intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Applications of hashing

Xem 1-17 trên 17 kết quả Applications of hashing
  • Probability and Computer science - Lecture 6: Bins and balls, applications - Hashing and bloom filters. This lecture provides students with content including: review the problem of bins and balls; poisson distribution; hashing; bloom filters;... Please refer to the detailed content of the lecture!

    pdf39p codabach1016 03-05-2024 2 0   Download

  • This paper presents a model of using smart electronic meters and network tools to store information about power, price, and customer code in information blocks of Blockchain applications to manage electricity bills. Price transactions will be stored as a data block.

    pdf8p viisac 15-09-2023 9 3   Download

  • Lecture "On safety and security of information systems: Cryptographic hash funtionns" provide students with knowledge about: Hash function; Applications of cryptographic hash functions; Simple hash functions; Requirements and security;... Please refer to the detailed content of the lecture!

    pdf22p hoabingan205 12-12-2022 11 5   Download

  • In this paper, we propose a design method for the signature scheme based on ring structure Zn. Our signature schemes are more secure, generate signatures at a faster rate than that of the ElGamal scheme and its variants. Moreover, our approaches also overcome some disadvantages of some similar signature schemes on ring Zn. For these advantages, they are fully applicable in practice.

    pdf10p viwmotors 02-12-2022 18 3   Download

  • Lecture Data Structures: Lesson 43 provide students with knowledge about hashing animation; applications of hashing; compilers use hash tables to keep track of declared variables (symbol table); entire dictionary can be hashed and words checked in constant time;...

    ppt10p hanthienngao 15-04-2022 6 1   Download

  • Blockchain technology has been applied widely in many countries in different fields such as banking, finance, insurance, health, production, retailing... However, the application of this technology in education seems to be still limited, especially in Vietnam. This paper will introduce an overview of blockchain technology as well as propose some recommendations on the potential of applying this technology to support management activities at universities in Vietnam. Finally, the advantages and disadvantages of deploying blockchain technology at universities in Vietnam will also be mentioned.

    pdf10p huyetthienthan 23-11-2021 19 1   Download

  • Lecture Design and Analysis of Algorithms - Lecture 21: Cryptography: Hashing. In this lecture, we will be studying some basics of cryptography. Specifically, we will be covering: Hash functions, random oracle model, desirable properties, applications to security.

    pdf4p nanhankhuoctai3 25-05-2020 25 0   Download

  • This paper proposes a block crypto system that uses cyclic geometric progressions over polynomial rings as encryption function, and its encryption diagram is based on unbalanced Feistel network with four branches. All the sub keys in encryption steps are also elements in cyclic geometric progressions over polynomial ring with two cyclotomic cosets. By using this crypto system, we apply to a hash function with 512 bits output length. Some diffusion simulations of the proposed crypto system and hash function are also presented.

    pdf8p minhxaminhyeu4 15-07-2019 21 0   Download

  • This paper focuses on the challenges of the development of enterprise mobile applications and services based on P2P architecture. Using selected results from related projects, we present and analyze these important issues and also propose an exemplary solution to address some of these issues.

    pdf12p minhxaminhyeu3 25-06-2019 17 0   Download

  • (bq) part 1 book "algorithms" has contents: basic programming model, data abstraction, analysis of algorithms, elementary sorts, mergesort, priority queues, symbol tables, binary search trees, balanced search trees, hash tables, applications.

    pdf442p bautroibinhyen19 02-03-2017 63 6   Download

  • Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications.

    pdf27p dunglh2013 02-04-2014 49 1   Download

  • We describe a novel mechanism called Reservoir Counting for application in online Locality Sensitive Hashing. This technique allows for significant savings in the streaming setting, allowing for maintaining a larger number of signatures, or an increased level of approximation accuracy at a similar memory footprint.

    pdf6p hongdo_1 12-04-2013 37 2   Download

  • Previous work on consistent hashing assumed that nodes were aware of most other nodes in the system, making it impractical to scale to large number of nodes. In contrast, each Chord node needs “routing” information about only a few other nodes. Because the routing table is distributed, a node resolves the hash function by communicating with a few other nodes. In the steady state, in an  -node system, each node maintains information only about    other nodes, and resolves all lookups via    messages to other nodes.

    pdf12p doiroimavanchuadc 06-02-2013 48 2   Download

  • Tutorials Point, Simply Easy Learning MySQL Tutorial Tutorialspoint.com MySQL is the most popular Open Source Relational SQL database management system. MySQL is one of the best RDBMS being used for developing web based software applications. This tutorial gives an initial push to start you with MySQL. For more detail kindly check tutorialspoint.com/mysql What is Database? A database is a separate application that stores a collection of data. Each database has one or more distinct APIs for creating, accessing, managing, searching, and replicating the data it holds.

    pdf24p daotlua 17-12-2012 72 5   Download

  • We have m balls that are thrown into n bins, with the location of each ball chosen independently and uniformly at random from n possibilities.

    pdf19p quangchien2205 30-03-2011 41 4   Download

  • Cryptographic hash functions play a fundamental role in modern cryptography. While related to conventional hash functions commonly used in non-cryptographic computer applications – in both cases, larger domains are mapped to smaller ranges – they differ in several important aspects. Our focus is restricted to cryptographic hash functions (hereafter, simply hash functions), and in particular to their use for data integrity and message authentication.

    pdf64p vankent 12-07-2010 83 8   Download

  • This module explains to students how to strengthen the security of their Web applications by incorporating the programmatic use of cryptography. Depending on the programming platform, students will use one of several cryptographic libraries to add encryption, hashing, and digital signing functionality to their Web application. After completing this module, students will be able to use the CAPICOM cryptographic library and the System.Security.Cryptography namespace to encrypt, hash, and sign data....

    pdf78p maiphuong 10-08-2009 116 20   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2