Dheeraj-02NK / Comparitive-Analysis-of-Cryptographic-AlgorithmView external linksLinks
Comparative analysis of cryptographic algorithms, evaluating their security, efficiency, and suitability for different use cases
☆12Apr 26, 2023Updated 2 years ago
Alternatives and similar repositories for Comparitive-Analysis-of-Cryptographic-Algorithm
Users that are interested in Comparitive-Analysis-of-Cryptographic-Algorithm are comparing it to the libraries listed below
Sorting:
- Android app development using Android Studio is a dynamic and versatile process that allows developers to create innovative and user-frie…☆13Aug 16, 2023Updated 2 years ago
- This project focuses on developing an Android application that combines QR code and barcode scanning functionalities within a single, use…☆12Aug 19, 2023Updated 2 years ago
- EDA (Exploratory Data Analysis) is a data analysis approach that involves summarizing and visualizing the main characteristics of a datas…☆12Aug 20, 2023Updated 2 years ago
- "Vampus World" is a grid-based exploration game where the player controls a blue agent to find gold while avoiding red vampus obstacles. …☆13Dec 22, 2023Updated 2 years ago
- Prompt-Wala: AI Image Generator is a Python application that utilizes OpenAI's GPT-3 to generate images based on user prompts and style p…☆11Sep 20, 2023Updated 2 years ago
- A Computer Network Laboratory using Cisco Packet Tracer provides students and professionals with a simulated environment to design, confi…☆13Apr 9, 2025Updated 10 months ago
- ☆13Oct 19, 2023Updated 2 years ago
- A recommendation system is a type of software application or algorithm that analyzes user preferences, behaviors, and patterns to provide…☆14Dec 10, 2023Updated 2 years ago
- Machine Learning (ML) is a field of artificial intelligence (AI) that focuses on developing algorithms and models capable of learning fro…☆14Apr 2, 2024Updated last year
- AI is a comprehensive repository housing cutting-edge artificial intelligence algorithms, models, and tools for research, experimentation…☆12Oct 1, 2023Updated 2 years ago
- Data structures are objects or collections that can be used to store and organize data. Python offers a variety of built-in data structur…☆12Dec 2, 2025Updated 2 months ago
- NLP (Natural Language Processing) is a field of study that combines computer science, linguistics, and artificial intelligence to enable …☆12Jul 3, 2025Updated 7 months ago
- Computer vision and digital image processing are fields that involve analyzing and manipulating visual data using computers. Computer vis…☆12Jul 15, 2023Updated 2 years ago
- Cryptography and Network Security form the backbone of secure communication in the digital realm. Cryptography involves the art and scien…☆12Aug 22, 2023Updated 2 years ago
- Python Libraries such as NumPy, Pandas, Matplotlib, Seaborn and Sickit-Learn, for Data Analysis, Data Visualization, EDA & Data Science☆16Jan 19, 2024Updated 2 years ago
- successfully implemented a custom blockchain from scratch, marking a significant milestone in my programming journey. This project goes b…☆14Oct 7, 2023Updated 2 years ago
- Creating a Database Management System (DBMS) lab and mini project involves implementing a database, performing various operations on it, …☆16Oct 12, 2023Updated 2 years ago
- Blockchain technology has emerged as a transformative force in the digital landscape, revolutionizing industries with its promise of secu…☆16Dec 24, 2023Updated 2 years ago
- Steganography is the ancient art and science of hiding information within seemingly innocuous carriers, such as images, audio files, or t…☆16Apr 25, 2023Updated 2 years ago
- This repository, named "ml_practice," serves as a learning ground for various machine learning concepts and techniques. The repository co…☆19Jan 26, 2024Updated 2 years ago
- Rainbow triangle in cpp using SDL2☆10Aug 22, 2021Updated 4 years ago
- Python simulation of the quantum key distribution protocol using QuTip simulator.☆19May 31, 2021Updated 4 years ago
- Pure Rust implementation of of the post-quantum CRYSTALS-Dilithium algorithm☆27Updated this week
- The security of our critical infrastructure is threatened by the advent of future quantum computers, breaking asymmetric cryptography – a…☆21Jul 15, 2020Updated 5 years ago
- A web_based application to give us the percentage of fruit rottenness☆26Feb 25, 2021Updated 4 years ago
- demonstration of quantum cryptography 🐈 🔐 , one-time pad communication via BB84. repo for our IT Security Master project☆32Feb 11, 2023Updated 3 years ago
- 😺 Classical implementation of shor's and grover's algorithm to help with understanding.☆38May 15, 2018Updated 7 years ago
- This repository contains jupyter notebook and other resources made by me during learning Data Science☆42Jun 10, 2020Updated 5 years ago
- IBM Cybersecurity Analyst Assessment☆37Sep 1, 2020Updated 5 years ago
- Astro R-CNN: Instance Segmentation in Astronomical Images using Mask R-CNN Deep Learning☆53Dec 17, 2021Updated 4 years ago
- A Python application which uses machine learning classification algorithms to classify drawings of the user.☆68Mar 15, 2023Updated 2 years ago
- Some basic visualizations and analyses for cryptocurrencies.☆104Feb 3, 2021Updated 5 years ago
- A Python application that uses camera input to train a SVM to respond to specific actions.☆117May 28, 2020Updated 5 years ago
- A Python application that visualizes stock data using professional candlestick charts.☆131Feb 21, 2023Updated 2 years ago
- A script that trains a model to recognize handwritten digits using the MNIST data set. Then it loads external files and uses the neural n…☆140Mar 4, 2023Updated 2 years ago
- A self-study curriculum for learning Python in four weeks.☆670Feb 24, 2021Updated 4 years ago
- A collection of my config files.☆630Oct 7, 2025Updated 4 months ago
- A simple interface for working with intents and chatbots.☆263Dec 3, 2024Updated last year
- A simple self-driving AI car game, which uses NEAT.☆293Jun 3, 2024Updated last year