Fig. 3From: Performance evaluation of Cuckoo filters as an enhancement tool for password crackingFlow diagram for the evaluation process. This process is repeated for each data structure under study. (*) The search methods are linear, hash table, binary search tree, binary search, and Cuckoo filterBack to article page