ctfnote.com
House of WrituepCryptoBook
Search…
⌃K
Links
🧙♂
/home/ret2basic.eth
ZK
"Why and How zk-SNARK Works"
ZK MOOC
0xPARC
ZK Hack Whiteboard Sessions
Crypto
Hash Functions
MAC
AES
Diffie-Hellman
RSA
ECC
Digital Signature
JWT
PRNG
SSL/TLS
Research
Lattice-based Cryptography (Lattice)
Oblivious Transfer (OT)
Secure Multi-party Computation (MPC)
Learning with Error (LWE)
Fully Homomorphic Encryption (FHE)
Zero Knowledge Proof (ZKP)
Oblivious RAM (ORAM)
Red Teaming
Linux Command Line
Enumeration
Exploitation
Buffer Overflow
Privilege Escalation
Post Exploitation
🚇
Pivoting
🪟
Active Directory (AD)
🦹♂
Command & Control (C2)
🧛♂
Malware Development
Web
Background Knowledge
File Upload
SQL Injection (SQLi)
Cross-Site Scripting (XSS)
CSRF and SSRF
XML External Entities (XXE)
Insecure Deserialization
HTTP Request Smuggling
Other Attacks
Bug Bounty Report Writing
Programming
Python
JavaScript
C
C++
C#
Java
PHP
MySQL
Computer Science
Algorithms
The Linux Programming Interface
Computer Systems
Distributed Systems
Practical Packet Analysis
Static Analysis
Pwn
Linux Exploitation
Windows Exploitation
Fuzzing
Reverse
Bytecode
angr
Misc
Forensics
Steganography
Powered By GitBook

Research

Cutting-edge research topics in cryptography include:
  • Lattice-based Cryptography (Lattice)
  • Oblivious Transfer (OT)
  • Secure Multi-party Computation (MPC)
  • Learning with Error (LWE)
  • Fully Homomorphic Encryption (FHE)
  • Zero Knowledge Proof (ZKP)
  • Oblivious RAM (ORAM)
Crypto - Previous
SSL/TLS
Next
Lattice-based Cryptography (Lattice)
Last modified 6mo ago
Copy link