<--- Back to Details
First PageDocument Content
Information science / Artificial intelligence / Error detection and correction / Hash functions / Hash table / Cryptographic hash functions / Trie / Linked list / Perfect hash function / Hashing / Search algorithms / Information retrieval
Date: 2014-07-10 21:19:43
Information science
Artificial intelligence
Error detection and correction
Hash functions
Hash table
Cryptographic hash functions
Trie
Linked list
Perfect hash function
Hashing
Search algorithms
Information retrieval

VISUAL BASIC COLLECTIONS AND HASH TABLES Thomas Niemann Preface

Add to Reading List

Source URL: www.epaperpress.com

Download Document from Source Website

File Size: 59,39 KB

Share Document on Facebook

Similar Documents

Cryptographic Hash Functions Part II Cryptography 1 Andreas Hülsing, TU/e Some slides by Sebastiaan de Hoogh, TU/e

DocID: 1uAoQ - View Document

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

DocID: 1uyAd - View Document

Cryptographic Hash Functions Part I Cryptography 1 Andreas Hülsing, TU/e Based on slides by Sebastiaan de Hoogh, TU/e

DocID: 1tYRg - View Document

Cryptography / Cryptographic hash functions / SHA-2 / Twofish / Encryption / Secure voice / Public switched telephone network / Crypt

GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

DocID: 1rud6 - View Document