blob/master/data_structures/hash_table.py Sources: 1.

3:52
Hash tables in 4 minutes

344,550 views

3 years ago

Computerphile
SHA: Secure Hashing Algorithm - Computerphile

Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash ...

10:21
SHA: Secure Hashing Algorithm - Computerphile

1,321,503 views

8 years ago

Lisk
What is Hashing? Hash Functions Explained Simply

What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting ...

2:36
What is Hashing? Hash Functions Explained Simply

447,516 views

7 years ago

MIT OpenCourseWare
4. Hashing

This lecture discusses comparison models, decision trees, and hash functions. License: Creative Commons BY-NC-SA More ...

52:55
4. Hashing

392,591 views

4 years ago

CS50
CS50 2019 - Lecture 5 - Hash Table

This is CS50, Harvard University's introduction to the intellectual enterprises of computer science and the art of programming.

5:15
CS50 2019 - Lecture 5 - Hash Table

17,575 views

5 years ago

Gate Smashers
L-6.1: What is hashing with example | Hashing in data structure

01:13 – Search Key & Hash Table 02:36 – Hash Function Example (K mod N) 03:32 – Other Hashing Methods(Mid-Square ...

5:53
L-6.1: What is hashing with example | Hashing in data structure

2,274,200 views

5 years ago

3Blue1Brown
How secure is 256 bit security?

If it's guessing a private key, you are correct, but for something like guessing which input to a hash function gives the desired ...

5:06
How secure is 256 bit security?

3,588,479 views

8 years ago

Charles Cabergs
Advanced C 35: Hash Table

Wait, there is hash tables in the standard library and nobody told me! Social links: Website: https://cacharle.xyz Github: ...

7:31
Advanced C 35: Hash Table

4,102 views

1 year ago

LearnCantrill
Hashing - what it is, how it's used and why it matters - with MD5 and SHA2-256 examples

This video steps through how hashing works , what it's used for and why it's really important as a supporting process for many ...

13:20
Hashing - what it is, how it's used and why it matters - with MD5 and SHA2-256 examples

14,584 views

3 years ago

Inside code
Hashing and hash tables crash course (+ face reveal) - Inside code

02:30 What is a hash table? 03:08 What is a hash function? 05:05 Some hash table applications 05:55 Hash table operations ...

36:53
Hashing and hash tables crash course (+ face reveal) - Inside code

7,134 views

3 years ago

CppCon
CppCon 2017: Matt Kulukundis “Designing a Fast, Efficient, Cache-friendly Hash Table, Step by Step”

http://CppCon.org — Presentation Slides, PDFs, Source Code and other presenter materials are available at: ...

59:34
CppCon 2017: Matt Kulukundis “Designing a Fast, Efficient, Cache-friendly Hash Table, Step by Step”

128,218 views

8 years ago

Simply Explained
Passwords & hash functions (Simply Explained)

We'll take a look at encryption, hash functions and a multilayer approach! Sources Can be found on my website: ...

7:28
Passwords & hash functions (Simply Explained)

391,795 views

7 years ago

MIT OpenCourseWare
21. Cryptography: Hash Functions

MIT 6.046J Design and Analysis of Algorithms, Spring 2015 View the complete course: http://ocw.mit.edu/6-046JS15 Instructor: ...

1:22:01
21. Cryptography: Hash Functions

192,678 views

9 years ago

HackerRank
Data Structures: Hash Tables

Learn the basics of Hash Tables, one of the most useful data structures for solving interview questions. This video is a part of ...

6:25
Data Structures: Hash Tables

1,540,463 views

9 years ago

Udacity
Better Hash Functions - Intro to Computer Science

This video is part of an online course, Intro to Computer Science. Check out the course here: ...

6:34
Better Hash Functions - Intro to Computer Science

6,122 views

10 years ago

CS50
Hash Tables - CS50 Shorts

This is CS50, Harvard University's introduction to the intellectual enterprises of computer science and the art of programming.

18:47
Hash Tables - CS50 Shorts

163,529 views

7 years ago

Udacity
Hash Chain - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

1:26
Hash Chain - Applied Cryptography

11,451 views

13 years ago

Udacity
Testing Hash Functions - CS101 - Udacity

Other units in this course below: Unit 1: http://www.youtube.com/playlist?list=PLF6D042E98ED5C691 Unit 2: ...

2:50
Testing Hash Functions - CS101 - Udacity

1,193 views

13 years ago

Udacity
Cuckoo Hashing Part1 - Intro to Parallel Programming

This video is part of an online course, Intro to Parallel Programming. Check out the course here: ...

1:39
Cuckoo Hashing Part1 - Intro to Parallel Programming

13,495 views

10 years ago

Dr_K
ImmutablePerson-5of6-HashCodeEquals

This is the standard way to create hash codes. Hash codes are for if you want it... if you would like to use this class, this person ...

9:36
ImmutablePerson-5of6-HashCodeEquals

1,818 views

10 years ago

Professor Messer
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

Security+ Training Course Index: https://professormesser.link/701videos Professor Messer's Course Notes: ...

10:25
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

265,983 views

2 years ago

Sahib Yar
Murmur Hash - Explained

Murmur hashing explained with working example. Code is available in the given GitHub repository. Github: ...

18:33
Murmur Hash - Explained

14,214 views

8 years ago

MIT OpenCourseWare
8. Randomization: Universal & Perfect Hashing

MIT 6.046J Design and Analysis of Algorithms, Spring 2015 View the complete course: http://ocw.mit.edu/6-046JS15 Instructor: ...

1:21:51
8. Randomization: Universal & Perfect Hashing

96,959 views

9 years ago

Udacity
Better Hash Functions - CS101 - Udacity

Other units in this course below: Unit 1: http://www.youtube.com/playlist?list=PLF6D042E98ED5C691 Unit 2: ...

6:34
Better Hash Functions - CS101 - Udacity

4,685 views

13 years ago