ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

6,344 results

Computerphile
Hashing Algorithms and Security - Computerphile

Audible free book: http://www.audible.com/computerphile Hashing Algorithms are used to ensure file authenticity, but how secure ...

8:12
Hashing Algorithms and Security - Computerphile

1,616,992 views

12 years ago

Lisk
What is Hashing? Hash Functions Explained Simply

What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting ...

2:36
What is Hashing? Hash Functions Explained Simply

447,631 views

7 years ago

MIT OpenCourseWare
21. Cryptography: Hash Functions

MIT 6.046J Design and Analysis of Algorithms, Spring 2015 View the complete course: http://ocw.mit.edu/6-046JS15 Instructor: ...

1:22:01
21. Cryptography: Hash Functions

192,717 views

9 years ago

Simply Explained
Passwords & hash functions (Simply Explained)

How can companies store passwords safely and keep them away from hackers? Well let's find out! With all the data breaches ...

7:28
Passwords & hash functions (Simply Explained)

391,873 views

7 years ago

Michael Sambol
Hash tables in 4 minutes

Hash tables in 4 minutes. Code: https://github.com/msambol/dsa/blob/master/data_structures/hash_table.py Sources: 1.

3:52
Hash tables in 4 minutes

344,854 views

3 years ago

MIT OpenCourseWare
4. Hashing

This lecture discusses comparison models, decision trees, and hash functions. License: Creative Commons BY-NC-SA More ...

52:55
4. Hashing

392,716 views

4 years ago

Computerphile
SHA: Secure Hashing Algorithm - Computerphile

Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash ...

10:21
SHA: Secure Hashing Algorithm - Computerphile

1,321,688 views

8 years ago

PyCon 2015
Curtis Lassam - Hash Functions and You: Partners in Freedom - PyCon 2015

"Speaker: Curtis Lassam Our trusty friend, the hash function, is as crucial to programming as linked lists or recursion, but it doesn't ...

27:05
Curtis Lassam - Hash Functions and You: Partners in Freedom - PyCon 2015

10,447 views

10 years ago

Professor Messer
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

Security+ Training Course Index: https://professormesser.link/701videos Professor Messer's Course Notes: ...

10:25
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

266,721 views

2 years ago

ByteByteGo
Consistent Hashing | Algorithms You Should Know #1

Weekly system design newsletter: https://bit.ly/3tfAlYD Checkout our bestselling System Design Interview books: Volume 1: ...

8:04
Consistent Hashing | Algorithms You Should Know #1

395,103 views

3 years ago

CppCon
CppCon 2017: Matt Kulukundis “Designing a Fast, Efficient, Cache-friendly Hash Table, Step by Step”

http://CppCon.org — Presentation Slides, PDFs, Source Code and other presenter materials are available at: ...

59:34
CppCon 2017: Matt Kulukundis “Designing a Fast, Efficient, Cache-friendly Hash Table, Step by Step”

128,301 views

8 years ago

Udacity
Better Hash Functions - Intro to Computer Science

This video is part of an online course, Intro to Computer Science. Check out the course here: ...

6:34
Better Hash Functions - Intro to Computer Science

6,124 views

10 years ago

Zero Knowledge
ZK Whiteboard Sessions - S3M1: How to Build Hash Functions, with Jean-Philippe (JP) Aumasson

S3M1: How to Build Hash Functions, with Jean-Philippe (JP) Aumasson. For all additional info and resources watch it here: ...

1:14:50
ZK Whiteboard Sessions - S3M1: How to Build Hash Functions, with Jean-Philippe (JP) Aumasson

1,363 views

4 months ago

Professor Kevin Wortman
Hash Functions

Hash functions, as used in the Hash Table data structure. Slides: ...

13:15
Hash Functions

565 views

4 years ago

Gate Smashers
L-6.1: What is hashing with example | Hashing in data structure

01:13 – Search Key & Hash Table 02:36 – Hash Function Example (K mod N) 03:32 – Other Hashing Methods(Mid-Square ...

5:53
L-6.1: What is hashing with example | Hashing in data structure

2,276,008 views

5 years ago

Khan Academy
Bitcoin - Cryptographic hash function

Courses on Khan Academy are always 100% free. Start practicing—and saving your progress—now: ...

10:14
Bitcoin - Cryptographic hash function

284,929 views

12 years ago

The Federalist Society
Probability in Bitcoin Mining: The Hashing Function

How does the hash function work in the world of Bitcoin mining? Peter Van Valkenburgh of the Coin Center explains how the hash ...

2:56
Probability in Bitcoin Mining: The Hashing Function

61,053 views

8 years ago

MIT OpenCourseWare
1. Signatures, Hashing, Hash Chains, e-cash, and Motivation

MIT MAS.S62 Cryptocurrency Engineering and Design, Spring 2018 Instructor: Neha Narula, Tadge Dryja View the complete ...

1:06:38
1. Signatures, Hashing, Hash Chains, e-cash, and Motivation

225,132 views

6 years ago

HackerRank
Data Structures: Hash Tables

Learn the basics of Hash Tables, one of the most useful data structures for solving interview questions. This video is a part of ...

6:25
Data Structures: Hash Tables

1,540,541 views

9 years ago

MIT OpenCourseWare
Lecture 8: Hashing with Chaining

MIT 6.006 Introduction to Algorithms, Fall 2011 View the complete course: http://ocw.mit.edu/6-006F11 Instructor: Erik Demaine ...

51:16
Lecture 8: Hashing with Chaining

616,885 views

13 years ago