Garvit Dadheechgarvitdadheech.hashnode.dev·Nov 6, 2024Why Ethereum Addresses Begin with 0x and How Keccak-256 Makes it Possible?In this article I will tell you about the keccak-256 algorithm that is used to create Ethereum public addresses and then we will see why the ethereum addresses starts with 0x. What is Keccak-256 ? Keccak-256 is a cryptographic hash function and a mem...Discuss·1 likeBlockchain
J3bitokjebitok.hashnode.dev·Oct 27, 2024Cryptography: Hashing Basics (TryHackMe)In this article, I will write a write-up for Hashing Basics that covers Hash Functions, Insecure Password Storage for Authentication, Using Hashing for Secure Password Storage, Recognising Password Hashes, Password Cracking, and Hashing for Integrity...Discuss·48 readsHashing
Gwon Honggwonhong.hashnode.dev·Oct 22, 2024How bcrypt hashes with salt (+Rainbow Table Attack)Goals Understand how bcrypt do ‘salting’ Especially, how it can do salting without storing salt at extra columns dedicated for ‘salt’ Basics Rainbow Table Attack Rainbow Table is a table with various possible passwords and it’s hashes. When attac...DiscussHashing
Yasin Sarkaryasinsarkar.hashnode.dev·Oct 20, 2024🌟 Understanding the Spread Operator and Rest Operator in JavaScriptJavaScript has two versatile features, the Spread Operator and the Rest Operator, which are both represented by three dots (...). While they look the same, they have different roles based on the context in which they're used. Let’s break down each of...DiscussJavaScript
Arturcode-with-arthur.hashnode.dev·Oct 11, 2024Mastering Hash Tables: The Key to Fast Data RetrievalIntroduction In programming, efficiency is key, and one of the most powerful tools to achieve fast data access is a hash table. Hash tables are a fundamental data structure that allows us to store and retrieve data in constant time (O(1)) on average....Discusshash table
Kingsley Ihemelandukijuchihe.hashnode.dev·Oct 2, 2024Hash Maps in DSAWhat are Hash Maps Hash maps are data structures that store key-value pairs, allowing for efficient data retrieval. They function similarly to a dictionary, where a unique key corresponds to a specific value. For instance, consider a scenario where y...DiscussData Structures and Algorithmshashmap
Souvik Mukherjeesouvik150.hashnode.dev·Sep 28, 2024Introduction to Hashing: What You Need to KnowEver head of associative arrays? also known as map or dictionaries. One of the most popular data structures to implement associative arrays as hash tables. Wait but what is hashing? Hashing is a technique used to store and retrieve data as quickly as...Discussdata structures
Riya Sanderriyasander.hashnode.dev·Sep 27, 2024Encoding vs Encryption: A Technical Comparison and ExplanationIn the world of digital communication and data transfer, encoding and encryption are essential concepts. Both convert data from one form to another, but the purpose and function are quite different. Encoding provides data that is formatted for compat...Discuss·38 readsencoding
Jyotiprakash Mishrablog.jyotiprakash.org·Sep 26, 2024Introduction to HashingHashing is a technique used to map data (such as strings, numbers, or any other data type) to a fixed-size value, often called a hash code or hash value. The purpose of hashing is to efficiently store and retrieve data from a collection, typically us...Discuss·12 likes·713 readscollisions
sai phanindrablog.saiphanindra.com·Sep 8, 2024Encryption, Encoding, and Hashing: Understanding the DifferencesIn today's digital age, data security is more crucial than ever. With the increasing threat of cyberattacks and data breaches, it's essential to understand the different techniques used to protect sensitive information. Encryption, encoding, and hash...DiscussCryptography and SecurityCryptography