![](images/graphics/blank.gif)
Applications of hashing
-
Probability and Computer science - Lecture 6: Bins and balls, applications - Hashing and bloom filters. This lecture provides students with content including: review the problem of bins and balls; poisson distribution; hashing; bloom filters;... Please refer to the detailed content of the lecture!
39p
codabach1016
03-05-2024
2
0
Download
-
This paper presents a model of using smart electronic meters and network tools to store information about power, price, and customer code in information blocks of Blockchain applications to manage electricity bills. Price transactions will be stored as a data block.
8p
viisac
15-09-2023
9
3
Download
-
Lecture "On safety and security of information systems: Cryptographic hash funtionns" provide students with knowledge about: Hash function; Applications of cryptographic hash functions; Simple hash functions; Requirements and security;... Please refer to the detailed content of the lecture!
22p
hoabingan205
12-12-2022
11
5
Download
-
In this paper, we propose a design method for the signature scheme based on ring structure Zn. Our signature schemes are more secure, generate signatures at a faster rate than that of the ElGamal scheme and its variants. Moreover, our approaches also overcome some disadvantages of some similar signature schemes on ring Zn. For these advantages, they are fully applicable in practice.
10p
viwmotors
02-12-2022
18
3
Download
-
Lecture Data Structures: Lesson 43 provide students with knowledge about hashing animation; applications of hashing; compilers use hash tables to keep track of declared variables (symbol table); entire dictionary can be hashed and words checked in constant time;...
10p
hanthienngao
15-04-2022
6
1
Download
-
Blockchain technology has been applied widely in many countries in different fields such as banking, finance, insurance, health, production, retailing... However, the application of this technology in education seems to be still limited, especially in Vietnam. This paper will introduce an overview of blockchain technology as well as propose some recommendations on the potential of applying this technology to support management activities at universities in Vietnam. Finally, the advantages and disadvantages of deploying blockchain technology at universities in Vietnam will also be mentioned.
10p
huyetthienthan
23-11-2021
19
1
Download
-
Lecture Design and Analysis of Algorithms - Lecture 21: Cryptography: Hashing. In this lecture, we will be studying some basics of cryptography. Specifically, we will be covering: Hash functions, random oracle model, desirable properties, applications to security.
4p
nanhankhuoctai3
25-05-2020
25
0
Download
-
This paper proposes a block crypto system that uses cyclic geometric progressions over polynomial rings as encryption function, and its encryption diagram is based on unbalanced Feistel network with four branches. All the sub keys in encryption steps are also elements in cyclic geometric progressions over polynomial ring with two cyclotomic cosets. By using this crypto system, we apply to a hash function with 512 bits output length. Some diffusion simulations of the proposed crypto system and hash function are also presented.
8p
minhxaminhyeu4
15-07-2019
21
0
Download
-
This paper focuses on the challenges of the development of enterprise mobile applications and services based on P2P architecture. Using selected results from related projects, we present and analyze these important issues and also propose an exemplary solution to address some of these issues.
12p
minhxaminhyeu3
25-06-2019
17
0
Download
-
(bq) part 1 book "algorithms" has contents: basic programming model, data abstraction, analysis of algorithms, elementary sorts, mergesort, priority queues, symbol tables, binary search trees, balanced search trees, hash tables, applications.
442p
bautroibinhyen19
02-03-2017
63
6
Download
-
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications.
27p
dunglh2013
02-04-2014
49
1
Download
-
We describe a novel mechanism called Reservoir Counting for application in online Locality Sensitive Hashing. This technique allows for significant savings in the streaming setting, allowing for maintaining a larger number of signatures, or an increased level of approximation accuracy at a similar memory footprint.
6p
hongdo_1
12-04-2013
37
2
Download
-
Previous work on consistent hashing assumed that nodes were aware of most other nodes in the system, making it impractical to scale to large number of nodes. In contrast, each Chord node needs “routing” information about only a few other nodes. Because the routing table is distributed, a node resolves the hash function by communicating with a few other nodes. In the steady state, in an -node system, each node maintains information only about other nodes, and resolves all lookups via messages to other nodes.
12p
doiroimavanchuadc
06-02-2013
48
2
Download
-
Tutorials Point, Simply Easy Learning MySQL Tutorial Tutorialspoint.com MySQL is the most popular Open Source Relational SQL database management system. MySQL is one of the best RDBMS being used for developing web based software applications. This tutorial gives an initial push to start you with MySQL. For more detail kindly check tutorialspoint.com/mysql What is Database? A database is a separate application that stores a collection of data. Each database has one or more distinct APIs for creating, accessing, managing, searching, and replicating the data it holds.
24p
daotlua
17-12-2012
72
5
Download
-
We have m balls that are thrown into n bins, with the location of each ball chosen independently and uniformly at random from n possibilities.
19p
quangchien2205
30-03-2011
41
4
Download
-
Cryptographic hash functions play a fundamental role in modern cryptography. While related to conventional hash functions commonly used in non-cryptographic computer applications – in both cases, larger domains are mapped to smaller ranges – they differ in several important aspects. Our focus is restricted to cryptographic hash functions (hereafter, simply hash functions), and in particular to their use for data integrity and message authentication.
64p
vankent
12-07-2010
83
8
Download
-
This module explains to students how to strengthen the security of their Web applications by incorporating the programmatic use of cryptography. Depending on the programming platform, students will use one of several cryptographic libraries to add encryption, hashing, and digital signing functionality to their Web application. After completing this module, students will be able to use the CAPICOM cryptographic library and the System.Security.Cryptography namespace to encrypt, hash, and sign data....
78p
maiphuong
10-08-2009
116
20
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)