moserware / AES-IllustratedLinks
An implementation of the Advanced Encryption Standard (AES) algorithm meant for study to go along with "A Stick Figure Guide to the Advanced Encryption Standard (AES)" blog post at www.moserware.com
☆424Updated 15 years ago
Alternatives and similar repositories for AES-Illustrated
Users that are interested in AES-Illustrated are comparing it to the libraries listed below
Sorting:
- Factoring as a Service☆268Updated last month
- ☆89Updated 9 years ago
- The "Intel x86 considered harmful" paper☆197Updated 9 years ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆322Updated 5 years ago
- C/C++ to assembly visualizer☆384Updated 4 years ago
- International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)☆185Updated last year
- msieve - Number Field Sieve implementation by Jason Papadopoulos☆248Updated 2 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆165Updated 5 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Constant-Time Toolkit☆296Updated 6 years ago
- An exploration of code homeomorphism☆379Updated 7 years ago
- The vim execution engine☆115Updated 7 years ago
- A simple tool to go along with "The First Few Milliseconds of an HTTPS Connection" blog post on moserware.com☆198Updated 16 years ago
- Lecture notes for a course on cryptography☆538Updated last year
- Noise Specification☆457Updated 6 years ago
- A tiny challenge to solve by Machine Learning or Computer Hacking (or both)☆92Updated 8 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more se…☆498Updated 5 months ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 7 years ago
- The "State considered harmful" paper☆107Updated 9 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- Educational SSH client☆124Updated 9 years ago
- Working through the Matasano Crypto Challenges (cryptopals.com)☆36Updated 10 years ago
- The dissection of a simple "hello world" ELF binary.☆464Updated 4 years ago
- Here I share the code of my CV, which is also a bootable bootloader :)☆520Updated 4 months ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- ☆470Updated 8 months ago
- We're insanely passionate about command line asm documentation in the cloud, and we're crushing it!☆380Updated 4 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago