搜索资源列表
Cryptanalysis-INCrypt32-of-iCLASS
- Cryptanalysis of INCrypt32 in HID s iCLASS Systems ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, and Daewan Han Category / Keywords: secret-key cryptography / INCrypt32, HID s iCLASS, RFID, reverse engineering, chosen message at
aes_mini_project
- It is encryption and decryption algorithm. AES is a symmetric encryption algorithm processing data in block of 128 bits.Under the influence of a key, a 128-bit block is encrypted by transforming it in a unique way into a new block of the same s
defcon-17-taylor-extras
- defcon-taylor (some obfuscation techniques to prevent from reverse engineering)
Test1_25Big
- 该系统实现了多种文件的压缩解压过程,通过大数四则运算,利用了ca认证,最终成功实现了几种文件的压缩,利用逆向思维,有实现了解压缩过程,不过也存在着一些不足,正在努力改进中。-The system supports multiple file compression decompression process by large numbers four operations, use the ca certification, to achieve the ultimate success of
NSPack_v3.7
- This Program is useful to protect our programs and product to unvoke hackers and crackers to reverse engeniring our programs. enjoy bravesaw.
ChaosEncryptionJavaAnbeirar
- Modern symmetrical encryption systems use a starting “key” that is up to 256 bits long (for us civilians anyway) and combine this with an initialization-vector (also up to 256 bits long). By applying the vector to the key through some scary mathemati