Explore tweets tagged as #HashFunction
@mohan_inocyx
MOHANBABU VELUSAMY
3 years
"SHA-256 is a powerful cryptographic hash function that is widely used in #blockchain technology. It ensures the security and integrity of transactions by providing a unique digital fingerprint for each block. #crypto #security #hashfunction"
Tweet media one
0
1
4
@stephenlb
Stephen Blum
2 years
Blake 3, recommended by NSA, offers advanced security and efficient performance against SHA-256, utilizing parallelizable multi-core functionality. #blake3 #cryptography #hashfunction
0
1
0
@Infosec_Train
InfosecTrain
2 years
Tweet media one
0
0
4
@animeshsarkar_
Animesh Sarkar
5 days
Modified My NSH (Not so Secure Hash) Algorithm Here’s how mining looks in action! Note: Real mining is far more complex. #Blockchain #CProgramming #HashFunction #Cryptography #BlockchainDevelopment #SystemProgramming #SHA256 #Crypto #Mining #Bitcoin #Ethereum
0
0
4
@techversetrends
jesus69420🕊️
8 months
Cryptographic hash functions take any size input—whether it’s a short message, a photo, or an entire video—and transform it into a fixed-size output, like a digital fingerprint. #Cryptography #Blockchain #HashFunction #CryptoEducation #BlockchainTechnology #CryptoExplained
0
0
0
@Prakkharz
Prakhar Singh
2 years
"A hash function is a mathematical function that produces a fixed-size output, known as a hash value, from an input message. Used for data validation, message authentication, and digital signatures, hash functions are one-way and collision-resistant. #HashFunction #Cryptography"
Tweet media one
0
0
0
@annkkitaaa
Ankita Singh
1 month
What happens when you type your password? It goes through a hash function - turning it into a fixed-length, irreversible value. No matter how long or short your input is, the output is always the same size. Perfect for storing passwords securely! #CyberSecurity #HashFunction
Tweet media one
0
0
4
@firattamurx
firattamur ⚡️
1 year
🐶 LeetCode Problem #572: Subtree of Another Tree Language: Java ☕️ Difficulty: 🟡 Easy 🔥 Takeaway: Recursive functions are commonly used in traversing trees! 🌳🔄 #LeetCode #Java #Coding #Tree #DepthFirstSearch #String #Matching #BinaryTree #HashFunction
Tweet media one
0
0
2
@Cryptogr_MDPI
Cryptography MDPI
1 year
#Cryptography Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance by Younes Lahraoui Saiida Lazaar Youssef Amal Abderrahmane Nitaj https://t.co/9HXvqz5cL1 #elliptic #curve #cryptography #HashFunction
Tweet media one
0
0
2
@encryptioncons
Encryption Consulting LLC
1 year
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
0
0
@newmichwill
Michael Egorov
6 months
@0x9212ce55 Cones down to: - Is passphrase really strong? - Is hashing of the hashfunction to derive the private key strong? Here, some really SLOW hash function is needed. - And even both are yes - better safe than sorry
0
0
3
@RajaSrinivas037
Raja Srinivas Reddy Chappidi
3 months
3042. Count Prefix and Suffix Pairs I - prefix and sufix can be found using slicing (l=len(w1), w2[:l]==w1 and w2[-l:]==w1) or inbuilt methods - feels like tricky part to how to limt the usage of nested loops to increase the time efficiency #DSA #Hashfunction #LeetCode
Tweet media one
0
0
1
@TechExplorist
Tech Explorist
2 years
A new method to boost the speed of online databases @MIT #Database #HashFunction #research
0
0
0
@Louise_A_Allen
The Ħermitologist
2 years
Can You Guess the Original Song! What are the Original Lyrics to the song below? 🎶Source Code, Everything about me’s so Source Code. You don’t even know what I’ve got, It’s really hitting the spot, Oh Macro. 😝👽👌🏾💕🎶 #hashfunction
1
0
0
@chaumian
Chaumian
2 years
#ePrint Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, Tianyu Zhang, Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing (TOSC 2024) https://t.co/EEvb072QwB #HashFunction #NostradamusAttack
0
0
0