Embarking on the journey towards UK citizenship or indefinite leave to remain entails more than bureaucratic procedures; it’s a voyage … More
Author: Sefik Serengil
My Experience For The UK Global Talent Visa As A Software Developer
As a software engineer, navigating the immigration process can often feel like solving a complex algorithm. When I decided to … More
Billion-scale Fast Vector Similarity Search with Spotify Voyager
In the ever-evolving landscape of music streaming and recommendation systems, Spotify has long been at the forefront, leveraging cutting-edge technologies … More
A Step by Step Approximate Nearest Neighbor Example In Python From Scratch
Nearest neighbor search is a fundamental problem for vector models in machine learning. It involves finding the closest vectors to … More
How to Encrypt Float Numbers with Public Key Algorithms in Python
In the ever-evolving landscape of data security, the need to protect sensitive information, including numeric data, is paramount. While public … More
A Step by Step Partially Homomorphic Encryption Example with Goldwasser-Micali in Python
In the realm of cryptography, data security and privacy have become paramount concerns. As we increasingly rely on digital communication … More
A Step by Step Partially Homomorphic Encryption Example with Naccache-Stern In Python
In the ever-evolving landscape of cybersecurity, encryption plays a pivotal role in safeguarding sensitive information. One intriguing facet of encryption … More
A Step by Step Partially Homomorphic Encryption Example with Damgard-Jurik in Python
In the world of data security and privacy, encryption plays a pivotal role in safeguarding sensitive information from prying eyes. … More
A Step by Step Partially Homomorphic Encryption Example with Okamoto–Uchiyama in Python
In today’s rapidly evolving digital landscape, the need for secure data transmission and storage has never been more critical. To … More
Use Cases of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a type of public key cryptography that relies on the mathematics of elliptic curves to … More