PDA

View Full Version : RCE Cryptographics


  1. piratebay heml.is
  2. RSA things!!!!
  3. strange CRC algorithm
  4. Practical attack on RC4 encryption
  5. Breaking a challenge response
  6. PMK , HMK , EMM SEED , EMM IV in IRDETO 2
  7. Delphi RNG reversing
  8. Algorithm for Seed Key
  9. Any books on breaking simple codes found in malware?
  10. Rijndael S-Box? AES... Maybe even XOR? -- Examples
  11. Extract hash for offline attack (Office 2007)
  12. Similar to XTEA ?
  13. anyone know what type of hash this is?
  14. Crypto Scheme
  15. decrypt with RSA?
  16. How can I check quickly if a pdf is decrypted right?
  17. Adobe Security handler cryptversion and 'NewCryptDataExProc' function question
  18. Hash idea
  19. DES in ASM
  20. Mask attack with the fastest MD5 cracker
  21. GPU Cryptography
  22. how to decrypt JCALG1 any body can help me
  23. a simple substitution cipher or not?
  24. Cryption
  25. How to attack crypto algorithms
  26. Whitebox crypto crackme ?
  27. I need help with this crypto algorithm
  28. Bday Attack on Flexlm's ECC?
  29. encrypted harddisk
  30. ElGamal with non relative prime k to p-1 ?
  31. White-Box Cryptography
  32. Is RSA safe in software protection ? - on XP crypto.api example
  33. BCH Codes
  34. Recovering deleted files from HDD
  35. RSA Guide
  36. Checksum problem
  37. Black box algorithm with some known good keys
  38. what cryptology Algorithm is it ?
  39. SHA-1 Collision Search - New approach
  40. Reverse Engineering of Strong Crypto Signature Schemes
  41. QRBG
  42. rijndael
  43. Help on checksum analysis
  44. Adobe Digital Editions DRM
  45. help with crypto identification
  46. Generate Your Own MD5 Collisions In Under a Minute
  47. Breaking 104 bit WEP in less than 60 seconds
  48. Experience with AES-128
  49. Online Cryptography Course, Washington Uni
  50. Product Keys Based on Elliptic Curve Cryptography
  51. MD5: how to compile win32 Console code?
  52. DES - ASM to C
  53. Blowfish2
  54. Interesting Crypto Function
  55. Handbook of Applied Cryptography
  56. Practical Aspects of Modern Cryptography
  57. LINK: Steganography in Computer Graphics
  58. Fibonacci and Primes
  59. Bruteforcing DES
  60. B4 I start coding: Does my algorithm make sense ? Picture/Diagram inside
  61. Can someone help me figure out if this is standard blowfish ? (ASM)
  62. function analysis
  63. Skype in coporate environments
  64. Checksum theory check...sum
  65. Any one see this Cryptographic?
  66. a piece code of a unknow cryptogrphics
  67. Exploiting MD5
  68. Recover Key from encryption
  69. .dat decrytion
  70. rsa Questions
  71. GData: An Online MD5 Hash Database
  72. strong? Possible attacks?
  73. Nice MD5 Collision!
  74. Locality-sensitive hash functions
  75. file.exe with 13 crypto signatures, help...
  76. Anyone worked on RC4 ?
  77. Weak-Key Classes attaks on IDEA algo
  78. HardKey4
  79. A question about MD5
  80. XOR equations :)
  81. XOR property (MD4/5 related)
  82. Breaking a challenge / response algo
  83. ec problem
  84. DES question
  85. Q:Number analysis...
  86. Literal Bitwise Calculations
  87. Is this real ?
  88. Article: The Misuse of RC4 in Microsoft Word and Excel
  89. PSDS_Crypto (panasonic crypto)
  90. Article about next-generation movie/DVD encryption
  91. Steganos Encrypted File and forgotten Password
  92. How to implement
  93. A little help in understanding some crypto
  94. Collision vulnerabilities in MD5 Checksums
  95. RSA implementation
  96. hash algo help
  97. RSA - More than 2 primes
  98. MD4/MD5/SHA-0 Dead
  99. Man in the middle
  100. new article about ECC
  101. Complexity of HASH algoritm
  102. Cryptanalysis questions
  103. Will RSA-640 be solved soon?
  104. LFSR-based cypher analysis
  105. Is it illegal to solve an RSA code?
  106. got P,Q,D, how to compute E?
  107. Okay, ultimate challange i belive
  108. Project RainbowCrack
  109. Decoding TwoFish Encryption
  110. Lets put those graphic processors to use
  111. Acoustic cryptanalysis
  112. Safer-K128
  113. Windows DRM and WMV
  114. Tiny Encryption Algorythm
  115. link problem using MS Visual c++6.0 when useing Cryptlib
  116. New in crypto
  117. problem with rsa
  118. simple rsa
  119. miracle sig files
  120. Adobe DRM (Digital Right Management)
  121. MD5 + some bit math
  122. Interesting Docs
  123. RSA 576 factored
  124. Mind Challenge...(or not?!)
  125. Cryptlib - setting IV's
  126. microsoft drm
  127. ECC questions
  128. Writing RSA keys to keyset - permission errors
  129. Could I ask u how to fix the problem in the mentioned keygenRSA.asm?
  130. Diffie Hellman Key Agreement - Cryptlib???
  131. Little simple doubt in Handbook of Applied Cryptography...
  132. DES 40bit
  133. Crypto Library Help Please!
  134. elliptic distribution
  135. WINZIP Archive decrypt
  136. des modified algo
  137. recover RSA primes p and q if we have n,d,e
  138. Attacking DSA
  139. IShield Single Exe password recovery?
  140. A nice intro to Cryptography
  141. bug in FGInt lib? (RSA)
  142. NeoProject takes on MD5
  143. new primality testing algorithm?
  144. RSA-576 - Factored
  145. knapsack
  146. NeoProject
  147. ServU Ftp Password Decryption
  148. Ecdsa
  149. help me on reversing hash function
  150. ElGamal Signature
  151. Tea
  152. Recognizing ....
  153. Call for Mike's comments
  154. Question about ECC points addition...
  155. BigNum Calc
  156. xor protection
  157. Blowfish
  158. unknown algorithm
  159. Typical code sequence for encryption?
  160. Data structure for big Integer
  161. Encryption modes
  162. Pencil and paper decryption ?
  163. Inside a MD5 (?) protected Java prog
  164. Marx Cryptobox
  165. Zip Protection Question?
  166. Primality testing *is* in P - Proof
  167. JBuilder 7 and DSA
  168. Bob and Alice
  169. Hash algorithm identification
  170. Interesting site
  171. Um few crypto newbie questions.
  172. New project: RSA-65 analysis on GetDataBack for NTFS
  173. Blowfish Bruteforce 48 bits
  174. $$$ for crypto weakness in a cool simple algorithm
  175. Need help with foxpro please
  176. SHA-1 protected program
  177. Cryptic Formula Help
  178. RSA-Tool2 v1.7 Request
  179. Encryption used in CRT
  180. SSleay BIGNUM FLIRT sigs
  181. Searching RSA Protected Programs
  182. Help determining cypher...
  183. i search Rsa-tools
  184. Blowfish and SHA-1 analysis on cacheX
  185. 8 bit CPU cipher
  186. hypercomplex numbers and RSA
  187. What kind of encryption is this?
  188. SHA-1 combined with RSA?
  189. Blowfish Init<>set_key
  190. public-key based Delphi components protection: SLockPK
  191. super-tiny PRNG
  192. Blum-Blum-Shub questions
  193. Encrypted Magic Folders
  194. prime number properties
  195. Subexponential attack on AES
  196. Random Number Analysis
  197. RSA Tool 2 v1.2
  198. Finding RSA Constants for keygenning...
  199. Cracking w97 files
  200. new winzip attack
  201. WinZip cipher
  202. stream cipher???
  203. Grille Me
  204. need ideas on how to attack an Authentication and Encryption model I thought of
  205. Tutorial: finding encryption code
  206. Analysis of ASProtect Keygeneration scheme
  207. why not decrypt in exe ?
  208. Challenge to all you so brilliant people...with motivation ;)
  209. decrypting an unknown file type
  210. fun proof
  211. RSA cracker machine
  212. Easy RSA
  213. bit commitment blues ;)
  214. Cryptography challenge ;)
  215. tE!'s RSA Tool
  216. Alittle bit of Encryption/Decryption fun...
  217. Rsa Challenge
  218. SecureID program!?
  219. rsa
  220. Dsa
  221. RNG and relative primes
  222. Beginners question
  223. Inside Windows Product Activation (WPA)
  224. help on a llittle crypto mission : -)
  225. MD5 works but RIPEMD-160 does not work
  226. A challenge ?
  227. E changed to 1 in RSA algo.
  228. Secrets & Lies
  229. How to know which algo is used ?
  230. Cryptography's Shining Ciphers
  231. TMG keygenme #3
  232. ECC and Flexlm
  233. xtr help :[
  234. Basics of Cryptography
  235. Rsa > 512
  236. a newb ie question?
  237. Crypto api test problems
  238. Cryptography ( As posted by EtErNaL_L0ser)