Trending

#Hashing

Latest posts tagged with #Hashing on Bluesky

Latest Top
Trending

Posts tagged #Hashing

Post image

What Your Auth Library Isn't Telling You About Passwords: Hashing and Salting Explained Before I started building auth into my own projects, I didn't think too deeply about what was happeni...

#Security #passwords #Hashing #Salting

Origin | Interest | Match

0 0 0 0
Landscape infographic showing input data flowing through preprocessing, mixing, compression, and producing a hash output.

Landscape infographic showing input data flowing through preprocessing, mixing, compression, and producing a hash output.

The GOST hash algorithm is a cryptographic function that transforms input data into a fixed-length digital fingerprint designed to be unique and irreversible.

www.miklix.com/calculators/...

#HashFunctions #DataIntegrity #Hashing #CyberSecurity #InfoSec

0 0 0 0
Preview
Matrix Hashing: Two-Level Collision Resolution for Scalable Lookups

Matrix Hashing uses two hash functions and a 2D array to achieve O(1) lookups with minimal collisions and a small sorted overflow for scalable systems. #hashing

0 0 0 0
Password & Encryption Tools | Altius IT Free password strength checker, secure password generator, and cryptographic hash generator. No signup required.

We just launched our Password Tools and it is completely free to use. We built it to be practical and accessible for anyone working with passwords.

Explore the new tools here:
www.altiusit.com/tools/passwo...

#Cybersecurity #PasswordSecurity #Hashing #InfoSec #DevTools #DataProtection #ITSecurity

2 0 0 0

Had enough wine to try on red dresses for next weekend.

Found one that I look less disgusting in. Will call that a win.

As long as I can escape any cameras I’ll have participated in another Red Dress run and not have photo evidence on how fat and gross i look. #hashing

1 0 1 0
Post image

Privacy addio? OpenAI sta raccogliendo i numeri di chiunque: tu sei nella lista?

📌 Link all'articolo : www.redhotcyber.com/post/pri...

#redhotcyber #news #chatgpt #openai #ecosistemaopenai #importazionecontatti #hashing

0 0 0 0
Infographic showing the XXH-32 hashing process from input data through block processing, mixing, state combination, and final 32-bit hash output. Simplified illustration, not intended to be scientifically correct.

Infographic showing the XXH-32 hashing process from input data through block processing, mixing, state combination, and final 32-bit hash output. Simplified illustration, not intended to be scientifically correct.

XXH-32 is a fast, non-cryptographic hash function that turns arbitrary input data into a compact 32-bit fingerprint for efficient lookups and checksums.

www.miklix.com/calculators/...

#HashFunctions #DataIntegrity #Hashing #HashCalculator #HashAlgorithm

(simplified illustration)

0 0 0 0
Password Cracking: Can a Rainbow table reverse a hashed password?
Password Cracking: Can a Rainbow table reverse a hashed password? YouTube video by David Bombal

Hashing cannot be reversed. Prove me wrong!

YouTube video featuring the amazing Michael Pound: youtu.be/OzVzo9gtiec

#hash #encryption #hashing #vpn #crypto #cryptography #md5 #sha #learn

6 0 0 1
Awakari App

The Power of Hashing in One-Way Security and Irreversible Storage In modern digital systems, hashing is one of the most fundamental building blocks of security. It is not encryption, it is not obfu...

#cryptography #hashing #cybersecurity #bervice #blockchain

Origin | Interest | Match

0 0 0 0
Preview
Bitcoin vs Quantum Computers: Hora de pasar a Post-Quantum Cryptography Blog personal de Chema Alonso ( https://MyPublicInbox.com/ChemaAlonso ): Ciberseguridad, IA, Innovación, Tecnología, Cómics & Cosas Personasles.

El lado del mal - Bitcoin vs Quantum Computers: Hora de pasar a Post-Quantum Cryptography elladodelmal.com/2025/12/bitc... #BitCoin #PQC #Criptografia #Hashing #ECDSA #SLHDSA #Criptomonedas #Blockchain #Quantum

0 0 0 0
Post image

How to Perform Secure Hashing Using Python's hashlib Module Hashing is a fundamental technique in programming that converts data into a fixed-size string of characters. Unlike encryption, hashi...

#Python #Hashing #Security

Origin | Interest | Match

0 0 0 0
Post image

Waiting for the hounds like "What!"

#Hashing #HashHouseHarriers #Hare #StillSomeDaylight #Thirsty

2 0 0 0
Preview
Cómo Descifrar un Hash de Contraseña: Guía Práctica 2025 Descubre cómo un hacker ético puede descifrar un hash de contraseña. Aprende sobre MD5, SHA-256 y ataques de diccionario con scripts PHP/Python.

¿Un hash de contraseña es irreversible? 🤔 Te enseñamos a descifrarlo con scripts PHP/Python en nuestra guía práctica y te retamos con un CTF. #Ciberseguridad #Hashing #EthicalHacking

0 0 0 0
Post image

Is that craig tucker from south park!?!?!? #southpark #mynameiscraigtucker #ISPY #craig #craigtucker #craigtuckersp #craigsp #craigsouthpark #craigtuckersouthpark #isthatcraigtucker #itsnot #butitlookslikehim #kinda #notreally #imsadnow #itsnotcraigtucker #thisisahashtag #hashing #boredgame #CraigTr

0 0 0 0

Communication Cost Reduction for Subgraph Counting under Local Differential Privacy via Hash Func...

Quentin Hillebrand, Vorapong Suppakitpaisarn, Tetsuo Shibuya

Action editor: Kamalika Chaudhuri

https://openreview.net/forum?id=N1J236mepp

#hashing #privacy #subgraph

0 0 0 0
Original post on mstdn.party

Can there be a #password #hashing algorithm that considers the distance between each character key on a keyboard (of some specific layout, say QWERTY)? The difficulty of hitting the correct character on a small 26-key on-screen keyboard on my phone is making me think whether we should have a […]

0 0 1 0
Steinar H. Gunderson

“Modern Perfect Hashing”, Steinar H. Gunderson (blog.sesse.net/blog/tech/20...).

Via HN: news.ycombinator.com/item?id=4568...

On Lobsters: lobste.rs/s/i33fks/mod...

#Hashing #PerfectHashing #Programming #LexicalAnalysis #Tokenization #Compilers #Algorithms

0 0 0 0
Modern perfect hashing for strings

Love 😍 such articles that cover a topic in depth:

“Modern Perfect Hashing For Strings” [2023], Wojciech Muła (0x80.pl/notesen/2023...).

On HN: news.ycombinator.com/item?id=3576...

#Hashing #PerfectHashing #Lexing #LexicalAnalysis #Programming #Algorithms #Trie #gperf #Tokenization

0 0 1 0
Preview
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown? Every journey in cybersecurity, whether you’re a seasoned pentester or just starting out, leads you back to the fundamentals. And few…

011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown? Every journey in cybersecurity, whether you’re a seasoned pentester or just starting out, leads you back to the fundamentals. And few fundamental...

#hashing #encryption #cybersecurity #technology

Origin | Interest | Match

0 0 0 0
Post image

Faster, Smaller AI Model Found for Image Geolocation Imagine playing a new, slightly altered version of the game GeoGuessr . You’re faced with a photo of an average U.S. house, maybe two floors w...

#Computer #vision #Hashing #algorithm #Image #analysis […]

[Original post on spectrum.ieee.org]

0 0 0 0
Post image

Faster, Smaller AI Model Found for Image Geolocation Imagine playing a new, slightly altered version of the game GeoGuessr . You’re faced with a photo of an average U.S. house, maybe two floors w...

#Computer #vision #Hashing #algorithm #Image #analysis […]

[Original post on spectrum.ieee.org]

1 0 0 0
Post image

Faster, Smaller AI Model Found for Image Geolocation Imagine playing a new, slightly altered version of the game GeoGuessr . You’re faced with a photo of an average U.S. house, maybe two floors w...

#Computer #vision #Hashing #algorithm #Image #analysis […]

[Original post on spectrum.ieee.org]

0 0 0 0
Post image

Faster, Smaller AI Model Found for Image Geolocation Imagine playing a new, slightly altered version of the game GeoGuessr . You’re faced with a photo of an average U.S. house, maybe two floors w...

#Computer #vision #Hashing #algorithm #Image #analysis […]

[Original post on spectrum.ieee.org]

0 0 0 0
Communication Cost Reduction for Subgraph Counting under Local Differential Privacy via Hash Functio...

Communication Cost Reduction for Subgraph Counting under Local Differential Privacy via Hash Functio...

New #TMLR-Paper-with-Video:

Communication Cost Reduction for Subgraph Counting under Local Differential Privacy via Hash Functio...

Quentin Hillebrand, Vorapong Suppakitpaisarn, Tetsuo Shibuya

https://tmlr.infinite-conf.org/paper_pages/N1J236mepp

#hashing #privacy #subgraph

1 0 0 0
Learning-Based Hashing for ANN Search: Foundations and Early Advances

Learning-Based Hashing for ANN Search: Foundations and Early Advances

A survey on learning‑based hashing for ANN search, submitted on 5 Oct 2025, notes recall@10 as a typical metric for evaluating binary codes in Hamming space. getnews.me/learning-based-hashing-f... #hashing #annsearch

0 0 0 0
Post image

New blog post: committing to secrets via hashing - a short, first-principles introduction #crypto #hashing

=> www.pokutta.com/blog/hashed...

1 0 0 0
Preview
The Next Big SHA? SHA3 Sponge Function Explained - Computerphile Learn more about the Jane Street internship at https://jane-st.co/internship-computerphile-25 If a bug is found in SHA2, SHA3 is already waiting in the wings! Mike Pound takes us through how it work...

The Next Big SHA? SHA3 Sponge Function Explained - Computerphile
twuai.com/search/fzlfl...
#hashing #cryptography #checksum #cipher #encrypt #sha1 #sha2 #md5 #tools

0 0 0 0

What is Hornet's favorite #hashing algorithm?

sha!
#silksong #hollowknightSilksong

0 0 0 0
DiffHash: Text‑Guided Diffusion Attack Improves Image Hashing Security

DiffHash: Text‑Guided Diffusion Attack Improves Image Hashing Security

Researchers unveiled DiffHash, a diffusion‑model and text‑guided attack that optimizes image representations instead of pixels, achieving black‑box transferability on datasets. Read more: getnews.me/diffhash-text-guided-dif... #deephashing #hashing

0 0 0 0
Awakari App

Hashing in Cybersecurity: A Beginner’s Guide to Digital Fingerprints Hashing is a fundamental concept in cybersecurity and computer science. Continue reading on Medium »

#blockchain #encryption #hashing #cybersecurity #cryptography

Origin | Interest | Match

0 0 0 0