Bhavesh Nandavebhaveshnandave.hashnode.dev·Apr 11, 2024Hashing Algorithm in BlockchainIn the world of blockchain, each block is like a link in a chain, and it's crucial to ensure that each link is securely connected to the previous one. This connection is established using a unique identifier called a Hash. Think of a Hash as a digita...DiscussHashing
Manupuri Nithinnithinmanupuri.hashnode.dev·Apr 3, 2024Hashing &Consistent HashingHashing Hashing is for fast retrieval operations which the data is stored based on the hash function it uses modules for the hash value based on that hash value. it is a traditional way for the storing the data and there is a drawback for when we are...DiscussHashing
Kshitij Khankakshitijkhanka.hashnode.dev·Mar 24, 2024Everything about Blockchain - Week 1 of LearningAfter reading this blog, you will learn about — Blockchain basics and properties, Hashing algorithms, Mining, Distributed P2P Network & Gas Fees. Side context : This marks the beginning of exploring and diving deep into Blockchain, Protocols, Cryptog...Discuss·1 likeBlockchain
Rudraksh Rawalthatcurlyhairedguy.hashnode.dev·Mar 20, 2024Diving Into BlockchainThe need of blockchain when we have banks? They are the intermediaries High transaction fees Problem of double counting Low security features therefore risking all the data High international tansfer cost Lots of documentation setting up Not 2...DiscussBlockchain
Aditya Ladadityaladblog.hashnode.dev·Mar 13, 2024Demystifying Consistent Hashing: A Comprehensive GuideWhat is Hashing ? It is a technique to convert data into hash code using a hash function. This hash code is used to uniquely identify the data or map it to a specific memory location. Why use Hashing ? Efficient storage of data by converting ...DiscussHashing
Samuelcodetree3.hashnode.dev·Feb 10, 2024Hash Tables In CHash tables are a data structure that seek to solve the time complexity problem of arrays and linked lists. With arrays and linked lists, one has to traverse through the lists in order to get the particular element they are looking for. This leads to...DiscussHashing
Nishant Tomerdevxnishant.hashnode.dev·Feb 9, 2024Safeguarding Passwords: A Comprehensive Guide to Bcrypt in Backend DevelopmentIntroduction: In the ever-evolving landscape of backend development, security remains a paramount concern, especially when it comes to user authentication and password protection. Bcrypt, a battle-tested and widely acclaimed library, stands as a fort...DiscussBcrypt
Shyamrag Charuvilinfomight.hashnode.dev·Jan 28, 2024Mastering Bloom Filters: Streamline Your Data Checks EfficientlyAre you new to the world of Bloom Filters and looking for a beginner-friendly guide? Curious about how large-scale websites efficiently check data like username availability? In this blog, we explore Bloom Filters in a straightforward and detailed ma...Discuss·67 readsbitset
Yichun Zhaoyichunzhao.hashnode.dev·Jan 10, 2024Java MD5 Hashingimport java.security.MessageDigest; import java.security.NoSuchAlgorithmException; public class MD5Hashing { public static String hashString(String input) { try { // Create a MessageDigest instance for MD5 Messag...DiscussHashing
Atchyut Preetham Pulavarthihashnode.atchyut.dev·Jan 6, 2024Unraveling the mystery behind RSA encryptionFor a better and more immersive experience, read this blog on my official blog - https://blog.atchyut.dev/blogpost/8b3ff3e755fd4624b7b9c7fff75a13b4 Hey there 👋🏼! Hope you're doing great. I'm super stoked today because we’ll be diving into RSA encry...Discussencryption