Computer

Hashing Algorithms and Security – Computerphile

Audible free book: http://www.audible.com/computerphile
Hashing Algorithms are used to ensure file authenticity, but how secure are they and why do they keep changing? Tom Scott hashes it out.

More from Tom Scott: http://www.youtube.com/user/enyay and https://twitter.com/tomscott

http://www.facebook.com/computerphile

This video was filmed and edited by Sean Riley.

Pigeon Sound Effects courtesy of http://www.freesfx.co.uk/

Computerphile is a sister project to Brady Haran’s Numberphile. See the full list of Brady’s video projects at: http://bit.ly/bradychannels

Products You May Like

Articles You May Like

What is chemical equilibrium? – George Zaidan and Charles Morton
27 Unbelievable Local Traditions – mental_floss on YouTube (Ep.214)
The Magic Roundabout: Swindon’s Terrifying Traffic Circle and Emergent Behaviour
Lucy Neal on the Citizen Artist
Signing Primes

Leave a Reply

Your email address will not be published. Required fields are marked *