I recently gave a talk at the Solving Polynomial Systems seminar about Linear Convex Optimization and the Gurobi software (here part of the material presented). Gurobi is a state-of-the-art optimiz...
Two interesting challenges about OneTimePassword (OTP) encription. In both cases we have a key reuse, which allows us to reduce to breaking single-key-xor in an obvious (BabyOTP) and less obvious (...
We bet on a casino that implements the Golang PRNG. From truncated outputs we can (almost) reconstruct the internal state. By winning with high frequency we are able to exponentially increase our b...
As part of a challenge in the Damncon 2022 CTF, I had to decode the follownig image: This is clearly the Hexahue Cipher. However, not without surprise, I could not find any automatic image decod...
An emoji search webpage is vulnerable to sql injection due to incorrect sanitizing of unicode characters. I solved this challenge together whit @Teuler27. Event Link: Reply CyberSecurity Chall...
A new version of content is available.