2026

Cryptography – Number Theory Prerequisites

Stub post for the mathematical foundations of modern cryptography, focusing on number theory concepts used later for public-key systems.

cryptographynumber-theorymathematics

Cryptography – Symmetric Encryption Basics

A stub for the first deep-dive into symmetric encryption in , focusing on block ciphers, modes of operation, and basic threat models.

cryptographysymmetric-encryptionblock-ciphers

Software Verification – Introduction to Testing

An overview of software testing in , covering why testing matters, core terminology, and how testing fits into the broader picture of verification and validation.

software-verificationtestingquality-assurance

Unit Testing Strategies: Writing Effective Test Cases

Comprehensive guide to unit testing strategies, covering test case design, coverage metrics, mocking techniques, and best practices for writing maintainable test suites.

software-verificationunit-testingtest-driven-developmentquality-assurance

Software Verification and Testing: Building Reliable Systems

Exploring the fundamentals of software verification and validation, covering testing strategies, quality assurance techniques, and methods for building reliable software systems.

software-verificationtestingvalidationquality-assurance

Public Key Cryptography: Understanding RSA and Key Exchange

Exploring public key cryptography systems, including the RSA algorithm, Diffie-Hellman key exchange, and how asymmetric encryption enables secure communication without shared secrets.

cryptographypublic-key-cryptographyrsadiffie-hellmankey-exchange

Integration Testing and Continuous Verification

Exploring integration testing methodologies and continuous verification practices, including test automation, CI/CD pipelines, and strategies for maintaining software quality throughout development.

software-verificationintegration-testingci-cdcontinuous-integration

Cryptographic Hash Functions: Ensuring Data Integrity

Understanding cryptographic hash functions, their properties, applications in data integrity verification, digital signatures, and password storage systems.

cryptographyhash-functionsshamd5data-integrity

Research Model Checking with SPIN and Promela

A deep dive into SPIN model checker and Promela modeling language for verifying concurrent systems, with practical examples and verification workflows.

software-verificationformal-methodsmodel-checkingspinpromela
2025

Research Zero-Knowledge Proofs: The SNARK Revolution

Exploring the theoretical foundations and practical implementation of zk-SNARKs—the cryptographic primitives enabling succinct, non-interactive proofs that verify computations without revealing inputs.

zero-knowledgezk-snarksuccinct-proofspolynomial-commitmentsarithmetization

Model Checking and Logic Review: Validating Systems and Concepts

A comprehensive review of advanced logic concepts including Hilbert Systems, the Tableaux Method, and Herbrand Semantics, showing how they feed into model checking with concrete transition-system examples.

logiclogic-for-computer-scientistsmodel-checkingherbrand-logichilbert-system

Bayesian Networks: D-Separation and Probabilistic Inference

Master d-separation algorithms for determining conditional independence in Bayesian networks and understand the foundation of probabilistic inference.

intelligent-systemsbayesian-networksd-separationconditional-independenceprobabilistic-inference

Unification Algorithm

2025 11 14 Unification Algorithm layout: post title: “The Unification Algorithm: Finding Most General Unifiers in First-Order Logic” date: 2025-11-14 categories: “Logic for Computer Scientists” tags: logic-for-c...

Thompson's Construction: From Regex to NFA

Explore Thompson's Construction algorithm, the elegant method for converting regular expressions to NFAs that revolutionized pattern matching and influenced decades of Unix tools.

automataregexnfathompson-constructionfinite-automata

Reinforcement Learning Introduction

2025 10 08 Reinforcement Learning Introduction layout: post title: “Reinforcement Learning: An Introduction to Learning from Rewards” date: 2025-10-08 categories: “Intelligent Systems” tags: reinforcement-learni...

Propositional Logic Ii Truth Tables And Formation Trees

2025 08 29 Propositional Logic Ii Truth Tables And Formation Trees layout: post title: “Propositional Logic II: Truth Tables and Formation Trees” date: 2025-08-29 categories: “Logic for Computer Scientists” tags: ...

Propositional Logic Basics

2025 08 27 Propositional Logic Basics layout: post title: “Propositional Logic Basics: Building the Foundation for Logical Reasoning” date: 2025-08-27 categories: [logic, computer-science, propositional-logic] tags: ...

Introduction To Logic For Computer Scientists

2025 08 25 Introduction To Logic For Computer Scientists layout: post title: “Introduction to Logic for Computer Scientists” date: 2025-08-25 categories: “Logic for Computer Scientists” tags: logic proposition...

Welcome to My Blog

An introduction to this blog and what I plan to share about my journey in computer science and machine learning research.

introductionwelcomeblogging