PavlinPenev / SoftUni-Web
A repository holding my work and projects in the SoftUni Web course.
☆12Updated last year
Related projects ⓘ
Alternatives and complementary repositories for SoftUni-Web
- Telegram bot using python☆24Updated 3 months ago
- ☆10Updated 2 years ago
- This project is aimed to create a trustClient(use TrustZone on ARM) and a server program to verify whether a executable program on Raspbe…☆11Updated 8 months ago
- With the use of Recurrent Neural Networks, a model is created and trained to learn to recognize emotions in tweets. The dataset has thous…☆11Updated 3 years ago
- Lattice algorithms using floating-point arithmetic☆323Updated last week
- We want to create a Repo which can provide different Malwares wrote by Python.☆12Updated 3 weeks ago
- IDS-GAN: Generative Adversarial Networks for AttackGeneration against Intrusion Detection☆18Updated 10 months ago
- ☆12Updated 11 months ago
- This is the C implementation of the McEliece Cryptosystem based on QC-MDPC codes.☆22Updated 3 years ago
- Python bindings for SPHINCS+☆15Updated 2 years ago
- A Python interface for https://github.com/fplll/fplll☆124Updated last week
- Prototype development for Insider Threat Detection and Assessment tools☆8Updated 9 years ago
- Encryption / Decryption of images with AES-CBC/ECB☆18Updated 3 years ago
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆14Updated 2 years ago
- FudanMPL 2.0, a series of multi-party learning frameworks, with rich features, including secure and fast XGBoost, secure Fine-tuning for …☆46Updated 2 months ago
- Implicit White-box Implementations of ARX Ciphers☆13Updated 2 years ago
- Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)☆21Updated 2 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆34Updated last year
- Steganography applied to conceal small files inside a PNG image.☆18Updated 6 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆31Updated 2 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆28Updated this week
- A tool for estimating a system's information leakage via Machine Learning☆10Updated 4 months ago
- Masked Ascon Software Implementations☆11Updated 2 years ago
- Intrusion Detection System for IoT Devices☆20Updated last year
- Implementations of some lightweight block ciphers in C☆19Updated 6 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 8 years ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆26Updated 7 years ago
- ☆15Updated 3 years ago
- A Python implementation of CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy☆29Updated 4 years ago