SHA: Secure Hashing Algorithm – Computerphile
Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash strings. EXTRA BITS: https://youtu.be/f8ZP_1K2Y-U Tom Scott on Hash Algorithms: https://youtu.be/b4b8ktEV4Bg http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: http://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's […]

Get Learn Progress

in your inbox

no spam, just juicy content

Hussein Hallak

SHA: Secure Hashing Algorithm – Computerphile

Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash strings.

EXTRA BITS: https://youtu.be/f8ZP_1K2Y-U
Tom Scott on Hash Algorithms: https://youtu.be/b4b8ktEV4Bg

http://www.facebook.com/computerphile

This video was filmed and edited by Sean Riley.

Computer Science at the University of Nottingham: http://bit.ly/nottscomputer

Computerphile is a sister project to Brady Haran’s Numberphile. More at http://www.bradyharan.com



Learn blockchain in an afternoon. Without spending countless hours deciphering tech jargon

The only blockchain guide giving you full historical context in bite-sized information with visually stunning graphics


Leave a Reply

Your email address will not be published. Required fields are marked *

×
×

Cart