Rathik MurtintyHashing, Salts, and PeppersHave you ever wondered how your passwords are kept secure?Apr 8Apr 8
Rathik MurtintyThe Vigenère Cipher and Kasiski’s MethodThe Vigenère Cipher is a famous classical encryption algorithm which was developed as a more robust solution to the pitfalls of…Mar 5Mar 5
Rathik MurtintyThe I2C ProtocolI2C may at first sound like the name of a newly discovered star. But, I2C is actually the name of a very simple, yet powerful…Sep 19, 2021Sep 19, 2021
Rathik MurtintyKruskal’s Minimum Spanning TreeRecently, I have been researching image segmentation. I find it fascinating that a machine can, to some degree, mimic the ability of humans…Aug 27, 2021Aug 27, 2021
Rathik MurtintyAutograd andBackpropagation in PytorchHave you ever used the following three lines of code, or some variation of them, in your ML scripts and had no clue what their purpose was?Jul 8, 2021Jul 8, 2021
Rathik MurtintyWiFi vs. EthernetWiFi. Ethernet. These two terms are thrown around loosely, especially when discussing streaming and gaming. But, what truly are these…Jul 4, 2021Jul 4, 2021