473,385 Members | 1,392 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

Hashing algorithms

Hi,

I am looking for resources (website links/documentation) to some good
hashing algorithms. Basically Hashing algorithms that cater to a range of
intergers/ a range of IP addresses.

Help would be greatly appreciated.

Thanks,
Priya
Nov 13 '05 #1
3 2141
On Thu, 17 Jul 2003 18:00:14 GMT, "Priya Ghate"
<pr********@hotmail.com> wrote:
Hi,

I am looking for resources (website links/documentation) to some good
hashing algorithms. Basically Hashing algorithms that cater to a range of
intergers/ a range of IP addresses.

And for some reason you expect a better answer here than from a search
engine.
<<Remove the del for email>>
Nov 13 '05 #2
I don't see anything wrong in asking for other peoples opinions ..
"Barry Schwarz" <sc******@deloz.net> wrote in message
news:bf**********@216.39.134.229...
On Thu, 17 Jul 2003 18:00:14 GMT, "Priya Ghate"
<pr********@hotmail.com> wrote:
Hi,

I am looking for resources (website links/documentation) to some good
hashing algorithms. Basically Hashing algorithms that cater to a range of
intergers/ a range of IP addresses.

And for some reason you expect a better answer here than from a search
engine.
<<Remove the del for email>>

Nov 13 '05 #3


Priya Ghate wrote:

I don't see anything wrong in asking for other peoples opinions ..

Then you should ask it in a newsgroup where it isn't off-topic.


Brian Rodenborn
Nov 13 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: Seth | last post by:
I want to create a simple hash function that can hash strings. Currently I'm storing passwords as strings in a DB but want to store them as a hash. I don't need any proper standardised hashing e.g....
11
by: Wm. Scott Miller | last post by:
Hello all! We are building applications here and have hashing algorithms to secure secrets (e.g passwords) by producing one way hashes. Now, I've read alot and I've followed most of the advice...
3
by: MuZZy | last post by:
Hi, Is there any guarantee that MD5 hashing algorithm implementation will not change in the next .NET version unlike what's happened to String.GetHashcode? Thank you, MuZZy
8
by: Maya | last post by:
Hello all, I'm using MD5 hashing in my application to give unique values to huge list of items my application receives, originally every item's name was difficult to use as an id for this item...
6
by: Jayender | last post by:
Hi, What is the difference between Hashing and Encryption ?
1
by: zoro | last post by:
separate chaining and linear probing are two implementation in hashing that we use to reduce collisions. i know that linear probing is the fastest in general than other implemenataions. but what...
7
by: Kless | last post by:
Since that I'm working to let encrypt/hash data in the data base of my projects I have been looking for libraries and/or wrappers. So I want give my feedback about it. In the first I found...
1
by: Tinku | last post by:
Hi friends I know Static Hashing and i know about Dynamic Hashing, still i have problem to make program with Dynamic Hashing I am new in "C" world, please help me, my problem is: i have to...
11
by: January Weiner | last post by:
Hello, I need to use a hashing function for relatively short strings (roughly 16 characters or less). The data that needs to be accessed via hash is just a simple int. I just need to look up...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.