## SHA-224 Hash In Java

The SHA-2 family of cryptographic hash functions consists of six hash functions. These are: SHA-224, with 224 bit hash values SHA-256, with 256 bit hash… Read More »

- Find minimum difference between any two elements | Set 2
- Minimum cost to modify a string
- Queries to check if string B exists as substring in string A
- Count number of distinct substrings of a given length
- Count of pairs of strings which differ in exactly one position
- Find the number of p-sided squares in a grid with K blacks painted
- Count number of pairs in array having sum divisible by K | SET 2
- Sum of all odd frequency nodes of the Linked List
- Number of subarrays having sum of the form k^m, m >= 0
- Rearrange given string to maximize the occurrence of string t
- Total distinct pairs of ugly numbers from two arrays
- Number of ways in which the substring in range [L, R] can be formed using characters out of the range
- Number of times the given string occurs in the array in the range [l, r]
- Distinct pairs from given arrays (a[i], b[j]) such that (a[i] + b[j]) is a Fibonacci number
- Count pairs with average present in the same array
- Total distinct pairs from two arrays such that second number can be obtained by inverting bits of first
- Check if a given number divides the sum of the factorials of its digits
- Kotlin Hashmap

The SHA-2 family of cryptographic hash functions consists of six hash functions. These are: SHA-224, with 224 bit hash values SHA-256, with 256 bit hash… Read More »

SHA-1 or Secure Hash Algorithm 1 is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value. This hash value… Read More »

The MD2 is a Message-Digest Algorithm. It is a cryptographic hash function developed by Ronald Rivest in 1989. It is optimized for 8-bit computers. The… Read More »

Prerequisites: Hashing Introduction and Collision handling by separate chaining How hashing works: For insertion of a key(K) – value(V) pair into a hash map, 2… Read More »

Definition: In Cryptography, SHA is cryptographic hash function which takes input as 20 Bytes and rendered the hash value in hexadecimal number, 40 digits long… Read More »

Given an array of positive integers (may contain duplicates), the task is to find the number of triplets whose product is equal to a given… Read More »

Given a number N, the task is to check whether it is fascinating or not. Fascinating Number: When a number( 3 digits or more )… Read More »

Given an array of integers arr[] representing digits of a number. The task is to write a program to generate the largest number possible using… Read More »

Top view of a binary tree is the set of nodes visible when the tree is viewed from the top. Given a binary tree, print… Read More »

Given a list of sentences and a list of phrases. The task is to find which sentence(s) contain all the words in a phrase and… Read More »

Given a string containing only two characters i.e. R and K (like RRKRRKKKKK). The task is to find the maximum value of N for a… Read More »

Given N strings. Find the longest possible subsequence from each of these N strings such that they are anagram to each other. The task is… Read More »

The java.lang.reflect.Method.hashCode() method returns the hash code for the Method class object. The hashcode returned is computed by exclusive-or operation on the hashcodes for the… Read More »

Given an array of distinct integers, print all the pairs having a positive value and negative value of a number that exists in the array.… Read More »

Given two strings str1 and str2, the task is to print the number of times str2 can be formed using characters of str1. However, a… Read More »