Mahalakshmi

Two robots

Joined:

Rank: #2967

Level: 1
2080 0 0 0

0 points to level up

Trophy Case

gold-trophy silver-trophy silver-trophy bronze-trophy bronze-trophy bronze-trophy empty-trophy empty-trophy bronze-trophy silver-trophy empty-trophy empty-trophy empty-trophy

Solved Challenges

CTF Archive Unevaluated (TETCTF) 0
CTF Archive import numpy as MT (Zh3r0 CTF V2) 0
CTF Archive Twist and Shout (Zh3r0 CTF V2) 0
CTF Archive Tough decisions (ECSC 2023 (Norway)) 0
CTF Archive Hide and seek (ECSC 2023 (Norway)) 0
CTF Archive Blind (ECSC 2023 (Norway)) 0
CTF Archive Twist and shout (ECSC 2023 (Norway)) 0
Lattices From Private to Public Key LWE 25
Crypto on the Web Secure Protocols 5
RSA Square Eyes 35
RSA RSA Signatures 25
Lattices LWE Low Bits Message 20
Lattices LWE High Bits Message 15
Symmetric Ciphers ECB CBC WTF 55
Mathematics Successive Powers 60
Mathematics Modular Binomials 80
RSA Modulus Inutilis 50
RSA Salty 20
Isogenies Image Point Arithmetic 30
Isogenies Introduction to Isogenies 10
ZKPs ZKP Introduction 5
Lattices LWE Intro 10
Lattices LWE Background 5
Lattices Gaussian Reduction 50
Lattices What's a Lattice? 40
Lattices Gram Schmidt 30
Lattices Size and Basis 15
Lattices Vectors 10
Crypto on the Web JWT Secrets 25
Crypto on the Web No Way JOSE 20
Crypto on the Web JWT Sessions 10
Crypto on the Web Token Appreciation 5
Symmetric Ciphers Stream of Consciousness 80
Symmetric Ciphers CTRIME 70
Symmetric Ciphers Lazy CBC 60
Symmetric Ciphers Triple DES 60
General Encoding Challenge 40
Introduction Network Attacks 5
Elliptic Curves Curves and Logs 40
Elliptic Curves Scalar Multiplication 35
Elliptic Curves Point Negation 10
Elliptic Curves Background Reading 5
Diffie-Hellman Computing Shared Secrets 30
Diffie-Hellman Computing Public Values 25
Diffie-Hellman Generators of Groups 20
Diffie-Hellman Working with Fields 10
RSA Manyprime 40
RSA Monoprime 30
RSA Factoring 15
RSA RSA Decryption 20
RSA Private Keys 20
RSA Euler's Totient 20
RSA Public Keys 15
RSA Modular Exponentiation 10
Mathematics Adrien's Signs 80
Mathematics Chinese Remainder Theorem 40
Mathematics Legendre Symbol 35
Mathematics Modular Square Root 35
Symmetric Ciphers Flipping Cookie 60
Symmetric Ciphers ECB Oracle 60
Symmetric Ciphers Passwords as Keys 50
Symmetric Ciphers Modes of Operation Starter 15
Symmetric Ciphers Bringing It All Together 50
Symmetric Ciphers Diffusion through Permutation 30
Symmetric Ciphers Confusion through Substitution 25
Symmetric Ciphers Structure of AES 15
Symmetric Ciphers Round Keys 20
Symmetric Ciphers Resisting Bruteforce 10
Symmetric Ciphers Keyed Permutations 5
Mathematics Quadratic Residues 25
General Modular Inverting 25
General Modular Arithmetic 2 20
General Modular Arithmetic 1 20
General Extended GCD 20
General Greatest Common Divisor 15
General You either know, XOR you don't 30
General Favourite byte 20
General XOR Properties 15
General XOR Starter 10
General Bytes and Big Integers 10
General Base64 10
General Hex 5
General ASCII 5
Introduction Great Snakes 3
Introduction Finding Flags 2

Level Up

level up icon

You are now level Current level