Page 1 of 8 12345678 LastLast
Threads 1 to 30 of 238

Forum: RCE Cryptographics

To discuss DES MD5 El-Gamal RSA PGP and others....

  1. piratebay heml.is

    Started by Shub-nigurrath, July 11th, 2013 04:55
    • Replies: 3
    • Views: 1,776
    April 14th, 2014, 06:36 Go to last post
  2. Delphi RNG reversing

    Started by LaptoniC, October 10th, 2011 08:13
    2 Pages
    1 2
    • Replies: 24
    • Views: 6,196
    March 2nd, 2013, 06:42 Go to last post
  3. Lightbulb RSA things!!!!

    Started by iceland, December 28th, 2012 05:00
    • Replies: 5
    • Views: 1,265
    December 30th, 2012, 12:43 Go to last post
  4. strange CRC algorithm

    Started by ka6sqg, July 14th, 2012 00:26
    • Replies: 1
    • Views: 997
    October 17th, 2012, 09:29 Go to last post
  5. Practical attack on RC4 encryption

    Started by OHPen, June 27th, 2012 11:30
    • Replies: 1
    • Views: 735
    June 28th, 2012, 06:20 Go to last post
  6. Breaking a challenge response

    Started by squidge, March 2nd, 2012 19:02
    • Replies: 5
    • Views: 1,112
    March 16th, 2012, 10:42 Go to last post
  7. PMK , HMK , EMM SEED , EMM IV in IRDETO 2

    Started by khaledlion83, October 19th, 2011 15:21
    • Replies: 0
    • Views: 5,415
    October 19th, 2011, 15:21 Go to last post
  8. Any books on breaking simple codes found in malware?

    Started by Sunk, May 13th, 2011 19:45
    • Replies: 14
    • Views: 8,850
    July 4th, 2011, 09:13 Go to last post
  9. Algorithm for Seed Key

    Started by croudfreak, May 25th, 2011 10:14
    • Replies: 2
    • Views: 1,934
    May 28th, 2011, 08:25 Go to last post
  10. White-Box Cryptography

    Started by LaBBa, September 4th, 2008 02:44
    • Replies: 10
    • Views: 6,031
    March 25th, 2011, 19:37 Go to last post
  11. Rijndael S-Box? AES... Maybe even XOR? -- Examples

    Started by ph3wl, February 21st, 2011 12:10
    • Replies: 0
    • Views: 1,722
    February 21st, 2011, 12:10 Go to last post
  12. Extract hash for offline attack (Office 2007)

    Started by bboitano, February 3rd, 2011 09:56
    • Replies: 1
    • Views: 1,350
    February 3rd, 2011, 10:56 Go to last post
  13. Crypto Scheme

    Started by galgal, August 16th, 2010 14:41
    • Replies: 6
    • Views: 1,749
    January 24th, 2011, 11:02 Go to last post
  14. decrypt with RSA?

    Started by joblack, July 25th, 2010 05:36
    • Replies: 3
    • Views: 1,096
    December 20th, 2010, 14:32 Go to last post
  15. anyone know what type of hash this is?

    Started by twisted, August 19th, 2010 11:01
    • Replies: 2
    • Views: 854
    November 26th, 2010, 04:57 Go to last post
  16. Question Similar to XTEA ?

    Started by s1mmie, November 18th, 2010 11:35
    • Replies: 4
    • Views: 690
    November 26th, 2010, 04:44 Go to last post
  17. Adobe Digital Editions DRM

    Started by SHaG, June 7th, 2007 06:25
    • Replies: 13
    • Views: 3,850
    September 8th, 2010, 17:24 Go to last post
    • Replies: 5
    • Views: 935
    June 6th, 2010, 03:36 Go to last post
  18. Wink Hash idea

    Started by w_a_r_1, April 28th, 2010 16:02
    • Replies: 1
    • Views: 697
    April 29th, 2010, 02:03 Go to last post
  19. DES in ASM

    Started by sonny, April 18th, 2010 11:23
    • Replies: 6
    • Views: 962
    April 18th, 2010, 18:01 Go to last post
  20. Post Mask attack with the fastest MD5 cracker

    Started by GreenPiece, April 6th, 2010 16:01
    • Replies: 1
    • Views: 1,022
    April 7th, 2010, 13:32 Go to last post
  21. GPU Cryptography

    Started by Monk, March 22nd, 2010 22:49
    • Replies: 1
    • Views: 1,057
    March 23rd, 2010, 11:45 Go to last post
  22. how to decrypt JCALG1 any body can help me

    Started by alim2201, March 9th, 2010 18:13
    • Replies: 1
    • Views: 673
    March 9th, 2010, 19:06 Go to last post
  23. Unhappy Cryption

    Started by w_a_r_1, February 26th, 2010 03:41
    • Replies: 7
    • Views: 994
    March 1st, 2010, 03:53 Go to last post
  24. a simple substitution cipher or not?

    Started by dion, February 26th, 2010 10:04
    • Replies: 3
    • Views: 670
    February 27th, 2010, 10:11 Go to last post
  25. Smile How to attack crypto algorithms

    Started by Warlock, December 20th, 2009 04:51
    • Replies: 4
    • Views: 1,220
    December 21st, 2009, 16:40 Go to last post
  26. Whitebox crypto crackme ?

    Started by OHPen, July 19th, 2009 04:08
    • Replies: 5
    • Views: 1,534
    October 22nd, 2009, 03:09 Go to last post
  27. SHA-1 Collision Search - New approach

    Started by OHPen, August 11th, 2007 09:54
    • Replies: 4
    • Views: 2,106
    June 15th, 2009, 05:07 Go to last post
  28. Generate Your Own MD5 Collisions In Under a Minute

    Started by LLXX, May 15th, 2007 03:03
    • Replies: 12
    • Views: 4,393
    June 2nd, 2009, 16:40 Go to last post

Thread Display Options

Use this control to limit the display of threads to those newer than the specified time frame.

Allows you to choose the data by which the thread list will be sorted.

Order threads in...

Note: when sorting by date, 'descending order' will show the newest results first.

Icon Legend

Contains unread posts
Contains unread posts
Contains no unread posts
Contains no unread posts
More than 15 replies or 400 views
Hot thread with unread posts
More than 15 replies or 400 views
Hot thread with no unread posts
Closed Thread
Thread is closed
Thread Contains a Message Written By You
You have posted in this thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •