Advertisement · 728 × 90
#
Hashtag
#Hashing
Advertisement · 728 × 90
Preview
Node.js — Developing a minimally HashDoS resistant, yet quickly reversible integer hash for V8 Node.js® is a free, open-source, cross-platform JavaScript runtime environment that lets developers create servers, web apps, command line tools and scripts.

Developing a Minimally HashDoS Resistant, Yet Quickly Reversible Integer Hash for V8, by @joyeecheung@mastodon.social (@nodejs@social.lfx.dev):

nodejs.org/en/blog/vulnerability/ma...

#nodejs #hashing #security

0 0 0 0
Preview
SHA-1 Generate a SHA-1 hash from any text in your browser. Learn why SHA-1 is deprecated, how it works, and when to use SHA-256 or SHA-512 instead.

SHA-1

Generate a SHA-1 hash from any text in your browser. Learn why SHA-1 is deprecated, how it works, and when to use SHA-256 or SHA-512 instead.

#sha1 #hashing #cryptography #security #informationtheoretical

0 0 0 0
Original post on soc.octade.net

**PERFECT PANGRAM HASH : Anagram Hash Function**

#DOI https://doi.org/10.5281/zenodo.18448042

A pangram is a sentence or phrase that contains each letter of an alphabet or character set at least once. A perfect pangram is an anagram of the alphabet which contains each letter exactly once […]

0 0 0 0
Infographic-style diagram showing the conceptual flow of the Whirlpool hash algorithm from input data through substitution, permutation, mixing, and repeated rounds to a final hash output.

Infographic-style diagram showing the conceptual flow of the Whirlpool hash algorithm from input data through substitution, permutation, mixing, and repeated rounds to a final hash output.

The Whirlpool hash algorithm is a cryptographic function that turns data of any size into a fixed-length, seemingly random digital fingerprint.

www.miklix.com/calculators/...

#HashFunctions #DataIntegrity #Hashing #CyberSecurity #InfoSec

0 0 0 0
Post image

What Your Auth Library Isn't Telling You About Passwords: Hashing and Salting Explained Before I started building auth into my own projects, I didn't think too deeply about what was happeni...

#Security #passwords #Hashing #Salting

Origin | Interest | Match

0 0 0 0
Landscape infographic showing input data flowing through preprocessing, mixing, compression, and producing a hash output.

Landscape infographic showing input data flowing through preprocessing, mixing, compression, and producing a hash output.

The GOST hash algorithm is a cryptographic function that transforms input data into a fixed-length digital fingerprint designed to be unique and irreversible.

www.miklix.com/calculators/...

#HashFunctions #DataIntegrity #Hashing #CyberSecurity #InfoSec

0 0 0 0
Preview
Matrix Hashing: Two-Level Collision Resolution for Scalable Lookups

Matrix Hashing uses two hash functions and a 2D array to achieve O(1) lookups with minimal collisions and a small sorted overflow for scalable systems. #hashing

0 0 0 0
Password & Encryption Tools | Altius IT Free password strength checker, secure password generator, and cryptographic hash generator. No signup required.

We just launched our Password Tools and it is completely free to use. We built it to be practical and accessible for anyone working with passwords.

Explore the new tools here:
www.altiusit.com/tools/passwo...

#Cybersecurity #PasswordSecurity #Hashing #InfoSec #DevTools #DataProtection #ITSecurity

2 0 0 0

Had enough wine to try on red dresses for next weekend.

Found one that I look less disgusting in. Will call that a win.

As long as I can escape any cameras I’ll have participated in another Red Dress run and not have photo evidence on how fat and gross i look. #hashing

1 0 1 0
Post image

Privacy addio? OpenAI sta raccogliendo i numeri di chiunque: tu sei nella lista?

📌 Link all'articolo : www.redhotcyber.com/post/pri...

#redhotcyber #news #chatgpt #openai #ecosistemaopenai #importazionecontatti #hashing

0 0 0 0
Infographic showing the XXH-32 hashing process from input data through block processing, mixing, state combination, and final 32-bit hash output. Simplified illustration, not intended to be scientifically correct.

Infographic showing the XXH-32 hashing process from input data through block processing, mixing, state combination, and final 32-bit hash output. Simplified illustration, not intended to be scientifically correct.

XXH-32 is a fast, non-cryptographic hash function that turns arbitrary input data into a compact 32-bit fingerprint for efficient lookups and checksums.

www.miklix.com/calculators/...

#HashFunctions #DataIntegrity #Hashing #HashCalculator #HashAlgorithm

(simplified illustration)

0 0 0 0
Password Cracking: Can a Rainbow table reverse a hashed password?
Password Cracking: Can a Rainbow table reverse a hashed password? YouTube video by David Bombal

Hashing cannot be reversed. Prove me wrong!

YouTube video featuring the amazing Michael Pound: youtu.be/OzVzo9gtiec

#hash #encryption #hashing #vpn #crypto #cryptography #md5 #sha #learn

6 0 0 1
Awakari App

The Power of Hashing in One-Way Security and Irreversible Storage In modern digital systems, hashing is one of the most fundamental building blocks of security. It is not encryption, it is not obfu...

#cryptography #hashing #cybersecurity #bervice #blockchain

Origin | Interest | Match

0 0 0 0
Preview
Bitcoin vs Quantum Computers: Hora de pasar a Post-Quantum Cryptography Blog personal de Chema Alonso ( https://MyPublicInbox.com/ChemaAlonso ): Ciberseguridad, IA, Innovación, Tecnología, Cómics & Cosas Personasles.

El lado del mal - Bitcoin vs Quantum Computers: Hora de pasar a Post-Quantum Cryptography elladodelmal.com/2025/12/bitc... #BitCoin #PQC #Criptografia #Hashing #ECDSA #SLHDSA #Criptomonedas #Blockchain #Quantum

0 0 0 0
Post image

How to Perform Secure Hashing Using Python's hashlib Module Hashing is a fundamental technique in programming that converts data into a fixed-size string of characters. Unlike encryption, hashi...

#Python #Hashing #Security

Origin | Interest | Match

0 0 0 0
Post image

Waiting for the hounds like "What!"

#Hashing #HashHouseHarriers #Hare #StillSomeDaylight #Thirsty

2 0 0 0
Preview
Cómo Descifrar un Hash de Contraseña: Guía Práctica 2025 Descubre cómo un hacker ético puede descifrar un hash de contraseña. Aprende sobre MD5, SHA-256 y ataques de diccionario con scripts PHP/Python.

¿Un hash de contraseña es irreversible? 🤔 Te enseñamos a descifrarlo con scripts PHP/Python en nuestra guía práctica y te retamos con un CTF. #Ciberseguridad #Hashing #EthicalHacking

0 0 0 0
Post image

Is that craig tucker from south park!?!?!? #southpark #mynameiscraigtucker #ISPY #craig #craigtucker #craigtuckersp #craigsp #craigsouthpark #craigtuckersouthpark #isthatcraigtucker #itsnot #butitlookslikehim #kinda #notreally #imsadnow #itsnotcraigtucker #thisisahashtag #hashing #boredgame #CraigTr

0 0 0 0

Communication Cost Reduction for Subgraph Counting under Local Differential Privacy via Hash Func...

Quentin Hillebrand, Vorapong Suppakitpaisarn, Tetsuo Shibuya

Action editor: Kamalika Chaudhuri

https://openreview.net/forum?id=N1J236mepp

#hashing #privacy #subgraph

0 0 0 0
Original post on mstdn.party

Can there be a #password #hashing algorithm that considers the distance between each character key on a keyboard (of some specific layout, say QWERTY)? The difficulty of hitting the correct character on a small 26-key on-screen keyboard on my phone is making me think whether we should have a […]

0 0 1 0
Steinar H. Gunderson

“Modern Perfect Hashing”, Steinar H. Gunderson (blog.sesse.net/blog/tech/20...).

Via HN: news.ycombinator.com/item?id=4568...

On Lobsters: lobste.rs/s/i33fks/mod...

#Hashing #PerfectHashing #Programming #LexicalAnalysis #Tokenization #Compilers #Algorithms

0 0 0 0
Modern perfect hashing for strings

Love 😍 such articles that cover a topic in depth:

“Modern Perfect Hashing For Strings” [2023], Wojciech Muła (0x80.pl/notesen/2023...).

On HN: news.ycombinator.com/item?id=3576...

#Hashing #PerfectHashing #Lexing #LexicalAnalysis #Programming #Algorithms #Trie #gperf #Tokenization

0 0 1 0
Preview
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown? Every journey in cybersecurity, whether you’re a seasoned pentester or just starting out, leads you back to the fundamentals. And few…

011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown? Every journey in cybersecurity, whether you’re a seasoned pentester or just starting out, leads you back to the fundamentals. And few fundamental...

#hashing #encryption #cybersecurity #technology

Origin | Interest | Match

0 0 0 0
Post image

Faster, Smaller AI Model Found for Image Geolocation Imagine playing a new, slightly altered version of the game GeoGuessr . You’re faced with a photo of an average U.S. house, maybe two floors w...

#Computer #vision #Hashing #algorithm #Image #analysis […]

[Original post on spectrum.ieee.org]

0 0 0 0
Post image

Faster, Smaller AI Model Found for Image Geolocation Imagine playing a new, slightly altered version of the game GeoGuessr . You’re faced with a photo of an average U.S. house, maybe two floors w...

#Computer #vision #Hashing #algorithm #Image #analysis […]

[Original post on spectrum.ieee.org]

1 0 0 0
Post image

Faster, Smaller AI Model Found for Image Geolocation Imagine playing a new, slightly altered version of the game GeoGuessr . You’re faced with a photo of an average U.S. house, maybe two floors w...

#Computer #vision #Hashing #algorithm #Image #analysis […]

[Original post on spectrum.ieee.org]

0 0 0 0
Post image

Faster, Smaller AI Model Found for Image Geolocation Imagine playing a new, slightly altered version of the game GeoGuessr . You’re faced with a photo of an average U.S. house, maybe two floors w...

#Computer #vision #Hashing #algorithm #Image #analysis […]

[Original post on spectrum.ieee.org]

0 0 0 0
Communication Cost Reduction for Subgraph Counting under Local Differential Privacy via Hash Functio...

Communication Cost Reduction for Subgraph Counting under Local Differential Privacy via Hash Functio...

New #TMLR-Paper-with-Video:

Communication Cost Reduction for Subgraph Counting under Local Differential Privacy via Hash Functio...

Quentin Hillebrand, Vorapong Suppakitpaisarn, Tetsuo Shibuya

https://tmlr.infinite-conf.org/paper_pages/N1J236mepp

#hashing #privacy #subgraph

1 0 0 0
Learning-Based Hashing for ANN Search: Foundations and Early Advances

Learning-Based Hashing for ANN Search: Foundations and Early Advances

A survey on learning‑based hashing for ANN search, submitted on 5 Oct 2025, notes recall@10 as a typical metric for evaluating binary codes in Hamming space. getnews.me/learning-based-hashing-f... #hashing #annsearch

0 0 0 0
Post image

New blog post: committing to secrets via hashing - a short, first-principles introduction #crypto #hashing

=> www.pokutta.com/blog/hashed...

1 0 0 0