DEV Community

karapto profile picture

karapto

Bio := struct {Identity, Affiliation, Research}{ "Ainu descendants🦌", "NAIST", "Privacy Enhancing Technologies🔬"}

Location Evry, France Joined Joined on  Personal website https://taishosasada.github.io/ github website

Education

Nara Institute of Science and Technology

Work

Ph.D Candidate

Tech Event for Women in Japan and around the World

Tech Event for Women in Japan and around the World

2
Comments
2 min read
What is Intel AVX2?

What is Intel AVX2?

12
Comments
4 min read
picoCTF 2022 ~NSA Backdoor writeup~

picoCTF 2022 ~NSA Backdoor writeup~

6
Comments
4 min read
picoCTF 2022 ~transposition-trial writeup~

picoCTF 2022 ~transposition-trial writeup~

7
Comments
1 min read
picoCTF 2022 ~morse-code writeup~

picoCTF 2022 ~morse-code writeup~

3
Comments
1 min read
picoCTF 2022 ~basic-mod1 writeup~

picoCTF 2022 ~basic-mod1 writeup~

5
Comments
2 min read
picoCTF 2021 -The Numbers writeup-

picoCTF 2021 -The Numbers writeup-

1
Comments
1 min read
picoCTF 2021 -Easy Peasy writeup-

picoCTF 2021 -Easy Peasy writeup-

13
Comments
2 min read
picoCTF 2021 -Mind your Ps and Qs writeup-

picoCTF 2021 -Mind your Ps and Qs writeup-

2
Comments
2 min read
picoCTF 2021 -Mod 26 writeup-

picoCTF 2021 -Mod 26 writeup-

2
Comments
1 min read
Graph Analytics with Python -Node Similarity-

Graph Analytics with Python -Node Similarity-

Comments
2 min read
RSA-OAEP

RSA-OAEP

Comments
5 min read
Graph Analytics with Python -Graph Partition and Community Extraction-

Graph Analytics with Python -Graph Partition and Community Extraction-

1
Comments
4 min read
Graph Analytics with Python -Graph Search-

Graph Analytics with Python -Graph Search-

Comments
5 min read
Graph Analytics with Python -Graph Generation-

Graph Analytics with Python -Graph Generation-

8
Comments
2 min read
Graph Analytics with Python -Graph Visualization and Centrality-

Graph Analytics with Python -Graph Visualization and Centrality-

1
Comments
3 min read
Adversarial Examples - Non-Targeted Evasive Attacks

Adversarial Examples - Non-Targeted Evasive Attacks

1
Comments
5 min read
loading...