## Fundamentals of Cryptography: coding method, message digest algorithm and encryption algorithm summary

Encoding method of bytecode to textIn the computer, whether memory, disk or network transmission, the data involved are stored or transmitted in binary format.Each binary bit can only be 0 or 1. Binary bits do not exist alone, but exist in the form of 8 binary bits forming 1 byte, that is, 1 byte = 8 bit s.Bytecode cannot be directly converted ...

Posted by **scs** on *Fri, 03 Dec 2021 15:26:01 -0800*

## STL source code analysis overview

catalogue
Node of list
list is more complex than vector's continuous linear space. Its storage space is discontinuous. The advantage is that each time an element is inserted and deleted, only one element's space needs to be configured or releasedIt is very convenient to insert and delete
Node of list
The list itself and the nodes of ...

Posted by **cesar110** on *Fri, 19 Nov 2021 03:56:43 -0800*

## 2021SC@SDUSC-PALISADE decryption function Decrypt

2021SC@SDUSC
This section continues to analyze the decryption process of BGV. The specific implementation of the decryption process is mainly in bgvrns-impl.cpp.
1 CryptoContext in palisade
The core class of PALISADE is the CryptoContext class, which provides all PALISADE encryption functions. All objects used in the PALISADE implement ...

Posted by **tomd79** on *Fri, 05 Nov 2021 16:04:07 -0700*

## Code implementation of AES encryption algorithm

Code implementation of AES encryption algorithm
Job objectives
The AES encryption algorithm is implemented in C language and optimized to the fastest speed.
Algorithm description
Introduction to AES
AES (Advanced Encryption Standard) is the most common symmetric encryption algorithm, also known as Rijndael encryption method. It is a block ...

Posted by **trazan** on *Mon, 25 Oct 2021 07:18:14 -0700*

## NTL cryptographic algorithm open source library -- large integer ZZ class

2021SC@SDUSC
Overview of this chapter
The large integer ZZ class mainly realizes the representation of large integers of arbitrary length, the greatest common factor, Jacobi symbol and prime test. The author will show readers how NTL realizes the above functions step by step by analyzing the form of functions in ZZ.cpp source cod ...

Posted by **burfo** on *Tue, 05 Oct 2021 12:52:38 -0700*

## streamgame1 of attack and defense world crypto master problem

streamgame1 of attack and defense world crypto master problem
Continue to start the reverse journey of the whole stack of dreams~ This problem is streamgame1 of the world's crypto master problem . . Download attachments, which are typical LFSR types:
from flag import flag
assert flag.startswith("flag{")
# Function: judge whether the string s ...

Posted by **phpcoding2** on *Tue, 21 Sep 2021 04:10:01 -0700*

## [20210828 WMCTF] WP in Crypto direction

woc, it's too difficult. It's just a fairy fighting. I don't have any confidence to continue when I see the number of people
All a, master's blog , then the environment was turned off at the moment of sending WP
Four questions, one in the backpack, one in the AGCD of RSA, one in AES.OCB, and the last unclear test point
WM
Crypto-check ...

Posted by **SteveMellor** on *Fri, 03 Sep 2021 19:01:15 -0700*