Level: 1
7115
0
102
2
0 points to level up
Three Isogenies | 0 | ||
Two Isogenies | 0 | ||
Montgomery Curves | 0 | ||
Image Point Arithmetic | 0 | ||
Where's the Supersingular Curve | 0 | ||
The j-invariant | 0 | ||
Gaussian Reduction | 0 | ||
What's a Lattice? | 0 | ||
Gram Schmidt | 0 | ||
MD0 | 0 | ||
Collider | 0 | ||
Bit by Bit | 0 | ||
Armory | 0 | ||
Ellipse Curve Cryptography | 0 | ||
Real Eisenstein | 0 | ||
Cofactor Cofantasy | 0 | ||
Unencryptable | 0 | ||
Roll your Own | 0 | ||
No Way Back Home | 0 | ||
Let's Decrypt Again | 0 | ||
Digestive | 0 | ||
Exceptional Curves | 0 | ||
Elliptic Nodes | 0 | ||
Vote for Pedro | 0 | ||
Blinding Light | 0 | ||
Let's Decrypt | 0 | ||
Null or Never | 0 | ||
Bespoke Padding | 0 | ||
RSA Backdoor Viability | 0 | ||
Static Client 2 | 0 | ||
Additive | 0 | ||
Static Client | 0 | ||
Export-grade | 0 | ||
Deriving Symmetric Keys | 0 | ||
Parameter Injection | 0 | ||
Dancing Queen | 0 | ||
Ron was Wrong, Whit is Right | 0 | ||
Endless Emails | 0 | ||
Everything is Big | 0 | ||
Everything is Still Big | 0 | ||
Modulus Inutilis | 0 | ||
Salty | 0 | ||
Bean Counter | 0 | ||
Symmetry | 0 | ||
Modular Binomials | 0 | ||
Adrien's Signs | 0 | ||
Signing Server | 0 | ||
Fast Primes | 0 | ||
Marin's Secrets | 0 | ||
Infinite Descent | 0 | ||
Crossed Wires | 0 | ||
Broken RSA | 0 | ||
Successive Powers | 0 | ||
Triple DES | 0 | ||
Lazy CBC | 0 | ||
Flipping Cookie | 0 | ||
ECB Oracle | 0 | ||
ECB CBC WTF | 0 | ||
Passwords as Keys | 0 | ||
Modes of Operation Starter | 0 | ||
JWT Secrets | 0 | ||
No Way JOSE | 0 | ||
Efficient Exchange | 0 | ||
Curves and Logs | 0 | ||
Scalar Multiplication | 0 | ||
Point Addition | 0 | ||
Manyprime | 0 | ||
Square Eyes | 0 | ||
Monoprime | 0 | ||
Inferius Prime | 0 | ||
Factoring | 0 | ||
RSA Signatures | 0 | ||
RSA Decryption | 0 | ||
Private Keys | 0 | ||
Euler's Totient | 0 | ||
Public Keys | 0 | ||
Bringing It All Together | 0 | ||
Chinese Remainder Theorem | 0 | ||
Modular Square Root | 0 | ||
Legendre Symbol | 0 | ||
Computing Shared Secrets | 0 | ||
Computing Public Values | 0 | ||
Generators of Groups | 0 | ||
Quadratic Residues | 0 | ||
Diffusion through Permutation | 0 | ||
Confusion through Substitution | 1 | ||
Round Keys | 0 | ||
Structure of AES | 0 | ||
SSH Keys | 0 | ||
Jack's Birthday Hash | 1 | ||
Lemur XOR | 0 | ||
CERTainly not | 0 | ||
Privacy-Enhanced Mail? | 0 | ||
Modular Inverting | 0 | ||
Modular Arithmetic 2 | 0 | ||
Modular Arithmetic 1 | 0 | ||
Extended GCD | 0 | ||
Greatest Common Divisor | 0 | ||
Encoding Challenge | 0 | ||
You either know, XOR you don't | 0 | ||
Favourite byte | 0 | ||
XOR Properties | 0 |
Symmetric Ciphers | Forbidden Fruit | 150 | |
Isogenies | Three Isogenies | 35 | |
Isogenies | Two Isogenies | 30 | |
Isogenies | Montgomery Curves | 30 | |
Isogenies | Image Point Arithmetic | 30 | |
Isogenies | Where's the Supersingular Curve | 25 | |
Isogenies | The j-invariant | 20 | |
Lattices | LWE Intro | 10 | |
Lattices | LWE Background | 5 | |
Lattices | Gaussian Reduction | 50 | |
Lattices | What's a Lattice? | 40 | |
Lattices | Gram Schmidt | 30 | |
Lattices | Size and Basis | 15 | |
Lattices | Vectors | 10 | |
CTF Archive | Twist and shout (ECSC 2023 (Norway)) | 0 | |
Hash Functions | MD0 | 80 | |
Crypto on the Web | JSON in JSON | 40 | |
Hash Functions | Collider | 50 | |
Misc | Gotta Go Fast | 40 | |
Misc | Bit by Bit | 100 | |
Misc | Armory | 100 | |
Diffie-Hellman | Script Kiddie | 70 | |
Symmetric Ciphers | Pad Thai | 80 | |
Mathematics | Ellipse Curve Cryptography | 125 | |
Mathematics | Real Eisenstein | 150 | |
Mathematics | Cofactor Cofantasy | 150 | |
Mathematics | Unencryptable | 125 | |
Mathematics | Roll your Own | 125 | |
Mathematics | No Way Back Home | 100 | |
RSA | Let's Decrypt Again | 175 | |
Elliptic Curves | Curveball | 100 | |
Elliptic Curves | Digestive | 60 | |
Elliptic Curves | Elliptic Nodes | 150 | |
Elliptic Curves | Smooth Criminal | 60 | |
Elliptic Curves | Exceptional Curves | 100 | |
Symmetric Ciphers | Paper Plane | 120 | |
RSA | Vote for Pedro | 150 | |
RSA | Blinding Light | 120 | |
RSA | Let's Decrypt | 80 | |
RSA | Null or Never | 100 | |
RSA | Bespoke Padding | 100 | |
RSA | RSA Backdoor Viability | 175 | |
Diffie-Hellman | Static Client 2 | 120 | |
Diffie-Hellman | Additive | 70 | |
Diffie-Hellman | Static Client | 100 | |
Diffie-Hellman | Export-grade | 100 | |
Diffie-Hellman | Deriving Symmetric Keys | 40 | |
Diffie-Hellman | Parameter Injection | 60 | |
Symmetric Ciphers | Dancing Queen | 120 | |
ZKPs | ZKP Introduction | 5 | |
RSA | Ron was Wrong, Whit is Right | 90 | |
RSA | Endless Emails | 150 | |
RSA | Everything is Big | 70 | |
RSA | Everything is Still Big | 100 | |
RSA | Modulus Inutilis | 50 | |
RSA | Salty | 20 | |
Symmetric Ciphers | Logon Zero | 80 | |
Symmetric Ciphers | Stream of Consciousness | 80 | |
Symmetric Ciphers | CTRIME | 70 | |
Symmetric Ciphers | Bean Counter | 60 | |
Symmetric Ciphers | Symmetry | 50 | |
Mathematics | Modular Binomials | 80 | |
Mathematics | Adrien's Signs | 80 | |
RSA | Signing Server | 60 | |
RSA | Fast Primes | 75 | |
RSA | Marin's Secrets | 50 | |
RSA | Infinite Descent | 50 | |
RSA | Crossed Wires | 100 | |
Mathematics | Broken RSA | 100 | |
Mathematics | Successive Powers | 60 | |
Symmetric Ciphers | Triple DES | 60 | |
Symmetric Ciphers | Lazy CBC | 60 | |
Symmetric Ciphers | Flipping Cookie | 60 | |
Symmetric Ciphers | ECB Oracle | 60 | |
Symmetric Ciphers | ECB CBC WTF | 55 | |
Symmetric Ciphers | Passwords as Keys | 50 | |
Symmetric Ciphers | Modes of Operation Starter | 15 | |
Crypto on the Web | JWT Secrets | 25 | |
Crypto on the Web | No Way JOSE | 20 | |
Elliptic Curves | Efficient Exchange | 50 | |
Elliptic Curves | Curves and Logs | 40 | |
Elliptic Curves | Scalar Multiplication | 35 | |
Elliptic Curves | Point Addition | 30 | |
Elliptic Curves | Point Negation | 10 | |
Elliptic Curves | Background Reading | 5 | |
RSA | Manyprime | 40 | |
RSA | Square Eyes | 35 | |
RSA | Monoprime | 30 | |
RSA | Inferius Prime | 30 | |
RSA | Factoring | 15 | |
Crypto on the Web | JWT Sessions | 10 | |
Crypto on the Web | Token Appreciation | 5 | |
RSA | RSA Signatures | 25 | |
RSA | RSA Decryption | 20 | |
RSA | Private Keys | 20 | |
RSA | Euler's Totient | 20 | |
RSA | Public Keys | 15 | |
Symmetric Ciphers | Bringing It All Together | 50 | |
Mathematics | Chinese Remainder Theorem | 40 | |
Mathematics | Modular Square Root | 35 | |
Mathematics | Legendre Symbol | 35 | |
Isogenies | Introduction to Isogenies | 10 | |
Diffie-Hellman | Computing Shared Secrets | 30 | |
Diffie-Hellman | Computing Public Values | 25 | |
Diffie-Hellman | Generators of Groups | 20 | |
Diffie-Hellman | Working with Fields | 10 | |
RSA | Modular Exponentiation | 10 | |
Mathematics | Quadratic Residues | 25 | |
Symmetric Ciphers | Diffusion through Permutation | 30 | |
Symmetric Ciphers | Confusion through Substitution | 25 | |
Symmetric Ciphers | Round Keys | 20 | |
Symmetric Ciphers | Structure of AES | 15 | |
Symmetric Ciphers | Resisting Bruteforce | 10 | |
Symmetric Ciphers | Keyed Permutations | 5 | |
General | Transparency | 50 | |
General | SSH Keys | 35 | |
Hash Functions | Jack's Birthday Hash | 20 | |
General | Lemur XOR | 40 | |
General | CERTainly not | 30 | |
General | Privacy-Enhanced Mail? | 25 | |
General | Modular Inverting | 25 | |
General | Modular Arithmetic 2 | 20 | |
General | Modular Arithmetic 1 | 20 | |
General | Extended GCD | 20 | |
General | Greatest Common Divisor | 15 | |
General | You either know, XOR you don't | 30 | |
General | Encoding Challenge | 40 | |
General | Favourite byte | 20 | |
Hash Functions | Jack's Birthday Confusion | 30 | |
General | XOR Properties | 15 | |
General | XOR Starter | 10 | |
General | Bytes and Big Integers | 10 | |
General | Base64 | 10 | |
General | Hex | 5 | |
General | ASCII | 5 | |
Introduction | Network Attacks | 5 | |
Introduction | Great Snakes | 3 | |
Introduction | Finding Flags | 2 |
You are now level Current level