1️⃣ Intro Hashing and Encryption 2️⃣ Differences and similarities 3️⃣ When we should use Encryption and Hashing 4️⃣Positives and Negatives 5️⃣Some Common Encryption and Hashing Algorithms
GDSC Lead
Vice Lead
Technical Committee Lead
Technical Committee Co-Lead
Media Committee Lead
Executive Committee Lead
Excessive Committee Co-Lead
Visual Identity Lead
Visual Identity Co-Lead
Human Resources Committee Lead
Human Resources Committee Co-Lead
Project Management Committee Lead
Project Management Committee Co-Lead
Public Relations Committee Lead