moserware / AES-IllustratedLinks
An implementation of the Advanced Encryption Standard (AES) algorithm meant for study to go along with "A Stick Figure Guide to the Advanced Encryption Standard (AES)" blog post at www.moserware.com
☆426Updated 16 years ago
Alternatives and similar repositories for AES-Illustrated
Users that are interested in AES-Illustrated are comparing it to the libraries listed below
Sorting:
- ☆89Updated 9 years ago
- The "Intel x86 considered harmful" paper☆200Updated 10 years ago
- Factoring as a Service☆275Updated 6 months ago
- A simple tool to go along with "The First Few Milliseconds of an HTTPS Connection" blog post on moserware.com☆199Updated 16 years ago
- International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)☆185Updated last year
- C/C++ to assembly visualizer☆384Updated 5 years ago
- A public database for software and firmware hashes☆215Updated 9 years ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆324Updated 5 years ago
- The "State considered harmful" paper☆109Updated 10 years ago
- Educational SSH client☆124Updated 9 years ago
- msieve - Number Field Sieve implementation by Jason Papadopoulos☆261Updated 2 years ago
- Constant-Time Toolkit☆301Updated 7 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- Simple proof-of-concept for killing a hard-to-kill process☆44Updated 7 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- An exploration of code homeomorphism☆380Updated 7 years ago
- a port scanner written in x86 assembly☆102Updated 7 years ago
- Noise Specification☆460Updated 7 years ago
- ☆472Updated last year
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 6 years ago
- A Prime Number Algorithm by E. W. Dijkstra☆16Updated 5 years ago
- The dissection of a simple "hello world" ELF binary.☆466Updated 5 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆310Updated 4 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆285Updated 4 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆168Updated 6 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 8 years ago
- The vim execution engine☆116Updated 7 years ago
- ☆288Updated 9 years ago
- TLS Library in python☆237Updated 3 years ago
- Memory-hard scheme Argon2☆207Updated 5 years ago