资源列表
46_Joan_CryptographicFunctionIdentification
- Cryptographic Function Identification in Obfuscated Binary Programs
Archivesiidx7
- cat photo again lolololol :)
Avick_389
- Japanese Game picture
AES128_ENCRYPT
- aes128控制台加密程序,输出每一轮加密结果。含注释和示例输入输出。-aes128 encryption program, it can output the detailed information in each epoch.
i2 reader
- i2 reader for oscam fixed emm errors
BB84-Client-master
- One of the Quantum cryptology protocol, BB84 protocol implementation in Java.
rsacsp
- * dlls/rsaenh/rsaenh.c 0003 * RSAENH - RSA encryption for Wine-* dlls/rsaenh/rsaenh.c 0003 * RSAENH- RSA encryption for Wine
mschapv2acc-master
- chap协议破解密码,使用暴力破解,所用时间根据密码长度决定-The chap protocol clears
LabViewv3.1
- 这是一款密码破解软件,但是时间比较长,强暴破解方法-This is a password cracking software, but time is longer, rape cracking method
BLAKE2-master
- BLAKE2 are cryptographic hash functions based on Dan Bernstein s Cha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each Cha round. Like SHA-2, there are two variants differing in the word size
Phelix-Optimized
- Phelix 1 is a high-speed stream cipher with a built-in MAC func- tionality. It is efficient in both hardware and software. On current Pentium CPUs, Phelix has a per-packet overhead of less than 900 clocks, plus a per- byte cost well under 8
SM3HASH
- SM3算法原理,脱离密码相关安全库,单独利用基本数据类型实现SM3摘要算法,理解SM3算法原理-the hash algorithm of SM3,the basic standard of Chinese cryptographic algorithm SM3