Hunter Johnson

Simple blockchain project

Square and multiply

Block Cipher Modes

SVM Soft Margin Addendum

SVM soft margin

SVM Hard Margin

Password length and bits of security

How to Crack an LFSR

Cryptography I, Lecture 1: Classical ciphers

Calculus I, lecture 1: A review of precalculus

Ensemble Methods

Elliptic Curve Cryptography

MACs: Message Authentication Codes

Decision Trees

Neural Network Extras

Cryptographic Hash Algorithms

Backpropagation 1

Backpropagation 2

Introduction to Cryptographic Hashes

Neural Networks: Forward and Back propagation

Digital Signatures: RSA and El Gamal

Cross Validation, Neural Nets

Precision, Recall, and Multiclass Classification

DLP Attacks and intro to El Gamal

Instance Based Methods

Cyclic Groups in Cryptography

Miller Rabin, RSA, and some DHKE

RSA Fast Exponentiation

Support Vector Machines (Intro)

Regularization Lecture