Defence blues
AES challenges
Red wilds
Privacy greenhouse
Purple crossroads
Indigo observatory
Contact
Initializing search
Defence blues
Mostly harmless, occasionally heroic:
Mostly harmless, occasionally heroic:
Golem Trust Computing Ltd.
Department of Silent Stability
The Home for Bewildered Beasts of Legend
Stormforge training grounds
Going places:
Going places:
Blue team @SOC
Blue team for dev
Blue team @Home
Bulletproofing servers
Middle ground:
Middle ground:
Buffer overflows
Reverse engineering
Steganography
Cryptanalysis
Cryptanalysis
Cryptanalysis notes
Root-
me cryptanalysis challenges
Root-
me cryptanalysis challenges
Old tricks, new treats:
Unmasking classical ciphers
AES challenges
AES challenges
AES Electronic code book
Initialisation vector
AES challenges
AES challenges
Table of contents
AES Electronic code book
Initialisation vector
Riding the currents:
Stream cipher exploits
Unlocking RSA:
Asymmetric mischief
Curves ahead:
Navigating elliptic curve cryptography
The raccoon’s secret recipes for digital mischief
Evasion
Active defence:
Active defence:
Honeytech for humans
AES challenges
¶
AES mode weaknesses.
AES Electronic code book
Initialisation vector
Back to top