Symmetric Ciphers | ECB Oracle | 60 | |
Symmetric Ciphers | ECB CBC WTF | 55 | |
Symmetric Ciphers | Passwords as Keys | 50 | |
Symmetric Ciphers | Modes of Operation Starter | 15 | |
Symmetric Ciphers | Bringing It All Together | 50 | |
Symmetric Ciphers | Diffusion through Permutation | 30 | |
Symmetric Ciphers | Confusion through Substitution | 25 | |
Symmetric Ciphers | Round Keys | 20 | |
Symmetric Ciphers | Structure of AES | 15 | |
Symmetric Ciphers | Resisting Bruteforce | 10 | |
Symmetric Ciphers | Keyed Permutations | 5 | |
ZKPs | Non-Interactive | 35 | |
ZKPs | Special Soundness | 25 | |
Lattices | Noise Free | 40 | |
General | Transparency | 50 | |
General | SSH Keys | 35 | |
General | CERTainly not | 30 | |
General | Privacy-Enhanced Mail? | 25 | |
General | Modular Inverting | 25 | |
General | Modular Arithmetic 2 | 20 | |
General | Modular Arithmetic 1 | 20 | |
General | Extended GCD | 20 | |
General | Greatest Common Divisor | 15 | |
General | Lemur XOR | 40 | |
General | You either know, XOR you don't | 30 | |
General | Favourite byte | 20 | |
General | XOR Properties | 15 | |
General | XOR Starter | 10 | |
General | Encoding Challenge | 40 | |
General | Bytes and Big Integers | 10 | |
General | Base64 | 10 | |
General | Hex | 5 | |
General | ASCII | 5 | |
Introduction | Network Attacks | 5 | |
Introduction | Great Snakes | 3 | |
Introduction | Finding Flags | 2 | |
Lattices | From Private to Public Key LWE | 25 | |
Lattices | LWE Low Bits Message | 20 | |
Lattices | LWE High Bits Message | 15 | |
Lattices | LWE Intro | 10 | |
Lattices | LWE Background | 5 | |
Lattices | Backpack Cryptography | 120 | |
Lattices | Find the Lattice | 100 | |
Lattices | Gaussian Reduction | 50 | |
Lattices | What's a Lattice? | 40 | |
Lattices | Gram Schmidt | 30 | |
Lattices | Size and Basis | 15 | |
Lattices | Vectors | 10 | |
ZKPs | Too Honest | 50 | |
ZKPs | Proofs of Knowledge | 20 | |
ZKPs | ZKP Introduction | 5 |
You are now level Current level