IcingMoon

Two robots

Joined:

Rank: #24

Country: 

Website: https://blog.tanglee.top/

Level: 1
16655 0 8 7

0 points to level up

Trophy Case

gold-trophy gold-trophy gold-trophy gold-trophy gold-trophy gold-trophy gold-trophy gold-trophy gold-trophy gold-trophy gold-trophy gold-trophy gold-trophy

Submitted Solutions

An Evil Twisted Mind 4
Ticket Maestro 1
Checkpoint 0
A Twisted Mind 1
Oracular Spectacular 0
The Good, The Pad, The Ugly 0
Pad Thai 0
Bounded Noise 1

Solved Challenges

Isogenies A True Genus 175
CTF Archive Ticket Maestro (CryptoHack) 0
Elliptic Curves An Evil Twisted Mind 175
Elliptic Curves An Exceptional Twisted Mind 125
ZKPs Ticket Maestro 200
Isogenies Meet me in the Claw 120
Isogenies Dual Masters 90
Isogenies Abelian SIDH 90
Isogenies Better than Linear 85
Isogenies André Encoding 80
Isogenies What's My Kernel 70
Isogenies CSIDH Key Exchange 90
Isogenies Twisted CSIDH Isogenies 70
Isogenies Secret Exponents 60
Isogenies Prime Power Isogenies 50
Isogenies Special Isogenies 30
Isogenies Breaking SIDH 250
Isogenies SIDH Key Exchange 80
Isogenies Composite Isogenies 60
Isogenies Three Isogenies 35
Isogenies Two Isogenies 30
Isogenies DLOG on the Surface 40
Isogenies Montgomery Curves 30
Isogenies Image Point Arithmetic 30
Isogenies Where's the Supersingular Curve 25
Isogenies The j-invariant 20
Isogenies Introduction to Isogenies 10
CTF Archive Fischlin's Transformation (CryptoHack) 0
ZKPs Fischlin Transform 180
ZKPs Mister Saplins The Prover 125
ZKPs Let's Prove It Again 175
ZKPs Let's Prove It 120
ZKPs Couples 100
ZKPs Mister Saplin's Preview 80
Elliptic Curves Checkpoint 150
Elliptic Curves A Twisted Mind 80
Symmetric Ciphers Oracular Spectacular 150
Symmetric Ciphers The Good, The Pad, The Ugly 100
Symmetric Ciphers Pad Thai 80
ZKPs Hamiltonicity 2 175
CTF Archive Hamiltonicity 2 (CryptoHack) 0
ZKPs Hamiltonicity 1 100
CTF Archive Hamiltonicity (CryptoHack) 0
Lattices Bounded Noise 50
Hash Functions Merkle Trees 25
ZKPs Pairing-Based Cryptography 50
ZKPs OR Proof 75
CTF Archive OR Proof (CryptoHack) 0
ZKPs Too Honest 50
ZKPs Non-Interactive 35
ZKPs Honest Verifier Zero Knowledge 30
ZKPs Special Soundness 25
ZKPs Proofs of Knowledge 20
ZKPs ZKP Introduction 5
Hash Functions WOTS Up 2 90
Hash Functions WOTS Up 75
CTF Archive RRSSAA (ECSC 2023 (Norway)) 0
Hash Functions Invariant 250
Lattices Too Many Errors 100
Lattices Noise Cheap 90
Lattices Missing Modulus 80
Lattices Nativity 60
Symmetric Ciphers Beatboxer 150
Symmetric Ciphers Forbidden Fruit 150
Misc Bruce Schneier's Password: Part 2 250
Misc LFSR Destroyer 250
Lattices Noise Free 40
Lattices From Private to Public Key LWE 25
Symmetric Ciphers Paper Plane 120
Lattices LWE Low Bits Message 20
Lattices LWE High Bits Message 15
Misc Bruce Schneier's Password 100
Misc Toshi's Treasure 150
Misc Armory 100
Misc Bit by Bit 100
Misc Jeff's LFSR 150
Misc L-Win 120
Lattices LWE Intro 10
Lattices LWE Background 5
Misc Trust Games 150
Crypto on the Web Megalomaniac 3 120
Crypto on the Web Megalomaniac 2 120
Crypto on the Web Megalomaniac 1 100
Misc RSA vs RNG 150
Misc Nothing Up My Sleeve 150
Crypto on the Web Authenticated Handshake 40
Misc Lo-Hi Card Game 120
Misc No Leaks 100
Misc Gotta Go Fast 40
Crypto on the Web Decrypting TLS 1.3 35
Crypto on the Web Decrypting TLS 1.2 30
Crypto on the Web Saying Hello 20
Symmetric Ciphers Oh SNAP 120
Symmetric Ciphers Dancing Queen 120
Crypto on the Web TLS Handshake 15
RSA Let's Decrypt Again 175
Crypto on the Web Sharks on the Wire 10
Crypto on the Web Secure Protocols 5
Crypto on the Web RSA or HMAC? Part 2 100
Crypto on the Web JSON in JSON 40
Crypto on the Web RSA or HMAC? 35
Crypto on the Web JWT Secrets 25
Crypto on the Web No Way JOSE 20
Crypto on the Web JWT Sessions 10
Crypto on the Web Token Appreciation 5
Hash Functions Mixed Up 120
Hash Functions MDFlag 125
Hash Functions MD0 80
Hash Functions No Difference 175
Hash Functions Twin Keys 100
Hash Functions PriMeD5 100
Hash Functions Hash Stuffing 50
Hash Functions Collider 50
Hash Functions Jack's Birthday Confusion 30
Hash Functions Jack's Birthday Hash 20
Diffie-Hellman The Matrix Revolutions 125
Diffie-Hellman The Matrix Reloaded 100
Diffie-Hellman The Matrix 75
Diffie-Hellman Script Kiddie 70
Diffie-Hellman Static Client 2 120
Diffie-Hellman Additive 70
Diffie-Hellman Static Client 100
Diffie-Hellman Export-grade 100
Diffie-Hellman Parameter Injection 60
Diffie-Hellman Deriving Symmetric Keys 40
Diffie-Hellman Computing Shared Secrets 30
Diffie-Hellman Computing Public Values 25
Diffie-Hellman Generators of Groups 20
Diffie-Hellman Working with Fields 10
Elliptic Curves Double and Broken 50
Elliptic Curves Montgomery's Ladder 40
Elliptic Curves Edwards Goes Degenerate 100
Elliptic Curves No Random, No Bias 120
Elliptic Curves ProSign 3 100
Elliptic Curves Curveball 100
Elliptic Curves Digestive 60
Elliptic Curves Real Curve Crypto 200
Elliptic Curves Moving Problems 150
Elliptic Curves Elliptic Nodes 150
Elliptic Curves Micro Transmissions 120
Elliptic Curves Exceptional Curves 100
Elliptic Curves Smooth Criminal 60
Elliptic Curves Efficient Exchange 50
Elliptic Curves Curves and Logs 40
Elliptic Curves Scalar Multiplication 35
Mathematics No Way Back Home 100
Mathematics Roll your Own 125
Elliptic Curves Point Addition 30
Elliptic Curves Point Negation 10
Elliptic Curves Background Reading 5
RSA Vote for Pedro 150
RSA Blinding Light 120
RSA Let's Decrypt 80
RSA Signing Server 60
RSA Null or Never 100
RSA Bespoke Padding 100
RSA RSA Backdoor Viability 175
RSA Ron was Wrong, Whit is Right 90
RSA Fast Primes 75
RSA Marin's Secrets 50
RSA Infinite Descent 50
RSA Endless Emails 150
RSA Everything is Still Big 100
RSA Crossed Wires 100
RSA Everything is Big 70
RSA Modulus Inutilis 50
RSA Salty 20
RSA Manyprime 40
RSA Square Eyes 35
RSA Monoprime 30
RSA Inferius Prime 30
RSA Factoring 15
RSA RSA Signatures 25
RSA RSA Decryption 20
RSA Private Keys 20
RSA Euler's Totient 20
RSA Public Keys 15
RSA Modular Exponentiation 10
Symmetric Ciphers Stream of Consciousness 80
Symmetric Ciphers Logon Zero 80
Symmetric Ciphers CTRIME 70
Symmetric Ciphers Bean Counter 60
Symmetric Ciphers Symmetry 50
Symmetric Ciphers Triple DES 60
Symmetric Ciphers Lazy CBC 60
Symmetric Ciphers Flipping Cookie 60
Symmetric Ciphers ECB Oracle 60
Symmetric Ciphers ECB CBC WTF 55
Symmetric Ciphers Bringing It All Together 50
Symmetric Ciphers Diffusion through Permutation 30
Symmetric Ciphers Passwords as Keys 50
Symmetric Ciphers Modes of Operation Starter 15
Symmetric Ciphers Confusion through Substitution 25
Symmetric Ciphers Round Keys 20
Symmetric Ciphers Structure of AES 15
Symmetric Ciphers Resisting Bruteforce 10
Symmetric Ciphers Keyed Permutations 5
Mathematics Prime and Prejudice 200
Mathematics Modular Binomials 80
Mathematics Adrien's Signs 80
Mathematics Successive Powers 60
Lattices Backpack Cryptography 120
Lattices Find the Lattice 100
Lattices Gaussian Reduction 50
Lattices What's a Lattice? 40
Lattices Gram Schmidt 30
Lattices Size and Basis 15
Lattices Vectors 10
Mathematics Chinese Remainder Theorem 40
Mathematics Modular Square Root 35
Mathematics Legendre Symbol 35
Mathematics Quadratic Residues 25
Mathematics Real Eisenstein 150
Mathematics Cofactor Cofantasy 150
Mathematics Unencryptable 125
Mathematics Ellipse Curve Cryptography 125
Mathematics Broken RSA 100
General Transparency 50
General SSH Keys 35
General CERTainly not 30
General Privacy-Enhanced Mail? 25
General Modular Inverting 25
General Modular Arithmetic 2 20
General Modular Arithmetic 1 20
General Extended GCD 20
General Greatest Common Divisor 15
General Lemur XOR 40
General You either know, XOR you don't 30
General Favourite byte 20
General XOR Properties 15
General XOR Starter 10
General Encoding Challenge 40
General Bytes and Big Integers 10
General Base64 10
General Hex 5
General ASCII 5
Introduction Network Attacks 5
Introduction Great Snakes 3
Introduction Finding Flags 2

Level Up

level up icon

You are now level Current level