Tag

hash functions

0 views collected around this technical thread.

Top Architect
Top Architect
Jul 13, 2022 · Fundamentals

Understanding Bloom Filters, Counting Bloom Filters, and Cuckoo Filters

This article explains the motivation behind using filters to reduce database I/O, introduces Bloom filters and their bitmap implementation, discusses their limitations, then covers Counting Bloom filters and Cuckoo filters—including their hash structures, deletion support, performance trade‑offs, and practical improvements.

Bloom FilterCounting BloomCuckoo filter
0 likes · 13 min read
Understanding Bloom Filters, Counting Bloom Filters, and Cuckoo Filters
Ops Development Stories
Ops Development Stories
Sep 18, 2021 · Information Security

Secure Message Delivery: Symmetric & Asymmetric Encryption, Hashes, Signatures

Learn the fundamentals of information security through a myth-inspired scenario, covering how symmetric and asymmetric encryption, message digests, and digital signatures ensure confidentiality, integrity, and authenticity when transmitting a simple invitation, and explore a practical secure email system design.

digital signaturesencryptionhash functions
0 likes · 7 min read
Secure Message Delivery: Symmetric & Asymmetric Encryption, Hashes, Signatures
Tencent Cloud Developer
Tencent Cloud Developer
Jul 21, 2021 · Big Data

Bloom Filter: Introduction, Theory, Construction, Query, and Applications

The article explains Bloom filters—a probabilistic, space‑efficient data structure using multiple hash functions on a bit array to answer set‑membership queries with controllable false‑positive rates, detailing their construction, query process, optimal parameters, and common uses such as URL deduplication, cache protection, and spam filtering.

Bloom FilterCache OptimizationFalse Positive
0 likes · 8 min read
Bloom Filter: Introduction, Theory, Construction, Query, and Applications
Selected Java Interview Questions
Selected Java Interview Questions
Jan 23, 2021 · Information Security

Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange

This article provides a comprehensive introduction to cryptographic techniques, covering the goals of confidentiality, integrity and authentication, and detailing symmetric, asymmetric and hash algorithms, common implementations, their advantages and drawbacks, as well as key exchange methods and public key infrastructure.

PKIasymmetric encryptioncryptography
0 likes · 16 min read
Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Oct 14, 2019 · Backend Development

Common Java Pitfalls and Performance Tips: NullPointerException, Spin Locks, Low Coupling, CPU Monitoring, and Hash Functions

This article explains typical Java issues such as NullPointerException, demonstrates using spin locks for efficient multithreading, emphasizes low‑coupling design, shows how to diagnose CPU spikes with Linux tools and jstack, and describes why hash functions have O(1) lookup with collision‑resolution strategies.

CPU monitoringConcurrencyJava
0 likes · 5 min read
Common Java Pitfalls and Performance Tips: NullPointerException, Spin Locks, Low Coupling, CPU Monitoring, and Hash Functions
360 Quality & Efficiency
360 Quality & Efficiency
Mar 6, 2017 · Information Security

Understanding Hash Functions, Encryption Algorithms, and Their Java Implementation

This article explains the fundamentals of hash functions and encryption algorithms, illustrates Google’s SHA‑1 collision breakthrough, describes the classification of cryptographic methods, presents a detailed end‑to‑end encryption/decryption scenario, and shows how Java’s built‑in APIs and libraries support these techniques for secure data handling.

Javacryptographyencryption
0 likes · 8 min read
Understanding Hash Functions, Encryption Algorithms, and Their Java Implementation
Architect
Architect
Jun 9, 2015 · Information Security

Why Use bcrypt for Password Hashing Instead of MD5, SHA1, SHA256, etc.

The article explains that general‑purpose hash functions like MD5 and SHA families are fast and vulnerable to brute‑force attacks, while bcrypt’s deliberately slow, work‑factor‑adjustable design makes it a far more secure choice for storing passwords.

bcryptcryptographyhash functions
0 likes · 4 min read
Why Use bcrypt for Password Hashing Instead of MD5, SHA1, SHA256, etc.