Aswani Kumar Cherukuri
Class 5 Neural network architectures 11.1.22
Class 7 Perceptron 17.1.22
Class. 10 Backpropagation Problems. 27.1.22
Class 9. Backpropagation network 25.1.22
Migration to Post Quantum Cryptography
THE QUANTUM CRASH: Grover's Algorithm Explained Simply
Sri Chakra Raja Simhasaneshwari, Anoop Sankar’s Mesmerising Performance That Captivated legends
Shor Algorithm Period Finding
Quantum Century Translating Science into Systems and Opportunities
Post Quantum Cryptography
Words of Wisdom - Governor of Tamil Nadu
Quantum Key Distribution BB84
Quantum Computing
Words of wisdom of Prof Kamakoti.
Summer School on Quantum Computing at Samarkand State University, Uzbekistan
Flying above Hindukush Mountains.
Demystifying Quantum Computing
Securing Machine Learning Models
Euclid and Extended Euclid Algorithms
Simplified Data Encryption Standard (S-DES)
Encrypted Network Traffic Analysis Book
Webinar on Exploring Blockchain Technology
Hash Functions, Digital Signatures and Quantum Cryptography
Class 16. Class Elgammal Crypto System and Key Management 15.3.2021
Public Key Cryptography
Advanced Encryption Standard
ACM India VIT Winter School on Cryptography and Cybersecurity 2023
Data Encryption Standard