<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://s-adhikary.github.io/data/</loc><lastmod>2023-09-07T00:00:00+00:00</lastmod></url><url><loc>https://s-adhikary.github.io/data/data1/</loc><lastmod>2023-09-07T00:00:00+00:00</lastmod></url><url><loc>https://s-adhikary.github.io/tags/keyword-10/</loc><lastmod>2023-09-07T00:00:00+00:00</lastmod></url><url><loc>https://s-adhikary.github.io/tags/keyword-5/</loc><lastmod>2023-09-07T00:00:00+00:00</lastmod></url><url><loc>https://s-adhikary.github.io/tags/keyword-6/</loc><lastmod>2023-09-07T00:00:00+00:00</lastmod></url><url><loc>https://s-adhikary.github.io/tags/keyword-7/</loc><lastmod>2023-09-07T00:00:00+00:00</lastmod></url><url><loc>https://s-adhikary.github.io/</loc><lastmod>2023-09-07T00:00:00+00:00</lastmod></url><url><loc>https://s-adhikary.github.io/tags/</loc><lastmod>2023-09-07T00:00:00+00:00</lastmod></url><url><loc>https://s-adhikary.github.io/papers/paper1/</loc></url><url><loc>https://s-adhikary.github.io/archive/</loc></url><url><loc>https://s-adhikary.github.io/tags/avx2/</loc></url><url><loc>https://s-adhikary.github.io/tags/block-cipher/</loc></url><url><loc>https://s-adhikary.github.io/tags/c-programming/</loc></url><url><loc>https://s-adhikary.github.io/teaching_internal/</loc></url><url><loc>https://s-adhikary.github.io/teaching_outside/</loc></url><url><loc>https://s-adhikary.github.io/tags/cryptography/</loc></url><url><loc>https://s-adhikary.github.io/tags/crytology/</loc></url><url><loc>https://s-adhikary.github.io/teaching_internal/course5/</loc></url><url><loc>https://s-adhikary.github.io/tags/cyber-security/</loc></url><url><loc>https://s-adhikary.github.io/tags/digital-signature/</loc></url><url><loc>https://s-adhikary.github.io/tags/discrete-mathematics/</loc></url><url><loc>https://s-adhikary.github.io/teaching_internal/course1/</loc></url><url><loc>https://s-adhikary.github.io/teaching_internal/course3/</loc></url><url><loc>https://s-adhikary.github.io/teaching_internal/course2/</loc></url><url><loc>https://s-adhikary.github.io/teaching_internal/course4/</loc></url><url><loc>https://s-adhikary.github.io/tags/exploitation-techniques/</loc></url><url><loc>https://s-adhikary.github.io/tags/fault-attack/</loc></url><url><loc>https://s-adhikary.github.io/tags/graph-theory/</loc></url><url><loc>https://s-adhikary.github.io/tags/inner-product-functional-encryption/</loc></url><url><loc>https://s-adhikary.github.io/tags/key-recovery/</loc></url><url><loc>https://s-adhikary.github.io/location/</loc></url><url><loc>https://s-adhikary.github.io/tags/mathematics/</loc></url><url><loc>https://s-adhikary.github.io/tags/mpc/</loc></url><url><loc>https://s-adhikary.github.io/tags/network-security/</loc></url><url><loc>https://s-adhikary.github.io/tags/number-theoretic-transformation/</loc></url><url><loc>https://s-adhikary.github.io/officehours/</loc></url><url><loc>https://s-adhikary.github.io/tags/openmp/</loc></url><url><loc>https://s-adhikary.github.io/papers/</loc></url><url><loc>https://s-adhikary.github.io/teaching_outside/course9/</loc></url><url><loc>https://s-adhikary.github.io/teaching_outside/course8/</loc></url><url><loc>https://s-adhikary.github.io/teaching_outside/course7/</loc></url><url><loc>https://s-adhikary.github.io/tags/privacy-preserving-biometric-authentication/</loc></url><url><loc>https://s-adhikary.github.io/tags/programming/</loc></url><url><loc>https://s-adhikary.github.io/tags/public-key/</loc></url><url><loc>https://s-adhikary.github.io/tags/python/</loc></url><url><loc>https://s-adhikary.github.io/teaching_outside/course6/</loc></url><url><loc>https://s-adhikary.github.io/tags/sagemath/</loc></url><url><loc>https://s-adhikary.github.io/tags/secure-computation/</loc></url><url><loc>https://s-adhikary.github.io/tags/stream-cipher/</loc></url><url><loc>https://s-adhikary.github.io/tags/zero-knowledge/</loc></url><url><loc>https://s-adhikary.github.io/papers/paper2/</loc></url></urlset>