Setting Up an Assembly Language Development Environment on Windows 10 (Using DOSBOX and MASM32)

Setting Up an Assembly Language Development Environment on Windows 10 (Using DOSBOX and MASM32)

Limited Time Resource Download: Reply “Tutorial” to obtain a microcontroller eBook, reply “Simulation“ to get Proteus simulation materials, the Baidu Drive group sharing link update time: 2017-07-12, if it is invalid, please leave a message at the end of the article, do not leave a message in the background, you can also search for more … Read more

China’s ‘Queen of Cryptography’ Wang Xiaoyun: A Legendary Scholar Who Broke America’s Top Encryption Algorithms to Safeguard National Cybersecurity

China's 'Queen of Cryptography' Wang Xiaoyun: A Legendary Scholar Who Broke America's Top Encryption Algorithms to Safeguard National Cybersecurity

She is known as the “Queen of Cryptography” in China and is a mathematical genius that gives headaches to American intelligence agencies. She led her team to successively crack globally recognized secure encryption algorithms such as MD5 and SHA-1, shocking the international cryptography community and forcing the U.S. National Institute of Standards and Technology (NIST) … Read more

Introduction to Commercial Cryptographic Algorithms

Introduction to Commercial Cryptographic Algorithms

Commercial cryptographic technology refers to the technology that can implement encryption, decryption, and authentication functions of commercial cryptographic algorithms (including programming technology for cryptographic algorithms and implementation technologies for cryptographic algorithm chips, encryption cards, etc.). Commercial cryptographic technology is the core of commercial cryptography, and the state has classified commercial cryptographic technology as a national … Read more

Application of National Encryption Algorithms in Various Platforms

Application of National Encryption Algorithms in Various Platforms

National encryption refers to the domestic encryption algorithms recognized by the National Cryptography Administration. The main algorithms include SM1, SM2, SM3, SM4, and the latest SM9. These algorithms are primarily used in domestic environments as recognized by the National Cryptography Administration. SM2 Algorithm: The SM2 elliptic curve public key cryptography algorithm is a public key … Read more

Implementation of Cryptographic Algorithms: AES, 3DES, RSA, SM2, SM3, SM4

Implementation of Cryptographic Algorithms: AES, 3DES, RSA, SM2, SM3, SM4

Click the blue text above “Programming Diary” to follow below National secret algorithms: These are algorithms independently developed by our country to reduce excessive reliance on foreign technology. National secret refers to the domestic cryptographic algorithms recognized by the National Cryptography Administration. The following is the specific correspondence: Symmetric algorithms: AES, DES, SM4 Asymmetric algorithms: … Read more

Operating System Only 1.4MB in Size Written in Assembly

Operating System Only 1.4MB in Size Written in Assembly

An operating system written in assembly language, designed to provide an efficient, stable, and user-friendly operating system experience. This operating system only occupies 1.4MB of space, with the latest update on May 10, 2024. MenuetOS not only provides an intuitive operating interface but also has multiple features, making it a versatile operating system. It supports … Read more