ninthDevilHAUNSTER / ecc_learning
shaobaobaoer 的椭圆曲线密码学习之路
☆9Updated 5 years ago
Related projects: ⓘ
- Cryptographic algorithm implementation☆45Updated last year
- ☆10Updated 4 years ago
- Repo for colecting all my public CTF challenges☆26Updated 9 months ago
- To store some files that I prepared for recommended postgraduate.☆14Updated 5 years ago
- 每周定期更新论文笔记分享的markdown以及图片☆181Updated 3 years ago
- ☆23Updated 5 years ago
- ☆29Updated last year
- ☆19Updated 5 years ago
- An attempt to learn glibc heap.☆41Updated 4 years ago
- angr中文版文档☆28Updated 5 years ago
- Predict and Backtrack MT19937 PRNG by putting 32 * 624 bits generated numbers. Python "random" standard library uses mt19937, so we can …☆24Updated last year
- Useful tools for writing shellcode☆66Updated 4 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆21Updated 4 years ago
- Lilac 2020暑期pwn培训课件以及相关文件☆87Updated 3 years ago
- ☆18Updated 10 months ago
- Implements Coron's simplification of Coppersmith's algorithm☆40Updated 11 months ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆12Updated 4 years ago
- RSA加密应用常见缺陷的原理与实践☆180Updated 2 years ago
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆72Updated 2 years ago
- ☆19Updated 5 years ago
- research and survey papers related to IoT security from 2014 to the first half of 2019☆59Updated 4 years ago
- 全国大学生信息安全竞赛作品收集☆60Updated 6 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Updated last year
- Implements Coron's simplification of Coppersmith's algorithm☆10Updated 7 years ago
- 按照三部分对模糊测试入门进行介绍:☆19Updated 4 years ago
- ☆21Updated last year
- 📖源码安全相关的论文收集(污点分析/符号执行/模糊测试)☆20Updated 2 years ago
- 基于patchkit和seccomp的自定义过滤syscall的pwn通防☆74Updated 3 years ago
- ☆85Updated 9 months ago
- resources for mini lctf 2020☆23Updated last year