<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://thepalakjain.com/publications/</loc><lastmod>2025-01-29T05:40:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thepalakjain.com/2022/10/13/universally-composable-end-to-end-secure-messaging/</loc><image:image><image:loc>https://thepalakjain.com/wp-content/uploads/2022/10/pic.png</image:loc><image:title>pic</image:title></image:image><lastmod>2024-07-11T19:25:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thepalakjain.com/some-lecture-and-lab-notes/</loc><image:image><image:loc>https://thepalakjain.com/wp-content/uploads/2022/10/img_0452.jpg</image:loc><image:title>forward secrecy in secure messaging</image:title><image:caption>Notes on forward secrecy from the secure instant messaging/ Signal module of CS 558</image:caption></image:image><image:image><image:loc>https://thepalakjain.com/wp-content/uploads/2022/10/img_e54e4e9ebac3-1.jpeg</image:loc><image:title>denial of service (DoS)</image:title><image:caption>Notes on denial of service attacks from the DoS module of CS 558</image:caption></image:image><image:image><image:loc>https://thepalakjain.com/wp-content/uploads/2022/10/img_772df0e8451c-1.jpeg</image:loc><image:title>onion routing</image:title><image:caption>notes on onion routing from the anonymous routing module of CS 558</image:caption></image:image><image:image><image:loc>https://thepalakjain.com/wp-content/uploads/2022/10/img_ddfd20817068-1.jpeg</image:loc><image:title>mixnets, tor</image:title><image:caption>notes on mixnets and TOR from the anonymous routing module of CS 558</image:caption></image:image><image:image><image:loc>https://thepalakjain.com/wp-content/uploads/2022/10/img_0446.jpg</image:loc><image:title>symmetric key encryption</image:title><image:caption>notes on symmetric key encryption from the cryptography review module of CS 558.</image:caption></image:image><lastmod>2024-07-06T12:12:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thepalakjain.com/2022/10/17/the-price-of-differential-privacy-under-continual-observation/</loc><image:image><image:loc>https://thepalakjain.com/wp-content/uploads/2022/10/img_2177.jpg</image:loc><image:title>img_2177</image:title></image:image><lastmod>2022-10-17T19:40:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thepalakjain.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-01-29T05:40:11+00:00</lastmod></url></urlset>
