ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

96 results

Lisk
What is Hashing? Hash Functions Explained Simply

What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting ...

2:36
What is Hashing? Hash Functions Explained Simply

446,453 views

7 years ago

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

... http://pgfplots.net/tikz/examples/author/jake/ Wikipedia Hash Function Algorithm illustrations: https://en.wikipedia.org/wiki/SHA-2 ...

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,250 views

6 years ago

MalwareAnalysisForHedgehogs
Malware Theory - Imphash algorithm explained

The imphash or import hash by Mandiant has been widely adopted by malware databases, security software and PE tools. What is ...

5:43
Malware Theory - Imphash algorithm explained

5,845 views

4 years ago

aantonop
Bitcoin Q&A: How Is the Number of Zeros in the Target Hash Determined?

How is the Bitcoin mining difficulty target hash determined? Why are the number of zeros at the beginning of the number used to ...

5:25
Bitcoin Q&A: How Is the Number of Zeros in the Target Hash Determined?

9,028 views

5 years ago

wikipedia tts
NIST hash function competition | Wikipedia audio article

This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/NIST_hash_function_competition 00:01:13 1 Process ...

8:02
NIST hash function competition | Wikipedia audio article

29 views

6 years ago

Cube Drone
Cube Drone - Bloom Filters

... "How do I generate all of these different hash functions anyways?" For other questions, like "who taught you how to do math?

3:32
Cube Drone - Bloom Filters

36,383 views

11 years ago

Programming threads
Python Dictionaries Explained: Hashing, Performance & Big O Notation

Master Python dictionaries from the ground up — from the basic structure to how they work behind the scenes. In this tutorial, we ...

13:57
Python Dictionaries Explained: Hashing, Performance & Big O Notation

229 views

1 year ago

Jon Gjengset
Crust of Rust: std::collections

In this video we go over the various collection types in the Rust standard library (effectively `std::collections`), and discuss a bit ...

2:45:04
Crust of Rust: std::collections

84,805 views

2 years ago

Rafiq Bouhsen
19.Immutability: Hashing and Chaining with Proof of Work

Source: EDX LinuxFoundationX LFS170x Blockchain: Understanding Its Uses and Implications ...

7:43
19.Immutability: Hashing and Chaining with Proof of Work

12 views

4 years ago

DEFCONConference
DEF CON 30 - Orange Tsai - Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS

To deal with this problem, 25 years ago, Microsoft designed its own Dynamic Hashing algorithm and applied it everywhere in IIS, ...

46:38
DEF CON 30 - Orange Tsai - Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS

1,326 views

3 years ago

CS 125 @ Illinois
CS 125 Fall 2018: Mon 12.3.2018. Hashing and Maps

Hash tables, maps, and some theory behind hashing. https://cs125.cs.illinois.edu/learn/2018_12_03_hashing_and_maps.

50:55
CS 125 Fall 2018: Mon 12.3.2018. Hashing and Maps

903 views

7 years ago

Wisc-Online
CRC - Cyclic Redundancy Check

Learn what the CRC is, the technology behind it, and how it's performed.

6:05
CRC - Cyclic Redundancy Check

144,767 views

9 years ago

Confreaks
RubyConf 2018 - Cache is King: Get the Most Bang for Your Buck From Ruby by Molly Struve

RubyConf 2018 - Cache is King: Get the Most Bang for Your Buck From Ruby by Molly Struve Sometimes your fastest queries can ...

33:20
RubyConf 2018 - Cache is King: Get the Most Bang for Your Buck From Ruby by Molly Struve

4,534 views

7 years ago

Learn with Shikaar
Hash String to Whole Number

In this video, you'll learn: • How to create a simple hash function for strings. • Using character codes and mathematical operations ...

3:32
Hash String to Whole Number

10 views

8 months ago

Spoken-Tutorial IIT Bombay
MD5 Encryption - English

MD5 Encryption Calculates the MD5 hash of str using the RSA Data Security, Inc.'s MD5 Message-Digest Algorithm, and returns ...

9:34
MD5 Encryption - English

5,504 views

11 years ago

84° Tech Studio
Computer Science Explained in 17 Minutes! 🎓💻

Ever wondered how computers work? Dive into (almost) all of Computer Science in just 17 minutes! ✨ We'll cover essential ...

16:49
Computer Science Explained in 17 Minutes! 🎓💻

71 views

1 year ago

Jon Gjengset
Crust of Rust: Atomics and Memory Ordering

In this episode of Crust of Rust, we go over Rust's atomic types, including the mysterious Ordering enum. In particular, we explore ...

2:39:20
Crust of Rust: Atomics and Memory Ordering

100,330 views

4 years ago

Programming threads
Why Python Dicts Use 33% Extra Memory

Key Performance Insights: ✓ Hash function maps keys to memory slots ✓ Open addressing handles collisions ✓ Load factor ...

0:57
Why Python Dicts Use 33% Extra Memory

1,121 views

2 months ago

Rafiq Bouhsen
18.Immutability: Immutability

Remember from earlier that one of the properties of a hash function is that it is extremely difficult to find two inputs to a hash ...

4:20
18.Immutability: Immutability

10 views

4 years ago

John Kubiatowicz
CS162 Lecture 24 (4/28/2020): Distributed File Systems (Finished), Key-Value Stores, and Chord

In this lecture we finish our discussion of Distributed File Systems and cache consistency, and then dive into a discussion of ...

1:25:22
CS162 Lecture 24 (4/28/2020): Distributed File Systems (Finished), Key-Value Stores, and Chord

1,863 views

5 years ago

Rafiq Bouhsen
15.Cryptography: Merkle Tree, Validation of Data

... type of data storage structure based on hash functions is called a Merkle tree: It is structured as a binary tree; the leaves contain ...

1:57
15.Cryptography: Merkle Tree, Validation of Data

139 views

4 years ago

Spoken-Tutorial IIT Bombay
MD5 Encryption - Tamil

MD5 Encryption Calculates the MD5 hash of str using the RSA Data Security, Inc.'s MD5 Message-Digest Algorithm, and returns ...

9:33
MD5 Encryption - Tamil

2,918 views

11 years ago

Cointelegraph
Bitcoin’s Peak Hash Rate, Booking.com Predicts Global Adoption | Crypto News

CEO at Booking.com predicts global crypto adoption, Austrian telecom giant A1 accepts crypto, Bitcoin hash rate reaches an ...

9:26
Bitcoin’s Peak Hash Rate, Booking.com Predicts Global Adoption | Crypto News

2,542 views

6 years ago

Rafiq Bouhsen
12.Cryptography: Private/Public Key Cryptography

Source: EDX LinuxFoundationX LFS170x Blockchain: Understanding Its Uses and Implications ...

3:12
12.Cryptography: Private/Public Key Cryptography

6 views

4 years ago

aantonop
Bitcoin Q&A: Cryptographic Primitives

How are cryptographic primitives employed in Bitcoin? What are hashes and digital signatures? How does elliptic curve ...

6:12
Bitcoin Q&A: Cryptographic Primitives

9,506 views

7 years ago