18 Feb 22 | Symmetric Ciphers | Symmetry | 50 |
18 Feb 22 | Symmetric Ciphers | ECB CBC WTF | 55 |
18 Feb 22 | Symmetric Ciphers | ECB Oracle | 60 |
8 Aug 21 | Crypto on the Web | JWT Secrets | 25 |
8 Aug 21 | Crypto on the Web | No Way JOSE | 20 |
8 Aug 21 | Crypto on the Web | JWT Sessions | 10 |
8 Aug 21 | Crypto on the Web | Token Appreciation | 5 |
8 Aug 21 | Hash Functions | Jack's Birthday Confusion | 30 |
8 Aug 21 | Hash Functions | Jack's Birthday Hash | 20 |
10 Aug 20 | RSA | Inferius Prime | 30 |
10 Aug 20 | Elliptic Curves | Efficient Exchange | 50 |
9 Aug 20 | Elliptic Curves | Curves and Logs | 40 |
9 Aug 20 | Elliptic Curves | Scalar Multiplication | 35 |
9 Aug 20 | Elliptic Curves | Point Addition | 30 |
9 Aug 20 | Elliptic Curves | Point Negation | 10 |
9 Aug 20 | Elliptic Curves | Background Reading | 5 |
8 Aug 20 | General | Encoding Challenge | 40 |
8 Aug 20 | General | Base64 | 10 |
8 Aug 20 | Diffie-Hellman | Deriving Symmetric Keys | 40 |
8 Aug 20 | Diffie-Hellman | Computing Shared Secrets | 30 |
8 Aug 20 | Diffie-Hellman | Computing Public Values | 25 |
8 Aug 20 | Diffie-Hellman | Generators of Groups | 20 |
8 Aug 20 | Diffie-Hellman | Working with Fields | 10 |
7 Aug 20 | RSA | Modulus Inutilis | 50 |
7 Aug 20 | RSA | Salty | 20 |
6 Aug 20 | RSA | Manyprime | 40 |
6 Aug 20 | RSA | Square Eyes | 35 |
6 Aug 20 | RSA | Monoprime | 30 |
6 Aug 20 | RSA | RSA Signatures | 25 |
6 Aug 20 | RSA | RSA Decryption | 20 |
3 Aug 20 | RSA | Factoring | 15 |
3 Aug 20 | RSA | Private Keys | 20 |
3 Aug 20 | RSA | Euler's Totient | 20 |
3 Aug 20 | RSA | Public Keys | 15 |
3 Aug 20 | RSA | Modular Exponentiation | 10 |
3 Aug 20 | Symmetric Ciphers | Passwords as Keys | 50 |
3 Aug 20 | Symmetric Ciphers | Modes of Operation Starter | 15 |
2 Aug 20 | Symmetric Ciphers | Bringing It All Together | 50 |
2 Aug 20 | Symmetric Ciphers | Diffusion through Permutation | 30 |
2 Aug 20 | Symmetric Ciphers | Confusion through Substitution | 25 |
2 Aug 20 | Symmetric Ciphers | Round Keys | 20 |
2 Aug 20 | Symmetric Ciphers | Structure of AES | 15 |
2 Aug 20 | Symmetric Ciphers | Resisting Bruteforce | 10 |
2 Aug 20 | Symmetric Ciphers | Keyed Permutations | 5 |
2 Aug 20 | General | Lemur XOR | 40 |
2 Aug 20 | Mathematics | Successive Powers | 60 |
1 Aug 20 | Lattices | What's a Lattice? | 40 |
31 Jul 20 | Mathematics | Chinese Remainder Theorem | 40 |
30 Jul 20 | Mathematics | Modular Square Root | 35 |
30 Jul 20 | Mathematics | Legendre Symbol | 35 |
27 Jul 20 | Lattices | Size and Basis | 15 |
27 Jul 20 | Lattices | Vectors | 10 |
25 Jul 20 | Mathematics | Quadratic Residues | 25 |
25 Jul 20 | General | Modular Inverting | 25 |
25 Jul 20 | General | Modular Arithmetic 2 | 20 |
25 Jul 20 | General | Modular Arithmetic 1 | 20 |
25 Jul 20 | General | Extended GCD | 20 |
25 Jul 20 | General | Greatest Common Divisor | 15 |
25 Jul 20 | General | You either know, XOR you don't | 30 |
25 Jul 20 | General | Favourite byte | 20 |
25 Jul 20 | General | XOR Properties | 15 |
25 Jul 20 | General | XOR Starter | 10 |
25 Jul 20 | General | Bytes and Big Integers | 10 |
25 Jul 20 | General | Hex | 5 |
25 Jul 20 | General | ASCII | 5 |
25 Jul 20 | Introduction | Network Attacks | 5 |
25 Jul 20 | Introduction | Great Snakes | 3 |
25 Jul 20 | Introduction | Finding Flags | 2 |
You are now level Current level