An implementation of the Advanced Encryption Standard (AES) algorithm meant for study to go along with "A Stick Figure Guide to the Advanced Encryption Standard (AES)" blog post at www.moserware.com
☆428Sep 24, 2009Updated 16 years ago
Alternatives and similar repositories for AES-Illustrated
Users that are interested in AES-Illustrated are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MIPS I simulator☆20Dec 28, 2018Updated 7 years ago
- Where a Linux sys-admin's perinoid scripts are collected.☆10Feb 3, 2016Updated 10 years ago
- a collection of .config files which work for certain machines☆10Updated this week
- ☆10Dec 27, 2022Updated 3 years ago
- keep cursor at fixed visual line of window☆14Oct 18, 2010Updated 15 years ago
- Code for "Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA"☆16Oct 8, 2025Updated 5 months ago
- Various tools and tweaks for playing with apple pay☆19Oct 29, 2015Updated 10 years ago
- Hello World examples in assembly, for use as templates.☆12Jan 18, 2026Updated 2 months ago
- nVidia Shield TV fastboot bootloader☆14Dec 5, 2018Updated 7 years ago
- symbolic execution engine for brainfuck because lol☆14Feb 5, 2017Updated 9 years ago
- "console" / kmscon - like window manager☆18Dec 17, 2020Updated 5 years ago
- CC1200 HAT - RF board☆21May 28, 2025Updated 9 months ago
- PORTING JETSON INFERENCING TO X86 64 ,IP CAMERA ,QT☆13Jan 29, 2020Updated 6 years ago
- legacy MTK devices preLoader from Mediatek☆20Apr 29, 2024Updated last year
- The Lilt terminal emulator - a simple and portable terminal emulator for Linux, macOS, and other Unix-like systems☆32May 24, 2023Updated 2 years ago
- Recon-ng is a full-featured Web Reconnaissance framework written in Python.☆38Oct 13, 2015Updated 10 years ago
- Differential fault analysis framework for AES128☆51Jul 26, 2013Updated 12 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- ☆43Dec 16, 2017Updated 8 years ago
- user-space elf loader☆16Nov 18, 2022Updated 3 years ago
- Overlay chroot☆16Apr 16, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/pentest-bookmarks☆12Aug 1, 2015Updated 10 years ago
- ☆14Oct 19, 2022Updated 3 years ago
- Reminding myself everything I knew about OSDev (and more)☆19Apr 22, 2014Updated 11 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- A URI (and IRI) parser with a straightforward API, based upon uriparser☆28Mar 18, 2018Updated 8 years ago
- The Mifare Classic key Diversification algorithm implemented in python☆30Dec 21, 2014Updated 11 years ago
- HP-35 calculator emulators (F# and JavaScript)☆13Sep 5, 2020Updated 5 years ago
- Implementation of do255e and do255s in Go☆23Dec 14, 2020Updated 5 years ago
- Doublethink challenge from DEF CON 2018☆23Dec 22, 2019Updated 6 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Apr 10, 2017Updated 8 years ago
- ROCA: Infineon RSA key vulnerability☆491Oct 19, 2023Updated 2 years ago
- A stand alone web site to guide users on different styling prompts for Stable Diffusion relating to fashion styling, hair and make up.☆13May 13, 2025Updated 10 months ago
- A simple sound/music visualizer built with Ruby-Processing and Minim☆21Oct 18, 2010Updated 15 years ago
- Introduction to Secure Multi-Party Computations☆16Nov 13, 2018Updated 7 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Jun 6, 2025Updated 9 months ago
- Github Actions wrapper for vmtest☆12Jan 10, 2025Updated last year
- Repo for the April 10-12 workshop to be held in Berkeley, CA☆14Jul 19, 2018Updated 7 years ago