Cryptographic algorithms

Hash chain

A hash chain is the successive application of a cryptographic hash function to a piece of data. In computer security, a hash chain is a method to produce many one-time keys from a single key or password. For non-repudiation a hash function can be applied successively to additional pieces of data in order to record the chronology of data's existence. (Wikipedia).

Hash chain
Video thumbnail

Hash Chain - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Hash Tables and Hash Functions

This computer science video describes the fundamental principles of the hash table data structure which allows for very fast insertion and retrieval of data. It covers commonly used hash algorithms for numeric and alphanumeric keys and summarises the objectives of a good hash function. Co

From playlist Data Structures

Video thumbnail

Java Hash Table

Get the Code Here: http://goo.gl/srwIf Welcome to my Java Hash Table tutorial. A Hash Table is a data structure offers fast insertion and searching capabilities. The negative is that they are limited in size because they are based on arrays. They are also hard to order. People get confus

From playlist Java Algorithms

Video thumbnail

Cryptographic Hash Functions: Part 1

Cryptographic Hash Functions Applications of Crypto Hash Functions Birthday Problem Secure Hash Algorithm (SHA)

From playlist Network Security

Video thumbnail

Hash table separate chaining source code

Related Videos: Hash table intro/hash function: https://www.youtube.com/watch?v=2E54GqF0H4s Hash table separate chaining: https://www.youtube.com/watch?v=T9gct6Dx-jo Hash table separate chaining code: https://www.youtube.com/watch?v=Av9kwXkuQFw Hash table open addressing: https://www.youtu

From playlist Data structures playlist

Video thumbnail

What is a Hashtag?

In this video, you’ll learn more about how hashtags are used on Twitter. Visit https://www.gcflearnfree.org/twitter/what-is-a-hashtag/1/ for our text-based lesson. This video includes information on: • Using hashtags • Browsing popular hashtags We hope you enjoy!

From playlist Twitter

Video thumbnail

Cryptography (part 3 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Hash table separate chaining

Related Videos: Hash table intro/hash function: https://www.youtube.com/watch?v=2E54GqF0H4s Hash table separate chaining: https://www.youtube.com/watch?v=T9gct6Dx-jo Hash table separate chaining code: https://www.youtube.com/watch?v=Av9kwXkuQFw Hash table open addressing: https://www.youtu

From playlist Data structures playlist

Video thumbnail

Blockchain 101 (or How to Build a Blockchain with JavaScript)

In this webinar, you will learn about how a blockchain is built, the most common inner workings, and the different use cases and applications. You will learn from the live code demo how to build a basic blockchain with JavaScript. Follow Wizeline Academy on their social channels: F

From playlist Blockchain

Video thumbnail

An Introduction to Modern Hashing

A basic review of hashing by Dzejla Medjedovic, a co-author of Algorithms and Data Structures for Massive Datasets. This video is an excerpt from a live coding session by Dzejla Medjedovic. Watch the full video at: http://mng.bz/v1Am 📚📚📚 Algorithms and Data Structures for Massive Datas

From playlist Data Science

Video thumbnail

Lecture 19: Bitcoin

Lecture 19: Bitcoin MIT 6.824: Distributed Systems (Spring 2020) https://pdos.csail.mit.edu/6.824/

From playlist MIT 6.824 Distributed Systems (Spring 2020)

Video thumbnail

This one weird trick will 10x your company's by Kyle Crum

Do you love the blockchain? Everyone loves the blockchain! Just saying it lends tech cred and tells everyone in the room that you are hip with the technologies. Blockchain. Blockchain. Crypto. Blockchain. According to the "internet" I can use blockchains for such things as registering my b

From playlist Madison+ Ruby 2018

Video thumbnail

4. Blockchain Basics & Consensus

MIT 15.S12 Blockchain and Money, Fall 2018 Instructor: Prof. Gary Gensler View the complete course: https://ocw.mit.edu/15-S12F18 YouTube Playlist: https://www.youtube.com/playlist?list=PLUl4u3cNGP63UUkfL0onkxF6MYgVa04Fn This lecture covers blockchain consensus protocols. Because of the d

From playlist MIT 15.S12 Blockchain and Money, Fall 2018

Video thumbnail

CERIAS Security: Recent Attacks on MD5 2/6

Clip 2/6 Speaker: John Black · University of Colorado at Boulder Cryptology is typically defined as cryptography (the construction of cryptographic algorithms) and cryptanalysis (attacks on these algorithms). Both are important, but the latter is more fun. Cryptographic hash functions

From playlist The CERIAS Security Seminars 2006

Video thumbnail

Generating Rainbow Tables With RainbowCrack

Hey guys! HackerSploit here back again with another video, in this video, I will be showing you how to generate Rainbow Tables for password hash cracking with RainbowCrack. ⭐Help Support HackerSploit by using the following links: 🔗 NordVPN: https://nordvpn.org/hacker Use the link above or

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Hash table double hashing

Related Videos: Hash table intro/hash function: https://www.youtube.com/watch?v=2E54GqF0H4s Hash table separate chaining: https://www.youtube.com/watch?v=T9gct6Dx-jo Hash table separate chaining code: https://www.youtube.com/watch?v=Av9kwXkuQFw Hash table open addressing: https://www.youtu

From playlist Data structures playlist

Video thumbnail

Bitcoin ₿ in 100 Seconds // Build your Own Blockchain

Learn the basics of Bitcoin ₿ in 100 seconds, then build your own blockchain from scratch with Node.js and TypeScript https://github.com/fireship-io/node-blockchain Support the Cause Send me some BTC: 13pEjpLf3taeezGkLpn2CMi2YNxaBF7rVZ Sponsor me on Github for $1 https://github.com/co

From playlist Backend Development

Related pages

Key stretching | One-way function | Merkle tree | Hash list | Hash-based cryptography | Cryptographic hash function | Computer security | X.509 | Bitcoin | Key (cryptography) | Non-repudiation | Blockchain