|
You are here |
cocomelonc.github.io | ||
| | | | |
goggleheadedhacker.com
|
|
| | | | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | |
| | | | |
crocidb.com
|
|
| | | | | Following my first GameBoy, the DMG, now I got a GameBoy color and replaced the buttons and gave it a clean. Also Update on my game for the platform | |
| | | | |
www.da.vidbuchanan.co.uk
|
|
| | | | | [AI summary] A detailed writeup of a cryptographic side-channel attack challenge from the UofTCTF where the author exploits timing variations in an AES decryption implementation to recover the flag. | |
| | | | |
int10h.org
|
|
| | | Font: IBM DOS ISO8-2x, from the world's biggest collection of classic text mode fonts, system fonts and BIOS fonts from DOS-era IBM PCs and compatibles | ||