Pinned Repositories
coursera-android
Source Code for Android Course Example Applications
Interview
Interview preparation
interviewprep
General coding practice for interviews
Inverted-Index-and-Document-Ranking
Implemented basic inverted index on documents. Implemented conjunctive query algorithm like cosine similarity to generate ranked list of document in Java
LZ77-Data-Compression-perl
Implementation of LZ77 data compression algorithm in perl
MalwareDetection
Implemented malware detection technique using functional call graph analysis using JAVA.
SmartCardRSA
Implemented attack on Smartcard RSA and decrypted the cipher text using Chinese Remainder Theorem in C. Smartcard RSA is cryptogrpahic challenge to decrypt cipher text. Challenge is attched in pdf "SmartCardRSA.pdf".
psdeshpande's Repositories
psdeshpande/MalwareDetection
Implemented malware detection technique using functional call graph analysis using JAVA.
psdeshpande/coursera-android
Source Code for Android Course Example Applications
psdeshpande/Interview
Interview preparation
psdeshpande/interviewprep
General coding practice for interviews
psdeshpande/Inverted-Index-and-Document-Ranking
Implemented basic inverted index on documents. Implemented conjunctive query algorithm like cosine similarity to generate ranked list of document in Java
psdeshpande/LZ77-Data-Compression-perl
Implementation of LZ77 data compression algorithm in perl
psdeshpande/SmartCardRSA
Implemented attack on Smartcard RSA and decrypted the cipher text using Chinese Remainder Theorem in C. Smartcard RSA is cryptogrpahic challenge to decrypt cipher text. Challenge is attched in pdf "SmartCardRSA.pdf".