moserware / AES-Illustrated
An implementation of the Advanced Encryption Standard (AES) algorithm meant for study to go along with "A Stick Figure Guide to the Advanced Encryption Standard (AES)" blog post at www.moserware.com
☆420Updated 15 years ago
Alternatives and similar repositories for AES-Illustrated:
Users that are interested in AES-Illustrated are comparing it to the libraries listed below
- Constant-Time Toolkit☆295Updated 6 years ago
- An agile, distributed, and secure alternative to the Certificate Authority system.☆627Updated 13 years ago
- ☆88Updated 9 years ago
- A simple tool to go along with "The First Few Milliseconds of an HTTPS Connection" blog post on moserware.com☆198Updated 15 years ago
- Blogging about reversing "script kiddie" style malware.☆98Updated 9 years ago
- An exploration of code homeomorphism☆372Updated 7 years ago
- The vim execution engine☆113Updated 7 years ago
- A Prime Number Algorithm by E. W. Dijkstra☆15Updated 4 years ago
- The "Intel x86 considered harmful" paper☆195Updated 9 years ago
- A machine emulator that visualizes how each instruction is processed☆390Updated 7 years ago
- International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)☆184Updated 9 months ago
- Some fun things you can do with kernel modules (all "bad ideas")☆439Updated 2 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- An 8-bit virtual machine implemented in C.☆22Updated 8 years ago
- x86 Assembly Primer for C Programmers☆214Updated 12 years ago
- Example code for the AES crypto instructions on Intel chips☆82Updated 5 years ago
- Inline C/asm in Bash☆252Updated 7 years ago
- Simple Driver code for vmlaunch☆159Updated 7 years ago
- ☆139Updated 7 years ago
- BSD-licensed C99/POSIX library code shared between tarsnap, scrypt, kivaloo, spiped, and bsdiff.☆112Updated 3 weeks ago
- The "State considered harmful" paper☆105Updated 9 years ago
- C/C++ to assembly visualizer☆384Updated 4 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆508Updated 3 years ago
- A simple framework for developing Linux kernel heap exploit techniques☆112Updated 4 years ago
- Checking that functions are constant time with Valgrind☆179Updated 8 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆273Updated 4 years ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆320Updated 4 years ago
- The dissection of a simple "hello world" ELF binary.☆461Updated 4 years ago
- Experimentations with Abstract Machines☆309Updated 2 years ago