intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Hashing algorithms

Xem 1-20 trên 57 kết quả Hashing algorithms
  • Part 2 of ebook "Data structures and algorithms in Python" provides readers with contents including: Chapter 9 - Priority queues; Chapter 10 - Maps, hash tables, and skip lists; Chapter 11 - Search trees; Chapter 12 - Sorting and selection; Chapter 13 - Text processing; Chapter 14 - Graph algorithms; Chapter 15 - Memory management and B-trees;...

    pdf387p daonhiennhien 03-07-2024 4 1   Download

  • The paper proposes a type of block cipher algorithm based on cryptographic hash function and public key cryptography. The algorithm proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.

    pdf11p visergeyne 18-06-2024 3 0   Download

  • Ebook "Cryptography and security services: Mechanisms and applications" presents the following content: Chapter 1 introduction, chapter 2 ASN.1 encoding, chapter 3 random number generation, chapter 4 advanced encryption standard, chapter 5 hash functions, chapter 6 message - authentication code algorithms, chapter 7 encrypt and authenticate modes, chapter 8 large integer arithmetic, chapter 9 public key algorithms.

    pdf446p zizaybay1103 29-05-2024 4 2   Download

  • Lecture Data structure and Algorithm basic lab: Week 14. This lesson provides students with content about: dictionary ADT; hash table; hash functions; hash code maps; compression maps; data structure for chaining; collision handling; exercises;... Please refer to the detailed content of the lecture!

    pdf48p codabach1016 03-05-2024 5 0   Download

  • Lecture Data structures and Algorithms: Week 14 (Lesson 14). This lesson provides students with content about: dictionary ADT; dictionary ADT methods; key-indexed dictionaries; hash table; hash functions; compression maps; collision handling; exercises;... Please refer to the detailed content of the lecture!

    pdf41p codabach1016 03-05-2024 1 0   Download

  • Part 1 book "Internet security - Cryptographic principles algorithms protocols" includes content: Internetworking and layered models; tcp ip suite and internet stack protocols; symmetric block ciphers; hash function, message digest and message authentication code, asymmetric public key cryptosystems.

    pdf221p longtimenosee08 31-03-2024 5 1   Download

  • This approach required a significant amount of time for preprocessing and formulating a constraint satisfaction problem (CSP). To address this problem, we proposed a new algorithm based on a hash data structure which performs more quickly in itemsets filtering and problem modeling. Experiment evaluations are conducted on real world and synthetic datasets.

    pdf11p visystrom 22-11-2023 6 5   Download

  • Ebook Algorithms in C: Part 1 includes contents: Chapter 1: introduction, chapter 2: c, chapter 3: elementary data structures, chapter 4: trees, chapter 5: recursion, chapter 6: analysis of algorithms, chapter 7: implementation of algorithms, chapter 8: elementary sorting methods, chapter 9: quicksort, chapter 10: radix sorting, chapter 11: priority queues, chapter 12: mergesort, chapter 13: external sorting, chapter 14: elementary searching methods, chapter 15: balanced trees, chapter 16: hashing, chapter 17: radix searching, chapter 18: external searching, chapter 19: string searching, ch...

    pdf359p haojiubujain08 01-11-2023 2 1   Download

  • Ebook "Teach yourself data structures and algorithms in 24 hours" includes content: Introducing data structures and algorithms, abstract data types, recursion and quicksort, trees, hash tables, appendixes.

    pdf548p haojiubujain07 20-09-2023 4 2   Download

  • Ebook "Data structures and algorithm analysis in C++ (Fourth edition)" provides critical new coverage of treaps, k-d trees and k-d B-trees, generational garbage collection, and other advanced topics such as sorting methods and a new hashing technique. Abundant C++ code examples and a variety of case studies provide valuable insights into data structures implementation.

    pdf818p tichhythan 17-08-2023 8 5   Download

  • Patient-powered research networks (PPRNs) are a valuable source of patient-generated information. Diagnosis code-based algorithms developed by PPRNs can be used to query health plans’ claims data to identify patients for research opportunities.

    pdf9p visteverogers 24-06-2023 3 2   Download

  • Ebook Fundamentals of database systems (Seventh edition): Part 2 presents the following content: Relational Database Design Algorithms and Further Dependencies; Disk Storage, Basic File Structures, Hashing, and Modern Storage Architectures; Indexing Structures for Files and Physical Database Design;...Please refer to the documentation for more details.

    pdf786p chankora 16-06-2023 6 3   Download

  • Lecture "Data structures and algorithms: Chapter 9 - Hash" provide students with knowledge about: Basic concepts; Hash functions: Direct Hashing, Modulo division, Digit extraction, Mid-square, Mid-square, Folding, Rotation, Pseudo-random; Collision resolution. Please refer to the detailed content of the lecture!

    pdf58p phuogchi205 07-03-2023 10 6   Download

  • In this paper, we propose a design method for the signature scheme based on ring structure Zn. Our signature schemes are more secure, generate signatures at a faster rate than that of the ElGamal scheme and its variants. Moreover, our approaches also overcome some disadvantages of some similar signature schemes on ring Zn. For these advantages, they are fully applicable in practice.

    pdf10p viwmotors 02-12-2022 18 3   Download

  • "The art of computer programming - Volume 3: Sorting and searching" comprises Chapters 5 and 6 of the complete series. Part 2 of book included chapter 6 deals with the problem of searching for specified items in tables or files; this is subdivided into methods that search sequentially, or by comparison of keys, or by digital properties, or by hashing, and then the more difficult problem of secondary key retrieval is considered.

    pdf400p britaikridanik 05-07-2022 17 3   Download

  • Lecture Database management systems: Lesson 36. The main topics covered in this chapter include: direct access (hashing), provides rapid, non-sequential, direct access to records, hashing algorithms, folding hash algo, key collision, collision handling, direct access (bucket overflow),...

    ppt24p wangziyi_1307 26-04-2022 12 2   Download

  • Bài báo này trình bày một phương pháp nén tín hiệu điện tim (ECG – Electrocardiography) sử dụng thuật toán TP (Turning Point) kết hợp với kỹ thuật giấu tin để bảo mật thông tin bệnh nhân. Tín hiệu ECG ban đầu sẽ được nén với tỉ lệ 2:1 trước khi dữ liệu của bệnh nhân được nhúng vào. Thuật toán mã hóa AES (Advanced Encryption Standard) cùng hàm băm SHA3 (Secure Hash Algorithm-3) được sử dụng để tăng tính bảo mật và xác thực cho thông tin bệnh nhân trước khi nhúng.

    pdf4p wangziyi_1307 26-04-2022 29 4   Download

  • Lecture Data Structures and Algorithms - Chapter 12: Hash (Dr. Nguyen Ho Man Rang). After completing this section, you will understand knowledge about: A Graph G consists of a set V, whose members are called the vertices of G, together with a set E of pairs of distinct vertices from V; the pairs in E are called the edges of G; a graph is called connected if there is a path from any vertex to any other vertex;...

    pdf83p bachkhinhdaluu 03-12-2021 22 0   Download

  • Lecture Algorithms - Chapter 3.4: Hash Tables. After studying this section will help you understand: hash functions, separate chaining, linear probing, context, symbol table implementations, classic space-time tradeoff,...

    pdf44p gongyuefei 22-08-2021 11 1   Download

  • The following will be discussed in Cryptography and Network Security Principles and Practices - Part 1: Introduction, classical encryption techniques, block ciphers and the data encryption standard, finite fields, advanced encryption standard, more on symmetric ciphers, confidentiality using symmetric encryption, introduction to number theory, public-key cryptography and RSA, key management - other public-key cryptosystems, message authentication and hash functions, hash and MAC algorithms, digital signatures and authentication protocols,...

    pdf576p lovebychance04 20-05-2021 35 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2