shivajikobardan Posted February 28, 2022 Posted February 28, 2022 can you post some examples of this?
Sensei Posted February 28, 2022 Posted February 28, 2022 41 minutes ago, shivajikobardan said: can you post some examples of this? The 1st one can be implemented using hash algorithms MD5, SHA1, SHA256 etc: https://en.wikipedia.org/wiki/Cryptographic_hash_function The 2nd can be implemented using Luhn's algorithm or variation of it: https://en.wikipedia.org/wiki/Luhn_algorithm Read the articles. There are examples there.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now