A collection of my answers to the exercises in Modern Cryptography: Theory and Practice by Wenbo Mao
☆10Oct 8, 2017Updated 8 years ago
Alternatives and similar repositories for Modern-Cryptography-Solutions
Users that are interested in Modern-Cryptography-Solutions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My solution for Introduction to Modern Cryptography (KL2)☆21Oct 21, 2019Updated 6 years ago
- 本项目设计一个可以产生21种音阶的电子琴,由PS2键盘完成输入,在Basys2板识别处理后,产生特定频率声音,最后通过Pmod_AMP模块发出。☆10Jul 21, 2019Updated 6 years ago
- Exercise Solutions of Introduction to Modern Cryptography (2nd edition) written by Jonathan Katz and Yehuda Lindell☆23Jul 7, 2020Updated 5 years ago
- 同济大学系统安全评估与应用安全实验课程设计(网络扫描系统,2023)A project of the System Security Assessment and Application Security Experimental Course at Tongji Univ…☆11Jun 2, 2024Updated last year
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Jun 4, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 同济大学信息安全原理课程设计大作业.(SSH原型系统,2023)Comprehensive Assignment of Course Design of Information Security Principles in Tongji University.☆12Jul 1, 2023Updated 2 years ago
- A simple program to capture the screen using Windows API☆25Oct 17, 2012Updated 13 years ago
- ☆10Jan 14, 2015Updated 11 years ago
- Tongji Data Structure Project - Social Network Links Prediction; 同济大学数据结构课程设计 - 社交网络预测☆11Sep 12, 2023Updated 2 years ago
- 同济大学信息安全原理课程作业(Project 1-2 l2tp&ipsec 协议分析,2023). Project 1-2 l2tp and ipsec of Information Security Principles Course of Tongji Universi…☆12Jun 30, 2023Updated 2 years ago
- A Jupyter notebook w/ script demonstrating how to train an Apache MXNet model for Brain Segmentation on SageMaker using the OASIS dataset☆17Jun 29, 2020Updated 5 years ago
- 哈夫曼编码用C语言实现对常见文件(文档,音乐,视频,图像等)压缩与解压☆15Sep 23, 2019Updated 6 years ago
- 同济大学现代密码学课程设计,包含AES算法,CBC模式,RSA加密解密,RSA签名,基于RSA的证书以及基于RSA和AES算法的文件加密系统。☆15Sep 1, 2022Updated 3 years ago
- 同济大学CS《高级程序语言设计2》大作业: 贪吃蛇TongJi University CS C++ assignment: greddy snake☆13Jul 25, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Some C programs to simulate three CPU scheduling algorithms for a multi-core computing system consisting of four homogeneous CPU’s☆15May 9, 2018Updated 7 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆133Jan 9, 2018Updated 8 years ago
- Bot for scraping email addresses, geolocations and phone numbers associated with Twitter accounts and optionally use AI to build personal…☆11Nov 30, 2021Updated 4 years ago
- 카카오톡에서 홍보가 전송되었을때 가리는 봇.☆19Jan 10, 2021Updated 5 years ago
- 数字逻辑课程设计,在Spartan-3的板上实现一个贪吃蛇的小游戏。☆15Jan 27, 2016Updated 10 years ago
- Smart contract hacking challenge introduced in my talk at DEFCON 28 - Blockchain Village☆23Aug 13, 2021Updated 4 years ago
- SDK to build end-to-end encrypted web applications☆23Nov 20, 2025Updated 4 months ago
- Running X Empire in your browser | Запуск X Empire в браузере☆12Sep 13, 2024Updated last year
- A bunch of examples on how to use Node.js streams☆11Jan 7, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- How to use the Web Cryptography API☆12Dec 9, 2016Updated 9 years ago
- dsdplay - DSD to PCM/DoP☆15Apr 7, 2014Updated 11 years ago
- How to send email with Skygear Cloud Functions☆16Dec 8, 2022Updated 3 years ago
- www.rootkit.com users section mirror, sql database dump, and a few other files/rootkits.☆20Feb 29, 2016Updated 10 years ago
- ☆22Jun 24, 2019Updated 6 years ago
- Electron application that demos using Spectron for end-to-end testing☆11Apr 24, 2017Updated 8 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- 深圳大学羽毛球场抢票脚本(2024)☆32Apr 17, 2024Updated last year
- Flow3 Autoreferral☆15Apr 23, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A not-curated list of cloud hacking labs☆26Apr 18, 2024Updated last year
- Node.js library to copy files between several storage sources (ftp, http/https, s3, ssh, local, ...)☆11Oct 20, 2021Updated 4 years ago
- 用于应用密码学课程课程实践,编写一个发送端程序和一个接收端程序,接收端要完成对消息的验证和解密。 用DES的ECB模式完成对信件内容的加密。 用RSA对上面的对称密钥进行加密,实现会话密钥交换。☆17Jun 2, 2019Updated 6 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Browser functions as Service. Interacting with browser pages, remotely.☆14Mar 18, 2026Updated last week
- ☆17Sep 20, 2021Updated 4 years ago
- Code for "Variational Model Inversion Attacks" Wang et al., NeurIPS2021☆22Dec 10, 2021Updated 4 years ago