## Count elements that are divisible by at-least one element in another array

Given two arrays arr1[] and arr2[]. The task is to find the count of such elements in the first array whose at-least one factor is… Read More »

- Load Factor and Rehashing
- Print nodes in top view of Binary Tree | Set 2
- Sentence that contains all the given phrases
- For each element in 1st array count elements less than or equal to it in 2nd array | Set 2
- Count number of triplets with product equal to given number with duplicates allowed
- Maximum occurring character in an input string | Set-2
- Find the largest number that can be formed with the given digits
- Count pairs in an array that hold i+j= arr[i]+arr[j]
- SHA-1 Hash
- Introduction to Merkle Tree
- SHA-512 Hash In Java
- Sum of elements whose square root is present in the array
- Longest common anagram subsequence from N strings
- Longest Subsequence with at least one common digit in every element
- Hashing in Distributed Systems
- SHA-256 Hash in Java
- Number of Counterclockwise shifts to make a string palindrome
- SHA-384 Hash In Java
- Fascinating Number
- Count pairs of parentheses sequences such that parantheses are balanced
- Count of strings that can be formed from another string using each character at-most once
- Check if a String can be converted to Pangram in K changes
- Print all the pairs that contains the positive and negative values of an element
- Method Class | hashCode() Method in Java
- PHP | hash_algos() Function
- Find all good indices in the given Array
- Minimum deletions from string to reduce it to string with at most 2 unique characters
- Maximum sub-matrix area having count of 1's one more than count of 0's
- Count occurrences of the average of array elements with a given number
- Minimum array elements to be changed to make it a Lucas Sequence

Given two arrays arr1[] and arr2[]. The task is to find the count of such elements in the first array whose at-least one factor is… Read More »

Given a String str containing only lowercase English alphabets and an integer K. The task is to check that whether the string can be converted… Read More »

The SHA-2 family of cryptographic hash functions consists of six hash functions. These are: SHA-224, with 224 bit hash values SHA-256, with 256 bit hash… Read More »

SHA-1 or Secure Hash Algorithm 1 is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value. This hash value… Read More »

The MD2 is a Message-Digest Algorithm. It is a cryptographic hash function developed by Ronald Rivest in 1989. It is optimized for 8-bit computers. The… Read More »

Prerequisites: Hashing Introduction and Collision handling by separate chaining How hashing works: For insertion of a key(K) – value(V) pair into a hash map, 2… Read More »

Definition: In Cryptography, SHA is cryptographic hash function which takes input as 20 Bytes and rendered the hash value in hexadecimal number, 40 digits long… Read More »

Given an array of positive integers (may contain duplicates), the task is to find the number of triplets whose product is equal to a given… Read More »

Given a number N, the task is to check whether it is fascinating or not. Fascinating Number: When a number( 3 digits or more )… Read More »

Given an array of integers arr[] representing digits of a number. The task is to write a program to generate the largest number possible using… Read More »

Top view of a binary tree is the set of nodes visible when the tree is viewed from the top. Given a binary tree, print… Read More »

Given a list of sentences and a list of phrases. The task is to find which sentence(s) contain all the words in a phrase and… Read More »

Given a string containing only two characters i.e. R and K (like RRKRRKKKKK). The task is to find the maximum value of N for a… Read More »