Krystian Piękośblog.infotraining.pl·Dec 6, 2024How to Hash Objects Without Repetition: std::hash can be DRYIn my previous article on std::tie, I discussed how to simplify comparison operators for your classes using the std::tie() function. Now we’ll explore a more complex case. Let's create a generic implementation of a hashing function for a class or str...629 readsC++
Souvik Mukherjeesouvik150.hashnode.dev·Sep 28, 2024Introduction to Hashing: What You Need to KnowEver head of associative arrays? also known as map or dictionaries. One of the most popular data structures to implement associative arrays as hash tables. Wait but what is hashing? Hashing is a technique used to store and retrieve data as quickly as...data structures
Jyotiprakash Mishrablog.jyotiprakash.org·Sep 26, 2024Introduction to HashingHashing is a technique used to map data (such as strings, numbers, or any other data type) to a fixed-size value, often called a hash code or hash value. The purpose of hashing is to efficiently store and retrieve data from a collection, typically us...12 likes·1.1K readscollisions
Darsh Pateldarsh-patel.hashnode.dev·Aug 16, 2024Collision Handling Techniques in Hashing You Need to KnowIntroduction to Collisions Hashing is a fundamental concept in computer science, widely used in various applications such as database indexing, caching, and data retrieval. The essence of hashing lies in mapping large datasets to smaller, fixed-size ...35 readsHashing
Adeyemo Oluwadamilare Emmanuelvinceoludare.hashnode.dev·Sep 3, 2023Art of Authentication (Episode two)User Authentication method (PASSWORD) User authentication is a fundamental aspect of ensuring the security and privacy of digital systems. It verifies the identity of a user trying to access a system, application, or data by requiring them to provide...authentication
James Mathengecodejunction.hashnode.dev·Jul 17, 2023Properties of Hash Functions: Unlocking the Secrets Behind HashingIn the previous article, we introduced the concept of hashing and hash functions. We learned that hash functions are algorithms that take an input and generate a unique fixed-size string output called a hash value. But what makes an effective hash fu...10 likesHashing
Hemant Besracodeinjava.hashnode.dev·Jul 4, 2023Hash-based Search In Java using linked ListHashing search, also known as hash-based search or hash table search, is a search algorithm that uses a data structure called a hash table to efficiently store and retrieve data. It leverages a hash function to map the search keys to indexes in the h...36 readsData StructureHashing
Affan Imranblockgenix.hashnode.dev·Jun 19, 2023From Encryption to Authentication: The Essentials of Digital Signatures, Keys, and Hashing.The need for secure communication and data security in today’s digital world is increasing at a high rate. In protecting online interactions and sensitive information, 3 essentials play a vital role, those are Encryption, Authentication, and Digital ...30 reads #blockchain #cryptocurrency #digitalwallet #cryptowallet #digitalcurrency #blockchaintechnology #cryptocurrencymining #bitcoin #ethereum #smartcontracts #decentralizedfinance (DeFi) #privatekeys #publickeys
James Mathengecodejunction.hashnode.dev·Jun 3, 2023Understanding Hash: The BasicsIntroduction This article serves as the introduction to our hashing series. Throughout this series, we'll study the interesting realm of hash functions and their importance in computer science. Hashing is a fundamental concept that plays a vital role...10 likesHashing
Anjani Jayanth Roy Gorrejayanthroyg.hashnode.dev·Feb 15, 2023How Passwords are Stored?Do you know that a highly secured password usually comprises 95 characters( i.e., 26 lower case, 26 upper case, 10 digits, and 33 symbols) whatever might be its length. Passwords are initially not stored by anyone or any database by any organization....101 readsCryptography