Adeyemo Oluwadamilare Emmanuelvinceoludare.hashnode.dev·Sep 3, 2023Art of Authentication (Episode two)User Authentication method (PASSWORD) User authentication is a fundamental aspect of ensuring the security and privacy of digital systems. It verifies the identity of a user trying to access a system, application, or data by requiring them to provide...Discussauthentication
James Mathengecodejunction.hashnode.dev·Jul 17, 2023Properties of Hash Functions: Unlocking the Secrets Behind HashingIn the previous article, we introduced the concept of hashing and hash functions. We learned that hash functions are algorithms that take an input and generate a unique fixed-size string output called a hash value. But what makes an effective hash fu...Discuss·10 likesHashing
Hemant Besracodeinjava.hashnode.dev·Jul 4, 2023Hash-based Search In Java using linked ListHashing search, also known as hash-based search or hash table search, is a search algorithm that uses a data structure called a hash table to efficiently store and retrieve data. It leverages a hash function to map the search keys to indexes in the h...Discuss·42 readsData StructureHashing
Affan Imranblockgenix.hashnode.dev·Jun 19, 2023From Encryption to Authentication: The Essentials of Digital Signatures, Keys, and Hashing.The need for secure communication and data security in today’s digital world is increasing at a high rate. In protecting online interactions and sensitive information, 3 essentials play a vital role, those are Encryption, Authentication, and Digital ...Discuss·30 reads #blockchain #cryptocurrency #digitalwallet #cryptowallet #digitalcurrency #blockchaintechnology #cryptocurrencymining #bitcoin #ethereum #smartcontracts #decentralizedfinance (DeFi) #privatekeys #publickeys
James Mathengecodejunction.hashnode.dev·Jun 3, 2023Understanding Hash: The BasicsIntroduction This article serves as the introduction to our hashing series. Throughout this series, we'll study the interesting realm of hash functions and their importance in computer science. Hashing is a fundamental concept that plays a vital role...Discuss·10 likes·26 readsHashing
Anjani Jayanth Roy Gorrejayanthroyg.hashnode.dev·Feb 15, 2023How Passwords are Stored?Do you know that a highly secured password usually comprises 95 characters( i.e., 26 lower case, 26 upper case, 10 digits, and 33 symbols) whatever might be its length. Passwords are initially not stored by anyone or any database by any organization....Discuss·98 readsCryptography
Jared Atandijaredatandi.hashnode.dev·Oct 22, 2022Hashing Function Techniques for Hash TablesHash tables are one of the most commonly used data structures in computer programming. They are used to store key-value pairs and are often used to implement lookup tables, such as dictionaries. Hash tables are typically implemented using an array. T...Discuss·2 likes·246 readsSE General Knowledgehashing functions