 
      
    | You are here | cocomelonc.github.io | ||
| | | | | tcode2k16.github.io | |
| | | | | a random blog about cybersecurity and programming | |
| | | | | blog.pkh.me | |
| | | | | ||
| | | | | goggleheadedhacker.com | |
| | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | ||