## Introduction to Merkle Tree

Merkle tree also known as hash tree is a data structure used for data verification and synchronization. It is a tree data structure where each… Read More »

- Load Factor and Rehashing
- Sentence that contains all the given phrases
- Print nodes in top view of Binary Tree | Set 2
- For each element in 1st array count elements less than or equal to it in 2nd array | Set 2
- Count number of triplets with product equal to given number with duplicates allowed
- Find the largest number that can be formed with the given digits
- Longest Subsequence with at least one common digit in every element
- SHA-1 Hash In Java
- SHA-512 Hash In Java
- Hashing in Distributed Systems
- SHA-384 Hash In Java
- Mid-Square hashing
- Maximum occurring character in an input string | Set-2
- Longest common anagram subsequence from N strings
- Introduction to Merkle Tree
- SHA-256 Hash in Java
- Number of Counterclockwise shifts to make a string palindrome
- Check if a String can be converted to Pangram in K changes
- Fascinating Number
- Find all good indices in the given Array
- Count of strings that can be formed from another string using each character at-most once
- Permutation of a string with maximum number of characters greater than its adjacent characters
- Maximum sub-matrix area having count of 1's one more than count of 0's
- Method Class | hashCode() Method in Java
- Count occurrences of the average of array elements with a given number
- Print all the pairs that contains the positive and negative values of an element
- Minimum deletions from string to reduce it to string with at most 2 unique characters
- Minimum array elements to be changed to make it a Lucas Sequence
- Sudo Placement[1.4] | Jumping the Subtree
- Count elements that are divisible by at-least one element in another array

Merkle tree also known as hash tree is a data structure used for data verification and synchronization. It is a tree data structure where each… Read More »

Given a string containing lowercase English alphabets. The task is to find the minimum number of characters needed to be removed so that the remaining… Read More »

Given an array A[] of integers. The task is to print all indices of this array such that after removing the ith element from the… Read More »

Given an array of integers and an integer . For every integer of the array a[i], the task is to calculate the count of numbers… Read More »

Given an array with N distinct elements. The task is to find the minimum number of elements to be changed in the array such that,… Read More »

Given an array. The task is to find the length of the longest subsequence in which all elements must have at least one digit in… Read More »

The hash_hmac_algos() function is an inbuilt function in PHP which is used to get the a list of registered hashing algorithms suitable for hash_hmac() function.… Read More »

The hash_equals function() is an inbuilt function in PHP which is used to compares two strings using the same time whether they are equal or… Read More »

The hash_copy() function is an inbuilt function in PHP which is used to get the copy of hashing context. Syntax: hash_copy( $context ) Parameters: This… Read More »

The hash_algos() function is an inbuilt function in PHP which is used to return a list of registered hashing algorithms. Syntax: array hash_algos( void )… Read More »

Given an integer . The task is to find all factors of N and print the product of four factors of N such that: Sum… Read More »

Given two unsorted arrays arr1[] and arr2[]. They may contain duplicates. For each element in arr1[] count elements less than or equal to it in… Read More »

Given two arrays arr1[] and arr2[]. The task is to find the count of such elements in the first array whose at-least one factor is… Read More »

Given a String str containing only lowercase English alphabets and an integer K. The task is to check that whether the string can be converted… Read More »

The SHA-2 family of cryptographic hash functions consists of six hash functions. These are: SHA-224, with 224 bit hash values SHA-256, with 256 bit hash… Read More »