用于应用密码学课程课程实践,编写一个发送端程序和一个接收端程序,接收端要完成对消息的验证和解密。 用DES的ECB模式完成对信件内容的加密。 用RSA对上面的对称密钥进行加密,实现会话密钥交换。
☆17Jun 2, 2019Updated 6 years ago
Alternatives and similar repositories for Comprehensive-Practice-of-Cryptography
Users that are interested in Comprehensive-Practice-of-Cryptography are comparing it to the libraries listed below
Sorting:
- 基于JAVA的WEB服务器,实现了GET方法,提供基本的配置管理工具,实现了基本的用户认证、网页防篡改、日志、站点统计每日访问的IP数等功能。☆12Apr 30, 2020Updated 5 years ago
- JPEG digital watermark based on modified DCT mid-frequency coefficient.☆21Apr 14, 2018Updated 7 years ago
- Reconstructing the content of image based on paper "Understanding Deep Image Representations by Inverting Them"☆11Jul 30, 2018Updated 7 years ago
- Trending Research Topics In Cybersecurity☆20Jul 16, 2020Updated 5 years ago
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Jun 4, 2022Updated 3 years ago
- ☆16Jan 5, 2021Updated 5 years ago
- The repository of Pentest-R1: Towards Autonomous Penetration Testing Reasoning Optimized via Two-Stage Reinforcement Learning.☆30Sep 8, 2025Updated 6 months ago
- [ICSE'26] FORGE: An LLM-driven Framework for Large-Scale Smart Contract Vulnerability Dataset Construction☆26Updated this week
- 业务编写复杂了,定义业务术语 不依赖 基础设施提供的数据,意味着 我们需要转换,将更多的语义转换成 业务概念, 也是为了提供数据的变化,不会导致业务的修改,特别适合 微服务中台业务的抽象; 我认为,如何判断自己的DDD架构设计是否合理,就是DDD四层是否可以拆分模块而不影响…☆12Apr 6, 2022Updated 3 years ago
- Smart contract hacking challenge introduced in my talk at DEFCON 28 - Blockchain Village☆23Aug 13, 2021Updated 4 years ago
- An implementation for a federated learning environment in python using Keras☆24Jul 17, 2019Updated 6 years ago
- ☆15Apr 12, 2019Updated 6 years ago
- Flow3 Autoreferral☆15Apr 23, 2025Updated 10 months ago
- Microsoft Defender for Cloud threat matrix for Kubernetes☆32Feb 7, 2023Updated 3 years ago
- scunet登录脚本☆10Sep 7, 2019Updated 6 years ago
- Kubescape eBPF agent 🥷🏻☆25Updated this week
- iCNN: image reconstruction from CNN features☆35Mar 20, 2023Updated 3 years ago
- ☆13Jul 11, 2023Updated 2 years ago
- 四川大学校园API☆22Aug 26, 2019Updated 6 years ago
- CVE-2022-0847 POC and Docker and Analysis write up☆25Mar 10, 2022Updated 4 years ago
- Trivy kubernetes library☆36Mar 1, 2026Updated 3 weeks ago
- Code for "Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment" (CCS 2019)☆49Dec 17, 2019Updated 6 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆36Aug 18, 2024Updated last year
- CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸☆34Jun 16, 2022Updated 3 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆33Feb 17, 2025Updated last year
- ☆50Mar 10, 2016Updated 10 years ago
- Harness for the Linux kernel eBPF verifier☆34Sep 1, 2022Updated 3 years ago
- ☆20Oct 2, 2020Updated 5 years ago
- Solidity code instrumentation and analysis framework.☆53Jun 27, 2020Updated 5 years ago
- ☆28Jul 21, 2022Updated 3 years ago
- Smart contract front-running vulnerability benchmark☆25Dec 11, 2023Updated 2 years ago
- ☆22Jan 7, 2016Updated 10 years ago
- BruteXSS - Cross-Site Scripting Bruteforcer☆71Jul 26, 2017Updated 8 years ago
- ☆77Updated this week
- A video-based distracted driver detection system.☆26Oct 26, 2022Updated 3 years ago
- 静态分析笔记 Static-Analysis-Notes 程序分析笔记 资源分享☆187Jan 11, 2023Updated 3 years ago
- ☆24May 13, 2024Updated last year
- Convert Ethereum Contract ABI Online☆28Feb 24, 2018Updated 8 years ago
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆84Feb 26, 2023Updated 3 years ago