Articles by Tag #hashing

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Hashing

যখন আপনি কোনো ওয়েবসাইটে নতুন অ্যাকাউন্ট খোলার কথা ভাবেন, তখন আপনাকে ইমেল প্রদান করতে হয় এবং একটি...

Learn More 20 0Jan 23

Password Hashing and Data Integrity in Real-World Implementation

When a user creates a new account by signing up, the password they provide is not stored directly in...

Learn More 20 1Jan 25

What the Hash?! Understanding the Basics of Hashing

Hashing is an important concept that helps us organize and manage data more efficiently. It's like a...

Learn More 10 0May 4

The Bcrypt Algorithm for Secure Password Hashing

Hashing is a cryptographic function that cannot be reversed. It takes an input of random size to...

Learn More 5 0Dec 8 '24

Lithe Hash: A Robust Module for Secure Password Hashing

Lithe Hash is a robust module designed for securely hashing passwords using the Bcrypt algorithm....

Learn More 4 0Nov 4 '24

Difference Between Encryption and Hashing 🔐🔑

Table of Contents Introduction Understanding Encryption Understanding Hashing Key...

Learn More 2 0Nov 8 '24

Cuckoo Hashing: An Efficient Collision Resolution Technique with O(1) Lookup Time

Overview Cuckoo Hashing is an advanced technique used to resolve hash collisions...

Learn More 1 1Feb 25

🚀 Introducing HashX – The Lightweight & Fast Hashing Library! 🔥

Hey Developers! 👋 I just launched HashX, an open-source hashing library that makes secure hashing...

Learn More 1 0Mar 26

Scalable Load Balancing with Consistent Hashing

In the world of micro-services, load balancing is a cornerstone to achieve scalability. There are...

Learn More 1 0Jul 27

Two Unconventional Ways to store Passwords: Honeywords & Rock Salt

As online threats keep evolving, storing passwords securely has become a constant challenge for...

Learn More 0 0Oct 31 '24

How to Prove Future Claims: A Guide to Cryptographic Foreshadowing

A user on Hacker News posed an intriguing question: how can one foreshadow specific information and...

Learn More 0 0May 26

Understanding Hash and Digital Signature in Blockchain: Building Trust Without Trusting Anyone

In our modern digital world, we do a lot of stuff online, transferring money, signing contracts, and...

Learn More 0 1Jul 17

🧠 Building a Simple Hash Table in C (with Linear Probing)

🧠 Building a Simple Hash Table in C (with Linear Probing) Hash tables are among the most efficient...

Learn More 0 0Jul 25

Pattern 9: Hashing

List of problems I have solved so far Easy Medium Hard List of problems I have...

Learn More 0 0Dec 14 '24

CryptX: Your Pocket-Sized Cryptography Playground!

Quick Summary: 📝 CryptX is an Android toolkit for experimenting with cryptography,...

Learn More 0 0Jul 9

Why Laravel’s bcrypt Hashes Fail in Node.js and How to Fix It

Introduction When integrating a new Node.js authentication service with an existing...

Learn More 0 2Jun 8

Sorting Algorithms That Use Hash Tables

The process of sorting is an essential undertaking in the field of computer science. Over...

Learn More 0 0Dec 7 '24

Hyperdimensional Faceprints: Building a Zero‑Shot DMCA Firewall with 10‑Bit Math

A deep dive into how ultra‑compact binary embeddings can flag stolen livestream frames in under 2 ms...

Learn More 0 0Jul 21

What is Hashing? A Complete Guide for Developers and Security Professionals

Table of Contents Introduction Core Concepts Properties of Hash Functions How Hashing...

Learn More 0 0Dec 9 '24

The Science of Password Protection: Understanding Hashing, Salting, and the Future of Authentication

Passwords remain the primary keys to our online identities despite their well-documented...

Learn More 0 0May 15

Lithe Hash: Um Módulo Robusto para Hashing Seguro de Senhas

O Lithe Hash é um módulo robusto projetado para hashing seguro de senhas utilizando o algoritmo...

Learn More 0 0Nov 4 '24

Basic File Integrity Monitoring System

Git Repo : Git repo of File integrity monitoring system This Python-based system monitors assigned...

Learn More 0 0Oct 8 '24

The Evolution of Hashing Algorithms: From MD5 to Modern Day

The journey of cryptographic hash functions mirrors the evolution of digital security itself. From...

Learn More 0 0Dec 9 '24

𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

Data security is a top priority for businesses and individuals alike. With cyber threats evolving,...

Learn More 0 0Nov 2 '24

How does BCrypt Verification work?

Have you ever wondered how can hashing algorithm verifies? Before we going into that, we have to...

Learn More 0 0Mar 20