首页
社区
课程
招聘
[分享]密码学连接
发表于: 2005-2-11 00:03 14508

[分享]密码学连接

2005-2-11 00:03
14508
补充一些连接:

2dbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4g2F1k6q4)9J5k6h3&6G2k6r3q4C8i4K6u0W2k6h3c8#2i4K6u0r3L8%4u0Y4i4K6u0r3j5%4u0&6M7s2c8G2i4K6u0r3j5%4u0&6M7s2c8G2i4K6u0r3 (American Cryptogram Association)

d5aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4W2L8h3W2G2N6r3W2U0M7#2)9J5k6h3y4G2L8g2)9J5c8X3y4J5P5i4m8@1L8#2)9J5c8X3W2F1k6r3g2^5i4K6u0W2K9s2c8E0L8l9`.`. (monoalphabetic cryptography game on pc)

bc8K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4g2F1K9g2)9J5k6r3#2S2L8X3&6Z5k6h3W2E0i4K6u0W2k6r3g2Q4x3V1k6K6N6s2g2V1L8%4u0Y4i4K6u0r3k6$3q4Z5k6#2)9J5c8W2m8s2f1q4)9J5c8X3y4J5P5i4m8@1L8$3I4G2k6K6q4Q4x3X3g2Z5N6r3#2D9 (A lot of links (approximately 500) on cryptography)

8fbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3u0D9k6i4c8U0K9r3I4W2P5i4m8S2M7X3E0Q4x3X3g2G2M7X3N6Q4x3X3g2#2K9#2)9J5c8R3`.`.  (offcial Site Bletchley Park)

bbeK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4@1k6h3N6G2j5i4u0U0K9r3W2$3k6g2)9J5k6h3y4G2L8g2)9J5c8R3`.`. (Site specialized on the steganography, with an interesting list of software)

138K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3S2W2M7X3#2W2N6r3W2U0i4K6u0W2j5$3!0E0i4K6u0r3k6$3c8D9K9h3u0J5j5i4u0&6/ (Transcription of the manuscript quantified founder of the company “Dawn Golden delicious”.)

2c4K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8J5L8#2)9J5k6h3N6G2N6W2)9J5k6i4g2C8i4K6u0r3N6X3W2J5N6s2g2S2L8r3#2#2M7$3g2#2L8g2)9J5c8Y4y4H3K9h3g2K6i4K6u0r3k6r3g2X3j5i4g2D9N6q4)9J5k6h3S2@1L8b7`.`. (A presentation of codes and figures)

ce1K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4N6A6M7$3c8G2L8g2)9J5k6i4N6W2K9i4A6E0j5h3&6F1i4K6u0W2j5h3y4Q4x3X3g2A6L8q4)9J5c8W2)9%4c8h3q4D9j5X3W2Q4x3V1k6U0M7Y4W2H3N6r3q4F1j5h3I4&6M7$3W2K6i4K6u0r3 (A course online of cryptanalyse)

a35K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4K6i4K6u0W2M7X3!0U0K9r3g2K6N6r3g2J5i4K6u0W2k6h3c8#2i4K6u0r3N6g2)9J5c8X3u0J5L8%4N6F1i4K6u0r3b7%4u0&6M7s2c8G2i4K6u0r3b7%4u0&6M7s2c8G2i4K6u0W2K9s2c8E0L8l9`.`. (A course online of cryptanalyse)

3b5K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3g2K6K9$3W2E0L8#2)9J5k6h3y4G2L8g2)9J5c8W2)9%4c8i4N6W2K9h3c8S2K9g2)9J5c8X3y4J5P5i4m8@1L8r3W2T1i4K6u0W2K9s2c8E0L8l9`.`. (Dai Wei, « Crypto++ », Bibilothèque of C++ programs relating to cryptography )

b50K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4g2E0K9h3y4Z5i4K6u0W2k6h3c8#2i4K6u0r3i4K6N6q4N6h3#2A6j5$3S2Q4x3V1k6X3L8g2)9J5k6o6x3@1i4K6u0V1y4o6m8Q4x3X3b7J5i4K6u0r3 (FIELD MANUAL NO 34-40-2. courses of cryptanalyse of the American army)

7f2K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4J5P5i4m8@1L8$3!0D9i4K6u0W2j5$3!0E0i4K6u0r3(Freeware of  help to decoding. allows also coding with many methods .)

cd5K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8A6M7$3q4H3M7r3g2S2M7X3W2F1k6#2)9J5k6r3W2F1j5#2)9J5k6h3y4G2L8g2)9J5c8R3`.`. (Encyclopedia on line of the cryptographic protocols)

079K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6W2j5X3S2G2L8h3g2Q4x3X3g2A6k6r3W2J5k6h3y4@1i4K6u0W2j5$3!0E0i4K6u0r3i4K6N6q4K9Y4m8J5L8$3y4Q4x3V1k6U0M7Y4W2H3N6r3!0Q4x3V1k6U0M7Y4W2H3N6r3!0Q4y4h3k6Z5K9i4y4@1i4K6u0W2K9s2c8E0L8l9`.`.(A summarized history of cryptology)

ba4K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3k6D9P5g2)9J5k6h3S2A6N6$3q4S2P5g2)9J5k6h3&6W2N6q4)9J5c8W2)9%4c8i4m8S2N6h3I4Q4x3V1k6U0M7Y4W2H3N6r3!0D9L8$3N6&6i4K6u0r3K9r3W2K6N6r3!0J5P5g2)9J5k6h3S2@1L8h3H3`. (A history of cryptology between 1470 and 1606, at the time of Shakespeare.)

f27K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4k6W2j5%4c8G2M7Y4y4A6N6r3g2Q4x3X3g2F1k6i4c8Q4x3V1k6@1N6r3y4G2k6r3g2Q4x3X3g2Z5N6r3#2D9 (Complete presentation of the cryptology from Antiquity to our days.)

9cdK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3N6F1N6g2)9J5k6h3!0J5k6#2)9J5c8Y4y4G2k6Y4c8%4j5i4u0W2i4K6u0r3j5$3I4S2M7%4y4H3j5i4c8Z5P5q4)9J5c8X3y4J5P5i4m8@1L8#2)9J5c8X3y4J5P5i4m8@1L8#2)9J5k6h3S2@1L8h3H3`. (Programs Java of cryptography in freeware.)

898K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3q4F1N6r3W2D9L8r3g2K6i4K6u0W2K9K6p5J5i4K6u0W2N6X3W2Q4x3X3g2#2M7#2)9J5c8X3#2S2N6r3S2Q4x3V1k6U0M7Y4W2H3N6r3!0@1N6i4c8Q4x3V1k6Z5L8$3#2W2i4K6u0W2K9s2c8E0 (A tutoriel of cryptography on the most known figures of traditional and modern cryptography.)

13dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8J5K9h3&6U0L8$3I4D9i4K6u0W2k6h3c8#2i4K6u0r3k6r3g2H3N6s2y4Q4x3V1k6U0M7s2y4U0i4K6u0r3j5%4u0&6M7s2c8G2k6%4u0S2M7r3S2&6i4K6u0r3K9h3&6V1k6i4S2Q4x3X3g2Z5N6r3#2D9 (With CryptoTool, a software of coding/decoding for Macintoch.)

bb8K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3A6B7N6r3y4Q4x3X3g2U0L8$3#2Q4x3V1k6e0N6r3g2Y4j5h3&6G2k6%4u0S2M7r3S2&6i4K6u0r3i4K6u0T1(The site of an author specialized in the steganography)

a42K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3S2G2L8h3g2Q4x3X3g2S2N6s2c8Q4x3X3g2F1k6i4c8Q4x3V1k6Q4y4@1g2@1L8r3g2S2M7Y4W2Q4x3V1k6U0M7Y4W2H3N6r3!0D9L8#2)9J5k6h3S2@1L8g2)9J5j5R3`.`.(Some algorithms of modern cryptology (RSA, MD5,…)

e7cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3S2G2L8h3g2Q4x3X3g2S2N6s2c8Q4x3X3g2F1k6i4c8Q4x3V1k6Q4y4@1g2@1L8r3g2S2M7Y4W2Q4x3V1k6U0M7Y4W2H3N6r3!0D9L8#2)9J5k6h3S2@1L8b7`.`. (A short overflight of the cryptology of the Elizabéthaine period.)

28bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4W2L8Y4c8J5j5h3I4Q4x3X3g2W2k6s2g2Q4x3V1k6Z5L8$3#2W2M7r3q4Y4k6i4y4Q4x3V1k6x3K9h3&6@1L8$3&6f1i4K6u0r3
classes/spring01/cryptography/cryptography.htm [url](A course online of cryptology with many programs java and Mathematica.)

[url]ff8K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2S2N6r3S2Q4x3X3g2#2j5%4y4V1i4K6u0W2k6h3c8#2i4K6u0r3i4K6N6q4j5%4u0&6M7s2c8G2i4K6u0r3 " target="_blank">39cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4W2L8Y4c8J5j5h3I4Q4x3X3g2W2k6s2g2Q4x3V1k6Z5L8$3#2W2M7r3q4Y4k6i4y4Q4x3V1k6x3K9h3&6@1L8$3&6f1i4K6u0r3
classes/spring01/cryptography/cryptography.htm [url](A course online of cryptology with many programs java and Mathematica.)

[url]4d4K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2S2N6r3S2Q4x3X3g2#2j5%4y4V1i4K6u0W2k6h3c8#2i4K6u0r3i4K6N6q4j5%4u0&6M7s2c8G2i4K6u0r3
(Useful applet java for the cryptanalyse of the figure of Vigenère and the figures monoalphabetic.)

5adK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3k6G2M7Y4c8#2L8X3g2U0K9i4c8&6i4K6u0W2j5$3!0E0i4K6u0r3M7$3E0&6M7$3y4J5j5i4m8W2M7W2)9J5c8X3y4G2k6r3W2F1k6#2)9J5c8U0x3%4z5g2)9J5c8X3I4W2M7%4y4G2L8U0q4Q4x3X3g2Z5N6r3@1`. (A course online of cryptology)

d6bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3y4K6M7X3y4Q4x3X3g2F1K9i4y4@1i4K6u0W2k6$3!0$3i4K6u0r3 (Site of the National Institute of Standards and Technology)

3d8K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3&6K6j5g2)9J5k6h3N6G2N6W2)9J5c8X3#2#2M7$3g2#2L8g2)9J5c8X3W2F1k6r3g2^5i4K6u0W2j5$3k6E0 (The museum of the “National Security Agency”)

c6bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4u0A6k6r3g2^5i4K6u0W2j5$3!0Q4x3X3g2#2K9#2)9J5c8X3y4J5P5i4m8@1L8$3I4G2k6%4W2Q4x3V1j5`. (An history very provided of cryptology)

effK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2W2L8h3u0W2M7Y4y4Q4x3X3g2S2L8$3I4Q4x3X3g2U0L8$3#2Q4x3V1k6B7M7r3g2K6j5$3S2W2L8q4)9J5c8X3S2A6M7%4c8G2M7X3W2U0j5h3I4Q4x3X3g2Z5N6r3#2Q4x3X3t1`.(Enigma and some tools of cryptanalyse)

755K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4D9i4K6u0W2j5$3q4E0i4K6u0W2j5h3y4Q4x3X3g2#2K9#2)9J5c8W2)9%4c8h3k6S2M7s2l9J5i4K6u0r3M7%4c8W2k6$3q4F1L8$3N6J5j5i4m8Z5P5g2)9J5c8X3S2A6M7%4c8G2M7Y4W2Q4x3X3g2Z5N6r3#2D9 (List old references)

72aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2W2L8h3u0W2M7Y4y4Q4x3X3g2S2L8$3&6Q4x3X3g2S2N6q4)9J5c8X3y4A6M7r3S2W2M7X3y4D9k6i4u0C8i4K6u0r3i4K6u0T1(A great quantity of applet java of coding)

9d2K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2S2N6r3S2Q4x3X3g2@1k6h3#2H3L8r3g2Q4x3X3g2W2k6s2g2Q4x3V1k6Q4y4@1g2J5k6h3&6S2N6h3I4@1i4K6u0r3j5%4u0&6M7s2c8G2L8r3!0Y4P5g2)9J5c8Y4y4&6L8r3I4S2j5Y4g2K6i4K6u0W2K9s2c8E0L8l9`.`. (Some algorithms illustrated by programs Javascript)

e6fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3y4G2k6r3g2T1M7X3g2S2K9$3g2J5i4K6u0W2k6r3W2V1M7#2)9J5k6h3y4G2L8g2)9J5c8X3W2F1k6r3g2^5i4K6u0W2K9s2c8E0 (Stories on the code secret, software  of cryptography. Site companion of the books that the author wrote.)

1adK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4A6M7r3S2W2M7Y4y4T1P5i4u0A6N6s2c8W2M7W2)9J5k6h3y4G2L8g2)9J5c8R3`.`. (Commercial site proposing many information on cryptography.)

95eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4G2k6r3g2K6j5h3&6V1j5$3W2H3K9r3g2J5M7#2)9J5k6h3!0J5k6#2)9J5k6i4g2C8i4K6u0r3 (History of the Enigma decoding  in Bletchley Park)

0c5K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3S2G2L8h3g2Q4x3X3g2W2j5$3&6Q4x3X3g2S2j5W2)9J5k6h3y4S2i4K6u0r3i4K6N6q4K9Y4y4S2N6X3q4J5k6q4)9J5c8X3y4J5P5i4m8@1L8#2)9J5c8X3A6K6j5%4u0&6M7s2c8Q4x3X3g2Z5N6r3@1`. (Very complete presentation of the figures from Antiquity to our days)

bcfK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3E0#2L8r3W2U0K9r3E0A6i4K6u0W2j5$3!0E0i4K6y4m8z5o6p5H3x3g2)9J5c8X3y4J5P5i4m8@1L8$3I4G2k6%4W2Q4x3V1j5`. (A small course of cryptology with much of interactive programs)

5f9K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4A6L8h3!0F1M7$3W2F1k6$3S2Q4x3X3g2F1k6i4c8Q4x3V1k6f1K9r3g2Q4y4h3k6n7L8r3q4U0K9#2)9#2k6V1y4Z5j5h3#2T1k6i4u0Q4x3V1k6Z5L8$3#2W2i4K6u0W2K9s2c8E0L8l9`.`. (Some figures in Javascript.)

4abK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4E0K9i4c8Z5M7%4u0A6M7$3y4S2i4K6u0W2k6r3g2E0L8$3&6Q4x3X3g2U0L8#2)9J5k6i4g2C8i4K6u0r3j5%4u0&6M7s2c8G2i4K6u0V1j5h3&6U0K9h3g2F1N6q4)9J5k6h3S2@1L8h3H3`. (History of the figures and the codes.)

6e5K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3u0D9N6h3g2S2L8X3N6W2L8q4)9J5k6h3c8W2L8h3!0F1i4K6u0W2j5$3!0Q4x3X3g2#2K9#2)9J5c8X3y4J5P5i4m8@1L8#2)9J5c8R3`.`. (Simulators of various machines of coding.)

eefK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3S2W2L8g2)9J5k6i4m8S2M7%4y4S2k6$3g2F1i4K6u0W2M7$3g2Q4x3V1k6@1j5h3^5H3x3g2)9J5c8R3`.`. (cryptography element , machines, files of the 2nd world war, cryptograms.)

50cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3g2K6j5i4c8Q4x3X3g2C8N6h3I4W2N6i4k6W2L8W2)9J5k6h3q4U0i4K6u0W2j5X3g2Q4x3V1k6U0L8%4y4A6j5#2)9J5c8X3W2F1N6s2u0G2i4K6u0r3 (Illustrated lexicon in an amusing way)

fa0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3k6J5L8$3c8W2i4K6u0W2K9r3!0E0k6g2)9J5k6h3y4W2M7X3&6Q4x3X3g2U0K9q4)9J5c8X3k6J5L8$3c8W2i4K6u0r3j5%4u0&6M7s2c8G2i4K6u0r3K9h3&6V1k6i4S2Q4x3X3g2Z5N6r3#2D9 (Historical articles, links, but especially of the simulators of machines of coding for PC (Enigma, Nema, etc))

9c2K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2S2N6r3S2Q4x3X3g2G2K9%4y4@1j5i4c8W2i4K6u0W2k6h3c8#2i4K6u0r3i4K6N6q4N6%4u0A6k6$3S2@1k6q4)9J5c8X3y4J5P5i4m8@1i4K6u0r3L8h3q4H3L8r3g2Q4x3V1j5`. (Programs on cryptology written in Maple)

[培训]科锐逆向工程师培训第53期2025年7月8日开班!

收藏
免费 0
支持
分享
最新回复 (14)
雪    币: 3686
活跃值: (1036)
能力值: (RANK:760 )
在线值:
发帖
回帖
粉丝
2
不错的一些links,辛苦,美化了一下,已经加进置顶的FAQ
2005-2-11 00:19
0
雪    币: 107475
活跃值: (202519)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
3
辛苦了...
2005-2-11 00:25
0
雪    币: 397
活跃值: (799)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
wsy
4
不好意思,我英文不好,不知道里面有没有中文的
2005-2-11 09:31
0
雪    币: 212
活跃值: (105)
能力值: ( LV6,RANK:90 )
在线值:
发帖
回帖
粉丝
5
哎,我也觉得可惜,没有中文的,我也是讨厌英文的垄断地位...
2005-2-11 15:15
0
雪    币: 397
活跃值: (799)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
wsy
6
支持国货。赫赫
2005-2-11 20:18
0
雪    币: 202
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
7
本人身在英国,学习计算机,对于密码学也很有兴趣,如果有人英语方面碰到了问题,不一定是关于密码学方面的,大家可以一起讨论,不行,我还可以问我们系的教授们嘛!当然也请高手们多多赐教!

本人最近正在研究Hashing方面的问题,如果大家友好的资源,请分享一下!!谢谢啦!!!
2005-3-12 05:35
0
雪    币: 261
活跃值: (230)
能力值: ( LV8,RANK:130 )
在线值:
发帖
回帖
粉丝
8
感谢楼主的辛勤劳动

只是链接比较难打开 需要多尝试几次
2005-3-12 21:47
0
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
9
还真的学英文呀,麻烦,为什么中文,不能是主流.
谢谢1楼顶
2005-3-18 08:51
0
雪    币: 100
活跃值: (15)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
zmh
10
装个金山词霸漫漫研究吧
2005-4-6 15:18
0
雪    币: 258
活跃值: (230)
能力值: ( LV12,RANK:770 )
在线值:
发帖
回帖
粉丝
11
支持,,支持,,,
2005-4-6 18:16
0
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
12
大家,我是一个新手,到 目前还是什么都不懂,
我对这一门很敢 兴趣请大家多多给我一些资料,
在未来的几天我的速度肯定能追过你们的,
2005-8-12 17:45
0
雪    币: 401
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
13
好东西。可是我一个也看不明白!555555555555
咋属鸡的!
2005-9-10 11:53
0
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
mjo
14
全是英文网站,我英语不好,但还是感谢
2005-10-21 13:31
0
雪    币: 295
活跃值: (461)
能力值: ( LV9,RANK:210 )
在线值:
发帖
回帖
粉丝
15
不错!爱好密码学的朋友们又眼福了
2005-10-23 14:56
0
游客
登录 | 注册 方可回帖
返回