I implemented AES128 in 69 bytes of x86 assembly. (from @OverTheWireCTF challenge 0). Can anyone beat that? :Ppic.twitter.com/VD7FUTD8Ii
U tweetove putem weba ili aplikacija drugih proizvođača možete dodati podatke o lokaciji, kao što su grad ili točna lokacija. Povijest lokacija tweetova uvijek možete izbrisati. Saznajte više
For anyone saying "uSinG aEs-Ni iS cHeAtInG": a) AESKEYGENASSIST only supports round constants as immediate arguments, so every other implementation I saw unrolls the key expansion loop. b) I tricked a lot of smart CTF players into thinking this was a non-standard AES impl :P
c) Explain the round loop exit condition. d) Make the code smaller :P (I think this is possible, the shuffling stage was kinda optimised for obscurity rather than size)
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.