Explore >> Select a destination


You are here

briancallahan.net
| | www.da.vidbuchanan.co.uk
2.2 parsecs away

Travel
| | [AI summary] The CTF writeup details the process of solving a cryptographic challenge involving AES key recovery through side-channel attacks. The key was recovered by analyzing timing leaks from the AES decryption process, specifically the doSboxInv function's execution time. The recovered round 10 key was then used to invert the AES key schedule to obtain the original encryption key, which was the flag. The writeup also discusses the challenges of directly recovering the original key due to timing noise and the importance of using statistical correlation to identify the correct key.
| | corvid.cafe
3.1 parsecs away

Travel
| | [AI summary] The author discusses the development and implementation of the Uxn virtual machine, including its opcode set, memory operations, and a detailed breakdown of the 'Hello world' program using Uxn's unique assembly language.
| | tcode2k16.github.io
2.5 parsecs away

Travel
| | a random blog about cybersecurity and programming
| | int10h.org
12.0 parsecs away

Travel
| Font: DOS/V re. JPN30, from the world's biggest collection of classic text mode fonts, system fonts and BIOS fonts from DOS-era IBM PCs and compatibles