Unlocking the Secrets of Cryptography: A Beginner’s Guide to Breaking Ciphers — Part 3
Medium | Furkan KAMACI
by Furkan KAMACI
1y ago
Unlocking the Secrets of Cryptography: A Beginner’s Guide to Breaking Ciphers — Part 3 Photo by SpaceX on Unsplash This is the third post and last part of my breaking ciphers series. If you haven’t read the previous one, you can find it here: https://furkankamaci.medium.com/unlocking-the-secrets-of-cryptography-a-beginners-guide-to-breaking-ciphers-part-2-a4ab2996e522 In my previous post, I showed how to break Product Cipher Composed of the same ciphers. In this post, I will make the cipher much more complicated and try to break it again. I will use the same ciphertext for ..read more
Visit website
Unlocking the Secrets of Cryptography: A Beginner’s Guide to Breaking Ciphers — Part 2
Medium | Furkan KAMACI
by Furkan KAMACI
1y ago
Unlocking the Secrets of Cryptography: A Beginner’s Guide to Breaking Ciphers — Part 2 Photo by Tom Roberts on Unsplash This is the second post in my breaking ciphers series. If you haven’t read the previous one, you can find it here: https://furkankamaci.medium.com/unlocking-the-secrets-of-cryptography-a-beginners-guide-to-breaking-ciphers-part-1-67d79c470127 In my previous post, I showed how to apply frequency analysis and break a cipher. In this post, I will make the cipher more complicated and try to break it again. I will use the same ciphertext for this post: htt ..read more
Visit website
Unlocking the Secrets of Cryptography: A Beginner’s Guide to Breaking Ciphers — Part 1
Medium | Furkan KAMACI
by Furkan KAMACI
1y ago
Unlocking the Secrets of Cryptography: A Beginner’s Guide to Breaking Ciphers — Part 1 Photo by Mauro Sbicego on UnsplashHistorical Background Cryptography has a long and fascinating history, dating back to ancient civilizations. The use of codes and ciphers allowed people to send messages that could not be understood by anyone who intercepted them. One of the earliest known examples of cryptography comes from ancient Egypt, where hieroglyphs were often written in a code that only priests and scribes could understand. In ancient Greece, the famous Scytale was used as a cryptographic ..read more
Visit website
Algorithm to Solve a Sudoku
Medium | Furkan KAMACI
by Furkan KAMACI
3y ago
Sudoku is a logic-based number-placement puzzle. In classic sudoku, the objective is to fill a 9×9 grid with digits so that each column, each row, and each of the nine 3×3 sub-grids that compose the grid (also called “boxes”, “blocks”, or “regions”) contains all of the digits from 1 to 9. The puzzle setter provides a partially completed grid, which for a well-posed puzzle has a single solution [1]. Sudoku example and its solution As the nature of the logic, we may fill empty cells with numbers and have many solution candidates. Trying to solve this problem with a brute force approach ..read more
Visit website
Apache NLPCraft
Medium | Furkan KAMACI
by Furkan KAMACI
3y ago
Photo by Volodymyr Hryshchenko on Unsplash NLPCraft is an open source library for adding Natural Language Interface to any applications. Based on semantic modeling it requires no ML/DL model training or existing text corpora. NLPCraft is simple to use: define a semantic model and intents to interpret user input. Securely deploy this model and use REST API to explore the data using natural language from your applications. Why NLI Natural Language Interface (NLI) enables users to explore any type of data sources using natural language augmenting existing UI/UX with fidelity and simplic ..read more
Visit website
Algorithm to Solve a Sudoku
Medium | Furkan KAMACI
by Furkan KAMACI
3y ago
Sudoku is a logic-based number-placement puzzle. In classic sudoku, the objective is to fill a 9×9 grid with digits so that each column, each row, and each of the nine 3×3 sub-grids that compose the grid (also called “boxes”, “blocks”, or “regions”) contains all of the digits from 1 to 9. The puzzle setter provides a partially completed grid, which for a well-posed puzzle has a single solution [1]. Sudoku example and its solution As the nature of the logic, we may fill empty cells with numbers and have many solution candidates. Trying to solve this problem with a brute force approach ..read more
Visit website
Apache NLPCraft
Medium | Furkan KAMACI
by Furkan KAMACI
4y ago
Photo by Volodymyr Hryshchenko on UnsplashNLPCraft is an open source library for adding Natural Language Interface to any applications. Based on semantic modeling it requires no ML/DL model training or existing text corpora. NLPCraft is simple to use: define a semantic model and intents to interpret user input. Securely deploy this model and use REST API to explore the data using natural language from your applications. Why NLI Natural Language Interface (NLI) enables users to explore any type of data sources using natural language augmenting existing UI/UX with fidelity and simplicity of conv ..read more
Visit website
Apache NLPCraft
Medium | Furkan KAMACI
by Furkan KAMACI
4y ago
Photo by Volodymyr Hryshchenko on UnsplashNLPCraft is an open source library for adding Natural Language Interface to any applications. Based on semantic modeling it requires no ML/DL model training or existing text corpora. NLPCraft is simple to use: define a semantic model and intents to interpret user input. Securely deploy this model and use REST API to explore the data using natural language from your applications. Why NLI Natural Language Interface (NLI) enables users to explore any type of data sources using natural language augmenting existing UI/UX with fidelity and simplicity of conv ..read more
Visit website
U.S. National Institute of Standards and Technology Released the Privacy Framework
Medium | Furkan KAMACI
by Furkan KAMACI
4y ago
Photo by fabio on UnsplashThe National Institute of Standards and Technology (NIST) is a physical sciences laboratory and a non-regulatory agency of the United States Department of Commerce. Its mission is to promote innovation and industrial competitiveness. NIST’s activities are organized into laboratory programs that include nanoscale science and technology, engineering, information technology, neutron research, material measurement, and physical measurement. NIST released the version 1.0 of Privacy Framework: A tool for Improving Privacy through Enterprise Risk Management (Privacy Framewor ..read more
Visit website
California Consumer Privacy Act (CCPA) and Comparison with GDPR
Medium | Furkan KAMACI
by Furkan KAMACI
4y ago
31 states at the United States have established laws regulating the secure destruction or disposal of personal information, with at least a dozen states imposing broader data security requirements and California is a pioneer belong them. The California Consumer Privacy Act (CCPA) was enacted in 2018 and takes effect on January 1, 2020. This landmark piece of legislation secures new privacy rights for California consumers. The CCPA grants new rights to California consumers: The right to know what personal information is collected, used, shared or sold, both as to the categories and specific pie ..read more
Visit website

Follow Medium | Furkan KAMACI on FeedSpot

Continue with Google
Continue with Apple
OR