moserware / AES-IllustratedLinks
An implementation of the Advanced Encryption Standard (AES) algorithm meant for study to go along with "A Stick Figure Guide to the Advanced Encryption Standard (AES)" blog post at www.moserware.com
☆423Updated 15 years ago
Alternatives and similar repositories for AES-Illustrated
Users that are interested in AES-Illustrated are comparing it to the libraries listed below
Sorting:
- The "Intel x86 considered harmful" paper☆197Updated 9 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago
- ☆89Updated 9 years ago
- Noise Specification☆455Updated 6 years ago
- Constant-Time Toolkit☆296Updated 6 years ago
- The dissection of a simple "hello world" ELF binary.☆464Updated 4 years ago
- Factoring as a Service☆265Updated last week
- The "State considered harmful" paper☆107Updated 9 years ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆322Updated 5 years ago
- C/C++ to assembly visualizer☆384Updated 4 years ago
- A simple tool to go along with "The First Few Milliseconds of an HTTPS Connection" blog post on moserware.com☆198Updated 16 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- We're insanely passionate about command line asm documentation in the cloud, and we're crushing it!☆379Updated 4 years ago
- How to backdoor Diffie-Hellman☆613Updated 8 years ago
- Educational SSH client☆124Updated 9 years ago
- ☆140Updated 7 years ago
- ☆470Updated 7 months ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Parser combinators for binary formats, in C. Yes, in C. What? Don't look at me like that.☆435Updated 2 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆166Updated 5 years ago
- Inline C/asm in Bash☆253Updated 7 years ago
- The USG is Good, not Bad☆403Updated 5 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆514Updated last month
- A big list of space book and whitepaper recommendations.☆100Updated 5 years ago
- Test DRAM for bit flips caused by the rowhammer problem☆979Updated 9 years ago
- Generate JSON system call info from Linux source☆149Updated 4 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 7 years ago
- Missed optimizations in C compilers☆341Updated 7 years ago
- A (nearly) uncloneable repo☆407Updated 4 years ago
- List of crypto projects that might not suck☆422Updated 2 years ago