| Isogenies | Abelian SIDH | 90 | |
| Isogenies | Introduction to Isogenies | 10 | |
| Isogenies | Meet me in the Claw | 120 | |
| Isogenies | Dual Masters | 90 | |
| Lattices | Noise Cheap | 90 | |
| ZKPs | Special Soundness | 25 | |
| Isogenies | André Encoding | 80 | |
| Isogenies | Better than Linear | 85 | |
| Isogenies | What's My Kernel | 70 | |
| Isogenies | CSIDH Key Exchange | 90 | |
| Isogenies | Twisted CSIDH Isogenies | 70 | |
| Isogenies | Secret Exponents | 60 | |
| Isogenies | Prime Power Isogenies | 50 | |
| Isogenies | Breaking SIDH | 250 | |
| Isogenies | Special Isogenies | 30 | |
| Isogenies | SIDH Key Exchange | 80 | |
| Isogenies | Composite Isogenies | 60 | |
| Isogenies | Three Isogenies | 35 | |
| Isogenies | Two Isogenies | 30 | |
| Isogenies | DLOG on the Surface | 40 | |
| Isogenies | Montgomery Curves | 30 | |
| Isogenies | Where's the Supersingular Curve | 25 | |
| Elliptic Curves | Moving Problems | 150 | |
| Isogenies | The j-invariant | 20 | |
| Elliptic Curves | An Evil Twisted Mind | 175 | |
| Elliptic Curves | No Random, No Bias | 120 | |
| Elliptic Curves | Real Curve Crypto | 200 | |
| Elliptic Curves | A Twisted Mind | 80 | |
| Lattices | Noise Free | 40 | |
| CTF Archive | Tough decisions (ECSC 2023 (Norway)) | 0 | |
| Hash Functions | WOTS Up | 75 | |
| Misc | Toshi's Treasure | 150 | |
| Misc | Armory | 100 | |
| Elliptic Curves | Exceptional Curves | 100 | |
| Elliptic Curves | Curves and Logs | 40 | |
| Elliptic Curves | Scalar Multiplication | 35 | |
| Elliptic Curves | Point Addition | 30 | |
| Elliptic Curves | Curveball | 100 | |
| Elliptic Curves | Smooth Criminal | 60 | |
| Elliptic Curves | Point Negation | 10 | |
| Elliptic Curves | Background Reading | 5 | |
| Diffie-Hellman | Parameter Injection | 60 | |
| Diffie-Hellman | Deriving Symmetric Keys | 40 | |
| Diffie-Hellman | Computing Shared Secrets | 30 | |
| Diffie-Hellman | Computing Public Values | 25 | |
| Diffie-Hellman | Generators of Groups | 20 | |
| Diffie-Hellman | Working with Fields | 10 | |
| RSA | Modulus Inutilis | 50 | |
| RSA | Salty | 20 | |
| RSA | Manyprime | 40 | |
| RSA | Monoprime | 30 | |
| RSA | Factoring | 15 | |
| RSA | Euler's Totient | 20 | |
| RSA | Public Keys | 15 | |
| RSA | Modular Exponentiation | 10 | |
| Symmetric Ciphers | Flipping Cookie | 60 | |
| Symmetric Ciphers | ECB CBC WTF | 55 | |
| Symmetric Ciphers | ECB Oracle | 60 | |
| Symmetric Ciphers | Modes of Operation Starter | 15 | |
| Symmetric Ciphers | Bringing It All Together | 50 | |
| Symmetric Ciphers | Diffusion through Permutation | 30 | |
| Symmetric Ciphers | Confusion through Substitution | 25 | |
| Symmetric Ciphers | Round Keys | 20 | |
| Symmetric Ciphers | Structure of AES | 15 | |
| Symmetric Ciphers | Resisting Bruteforce | 10 | |
| Symmetric Ciphers | Keyed Permutations | 5 | |
| Mathematics | Adrien's Signs | 80 | |
| General | Modular Inverting | 25 | |
| General | Modular Arithmetic 2 | 20 | |
| General | Modular Arithmetic 1 | 20 |
You are now level Current level