Vinayak Sharmaitsvinayak.hashnode.dev·Dec 8, 2024The Bcrypt Algorithm for Secure Password HashingHashing is a cryptographic function that cannot be reversed. It takes an input of random size to produce fixed-size values. These fixed-size values are called hash values, and the cryptographic function is called the hashing function. Hashing has a c...Discuss·1 likePython
Subhanshu Mohan Guptablogs.subhanshumg.com·Nov 30, 2024Ensuring Inter-Agent Data Integrity in Multi-Node DevSecOpsIntroduction In modern DevSecOps environments, where distributed systems and multi-node architectures are prevalent, ensuring data integrity during inter-agent communication is crucial. Compromised data exchanges can lead to system failures, vulnerab...Discuss·10 likes·36 readsAI powered DevOpsMultiNodeArchitecture
Pankaj Kholiyadatatype.hashnode.dev·Nov 26, 2024Hash ArrayHash Array Hash Array is a technique used to efficiently count the frequency of elements in an array using hashing. This method involves initializing an array and hashing the elements of the original array based on their values to keep track of their...DiscussHashing
Garvit Dadheechgarvitdadheech.hashnode.dev·Nov 6, 2024Why Ethereum Addresses Begin with 0x and How Keccak-256 Makes it Possible?In this article I will tell you about the keccak-256 algorithm that is used to create Ethereum public addresses and then we will see why the ethereum addresses starts with 0x. What is Keccak-256 ? Keccak-256 is a cryptographic hash function and a mem...Discuss·1 likeBlockchain
J3bitokjebitok.hashnode.dev·Oct 27, 2024Cryptography: Hashing Basics (TryHackMe)In this article, I will write a write-up for Hashing Basics that covers Hash Functions, Insecure Password Storage for Authentication, Using Hashing for Secure Password Storage, Recognising Password Hashes, Password Cracking, and Hashing for Integrity...Discuss·54 readsHashing
Gwon Honggwonhong.hashnode.dev·Oct 22, 2024How bcrypt hashes with salt (+Rainbow Table Attack)Goals Understand how bcrypt do ‘salting’ Especially, how it can do salting without storing salt at extra columns dedicated for ‘salt’ Basics Rainbow Table Attack Rainbow Table is a table with various possible passwords and it’s hashes. When attac...DiscussHashing
Yasin Sarkaryasinsarkar.hashnode.dev·Oct 20, 2024🌟 Understanding the Spread Operator and Rest Operator in JavaScriptJavaScript has two versatile features, the Spread Operator and the Rest Operator, which are both represented by three dots (...). While they look the same, they have different roles based on the context in which they're used. Let’s break down each of...DiscussJavaScript
Arturcode-with-arthur.hashnode.dev·Oct 11, 2024Mastering Hash Tables: The Key to Fast Data RetrievalIntroduction In programming, efficiency is key, and one of the most powerful tools to achieve fast data access is a hash table. Hash tables are a fundamental data structure that allows us to store and retrieve data in constant time (O(1)) on average....Discusshash table
Kingsley Ihemelandukijuchihe.hashnode.dev·Oct 2, 2024Hash Maps in DSAWhat are Hash Maps Hash maps are data structures that store key-value pairs, allowing for efficient data retrieval. They function similarly to a dictionary, where a unique key corresponds to a specific value. For instance, consider a scenario where y...DiscussData Structures and Algorithmshashmap
Souvik Mukherjeesouvik150.hashnode.dev·Sep 28, 2024Introduction to Hashing: What You Need to KnowEver head of associative arrays? also known as map or dictionaries. One of the most popular data structures to implement associative arrays as hash tables. Wait but what is hashing? Hashing is a technique used to store and retrieve data as quickly as...Discussdata structures