Published inLevel Up CodingSecure Secret Sharing and Recovery Using FHEEnhance data security and privacy in collaborative processing with Fully Homomorphic Encryption and Shamir’s Secret Sharing.Jul 22Jul 22
Published inTowards Data ScienceCoding in Cipher: Encrypted Data Structures and AlgorithmsWelcome, developers! If you’ve spent time mastering data structures and algorithms, have you considered their encrypted data potential?May 9May 9
A Practical Exploration of Large Language Models in Corporate EnvironmentsIn the rapidly evolving landscape of artificial intelligence, Large Language Models (LLMs) have emerged as a cornerstone of innovation…Jan 2Jan 2
JIRA tickets heuristic estimatesOne of the most important tasks of a Software Development Manager is to make realistic estimates on a JIRA ticket completion time. Many…Aug 10, 2022Aug 10, 2022
Running private blockchain in production, technical overviewA blockchain is a digital record of transactions. Blockchains that are used for recording transactions follow some coded rules. Each…May 17, 2021May 17, 2021
ETF Analysis Using Probabilistic Probabilistic Programinghttps://www.etf-analytics.net/Mar 4, 2021Mar 4, 2021
Hands-On Disseminate Proof of Ownership Without Disclosing the Underlying Private DataThis article shows how to securely share data between organizations and provides a few examples in python.Aug 6, 2020Aug 6, 2020
Published inAnalytics VidhyaEncrypted Computations, Implementation TricksThis is a guide to help software developers and data scientists to build solutions that perform some computation over encrypted data using…Jul 28, 2020Jul 28, 2020
Encrypted Computations using Google ColabIn this tutorial, I show how to make a computation on encrypted data using Python and Google Collab, a free machine learning platform…Jul 27, 2020Jul 27, 2020