• Hash Table

    September 10, 2019

    A hash table is a structure that maps keys to values. Let’s first understand the term hash. Hashing Hashing is…

    VIEW
  • Digital signature

    September 10, 2019

    Imagine that Alice wants to send a message to Bob. The system uses RSA encryption, and no one can read…

    VIEW
  • September 10, 2019

  • RSA (cryptosystem)

    September 10, 2019

    RSA is one of the first public-key (asymmetric) cryptosystems and is widely used for secure data transmission. RSA stands for…

    VIEW
  • Asymmetric Encryption

    September 10, 2019

    Public-key cryptography (asymmetric cryptography) is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely,…

    VIEW
  • AES (Advanced Encryption Standard)

    September 10, 2019

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified information…

    VIEW
  • September 10, 2019

  • The auto Specifier C++

    September 8, 2019

    The auto specifier deduces the type of a declared variable from its initialization expression. This means that a variable can…

    VIEW
  • Basic Data Structure

    September 8, 2019

    Linked List The linked list data structure is often used to implement other data structures. A linked list is a…

    VIEW
  • What is RESTful API?

    September 8, 2019

    A RESTful API (RESTful web service), is based on Representational State Transfer (REST) technology, which is an architectural style and…

    VIEW
  • The Dot (Regex)

    September 8, 2019

    The dot (.) is one of the most common metacharacters. What are the metacharacters: In regular expressions, there are characters…

    VIEW
  • Adjacency Matrix in C++

    September 7, 2019

    An adjacency matrix is a square matrix used to represent a finite graph. The elements of the matrix indicate whether…

    VIEW