rakeshsukla53 / CryptographyLinks
List of projects and assignments for Applied Crytography
☆38Updated 10 years ago
Alternatives and similar repositories for Cryptography
Users that are interested in Cryptography are comparing it to the libraries listed below
Sorting:
- It is an Encryption and Decryption tool written in python which is used to encrypt any type of file based on AES Standards and the files …☆38Updated 6 years ago
- A secure platform for storing of files using Hybrid Cryptography☆52Updated 3 years ago
- Collection of awesome resources for beginners on cyber security☆20Updated 4 years ago
- This repo will contain the algorithms for encryption and decryption of messages and ciphers respectively !!☆58Updated 3 years ago
- "Develop a passion for learning. If you do, you will never cease to grow." ― Anthony J. D'Angelo☆61Updated 5 years ago
- A curated repository for minor and major projects alloted in schools and colleges☆28Updated 4 years ago
- Collection of programming related books & their frameworks.☆148Updated 5 years ago
- Subject :- Algorithm-I (CS21003) , Discrete Structure (CS21001), Intro to Electronics (EC21103), Science and Humanism (HS30074), & Signal…☆12Updated 4 years ago
- Network security related project collection.☆76Updated 6 years ago
- Web based facial Authentication system with flask server☆114Updated 3 years ago
- A collection of curated resources for learning Computer Science subjects and skills, that I garnered throughout my tenure as a CSE studen…☆86Updated 4 years ago
- Roadmap to learn data structures, algorithms, mathematics, dynamic programming to beat in competitive programming, or crack any interview…☆30Updated 5 years ago
- List of resources for Algorithms and Data Structures in Python & other CS topics @2017☆297Updated 2 years ago
- Cryptography and Network Security Lab programs done in 7th semester of SIT(VTU).☆32Updated 6 years ago
- This repository will be demonstrating some network designs and solutions for LAN and WAN. The projects include concepts like Port Address…☆23Updated 5 years ago
- "Programmers are not to be measured by their ingenuity and their logic but by the completeness of their case analysis." ― Alan J. Perlis☆96Updated 4 years ago
- 📚👨🎓 Resources I'm using everyday to develop my skills to become a self-taught good programmer ...☆32Updated 5 years ago
- Regularly Updated | Solutions of data structure and algorithms based questions from various in Python | Data Structure Books and Cheatshe…☆76Updated last year
- 🔴 More than ~3877 Full Stack, Coding & System Design Interview Questions And Answers sourced from all around the Internet to help you to…☆77Updated 4 years ago
- "To competently perform rectifying security service, two critical incident response elements are necessary: information and organization.…☆57Updated 4 years ago
- Repo to level up my Python skills☆17Updated 5 years ago
- Networking , N/W layer, Transport and Application Layer, Networking Service, Internet, Troubleshooting , N/W future☆167Updated 3 years ago
- Welcome, to this Open Source Repository regarding FREE ARTIFICIAL INTELLIGENCE RESOURCE. Get Benefit from the free resources mention & ki…☆74Updated 4 years ago
- Solutions to HackerRank / GeeksforGeeks / LeetCode Questions: C, C++, Python, Problem Solving, SQL, 30 Days of Code and much more (400+ p…☆54Updated 4 months ago
- "The universe doesn't allow perfection." ― Stephen Hawking☆53Updated 3 years ago
- A complimentary course for an understanding of blockchain and its development like custom blockchain, dapps, etc.☆72Updated 4 years ago
- "I don't care that they stole my idea . . I care that they don't have any of their own." ― Nikola Tesla☆43Updated 5 years ago
- "The key to artificial intelligence has always been the representation." - Jeff Hawkins☆83Updated 5 years ago
- For a lot of people, pursuing computer science, either as a career or as a skill, can seem daunting. Not to fear, though! I’ve rounded up…☆58Updated 4 years ago
- Final year Project in the field of Cyber-Security☆58Updated 5 years ago