Log in

View Full Version : RCE Cryptographics


  1. piratebay heml.is (3 replies)
  2. RSA things!!!! (5 replies)
  3. strange CRC algorithm (1 replies)
  4. Practical attack on RC4 encryption (1 replies)
  5. Breaking a challenge response (5 replies)
  6. PMK , HMK , EMM SEED , EMM IV in IRDETO 2 (0 replies)
  7. Delphi RNG reversing (24 replies)
  8. Algorithm for Seed Key (2 replies)
  9. Any books on breaking simple codes found in malware? (14 replies)
  10. Rijndael S-Box? AES... Maybe even XOR? -- Examples (0 replies)
  11. Extract hash for offline attack (Office 2007) (1 replies)
  12. Similar to XTEA ? (4 replies)
  13. anyone know what type of hash this is? (2 replies)
  14. Crypto Scheme (6 replies)
  15. decrypt with RSA? (3 replies)
  16. How can I check quickly if a pdf is decrypted right? (5 replies)
  17. Adobe Security handler cryptversion and 'NewCryptDataExProc' function question (4 replies)
  18. Hash idea (1 replies)
  19. DES in ASM (6 replies)
  20. Mask attack with the fastest MD5 cracker (1 replies)
  21. GPU Cryptography (1 replies)
  22. how to decrypt JCALG1 any body can help me (1 replies)
  23. a simple substitution cipher or not? (3 replies)
  24. Cryption (7 replies)
  25. How to attack crypto algorithms (4 replies)
  26. Whitebox crypto crackme ? (5 replies)
  27. I need help with this crypto algorithm (0 replies)
  28. Bday Attack on Flexlm's ECC? (6 replies)
  29. encrypted harddisk (13 replies)
  30. ElGamal with non relative prime k to p-1 ? (5 replies)
  31. White-Box Cryptography (10 replies)
  32. Is RSA safe in software protection ? - on XP crypto.api example (8 replies)
  33. BCH Codes (3 replies)
  34. Recovering deleted files from HDD (11 replies)
  35. RSA Guide (11 replies)
  36. Checksum problem (7 replies)
  37. Black box algorithm with some known good keys (7 replies)
  38. what cryptology Algorithm is it ? (3 replies)
  39. SHA-1 Collision Search - New approach (4 replies)
  40. Reverse Engineering of Strong Crypto Signature Schemes (16 replies)
  41. QRBG (2 replies)
  42. rijndael (2 replies)
  43. Help on checksum analysis (8 replies)
  44. Adobe Digital Editions DRM (13 replies)
  45. help with crypto identification (1 replies)
  46. Generate Your Own MD5 Collisions In Under a Minute (12 replies)
  47. Breaking 104 bit WEP in less than 60 seconds (3 replies)
  48. Experience with AES-128 (10 replies)
  49. Online Cryptography Course, Washington Uni (0 replies)
  50. Product Keys Based on Elliptic Curve Cryptography (0 replies)
  51. MD5: how to compile win32 Console code? (8 replies)
  52. DES - ASM to C (11 replies)
  53. Blowfish2 (12 replies)
  54. Interesting Crypto Function (2 replies)
  55. Handbook of Applied Cryptography (1 replies)
  56. Practical Aspects of Modern Cryptography (2 replies)
  57. LINK: Steganography in Computer Graphics (1 replies)
  58. Fibonacci and Primes (10 replies)
  59. Bruteforcing DES (4 replies)
  60. B4 I start coding: Does my algorithm make sense ? Picture/Diagram inside (16 replies)
  61. Can someone help me figure out if this is standard blowfish ? (ASM) (4 replies)
  62. function analysis (4 replies)
  63. Skype in coporate environments (1 replies)
  64. Checksum theory check...sum (15 replies)
  65. Any one see this Cryptographic? (11 replies)
  66. a piece code of a unknow cryptogrphics (16 replies)
  67. Exploiting MD5 (10 replies)
  68. Recover Key from encryption (7 replies)
  69. .dat decrytion (2 replies)
  70. rsa Questions (6 replies)
  71. GData: An Online MD5 Hash Database (6 replies)
  72. strong? Possible attacks? (2 replies)
  73. Nice MD5 Collision! (2 replies)
  74. Locality-sensitive hash functions (0 replies)
  75. file.exe with 13 crypto signatures, help... (4 replies)
  76. Anyone worked on RC4 ? (2 replies)
  77. Weak-Key Classes attaks on IDEA algo (3 replies)
  78. HardKey4 (1 replies)
  79. A question about MD5 (3 replies)
  80. XOR equations :) (0 replies)
  81. XOR property (MD4/5 related) (9 replies)
  82. Breaking a challenge / response algo (4 replies)
  83. ec problem (3 replies)
  84. DES question (3 replies)
  85. Q:Number analysis... (12 replies)
  86. Literal Bitwise Calculations (13 replies)
  87. Is this real ? (2 replies)
  88. Article: The Misuse of RC4 in Microsoft Word and Excel (0 replies)
  89. PSDS_Crypto (panasonic crypto) (8 replies)
  90. Article about next-generation movie/DVD encryption (0 replies)
  91. Steganos Encrypted File and forgotten Password (7 replies)
  92. How to implement (20 replies)
  93. A little help in understanding some crypto (11 replies)
  94. Collision vulnerabilities in MD5 Checksums (7 replies)
  95. RSA implementation (13 replies)
  96. hash algo help (5 replies)
  97. RSA - More than 2 primes (1 replies)
  98. MD4/MD5/SHA-0 Dead (4 replies)
  99. Man in the middle (8 replies)
  100. new article about ECC (1 replies)
  101. Complexity of HASH algoritm (6 replies)
  102. Cryptanalysis questions (6 replies)
  103. Will RSA-640 be solved soon? (1 replies)
  104. LFSR-based cypher analysis (7 replies)
  105. Is it illegal to solve an RSA code? (5 replies)
  106. got P,Q,D, how to compute E? (13 replies)
  107. Okay, ultimate challange i belive (41 replies)
  108. Project RainbowCrack (6 replies)
  109. Decoding TwoFish Encryption (2 replies)
  110. Lets put those graphic processors to use (2 replies)
  111. Acoustic cryptanalysis (2 replies)
  112. Safer-K128 (2 replies)
  113. Windows DRM and WMV (8 replies)
  114. Tiny Encryption Algorythm (3 replies)
  115. link problem using MS Visual c++6.0 when useing Cryptlib (5 replies)
  116. New in crypto (9 replies)
  117. problem with rsa (29 replies)
  118. simple rsa (4 replies)
  119. miracle sig files (5 replies)
  120. Adobe DRM (Digital Right Management) (13 replies)
  121. MD5 + some bit math (4 replies)
  122. Interesting Docs (2 replies)
  123. RSA 576 factored (2 replies)
  124. Mind Challenge...(or not?!) (7 replies)
  125. Cryptlib - setting IV's (5 replies)
  126. microsoft drm (1 replies)
  127. ECC questions (4 replies)
  128. Writing RSA keys to keyset - permission errors (6 replies)
  129. Could I ask u how to fix the problem in the mentioned keygenRSA.asm? (2 replies)
  130. Diffie Hellman Key Agreement - Cryptlib??? (4 replies)
  131. Little simple doubt in Handbook of Applied Cryptography... (12 replies)
  132. DES 40bit (1 replies)
  133. Crypto Library Help Please! (4 replies)
  134. elliptic distribution (2 replies)
  135. WINZIP Archive decrypt (3 replies)
  136. des modified algo (1 replies)
  137. recover RSA primes p and q if we have n,d,e (8 replies)
  138. Attacking DSA (14 replies)
  139. IShield Single Exe password recovery? (1 replies)
  140. A nice intro to Cryptography (5 replies)
  141. bug in FGInt lib? (RSA) (3 replies)
  142. NeoProject takes on MD5 (0 replies)
  143. new primality testing algorithm? (1 replies)
  144. RSA-576 - Factored (9 replies)
  145. knapsack (0 replies)
  146. NeoProject (8 replies)
  147. ServU Ftp Password Decryption (1 replies)
  148. Ecdsa (1 replies)
  149. help me on reversing hash function (10 replies)
  150. ElGamal Signature (22 replies)
  151. Tea (19 replies)
  152. Recognizing .... (10 replies)
  153. Call for Mike's comments (2 replies)
  154. Question about ECC points addition... (6 replies)
  155. BigNum Calc (3 replies)
  156. xor protection (6 replies)
  157. Blowfish (14 replies)
  158. unknown algorithm (2 replies)
  159. Typical code sequence for encryption? (4 replies)
  160. Data structure for big Integer (9 replies)
  161. Encryption modes (23 replies)
  162. Pencil and paper decryption ? (11 replies)
  163. Inside a MD5 (?) protected Java prog (7 replies)
  164. Marx Cryptobox (2 replies)
  165. Zip Protection Question? (4 replies)
  166. Primality testing *is* in P - Proof (3 replies)
  167. JBuilder 7 and DSA (22 replies)
  168. Bob and Alice (6 replies)
  169. Hash algorithm identification (9 replies)
  170. Interesting site (1 replies)
  171. Um few crypto newbie questions. (5 replies)
  172. New project: RSA-65 analysis on GetDataBack for NTFS (6 replies)
  173. Blowfish Bruteforce 48 bits (2 replies)
  174. $$$ for crypto weakness in a cool simple algorithm (4 replies)
  175. Need help with foxpro please (7 replies)
  176. SHA-1 protected program (4 replies)
  177. Cryptic Formula Help (8 replies)
  178. RSA-Tool2 v1.7 Request (4 replies)
  179. Encryption used in CRT (13 replies)
  180. SSleay BIGNUM FLIRT sigs (1 replies)
  181. Searching RSA Protected Programs (7 replies)
  182. Help determining cypher... (6 replies)
  183. i search Rsa-tools (3 replies)
  184. Blowfish and SHA-1 analysis on cacheX (18 replies)
  185. 8 bit CPU cipher (16 replies)
  186. hypercomplex numbers and RSA (0 replies)
  187. What kind of encryption is this? (3 replies)
  188. SHA-1 combined with RSA? (9 replies)
  189. Blowfish Init<>set_key (13 replies)
  190. public-key based Delphi components protection: SLockPK (24 replies)
  191. super-tiny PRNG (7 replies)
  192. Blum-Blum-Shub questions (4 replies)
  193. Encrypted Magic Folders (2 replies)
  194. prime number properties (10 replies)
  195. Subexponential attack on AES (0 replies)
  196. Random Number Analysis (22 replies)
  197. RSA Tool 2 v1.2 (2 replies)
  198. Finding RSA Constants for keygenning... (3 replies)
  199. Cracking w97 files (14 replies)
  200. new winzip attack (0 replies)
  201. WinZip cipher (43 replies)
  202. stream cipher??? (28 replies)
  203. Grille Me (8 replies)
  204. need ideas on how to attack an Authentication and Encryption model I thought of (4 replies)
  205. Tutorial: finding encryption code (11 replies)
  206. Analysis of ASProtect Keygeneration scheme (3 replies)
  207. why not decrypt in exe ? (3 replies)
  208. Challenge to all you so brilliant people...with motivation ;) (15 replies)
  209. decrypting an unknown file type (3 replies)
  210. fun proof (1 replies)
  211. RSA cracker machine (9 replies)
  212. Easy RSA (9 replies)
  213. bit commitment blues ;) (1 replies)
  214. Cryptography challenge ;) (2 replies)
  215. tE!'s RSA Tool (3 replies)
  216. Alittle bit of Encryption/Decryption fun... (0 replies)
  217. Rsa Challenge (10 replies)
  218. SecureID program!? (4 replies)
  219. rsa (1 replies)
  220. Dsa (12 replies)
  221. RNG and relative primes (6 replies)
  222. Beginners question (4 replies)
  223. Inside Windows Product Activation (WPA) (6 replies)
  224. help on a llittle crypto mission : -) (4 replies)
  225. MD5 works but RIPEMD-160 does not work (6 replies)
  226. A challenge ? (10 replies)
  227. E changed to 1 in RSA algo. (1 replies)
  228. Secrets & Lies (14 replies)
  229. How to know which algo is used ? (7 replies)
  230. Cryptography's Shining Ciphers (5 replies)
  231. TMG keygenme #3 (7 replies)
  232. ECC and Flexlm (6 replies)
  233. xtr help :[ (2 replies)
  234. Basics of Cryptography (14 replies)
  235. Rsa > 512 (16 replies)
  236. a newb ie question? (6 replies)
  237. Crypto api test problems (3 replies)
  238. Cryptography ( As posted by EtErNaL_L0ser) (24 replies)