Page 1 of 8 12345678 LastLast
Threads 1 to 30 of 238

Forum: RCE Cryptographics

To discuss DES MD5 El-Gamal RSA PGP and others....

  1. Any books on breaking simple codes found in malware?

    Started by Sunk, May 13th, 2011 19:45
    • Replies: 14
    • Views: 16,402
    July 4th, 2011, 09:13 Go to last post
  2. Delphi RNG reversing

    Started by LaptoniC, October 10th, 2011 08:13
    2 Pages
    1 2
    • Replies: 24
    • Views: 15,285
    March 2nd, 2013, 06:42 Go to last post
  3. White-Box Cryptography

    Started by LaBBa, September 4th, 2008 02:44
    • Replies: 10
    • Views: 12,916
    March 25th, 2011, 19:37 Go to last post
  4. Generate Your Own MD5 Collisions In Under a Minute

    Started by LLXX, May 15th, 2007 03:03
    • Replies: 12
    • Views: 11,727
    June 2nd, 2009, 16:40 Go to last post
  5. PMK , HMK , EMM SEED , EMM IV in IRDETO 2

    Started by khaledlion83, October 19th, 2011 15:21
    • Replies: 0
    • Views: 11,374
    October 19th, 2011, 15:21 Go to last post
  6. Adobe Digital Editions DRM

    Started by SHaG, June 7th, 2007 06:25
    • Replies: 13
    • Views: 11,334
    September 8th, 2010, 17:24 Go to last post
  7. WinZip cipher

    Started by naides, March 26th, 2002 11:15
    3 Pages
    1 2 3
    • Replies: 43
    • Views: 9,566
    November 1st, 2006, 16:21 Go to last post
  8. Crypto Scheme

    Started by galgal, August 16th, 2010 14:41
    • Replies: 6
    • Views: 8,492
    January 24th, 2011, 11:02 Go to last post
  9. SHA-1 Collision Search - New approach

    Started by OHPen, August 11th, 2007 09:54
    • Replies: 4
    • Views: 8,490
    June 15th, 2009, 05:07 Go to last post
  10. Algorithm for Seed Key

    Started by croudfreak, May 25th, 2011 10:14
    • Replies: 2
    • Views: 8,333
    May 28th, 2011, 08:25 Go to last post
  11. piratebay heml.is

    Started by Shub-nigurrath, July 11th, 2013 04:55
    • Replies: 3
    • Views: 8,296
    April 14th, 2014, 06:36 Go to last post
  12. Whitebox crypto crackme ?

    Started by OHPen, July 19th, 2009 04:08
    • Replies: 5
    • Views: 8,159
    October 22nd, 2009, 03:09 Go to last post
  13. Lightbulb RSA things!!!!

    Started by iceland, December 28th, 2012 05:00
    • Replies: 5
    • Views: 7,879
    December 30th, 2012, 12:43 Go to last post
  14. public-key based Delphi components protection: SLockPK

    Started by Solomon, May 10th, 2002 04:57
    2 Pages
    1 2
    • Replies: 24
    • Views: 7,843
    April 30th, 2007, 16:38 Go to last post
  15. Breaking a challenge response

    Started by squidge, March 2nd, 2012 19:02
    • Replies: 5
    • Views: 7,838
    March 16th, 2012, 10:42 Go to last post
    • Replies: 5
    • Views: 7,654
    June 6th, 2010, 03:36 Go to last post
  16. decrypt with RSA?

    Started by joblack, July 25th, 2010 05:36
    • Replies: 3
    • Views: 7,632
    December 20th, 2010, 14:32 Go to last post
  17. Unhappy Cryption

    Started by w_a_r_1, February 26th, 2010 03:41
    • Replies: 7
    • Views: 7,621
    March 1st, 2010, 03:53 Go to last post
  18. Rijndael S-Box? AES... Maybe even XOR? -- Examples

    Started by ph3wl, February 21st, 2011 12:10
    • Replies: 0
    • Views: 7,596
    February 21st, 2011, 12:10 Go to last post
  19. Smile How to attack crypto algorithms

    Started by Warlock, December 20th, 2009 04:51
    • Replies: 4
    • Views: 7,587
    December 21st, 2009, 16:40 Go to last post
  20. DES in ASM

    Started by sonny, April 18th, 2010 11:23
    • Replies: 6
    • Views: 7,563
    April 18th, 2010, 18:01 Go to last post
    • Replies: 4
    • Views: 7,448
    June 2nd, 2010, 14:56 Go to last post
  21. Extract hash for offline attack (Office 2007)

    Started by bboitano, February 3rd, 2011 09:56
    • Replies: 1
    • Views: 7,437
    February 3rd, 2011, 10:56 Go to last post
  22. GPU Cryptography

    Started by Monk, March 22nd, 2010 22:49
    • Replies: 1
    • Views: 7,234
    March 23rd, 2010, 11:45 Go to last post
  23. strange CRC algorithm

    Started by ka6sqg, July 14th, 2012 00:26
    • Replies: 1
    • Views: 7,179
    October 17th, 2012, 09:29 Go to last post
  24. Post Mask attack with the fastest MD5 cracker

    Started by GreenPiece, April 6th, 2010 16:01
    • Replies: 1
    • Views: 7,131
    April 7th, 2010, 13:32 Go to last post
  25. Question Similar to XTEA ?

    Started by s1mmie, November 18th, 2010 11:35
    • Replies: 4
    • Views: 7,111
    November 26th, 2010, 04:44 Go to last post
  26. anyone know what type of hash this is?

    Started by twisted, August 19th, 2010 11:01
    • Replies: 2
    • Views: 7,095
    November 26th, 2010, 04:57 Go to last post
  27. a simple substitution cipher or not?

    Started by dion, February 26th, 2010 10:04
    • Replies: 3
    • Views: 6,938
    February 27th, 2010, 10:11 Go to last post
  28. Practical attack on RC4 encryption

    Started by OHPen, June 27th, 2012 11:30
    • Replies: 1
    • Views: 6,936
    June 28th, 2012, 06:20 Go to last post

Thread Display Options

Use this control to limit the display of threads to those newer than the specified time frame.

Allows you to choose the data by which the thread list will be sorted.

Order threads in...

Note: when sorting by date, 'descending order' will show the newest results first.

Icon Legend

Contains unread posts
Contains unread posts
Contains no unread posts
Contains no unread posts
More than 15 replies or 400 views
Hot thread with unread posts
More than 15 replies or 400 views
Hot thread with no unread posts
Closed Thread
Thread is closed
Thread Contains a Message Written By You
You have posted in this thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •