impic.org

       )\               (__)     
      /  \              (oo)     
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




.interesting papers
.projects
.fun
.links
.protected


interesting papers


  Applications to Chinese Remainder Theorem
  Steganography in computer graphics
  A Class of Weak Keys in the RC4 Stream Cipher
  Weakness in the Key Scheduling Algorithm of RC4
  StarForce 3 - Brief insight into a hidden world
  Factoring Large Numbers with the TWINKLE Device
  Finding Collisions in the Full SHA-1
  Bypassing software firewalls using process infection
  Breaking 104 bit WEP in less than 60 seconds
  Related-key Cryptanalysis of the Full AES-192 and AES-256


projects


  ListDir project


fun


  Dawn Of The Dead 5 (WC III Map) Codegen
  Hagakure


links


  A s c i i Art
  Against TCPA
  Internet Storm Center
  SourceForge
  SecurityFocus
  Debian GNU Linux
  NewOrder


protected


   ::1 (ipv6)
   FC?G?-...-2B?Q8 (wxp)
   71579009f1de0b9e24e550ec798302df (md5/lowercase)
   nop (asm/x86/hex)
   N;φ(N) (RSA/p or q last 30 decimal digits)
   Why do you wear dad stupid bunny suit? (answer)

©


  liame