Shreyash H. Turkar's repositories
DistributedSystems
Implementation of Distributed System Algorithms. Lab Works for 6th Semester.
Threshold_Key_Cipher
Threshold Cypher Cryptography
-linux-shellScripting-
Hanker Rank Shell Scripting Practice
A-SECURE-COMMUNICATION-WITH-Generative-Adversarial-Nets-GANs-of-ADVERSARIAL-NEURAL-CRYPTOGRAPHY
PROBLEM STATEMENT We here discuss whether we can employ neural nets to secure our communication channels. We take classic Alice, Bob and Eve example where Alice is trying to send a message to Bob and Eve is eavesdropping. Instead of using rigid symmetric encryption algorithms like AES, DES, we will create an adversarial neural network where Alice will be trained to encrypt using a shared key, Bob will be trained to decrypt using a shared key and Eve will be trained to reconstruct the message without a shared key.
BioInformaticsLab
Lab works for Subject: BioInformatics
Computer-Networking
computer networking lab practicals
Cryptography
Cryptography Lab
Hacker_Rank
Hacker Rank Solutions
Keyless_Door_IoT_ONE
Key less Door Lock System For My Hostel's Room
Networking
Making UDP and TCP Object Oriented for ease of use and more
SoundPixel
Control WS2812 RBG LEDs using amplitude of frequencies decoded from audio signal using MSEGQ7.
Tic-Tac-Toe-Game
My First Python Program
transaction_generator
Nodejs code for fetching UTXOS, generating metadata data and unsigned transaction.
CypherRock
Program for signing Bitcoin transactions
TopHeadlines
Microservice for fetching, caching and supplying news.
f32_printf
Terminal color output simplified.
test_grpc
For learning to using gRPC
whiteBoardPractice
Repository for "White Board" practice.