## XOR Encryption

Admin | 11-Apr-2017 | C#, VB.Net, C, C++, PHP

In cryptography, XOR Encryption, also known as XOR Cipher, is a encryption algorithm. With this algorithm, a string of text can be encrypted by ...

Admin | 11-Apr-2017 | C#, VB.Net, C, C++, PHP

In cryptography, XOR Encryption, also known as XOR Cipher, is a encryption algorithm. With this algorithm, a string of text can be encrypted by ...

Admin | 31-Jan-2017 | C#, VB.Net, C, C++

Breadth first traversal, also known as breadth first search or BFS, is an algorithm for traversing or searching tree or graph data structures. It ...

Admin | 31-Jan-2017 | C#, VB.Net, C, C++

Depth first traversal, also known as depth first search or DFS, is an algorithm for traversing or searching tree or graph data structures. One starts ...

Admin | 30-Jan-2017 | C#, VB.Net, C, C++, PHP

Linear search, also known as sequential search is an algorithm for finding a target value within a list. It sequentially checks each element of the ...

Admin | 30-Jan-2017 | C#, VB.Net, C, C++, PHP

Interpolation search is an improved variant of binary search. This search algorithm works on the probing position of the required value. For this ...

Admin | 04-Jan-2017 | C#, VB.Net, C, C++

This algorithm finds the median of two sorted arrays by first getting medians of the two sorted arrays and then comparing them.

Admin | 29-Dec-2016 | C#, VB.Net, C, C++, PHP

This algorithm searches for all the occurrences of pattern and its permutations (or anagrams) in the specified text.

vitol96 | 21-Dec-2016 | PHP

Atbash is a mono-alphabetic substitution cipher originally used to encode the Hebrew alphabet. It can be modified for use with any known alphabet. ...

Admin | 13-Dec-2016 | C#, VB.Net, C, C++

This algorithm works by scanning pattern characters from the least frequent one to the most frequent one. Doing so one may hope to have a mismatch ...

Admin | 06-Oct-2016 | C#, VB.Net, C, C++, PHP

In cryptography, a transposition cipher, also known as columnar transposition cipher, is a simple and easy to implement cipher. This cipher follows a ...