Protocol Foundations 004: Data proofs [electronic resource].
Ethereum Foundation 2024
Open access content
The digitalization of the modern world has brought an exponential surge in the amount of information computer systems must handle. Hashes, which we covered in Protocol Foundations 003: Hashing, can be leveraged to structure large quantities of data in a way that allows for efficient integrity verification. A common example is a database using hashes as indices for faster data lookup. The so-called hash table stores data in key- value pairs and accesses them by hashes. In Figure 1, we see this applied to storing phone numbers, one of hash tables’ original uses dating from the 1950s…
https://www.librarystack.org/protocol-foundations-004-data-proofs/?ref=unknown
Algorithms
Computational intelligence
Data mining
Mathematics
Text
Mario Havel
Tim Beiko
Sign up to get news from us
Thank you for signing up. You'll begin to receive emails from us shortly.
We’re not able to update your preferences at the moment. Please try again later.
You’ve already subscribed with this email address. If you’d like to subscribe with another, please try again.
This email was permanently deleted from our database. If you’d like to resubscribe with this email, please contact us
Please complete the form below to buy:
[Title of the book, authors]
ISBN: [ISBN of the book]
Price [Price of book]
Thank you for placing an order. We will contact you shortly.
We’re not able to process your request at the moment. Please try again later.