DJ

Dr. Madhuri Jawale

Sort by
Message Digest : MD5 algorithm, SHA-1 algorithm
Message Digest : Cryptographic Hash Functions
Diffie -Hellman Key Exchange Algorithm.
Cryptography RSA Algorithm RSA Examples
Unit I Part II.pdf : Security Fundamentals
Cryptography and Information :Security Fundamentals
Stack Applications : Infix to postfix conversion, Evaluation of postfix expression, Decimal to Binary conversion.
Introduction to Stack, ▪ Stack ADT, ▪ Implementation of Stack using array, ▪ Concept of implicit and explicit stack.
Insertion Sort, Merge Sort. Time complexity of all sorting algorithms and their comparison.
Sorting Algorithms: Bubble Sort, Selection Sort,
Searching and Sorting Unit II Part I.pptx
Fundamentals of Data Structure_Unit I.pptx
The loop control structure