View Full Version : RCE Cryptographics
- piratebay heml.is (3 replies)
- RSA things!!!! (5 replies)
- strange CRC algorithm (1 replies)
- Practical attack on RC4 encryption (1 replies)
- Breaking a challenge response (5 replies)
- PMK , HMK , EMM SEED , EMM IV in IRDETO 2 (0 replies)
- Delphi RNG reversing (24 replies)
- Algorithm for Seed Key (2 replies)
- Any books on breaking simple codes found in malware? (14 replies)
- Rijndael S-Box? AES... Maybe even XOR? -- Examples (0 replies)
- Extract hash for offline attack (Office 2007) (1 replies)
- Similar to XTEA ? (4 replies)
- anyone know what type of hash this is? (2 replies)
- Crypto Scheme (6 replies)
- decrypt with RSA? (3 replies)
- How can I check quickly if a pdf is decrypted right? (5 replies)
- Adobe Security handler cryptversion and 'NewCryptDataExProc' function question (4 replies)
- Hash idea (1 replies)
- DES in ASM (6 replies)
- Mask attack with the fastest MD5 cracker (1 replies)
- GPU Cryptography (1 replies)
- how to decrypt JCALG1 any body can help me (1 replies)
- a simple substitution cipher or not? (3 replies)
- Cryption (7 replies)
- How to attack crypto algorithms (4 replies)
- Whitebox crypto crackme ? (5 replies)
- I need help with this crypto algorithm (0 replies)
- Bday Attack on Flexlm's ECC? (6 replies)
- encrypted harddisk (13 replies)
- ElGamal with non relative prime k to p-1 ? (5 replies)
- White-Box Cryptography (10 replies)
- Is RSA safe in software protection ? - on XP crypto.api example (8 replies)
- BCH Codes (3 replies)
- Recovering deleted files from HDD (11 replies)
- RSA Guide (11 replies)
- Checksum problem (7 replies)
- Black box algorithm with some known good keys (7 replies)
- what cryptology Algorithm is it ? (3 replies)
- SHA-1 Collision Search - New approach (4 replies)
- Reverse Engineering of Strong Crypto Signature Schemes (16 replies)
- QRBG (2 replies)
- rijndael (2 replies)
- Help on checksum analysis (8 replies)
- Adobe Digital Editions DRM (13 replies)
- help with crypto identification (1 replies)
- Generate Your Own MD5 Collisions In Under a Minute (12 replies)
- Breaking 104 bit WEP in less than 60 seconds (3 replies)
- Experience with AES-128 (10 replies)
- Online Cryptography Course, Washington Uni (0 replies)
- Product Keys Based on Elliptic Curve Cryptography (0 replies)
- MD5: how to compile win32 Console code? (8 replies)
- DES - ASM to C (11 replies)
- Blowfish2 (12 replies)
- Interesting Crypto Function (2 replies)
- Handbook of Applied Cryptography (1 replies)
- Practical Aspects of Modern Cryptography (2 replies)
- LINK: Steganography in Computer Graphics (1 replies)
- Fibonacci and Primes (10 replies)
- Bruteforcing DES (4 replies)
- B4 I start coding: Does my algorithm make sense ? Picture/Diagram inside (16 replies)
- Can someone help me figure out if this is standard blowfish ? (ASM) (4 replies)
- function analysis (4 replies)
- Skype in coporate environments (1 replies)
- Checksum theory check...sum (15 replies)
- Any one see this Cryptographic? (11 replies)
- a piece code of a unknow cryptogrphics (16 replies)
- Exploiting MD5 (10 replies)
- Recover Key from encryption (7 replies)
- .dat decrytion (2 replies)
- rsa Questions (6 replies)
- GData: An Online MD5 Hash Database (6 replies)
- strong? Possible attacks? (2 replies)
- Nice MD5 Collision! (2 replies)
- Locality-sensitive hash functions (0 replies)
- file.exe with 13 crypto signatures, help... (4 replies)
- Anyone worked on RC4 ? (2 replies)
- Weak-Key Classes attaks on IDEA algo (3 replies)
- HardKey4 (1 replies)
- A question about MD5 (3 replies)
- XOR equations :) (0 replies)
- XOR property (MD4/5 related) (9 replies)
- Breaking a challenge / response algo (4 replies)
- ec problem (3 replies)
- DES question (3 replies)
- Q:Number analysis... (12 replies)
- Literal Bitwise Calculations (13 replies)
- Is this real ? (2 replies)
- Article: The Misuse of RC4 in Microsoft Word and Excel (0 replies)
- PSDS_Crypto (panasonic crypto) (8 replies)
- Article about next-generation movie/DVD encryption (0 replies)
- Steganos Encrypted File and forgotten Password (7 replies)
- How to implement (20 replies)
- A little help in understanding some crypto (11 replies)
- Collision vulnerabilities in MD5 Checksums (7 replies)
- RSA implementation (13 replies)
- hash algo help (5 replies)
- RSA - More than 2 primes (1 replies)
- MD4/MD5/SHA-0 Dead (4 replies)
- Man in the middle (8 replies)
- new article about ECC (1 replies)
- Complexity of HASH algoritm (6 replies)
- Cryptanalysis questions (6 replies)
- Will RSA-640 be solved soon? (1 replies)
- LFSR-based cypher analysis (7 replies)
- Is it illegal to solve an RSA code? (5 replies)
- got P,Q,D, how to compute E? (13 replies)
- Okay, ultimate challange i belive (41 replies)
- Project RainbowCrack (6 replies)
- Decoding TwoFish Encryption (2 replies)
- Lets put those graphic processors to use (2 replies)
- Acoustic cryptanalysis (2 replies)
- Safer-K128 (2 replies)
- Windows DRM and WMV (8 replies)
- Tiny Encryption Algorythm (3 replies)
- link problem using MS Visual c++6.0 when useing Cryptlib (5 replies)
- New in crypto (9 replies)
- problem with rsa (29 replies)
- simple rsa (4 replies)
- miracle sig files (5 replies)
- Adobe DRM (Digital Right Management) (13 replies)
- MD5 + some bit math (4 replies)
- Interesting Docs (2 replies)
- RSA 576 factored (2 replies)
- Mind Challenge...(or not?!) (7 replies)
- Cryptlib - setting IV's (5 replies)
- microsoft drm (1 replies)
- ECC questions (4 replies)
- Writing RSA keys to keyset - permission errors (6 replies)
- Could I ask u how to fix the problem in the mentioned keygenRSA.asm? (2 replies)
- Diffie Hellman Key Agreement - Cryptlib??? (4 replies)
- Little simple doubt in Handbook of Applied Cryptography... (12 replies)
- DES 40bit (1 replies)
- Crypto Library Help Please! (4 replies)
- elliptic distribution (2 replies)
- WINZIP Archive decrypt (3 replies)
- des modified algo (1 replies)
- recover RSA primes p and q if we have n,d,e (8 replies)
- Attacking DSA (14 replies)
- IShield Single Exe password recovery? (1 replies)
- A nice intro to Cryptography (5 replies)
- bug in FGInt lib? (RSA) (3 replies)
- NeoProject takes on MD5 (0 replies)
- new primality testing algorithm? (1 replies)
- RSA-576 - Factored (9 replies)
- knapsack (0 replies)
- NeoProject (8 replies)
- ServU Ftp Password Decryption (1 replies)
- Ecdsa (1 replies)
- help me on reversing hash function (10 replies)
- ElGamal Signature (22 replies)
- Tea (19 replies)
- Recognizing .... (10 replies)
- Call for Mike's comments (2 replies)
- Question about ECC points addition... (6 replies)
- BigNum Calc (3 replies)
- xor protection (6 replies)
- Blowfish (14 replies)
- unknown algorithm (2 replies)
- Typical code sequence for encryption? (4 replies)
- Data structure for big Integer (9 replies)
- Encryption modes (23 replies)
- Pencil and paper decryption ? (11 replies)
- Inside a MD5 (?) protected Java prog (7 replies)
- Marx Cryptobox (2 replies)
- Zip Protection Question? (4 replies)
- Primality testing *is* in P - Proof (3 replies)
- JBuilder 7 and DSA (22 replies)
- Bob and Alice (6 replies)
- Hash algorithm identification (9 replies)
- Interesting site (1 replies)
- Um few crypto newbie questions. (5 replies)
- New project: RSA-65 analysis on GetDataBack for NTFS (6 replies)
- Blowfish Bruteforce 48 bits (2 replies)
- $$$ for crypto weakness in a cool simple algorithm (4 replies)
- Need help with foxpro please (7 replies)
- SHA-1 protected program (4 replies)
- Cryptic Formula Help (8 replies)
- RSA-Tool2 v1.7 Request (4 replies)
- Encryption used in CRT (13 replies)
- SSleay BIGNUM FLIRT sigs (1 replies)
- Searching RSA Protected Programs (7 replies)
- Help determining cypher... (6 replies)
- i search Rsa-tools (3 replies)
- Blowfish and SHA-1 analysis on cacheX (18 replies)
- 8 bit CPU cipher (16 replies)
- hypercomplex numbers and RSA (0 replies)
- What kind of encryption is this? (3 replies)
- SHA-1 combined with RSA? (9 replies)
- Blowfish Init<>set_key (13 replies)
- public-key based Delphi components protection: SLockPK (24 replies)
- super-tiny PRNG (7 replies)
- Blum-Blum-Shub questions (4 replies)
- Encrypted Magic Folders (2 replies)
- prime number properties (10 replies)
- Subexponential attack on AES (0 replies)
- Random Number Analysis (22 replies)
- RSA Tool 2 v1.2 (2 replies)
- Finding RSA Constants for keygenning... (3 replies)
- Cracking w97 files (14 replies)
- new winzip attack (0 replies)
- WinZip cipher (43 replies)
- stream cipher??? (28 replies)
- Grille Me (8 replies)
- need ideas on how to attack an Authentication and Encryption model I thought of (4 replies)
- Tutorial: finding encryption code (11 replies)
- Analysis of ASProtect Keygeneration scheme (3 replies)
- why not decrypt in exe ? (3 replies)
- Challenge to all you so brilliant people...with motivation ;) (15 replies)
- decrypting an unknown file type (3 replies)
- fun proof (1 replies)
- RSA cracker machine (9 replies)
- Easy RSA (9 replies)
- bit commitment blues ;) (1 replies)
- Cryptography challenge ;) (2 replies)
- tE!'s RSA Tool (3 replies)
- Alittle bit of Encryption/Decryption fun... (0 replies)
- Rsa Challenge (10 replies)
- SecureID program!? (4 replies)
- rsa (1 replies)
- Dsa (12 replies)
- RNG and relative primes (6 replies)
- Beginners question (4 replies)
- Inside Windows Product Activation (WPA) (6 replies)
- help on a llittle crypto mission : -) (4 replies)
- MD5 works but RIPEMD-160 does not work (6 replies)
- A challenge ? (10 replies)
- E changed to 1 in RSA algo. (1 replies)
- Secrets & Lies (14 replies)
- How to know which algo is used ? (7 replies)
- Cryptography's Shining Ciphers (5 replies)
- TMG keygenme #3 (7 replies)
- ECC and Flexlm (6 replies)
- xtr help :[ (2 replies)
- Basics of Cryptography (14 replies)
- Rsa > 512 (16 replies)
- a newb ie question? (6 replies)
- Crypto api test problems (3 replies)
- Cryptography ( As posted by EtErNaL_L0ser) (24 replies)
Powered by vBulletin® Version 4.2.2 Copyright © 2018 vBulletin Solutions, Inc. All rights reserved.