ShekharHow to build a State of the Art Authentication MechanismARGON2:- Computationally Hard Encryption, Oblivious Transfer + Password Authenticated Key Exchange and Private Set IntersectionApr 25Apr 25
ShekharAsymmetric and Post Quantum Cryptography In DepthWe had already looked at RSA back in this article for Diffie Helman Key Echange in TLS. Let us understand other modern approaches in this…Apr 12Apr 12
ShekharSymmetric Cryptography in DepthEventually in TLS, the actual process of sending and receiving of data is using Symmetric Encryption. Let us take a look at ChaCha20 and…Apr 7Apr 7
ShekharPolyglot mechanisms for High Network IO PerformanceClassic Socket IO, AsyncIO, Non Blocking IO, Reactor, Multi-Reactor, GoRoutines and Virtual ThreadsMar 6Mar 6
ShekharLLMs : From Zero to Hero.These articles are all you need — Vector Search — Part 4Semantic/Vector search differs from Keyword/Similarity search in that Similarity search is like looking for a specific book in a library…Mar 4Mar 4
ShekharSimilarity Search: A Crash CourseSearch/Information Retrieval as explained in RAG eventually ends up being the lynchpin of the entire RAG pipeline. But what is search?Mar 4Mar 4
ShekharLLMs : From Zero to Hero.These articles are all you need — Miscellaneous — Part 5Advanced Topics not for the NOOB: RAG Triad, RLHF, PPO, DPO, Chunking, Advanced RetreivalFeb 18Feb 18
ShekharThe OpenAI fiasco: The Real Questions To AskSome food for thought. I believe these are the actual questions we should be asking.Nov 20, 2023Nov 20, 2023
ShekharinAWS in Plain EnglishHow AWS S3 Requests Are Authenticated: HMAC-SHA256HMAC-SHA256. Sounds like gobbledygook. What is it really?Sep 10, 2023Sep 10, 2023
ShekharLLMs : From Zero to Hero. These articles are all you need — Part 3What was the hullabaloo on Ethics?Aug 26, 2023Aug 26, 2023