Skip to content

Tag Archives: Hash

The SHA-2 family of cryptographic hash functions consists of six hash functions. These are: SHA-224, with 224 bit hash values SHA-256, with 256 bit hash… Read More
The SHA-2 family of cryptographic hash functions consists of six hash functions. These are: SHA-224, with 224 bit hash values SHA-256, with 256 bit hash… Read More
The SHA-2 family of cryptographic hash functions consists of six hash functions. These are: SHA-224, with 224 bit hash values SHA-256, with 256 bit hash… Read More
SHA-1 or Secure Hash Algorithm 1 is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value. This hash value… Read More
The MD2 is a Message-Digest Algorithm. It is a cryptographic hash function developed by Ronald Rivest in 1989. It is optimized for 8-bit computers. The… Read More
Prerequisites: Hashing Introduction and Collision handling by separate chaining How hashing works: For insertion of a key(K) – value(V) pair into a hash map, 2… Read More
Definition: In Cryptography, SHA is cryptographic hash function which takes input as 20 Bytes and rendered the hash value in hexadecimal number, 40 digits long approx.Message… Read More
Given an array of positive integers (may contain duplicates), the task is to find the number of triplets whose product is equal to a given… Read More
Given a number N, the task is to check whether it is fascinating or not. Fascinating Number: When a number( 3 digits or more ) is… Read More
Given an array of integers arr[] represents digits of a number. The task is to write a program to generate the largest number possible using… Read More
Top view of a binary tree is the set of nodes visible when the tree is viewed from the top. Given a binary tree, print… Read More
Given a list of sentences and a list of phrases. The task is to find which sentence(s) contain all the words in a phrase and… Read More
Given a string containing only two characters i.e. R and K (like RRKRRKKKKK). The task is to find the maximum value of N for a… Read More
Given N strings. Find the longest possible subsequence from each of these N strings such that they are anagram to each other. The task is… Read More
The java.lang.reflect.Method.hashCode() method returns the hash code for the Method class object. The hashcode returned is computed by exclusive-or operation on the hashcodes for the… Read More

Start Your Coding Journey Now!