Developing a Minimally HashDoS Resistant, Yet Quickly Reversible Integer Hash for V8, by @joyeecheung@mastodon.social (@nodejs@social.lfx.dev):
nodejs.org/en/blog/vulnerability/ma...
#nodejs #hashing #security
SHA-1
Generate a SHA-1 hash from any text in your browser. Learn why SHA-1 is deprecated, how it works, and when to use SHA-256 or SHA-512 instead.
#sha1 #hashing #cryptography #security #informationtheoretical
**PERFECT PANGRAM HASH : Anagram Hash Function**
#DOI https://doi.org/10.5281/zenodo.18448042
A pangram is a sentence or phrase that contains each letter of an alphabet or character set at least once. A perfect pangram is an anagram of the alphabet which contains each letter exactly once […]
Infographic-style diagram showing the conceptual flow of the Whirlpool hash algorithm from input data through substitution, permutation, mixing, and repeated rounds to a final hash output.
The Whirlpool hash algorithm is a cryptographic function that turns data of any size into a fixed-length, seemingly random digital fingerprint.
www.miklix.com/calculators/...
#HashFunctions #DataIntegrity #Hashing #CyberSecurity #InfoSec
What Your Auth Library Isn't Telling You About Passwords: Hashing and Salting Explained Before I started building auth into my own projects, I didn't think too deeply about what was happeni...
#Security #passwords #Hashing #Salting
Origin | Interest | Match
Landscape infographic showing input data flowing through preprocessing, mixing, compression, and producing a hash output.
The GOST hash algorithm is a cryptographic function that transforms input data into a fixed-length digital fingerprint designed to be unique and irreversible.
www.miklix.com/calculators/...
#HashFunctions #DataIntegrity #Hashing #CyberSecurity #InfoSec
Matrix Hashing uses two hash functions and a 2D array to achieve O(1) lookups with minimal collisions and a small sorted overflow for scalable systems. #hashing
We just launched our Password Tools and it is completely free to use. We built it to be practical and accessible for anyone working with passwords.
Explore the new tools here:
www.altiusit.com/tools/passwo...
#Cybersecurity #PasswordSecurity #Hashing #InfoSec #DevTools #DataProtection #ITSecurity
Had enough wine to try on red dresses for next weekend.
Found one that I look less disgusting in. Will call that a win.
As long as I can escape any cameras I’ll have participated in another Red Dress run and not have photo evidence on how fat and gross i look. #hashing
Privacy addio? OpenAI sta raccogliendo i numeri di chiunque: tu sei nella lista?
📌 Link all'articolo : www.redhotcyber.com/post/pri...
#redhotcyber #news #chatgpt #openai #ecosistemaopenai #importazionecontatti #hashing
Infographic showing the XXH-32 hashing process from input data through block processing, mixing, state combination, and final 32-bit hash output. Simplified illustration, not intended to be scientifically correct.
XXH-32 is a fast, non-cryptographic hash function that turns arbitrary input data into a compact 32-bit fingerprint for efficient lookups and checksums.
www.miklix.com/calculators/...
#HashFunctions #DataIntegrity #Hashing #HashCalculator #HashAlgorithm
(simplified illustration)
Hashing cannot be reversed. Prove me wrong!
YouTube video featuring the amazing Michael Pound: youtu.be/OzVzo9gtiec
#hash #encryption #hashing #vpn #crypto #cryptography #md5 #sha #learn
The Power of Hashing in One-Way Security and Irreversible Storage In modern digital systems, hashing is one of the most fundamental building blocks of security. It is not encryption, it is not obfu...
#cryptography #hashing #cybersecurity #bervice #blockchain
Origin | Interest | Match
El lado del mal - Bitcoin vs Quantum Computers: Hora de pasar a Post-Quantum Cryptography elladodelmal.com/2025/12/bitc... #BitCoin #PQC #Criptografia #Hashing #ECDSA #SLHDSA #Criptomonedas #Blockchain #Quantum
How to Perform Secure Hashing Using Python's hashlib Module Hashing is a fundamental technique in programming that converts data into a fixed-size string of characters. Unlike encryption, hashi...
#Python #Hashing #Security
Origin | Interest | Match
Waiting for the hounds like "What!"
#Hashing #HashHouseHarriers #Hare #StillSomeDaylight #Thirsty
¿Un hash de contraseña es irreversible? 🤔 Te enseñamos a descifrarlo con scripts PHP/Python en nuestra guía práctica y te retamos con un CTF. #Ciberseguridad #Hashing #EthicalHacking
Is that craig tucker from south park!?!?!? #southpark #mynameiscraigtucker #ISPY #craig #craigtucker #craigtuckersp #craigsp #craigsouthpark #craigtuckersouthpark #isthatcraigtucker #itsnot #butitlookslikehim #kinda #notreally #imsadnow #itsnotcraigtucker #thisisahashtag #hashing #boredgame #CraigTr
Communication Cost Reduction for Subgraph Counting under Local Differential Privacy via Hash Func...
Quentin Hillebrand, Vorapong Suppakitpaisarn, Tetsuo Shibuya
Action editor: Kamalika Chaudhuri
https://openreview.net/forum?id=N1J236mepp
#hashing #privacy #subgraph
Can there be a #password #hashing algorithm that considers the distance between each character key on a keyboard (of some specific layout, say QWERTY)? The difficulty of hitting the correct character on a small 26-key on-screen keyboard on my phone is making me think whether we should have a […]
“Modern Perfect Hashing”, Steinar H. Gunderson (blog.sesse.net/blog/tech/20...).
Via HN: news.ycombinator.com/item?id=4568...
On Lobsters: lobste.rs/s/i33fks/mod...
#Hashing #PerfectHashing #Programming #LexicalAnalysis #Tokenization #Compilers #Algorithms
Love 😍 such articles that cover a topic in depth:
“Modern Perfect Hashing For Strings” [2023], Wojciech Muła (0x80.pl/notesen/2023...).
On HN: news.ycombinator.com/item?id=3576...
#Hashing #PerfectHashing #Lexing #LexicalAnalysis #Programming #Algorithms #Trie #gperf #Tokenization
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown? Every journey in cybersecurity, whether you’re a seasoned pentester or just starting out, leads you back to the fundamentals. And few fundamental...
#hashing #encryption #cybersecurity #technology
Origin | Interest | Match
Faster, Smaller AI Model Found for Image Geolocation Imagine playing a new, slightly altered version of the game GeoGuessr . You’re faced with a photo of an average U.S. house, maybe two floors w...
#Computer #vision #Hashing #algorithm #Image #analysis […]
[Original post on spectrum.ieee.org]
Faster, Smaller AI Model Found for Image Geolocation Imagine playing a new, slightly altered version of the game GeoGuessr . You’re faced with a photo of an average U.S. house, maybe two floors w...
#Computer #vision #Hashing #algorithm #Image #analysis […]
[Original post on spectrum.ieee.org]
Faster, Smaller AI Model Found for Image Geolocation Imagine playing a new, slightly altered version of the game GeoGuessr . You’re faced with a photo of an average U.S. house, maybe two floors w...
#Computer #vision #Hashing #algorithm #Image #analysis […]
[Original post on spectrum.ieee.org]
Faster, Smaller AI Model Found for Image Geolocation Imagine playing a new, slightly altered version of the game GeoGuessr . You’re faced with a photo of an average U.S. house, maybe two floors w...
#Computer #vision #Hashing #algorithm #Image #analysis […]
[Original post on spectrum.ieee.org]
Communication Cost Reduction for Subgraph Counting under Local Differential Privacy via Hash Functio...
New #TMLR-Paper-with-Video:
Communication Cost Reduction for Subgraph Counting under Local Differential Privacy via Hash Functio...
Quentin Hillebrand, Vorapong Suppakitpaisarn, Tetsuo Shibuya
https://tmlr.infinite-conf.org/paper_pages/N1J236mepp
#hashing #privacy #subgraph
Learning-Based Hashing for ANN Search: Foundations and Early Advances
A survey on learning‑based hashing for ANN search, submitted on 5 Oct 2025, notes recall@10 as a typical metric for evaluating binary codes in Hamming space. getnews.me/learning-based-hashing-f... #hashing #annsearch