>>13
Here is one from the archived blog posts. there 7 of which 3 are notable.
Crypteria4.c Cipher
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#define ull unsigned long long
#define ll long long int
#define ui unsigned int
#define lu unsigned long
#define li long int
#define ch char
#define uc unsigned char
#define chp char*
#define ucp unsigned char*
#define stdargs int argc,char **argv
//==DEBUG
#define thisline ;printf("%d,",__LINE__); //debug scan,print number of last executed line
//==ASM
#define rdt(timer) ;asm volatile("rdtsc\n\t":"=A"(timer));
// unsigned long long timer
//==Bitutil//byte rotate left/right
#define brol(value,shift) ((value << shift) | (value >> (8 - shift)))
#define getbit(byte,place) (byte&(1<<place))
#define delbit(byte,place) (byte&(0xFF^(1<<place)))//get 2chunks of byte
#define byte04(bt) bt&0xc0 //chunk[11000000]
#define byte14(bt) bt&0x30 //chunk[00110000]
#define byte24(bt) bt&0xc //chunk[00001100]
#define byte34(bt) bt&0x3 //chunk[00000011]
//erase 2chunks of byte
#define byte40(bt) bt&0x3f //chunk[00111111]
#define byte41(bt) bt&0xcf //chunk[11001111]
#define byte42(bt) bt&0xf3 //chunk[11110011]
#define byte43(bt) bt&0xfc //chunk[11111100]
//get 1bit from byte#define gbit0(bt) bt&0x80
#define gbit1(bt) bt&0x40
#define gbit2(bt) bt&0x20
#define gbit3(bt) bt&0x10
#define gbit4(bt) bt&0x8
#define gbit5(bt) bt&0x4
#define gbit6(bt) bt&0x2
#define gbit7(bt) bt&0x1
//erase 1 bit from byte
#define cbit0(bt) bt&0x7f
#define cbit1(bt) bt&0xbf
#define cbit2(bt) bt&0xdf
#define cbit3(bt) bt&0xef
#define cbit4(bt) bt&0xf7
#define cbit5(bt) bt&0xfb
#define cbit6(bt) bt&0xfd
#define cbit7(bt) bt&0xfe
//==File IO
#define fseekend(file) ;fseek(file,0,SEEK_END);
#define fseekstart(file) ;fseek(file,0,SEEK_SET);
#define rfp(pointer,filename) ;FILE* pointer=fopen(filename,"rb");
#define srfp(pointer2,file) ;FILE* pointer2=fopen(file,"rb");if(!pointer2){printf("%s",file);perror("<=srfp:");exit(1);};
#define wfp(pointer,filename) ;FILE* pointer=fopen(filename,"wb");
#define swfp(pointer2,file) ;FILE* pointer2=fopen(file,"wb");if(!pointer2){printf("%s",file);perror("<=swfp:");exit(1);};
#define fsize(name,rsize) ;srfp(temp_1,name);fseekend(temp_1);rsize=ftell(temp_1);fclose(temp_1);
#define rdf(pointer3,name,rsize) ;srfp(temp_2,name);fseekend(temp_2);li rsize=ftell(temp_2);rewind(temp_2);uc* pointer3=malloc(rsize);fread(pointer3,1,rsize,temp_2);fclose(temp_2);
#define wrf(pointer,name,size) ;swfp(temp_3,name);fwrite(pointer,1,size,temp_3);fclose(temp_3);
#define FILESIZEMULT 31 //howmuch bytes max+8 is added to each input byte(defines enc format)
#define SYNTAX ;printf("Syntax : %s inputfile password [-decode]\n .ecf files are encrypted, .src files are decrypted",argv[0]);
inline uc rndbyte(void){ull tmp;rdt(tmp);uc a,c,b,d;a=tmp&0xFF;d=a%5;if(d<3){d++;}rdt(tmp);b=tmp&0xFF;d=(d*(b%5))^a;if(d>10){d-=10;};rdt(tmp);c=tmp&0xFF;if(d%2){return a^b^c;}else{return b^c^a;}}
void main(stdargs){if(argc<3){SYNTAX;return;}rdf(input,argv[1],inpsize);int pwlen=strlen(argv[2]);uc pwshift=(pwlen%8)+1;chp outputname=malloc(512);sprintf(outputname,"%s%s",argv[1],argv[3]?".src":".ecf");printf("%s '%s' to '%s'",argv[3]?"Decoding":"Encoding",argv[1],outputname);swfp(output,outputname);li loop=0;uc curgap;li gapbyte=0;uc bitarr[8];uc curgaph,bytec0,bytec1,bytec2,bytec3,bytec4,bytec5,bytec6,bytec7,s1,s2;uc endbyte=0;if(!argv[3]){for(loop=0;loop<inpsize;loop++){curgap=argv[2][loop%pwlen];curgaph=(brol(curgap,pwshift))%FILESIZEMULT ;for(gapbyte=0;gapbyte<(curgaph);gapbyte++){fputc(rndbyte(),output);};//rotate back bitarr[x] =8-rotates2=((pwshift+0)^curgap)%8;s1=(brol(curgap,s2))%8;bytec0=((gbit0(input[loop]))|(cbit0(rndbyte())))^(brol(curgap,s1));fputc(brol(bytec0,(8-s1)),output);s2=((pwshift+1)^curgap)%8;s1=(brol(curgap,s2))%8;bytec1=((gbit1(input[loop]))|(cbit1(rndbyte())))^(brol(curgap,s1));fputc(brol(bytec1,(8-s1)),output);s2=((pwshift+2)^curgap)%8;s1=(brol(curgap,s2))%8;bytec2=((gbit2(input[loop]))|(cbit2(rndbyte())))^(brol(curgap,s1));fputc(brol(bytec2,(8-s1)),output);s2=((pwshift+3)^curgap)%8;s1=(brol(curgap,s2))%8;bytec3=((gbit3(input[loop]))|(cbit3(rndbyte())))^(brol(curgap,s1));fputc(brol(bytec3,(8-s1)),output);s2=((pwshift+4)^curgap)%8;s1=(brol(curgap,s2))%8;bytec4=((gbit4(input[loop]))|(cbit4(rndbyte())))^(brol(curgap,s1));fputc(brol(bytec4,(8-s1)),output);s2=((pwshift+5)^curgap)%8;s1=(brol(curgap,s2))%8;bytec5=((gbit5(input[loop]))|(cbit5(rndbyte())))^(brol(curgap,s1));fputc(brol(bytec5,(8-s1)),output);s2=((pwshift+6)^curgap)%8;s1=(brol(curgap,s2))%8;bytec6=((gbit6(input[loop]))|(cbit6(rndbyte())))^(brol(curgap,s1));fputc(brol(bytec6,(8-s1)),output);s2=((pwshift+7)^curgap)%8;s1=(brol(curgap,s2))%8;bytec7=((gbit7(input[loop]))|(cbit7(rndbyte())))^(brol(curgap,s1));fputc(brol(bytec7,(8-s1)),output);}}else{while(1){if(gapbyte==pwlen){gapbyte=0;};curgap=argv[2][gapbyte++];loop+=((brol(curgap,pwshift))%FILESIZEMULT);if(loop>inpsize){break;};endbyte=0;s2=((pwshift+0)^curgap)%8;bitarr[0]=input[loop++];s1=(brol(curgap,s2))%8;bytec0=gbit0((brol(bitarr[0],s1)^brol(curgap,s1)));s2=((pwshift+1)^curgap)%8;bitarr[1]=input[loop++];s1=(brol(curgap,s2))%8;bytec1=gbit1((brol(bitarr[1],s1)^brol(curgap,s1)));s2=((pwshift+2)^curgap)%8;bitarr[2]=input[loop++];s1=(brol(curgap,s2))%8;bytec2=gbit2((brol(bitarr[2],s1)^brol(curgap,s1)));s2=((pwshift+3)^curgap)%8;bitarr[3]=input[loop++];s1=(brol(curgap,s2))%8;bytec3=gbit3((brol(bitarr[3],s1)^brol(curgap,s1)));s2=((pwshift+4)^curgap)%8;bitarr[4]=input[loop++];s1=(brol(curgap,s2))%8;bytec4=gbit4((brol(bitarr[4],s1)^brol(curgap,s1)));s2=((pwshift+5)^curgap)%8;bitarr[5]=input[loop++];s1=(brol(curgap,s2))%8;bytec5=gbit5((brol(bitarr[5],s1)^brol(curgap,s1)));s2=((pwshift+6)^curgap)%8;bitarr[6]=input[loop++];s1=(brol(curgap,s2))%8;bytec6=gbit6((brol(bitarr[6],s1)^brol(curgap,s1)));s2=((pwshift+7)^curgap)%8;bitarr[7]=input[loop++];s1=(brol(curgap,s2))%8;bytec7=gbit7((brol(bitarr[7],s1)^brol(curgap,s1)));endbyte|=bytec0;endbyte|=bytec1;endbyte|=bytec2;endbyte|=bytec3;endbyte|=bytec4;endbyte|=bytec5;endbyte|=bytec6;endbyte|=bytec7;fputc(endbyte,output);}}}