![](images/graphics/blank.gif)
Hashing algorithms
-
Part 2 of ebook "Data structures and algorithms in Python" provides readers with contents including: Chapter 9 - Priority queues; Chapter 10 - Maps, hash tables, and skip lists; Chapter 11 - Search trees; Chapter 12 - Sorting and selection; Chapter 13 - Text processing; Chapter 14 - Graph algorithms; Chapter 15 - Memory management and B-trees;...
387p
daonhiennhien
03-07-2024
4
1
Download
-
The paper proposes a type of block cipher algorithm based on cryptographic hash function and public key cryptography. The algorithm proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.
11p
visergeyne
18-06-2024
3
0
Download
-
Ebook "Cryptography and security services: Mechanisms and applications" presents the following content: Chapter 1 introduction, chapter 2 ASN.1 encoding, chapter 3 random number generation, chapter 4 advanced encryption standard, chapter 5 hash functions, chapter 6 message - authentication code algorithms, chapter 7 encrypt and authenticate modes, chapter 8 large integer arithmetic, chapter 9 public key algorithms.
446p
zizaybay1103
29-05-2024
4
2
Download
-
Lecture Data structure and Algorithm basic lab: Week 14. This lesson provides students with content about: dictionary ADT; hash table; hash functions; hash code maps; compression maps; data structure for chaining; collision handling; exercises;... Please refer to the detailed content of the lecture!
48p
codabach1016
03-05-2024
5
0
Download
-
Lecture Data structures and Algorithms: Week 14 (Lesson 14). This lesson provides students with content about: dictionary ADT; dictionary ADT methods; key-indexed dictionaries; hash table; hash functions; compression maps; collision handling; exercises;... Please refer to the detailed content of the lecture!
41p
codabach1016
03-05-2024
1
0
Download
-
Part 1 book "Internet security - Cryptographic principles algorithms protocols" includes content: Internetworking and layered models; tcp ip suite and internet stack protocols; symmetric block ciphers; hash function, message digest and message authentication code, asymmetric public key cryptosystems.
221p
longtimenosee08
31-03-2024
5
1
Download
-
This approach required a significant amount of time for preprocessing and formulating a constraint satisfaction problem (CSP). To address this problem, we proposed a new algorithm based on a hash data structure which performs more quickly in itemsets filtering and problem modeling. Experiment evaluations are conducted on real world and synthetic datasets.
11p
visystrom
22-11-2023
6
5
Download
-
Ebook Algorithms in C: Part 1 includes contents: Chapter 1: introduction, chapter 2: c, chapter 3: elementary data structures, chapter 4: trees, chapter 5: recursion, chapter 6: analysis of algorithms, chapter 7: implementation of algorithms, chapter 8: elementary sorting methods, chapter 9: quicksort, chapter 10: radix sorting, chapter 11: priority queues, chapter 12: mergesort, chapter 13: external sorting, chapter 14: elementary searching methods, chapter 15: balanced trees, chapter 16: hashing, chapter 17: radix searching, chapter 18: external searching, chapter 19: string searching, ch...
359p
haojiubujain08
01-11-2023
2
1
Download
-
Ebook "Teach yourself data structures and algorithms in 24 hours" includes content: Introducing data structures and algorithms, abstract data types, recursion and quicksort, trees, hash tables, appendixes.
548p
haojiubujain07
20-09-2023
4
2
Download
-
Ebook "Data structures and algorithm analysis in C++ (Fourth edition)" provides critical new coverage of treaps, k-d trees and k-d B-trees, generational garbage collection, and other advanced topics such as sorting methods and a new hashing technique. Abundant C++ code examples and a variety of case studies provide valuable insights into data structures implementation.
818p
tichhythan
17-08-2023
8
5
Download
-
Patient-powered research networks (PPRNs) are a valuable source of patient-generated information. Diagnosis code-based algorithms developed by PPRNs can be used to query health plans’ claims data to identify patients for research opportunities.
9p
visteverogers
24-06-2023
3
2
Download
-
Ebook Fundamentals of database systems (Seventh edition): Part 2 presents the following content: Relational Database Design Algorithms and Further Dependencies; Disk Storage, Basic File Structures, Hashing, and Modern Storage Architectures; Indexing Structures for Files and Physical Database Design;...Please refer to the documentation for more details.
786p
chankora
16-06-2023
6
3
Download
-
Lecture "Data structures and algorithms: Chapter 9 - Hash" provide students with knowledge about: Basic concepts; Hash functions: Direct Hashing, Modulo division, Digit extraction, Mid-square, Mid-square, Folding, Rotation, Pseudo-random; Collision resolution. Please refer to the detailed content of the lecture!
58p
phuogchi205
07-03-2023
10
6
Download
-
In this paper, we propose a design method for the signature scheme based on ring structure Zn. Our signature schemes are more secure, generate signatures at a faster rate than that of the ElGamal scheme and its variants. Moreover, our approaches also overcome some disadvantages of some similar signature schemes on ring Zn. For these advantages, they are fully applicable in practice.
10p
viwmotors
02-12-2022
18
3
Download
-
"The art of computer programming - Volume 3: Sorting and searching" comprises Chapters 5 and 6 of the complete series. Part 2 of book included chapter 6 deals with the problem of searching for specified items in tables or files; this is subdivided into methods that search sequentially, or by comparison of keys, or by digital properties, or by hashing, and then the more difficult problem of secondary key retrieval is considered.
400p
britaikridanik
05-07-2022
17
3
Download
-
Lecture Database management systems: Lesson 36. The main topics covered in this chapter include: direct access (hashing), provides rapid, non-sequential, direct access to records, hashing algorithms, folding hash algo, key collision, collision handling, direct access (bucket overflow),...
24p
wangziyi_1307
26-04-2022
12
2
Download
-
Bài báo này trình bày một phương pháp nén tín hiệu điện tim (ECG – Electrocardiography) sử dụng thuật toán TP (Turning Point) kết hợp với kỹ thuật giấu tin để bảo mật thông tin bệnh nhân. Tín hiệu ECG ban đầu sẽ được nén với tỉ lệ 2:1 trước khi dữ liệu của bệnh nhân được nhúng vào. Thuật toán mã hóa AES (Advanced Encryption Standard) cùng hàm băm SHA3 (Secure Hash Algorithm-3) được sử dụng để tăng tính bảo mật và xác thực cho thông tin bệnh nhân trước khi nhúng.
4p
wangziyi_1307
26-04-2022
29
4
Download
-
Lecture Data Structures and Algorithms - Chapter 12: Hash (Dr. Nguyen Ho Man Rang). After completing this section, you will understand knowledge about: A Graph G consists of a set V, whose members are called the vertices of G, together with a set E of pairs of distinct vertices from V; the pairs in E are called the edges of G; a graph is called connected if there is a path from any vertex to any other vertex;...
83p
bachkhinhdaluu
03-12-2021
22
0
Download
-
Lecture Algorithms - Chapter 3.4: Hash Tables. After studying this section will help you understand: hash functions, separate chaining, linear probing, context, symbol table implementations, classic space-time tradeoff,...
44p
gongyuefei
22-08-2021
11
1
Download
-
The following will be discussed in Cryptography and Network Security Principles and Practices - Part 1: Introduction, classical encryption techniques, block ciphers and the data encryption standard, finite fields, advanced encryption standard, more on symmetric ciphers, confidentiality using symmetric encryption, introduction to number theory, public-key cryptography and RSA, key management - other public-key cryptosystems, message authentication and hash functions, hash and MAC algorithms, digital signatures and authentication protocols,...
576p
lovebychance04
20-05-2021
35
5
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)