| Crypto on the Web | Megalomaniac 3 | 120 | |
| Crypto on the Web | Megalomaniac 1 | 100 | |
| ZKPs | Let's Prove It Again | 175 | |
| Isogenies | André Encoding | 80 | |
| Isogenies | CSIDH Key Exchange | 90 | |
| Isogenies | Breaking SIDH | 250 | |
| Isogenies | Better than Linear | 85 | |
| Isogenies | What's My Kernel | 70 | |
| Isogenies | Twisted CSIDH Isogenies | 70 | |
| Isogenies | Secret Exponents | 60 | |
| Crypto on the Web | RSA or HMAC? Part 2 | 100 | |
| Crypto on the Web | Authenticated Handshake | 40 | |
| Crypto on the Web | Decrypting TLS 1.3 | 35 | |
| Crypto on the Web | Decrypting TLS 1.2 | 30 | |
| Crypto on the Web | Saying Hello | 20 | |
| Crypto on the Web | TLS Handshake | 15 | |
| Crypto on the Web | Sharks on the Wire | 10 | |
| Crypto on the Web | Secure Protocols | 5 | |
| Crypto on the Web | RSA or HMAC? | 35 | |
| Crypto on the Web | JSON in JSON | 40 | |
| Crypto on the Web | JWT Secrets | 25 | |
| Crypto on the Web | No Way JOSE | 20 | |
| Crypto on the Web | JWT Sessions | 10 | |
| Crypto on the Web | Token Appreciation | 5 | |
| Isogenies | Prime Power Isogenies | 50 | |
| ZKPs | Couples | 100 | |
| Isogenies | SIDH Key Exchange | 80 | |
| Isogenies | Composite Isogenies | 60 | |
| Isogenies | Three Isogenies | 35 | |
| Isogenies | Special Isogenies | 30 | |
| Isogenies | Two Isogenies | 30 | |
| Isogenies | DLOG on the Surface | 40 | |
| Isogenies | Montgomery Curves | 30 | |
| Isogenies | Introduction to Isogenies | 10 | |
| Isogenies | Image Point Arithmetic | 30 | |
| Isogenies | Where's the Supersingular Curve | 25 | |
| Isogenies | The j-invariant | 20 | |
| ZKPs | Mister Saplins The Prover | 125 | |
| ZKPs | Pairing-Based Cryptography | 50 | |
| ZKPs | Too Honest | 50 | |
| ZKPs | Non-Interactive | 35 | |
| ZKPs | Honest Verifier Zero Knowledge | 30 | |
| ZKPs | Special Soundness | 25 | |
| ZKPs | Proofs of Knowledge | 20 | |
| ZKPs | ZKP Introduction | 5 | |
| Lattices | Noise Cheap | 90 | |
| Lattices | Nativity | 60 | |
| Lattices | Missing Modulus | 80 | |
| Lattices | Too Many Errors | 100 | |
| Lattices | Bounded Noise | 50 | |
| Lattices | Noise Free | 40 | |
| Lattices | From Private to Public Key LWE | 25 | |
| Lattices | LWE Low Bits Message | 20 | |
| Lattices | LWE High Bits Message | 15 | |
| Lattices | LWE Intro | 10 | |
| Lattices | LWE Background | 5 | |
| Lattices | Backpack Cryptography | 120 | |
| Lattices | Find the Lattice | 100 | |
| Lattices | Gaussian Reduction | 50 | |
| Lattices | What's a Lattice? | 40 | |
| Lattices | Gram Schmidt | 30 | |
| Lattices | Size and Basis | 15 | |
| Lattices | Vectors | 10 | |
| Elliptic Curves | Moving Problems | 150 | |
| Elliptic Curves | Montgomery's Ladder | 40 | |
| Elliptic Curves | Curveball | 100 | |
| Elliptic Curves | ProSign 3 | 100 | |
| Elliptic Curves | Smooth Criminal | 60 | |
| Elliptic Curves | Efficient Exchange | 50 | |
| Elliptic Curves | Curves and Logs | 40 | |
| Elliptic Curves | Scalar Multiplication | 35 | |
| Elliptic Curves | Point Addition | 30 | |
| Elliptic Curves | Point Negation | 10 | |
| Elliptic Curves | Background Reading | 5 |
You are now level Current level