Articles by Tag #hashing

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

The Magic Behind Instant Lookups: Understanding Hashing and Java's HashMap

1. Hashing: The Core Concept Hashing is a technique used to convert a large key into a small integer...

Learn More 0 0Oct 22

Indexing, Hashing & Query Optimization in SQL

Efficient data retrieval is essential for database performance. In this tutorial, we’ll explore...

Learn More 0 0Oct 5

Hashing

যখন আপনি কোনো ওয়েবসাইটে নতুন অ্যাকাউন্ট খোলার কথা ভাবেন, তখন আপনাকে ইমেল প্রদান করতে হয় এবং একটি...

Learn More 20 0Jan 23

How SHA1 Generators Work (and Why You Should Follow Modern Hashing Best Practices)

If you’ve ever verified a downloaded file, stored a password securely, or checked a digital signature...

Learn More 0 0Nov 12

Learning Web -3

*Assignments Question * Write a function to give input string that output a SHA-256 hash that...

Learn More 0 0Oct 7

Password Hashing and Data Integrity in Real-World Implementation

When a user creates a new account by signing up, the password they provide is not stored directly in...

Learn More 20 1Jan 25

Indexing, Hashing & Query Optimization

Introduction Efficient data retrieval is critical in database management. Indexing and...

Learn More 0 0Oct 3

How Does BCrypt Verification Work?

Have you ever wondered how can hashing algorithm verifies? Before we going into that, we have to...

Learn More 0 0Mar 20

What the Hash?! Understanding the Basics of Hashing

Hashing is an important concept that helps us organize and manage data more efficiently. It's like a...

Learn More 10 0May 4

Scalable Load Balancing with Consistent Hashing

In the world of micro-services, load balancing is a cornerstone to achieve scalability. There are...

Learn More 1 0Jul 27

Cuckoo Hashing: An Efficient Collision Resolution Technique with O(1) Lookup Time

Overview Cuckoo Hashing is an advanced technique used to resolve hash collisions...

Learn More 1 1Feb 25

🧠 Building a Simple Hash Table in C (with Linear Probing)

🧠 Building a Simple Hash Table in C (with Linear Probing) Hash tables are among the most efficient...

Learn More 0 0Jul 25

CryptX: Your Pocket-Sized Cryptography Playground!

Quick Summary: 📝 CryptX is an Android toolkit for experimenting with cryptography,...

Learn More 0 0Jul 9

Why Laravel’s bcrypt Hashes Fail in Node.js and How to Fix It

Introduction When integrating a new Node.js authentication service with an existing...

Learn More 0 2Jun 8

Understanding Hash and Digital Signature in Blockchain: Building Trust Without Trusting Anyone

In our modern digital world, we do a lot of stuff online, transferring money, signing contracts, and...

Learn More 0 1Jul 17

🚀 Introducing HashX – The Lightweight & Fast Hashing Library! 🔥

Hey Developers! 👋 I just launched HashX, an open-source hashing library that makes secure hashing...

Learn More 1 0Mar 26

How to Prove Future Claims: A Guide to Cryptographic Foreshadowing

A user on Hacker News posed an intriguing question: how can one foreshadow specific information and...

Learn More 0 0May 26

Bitwise Operation

Swapping: a = a ^ b b = a^b a = b^a Left Shift: x<< k = x* 2^k Right shift = x >> k =...

Learn More 0 0Aug 27

Hyperdimensional Faceprints: Building a Zero‑Shot DMCA Firewall with 10‑Bit Math

A deep dive into how ultra‑compact binary embeddings can flag stolen livestream frames in under 2 ms...

Learn More 0 0Jul 21

The Science of Password Protection: Understanding Hashing, Salting, and the Future of Authentication

Passwords remain the primary keys to our online identities despite their well-documented...

Learn More 0 0May 15