zgg299 / Comprehensive-Practice-of-CryptographyView external linksLinks
用于应用密码学课程课程实践,编写一个发送端程序和一 个接收端程序,接收端要完成对消息的验证和解密。 用DES的ECB模式完成对信件内容的加密。 用RSA对上面的对称密钥进行加密,实现会话密钥交换。
☆17Jun 2, 2019Updated 6 years ago
Alternatives and similar repositories for Comprehensive-Practice-of-Cryptography
Users that are interested in Comprehensive-Practice-of-Cryptography are comparing it to the libraries listed below
Sorting:
- 基于JAVA的WEB服务器,实现了GET方法,提供基本的配置管理工具,实现了基本的用户认证、网页防篡改、日志、站点统计每日访问的IP数等功能。☆12Apr 30, 2020Updated 5 years ago
- Data Mining for Cybersecurity☆78Jun 21, 2022Updated 3 years ago
- JPEG digital watermark based on modified DCT mid-frequency coefficient.☆20Apr 14, 2018Updated 7 years ago
- Trending Research Topics In Cybersecurity☆20Jul 16, 2020Updated 5 years ago
- ☆10Feb 16, 2018Updated 7 years ago
- course labratory☆14Dec 12, 2018Updated 7 years ago
- [ICSE'26] FORGE: An LLM-driven Framework for Large-Scale Smart Contract Vulnerability Dataset Construction☆23Jan 24, 2026Updated 3 weeks ago
- 四川大学综合教务系统助手,是一个优化四川大学综合教务系统的「Userscript」,即用户脚本。这不是一个独立的软件,也不是一个浏览器的插件,但可以依赖浏览器的插件运行,或者作为一个Bookmarklet在点击后运行。该脚本可以为综合教务系统增加以下功能:1. 外观美化:会…☆210Jan 11, 2025Updated last year
- scunet登录脚本☆10Sep 7, 2019Updated 6 years ago
- Used to determine if a twitter account/tweet is a trollbot or not.☆14Mar 2, 2019Updated 6 years ago
- ☆13Jul 11, 2023Updated 2 years ago
- ☆15Dec 25, 2018Updated 7 years ago
- ☆16Jan 5, 2021Updated 5 years ago
- Some personal work on DARPA TC engagement5☆20Aug 7, 2023Updated 2 years ago
- A video-based distracted driver detection system.☆26Oct 26, 2022Updated 3 years ago
- UI framework using https://www.iviewui.com, Out of the box use truffle-vue☆27Jul 24, 2018Updated 7 years ago
- ☆20Oct 2, 2020Updated 5 years ago
- A published large-scale dataset - Weibo User Depression Detection Dataset.☆101Jan 23, 2026Updated 3 weeks ago
- An implementation for a federated learning environment in python using Keras☆24Jul 17, 2019Updated 6 years ago
- Convert Ethereum Contract ABI Online☆28Feb 24, 2018Updated 7 years ago
- Smart contract front-running vulnerability benchmark☆25Dec 11, 2023Updated 2 years ago
- ☆24May 13, 2024Updated last year
- ☆28Jul 21, 2022Updated 3 years ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Jul 29, 2022Updated 3 years ago
- CVE-2022-0847 POC and Docker and Analysis write up☆26Mar 10, 2022Updated 3 years ago
- ☆22Jan 7, 2016Updated 10 years ago
- Harness for the Linux kernel eBPF verifier☆34Sep 1, 2022Updated 3 years ago
- Weibo Preprocess Toolkit☆32Jul 13, 2019Updated 6 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- iCNN: image reconstruction from CNN features☆35Mar 20, 2023Updated 2 years ago
- CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸☆34Jun 16, 2022Updated 3 years ago
- AChecker (Access Control Checker) is an automated static analysis tool for detecting access control vulnerabilities in smart contracts.☆38May 2, 2023Updated 2 years ago
- Fuzzing Deep-Learning Libraries via Automated Relational API Inference (ESEC/FSE 2022)☆40May 17, 2023Updated 2 years ago
- Code for "Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment" (CCS 2019)☆48Dec 17, 2019Updated 6 years ago
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆54Nov 29, 2021Updated 4 years ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆50Jul 6, 2021Updated 4 years ago
- 静态分析笔记 Static-Analysis-Notes 程序分析笔记 资源分享☆186Jan 11, 2023Updated 3 years ago
- Differential fuzzing for Smart Contract VMs☆52May 2, 2022Updated 3 years ago
- ☆50Mar 10, 2016Updated 9 years ago