You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: index.html
+3-4Lines changed: 3 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,6 @@
11
11
<body>
12
12
<header>
13
13
<h1>ArchX - Cryptography and computing</h1>
14
-
15
14
<!-- Toolbar -->
16
15
<nav>
17
16
<ahref="index.html">Home</a>
@@ -20,7 +19,7 @@ <h1>ArchX - Cryptography and computing</h1>
20
19
<ahref="forum.html">Forum</a>
21
20
<ahref="article.html">Articles</a>
22
21
<ahref="write-up.html">Write-up</a>
23
-
<ahref="ressources.html">Ressources</a>
22
+
<ahref="books.html">Books</a>
24
23
<buttonid="dark-mode-toggle" class="btn" style="background: none; border: none; cursor: pointer; font-size: 1.5em;">
25
24
<spanid="theme-icon">🌙</span>
26
25
</button>
@@ -30,7 +29,7 @@ <h1>ArchX - Cryptography and computing</h1>
30
29
<section>
31
30
<h1>Welcome to archX !</h1>
32
31
<p>
33
-
I'm a 20 year old french student interested in cybersecurity, cryptography and many other stuff. I'm currently in the third year of a Bachelor in computer science.
32
+
I'm a 21 year old french student interested in cybersecurity, cryptography and many other stuff. I'm currently in the third year of a Bachelor in computer science.
34
33
<br/>
35
34
36
35
I started programmation with python and C and I'm mostly interested in implementing cryptographic algorithm.
<ahref="https://www.schneier.com/news/" target="_blank">Schneier on Security: News</a>
47
47
Bruce Schneier is a public-interest technologist, working at the intersection of security, technology, and people. He's been writing about security issues on his blog since 2004 and on his newsletter since 1998.
48
48
</p>
49
49
</li>
50
50
51
-
<lidata-tags="all crypto">
51
+
<lidata-tags="all default">
52
52
<p>
53
53
<ahref="https://www.schneier.com/crypto-gram/" target="_blank">Schneier on Security: Crypto-Gram Newsletter.</a>
54
54
A free monthly newsletter digest from his posts
55
55
</p>
56
56
57
57
</li>
58
58
59
-
<lidata-tags="all crypto">
59
+
<lidata-tags="all default">
60
60
<p>
61
61
<ahref="https://eprint.iacr.org/" target="_blank">ePrint Archive</a>: It is a major hub for cryptographics paper in the communauty. You can search for paper by tags and release date.
62
62
</p>
63
63
64
64
</li>
65
65
66
-
<lidata-tags="all crypto">
66
+
<lidata-tags="all default">
67
67
<p>
68
68
<ahref="https://cryptome.org/" target="_blank">Cryptome</a> Cryptome publishes documents prohibited by governements. You also can subscribed to a mailing list.
is an open source cryptography company building state-of-the-art FHE (Fully Homomorphic Encryption) solutions for blockchain and AI. The project is interesting because it introduces you to FHE and have a bounty program so if your are good and motivated you even can make a bit of money.
is a repository maintained by Jean-Philippe Aumasson, a great cryptographer. It lists "coding rules" for implementations of cryptographic operations, and more generally for operations involving secret or sensitive values.
72
72
This page is a very good ressource if you want to develop your own implementation. Of course those recommendations aren't enought for a well secured implementation but as a beginner it is a good training.
The Community Cryptography Specification Project is a project that facilitates the maintenance of cryptography specifications using software development methodologies. In other words, C2SP applies the successful processes of open source software development and maintenance to specification documents.
is an open-access web book dedicated to the art and science of computing by Sergey Slotin. Its intended audience is everyone from performance engineers and practical algorithm researchers to undergraduate computer science students.
Created by Daniel Lemire, SimdJson is tool parsing gigabytes of JSON per second. Used by Facebook/Meta Velox, the Node.js runtime and dozen of other real world usage, this tool is certainly one of the fastet in the world for json parsing.
Copy file name to clipboardExpand all lines: write-up.html
+73-26Lines changed: 73 additions & 26 deletions
Original file line number
Diff line number
Diff line change
@@ -18,45 +18,92 @@
18
18
<ahref="forum.html">Forum</a>
19
19
<ahref="article.html">Articles</a>
20
20
<ahref="write-up.html">Write-up</a>
21
-
<ahref="ressources.html">Ressources</a>
21
+
<ahref="books.html">Books</a>
22
22
<buttonid="dark-mode-toggle" class="btn" style="background: none; border: none; cursor: pointer; font-size: 1.5em;">
23
23
<spanid="theme-icon">🌙</span>
24
24
</button>
25
25
</nav>
26
26
</header>
27
27
28
-
<h1class="page-title">Write-up</h1>
29
-
<p>The first three write-ups are mine, the others are some interesting ones I've found.</p>
30
-
31
-
<!-- Write-up -->
32
-
<divclass=article>
33
-
<hr>
34
-
<h2><ahref="https://github.com/Bl4omArchie/Write-Up/blob/main/crypto/RsaBookCTF.md" target="_blank">RSA book CTF</a></h2>I participated to the second edition of the bookCTF, there is two simple challenge with RSA</p>
35
-
<hr>
28
+
<section>
29
+
<h1class="page-title">Write-up</h1>
30
+
<p>A bunch of crypto write-up from CTF I participated to.</p>
31
+
</section>
36
32
37
-
<h2><ahref="https://github.com/Bl4omArchie/Write-Up/blob/main/crypto/dvCTF-utCTF.md" target="_blank">DaVinci CTF and utCTF</a></h2> Two write-up that I've made on two CTF at the same time. The first challenge is about RSA and the second one DH</p>
<h2><ahref="https://ret2school.github.io/post/writeuprsa/" target="_blank">Frank, recovering a full RSA private key </a></h2> a good challenge that I'v done with a friend at the Midnight Sun CTF. We get a privet key with hidden part and from the clear part, we need to recover the entire key</p>
41
-
<hr>
39
+
<ul>
40
+
<lidata-tags="all default">
41
+
<p>
42
+
<ahref="https://github.com/Bl4omArchie/Write-Up/blob/main/crypto/RsaBookCTF.md" target="_blank">RSA book CTF</a>
43
+
I participated to the second edition of the bookCTF, there is two simple challenge with RSA
44
+
</p>
45
+
</li>
46
+
42
47
43
-
<h2><ahref="https://siben.eu/xoring-networks.html" target="_blank">Xoring Network </a></h2> an hard challenge that I tryied at the 2020 FCSC. This challenge is really hard and the code solution is in C and python </p>
44
-
<hr>
48
+
<lidata-tags="all year-2021">
49
+
<p>
50
+
<ahref="https://github.com/Bl4omArchie/Write-Up/blob/main/crypto/dvCTF-utCTF.md" target="_blank">DaVinci CTF and utCTF</a>
51
+
Two write-up that I've made on two CTF at the same time. The first challenge is about RSA and the second one DH
52
+
</p>
53
+
</li>
45
54
46
-
<h2><ahref="https://www.hackademint.org/Baby_Xoring_Networks" target="_blank">Baby Xoring Network</a></h2> Same challenge from the same CTF but less hard and you only need python</p>
47
-
<hr>
48
55
49
-
<h2><ahref="https://hackmd.io/@jack4818/B1RXIH_ZD" target="_blank">2020 CryptoCTF </a></h2> All the write-up from the 2020 CryptoCTF by the Cryptohack team</p>
50
-
<hr>
56
+
<lidata-tags="all year-2021">
57
+
<p>
58
+
<ahref="https://ret2school.github.io/post/writeuprsa/" target="_blank">Frank, recovering a full RSA private key </a>
59
+
A good challenge that I'v done with a friend at the Midnight Sun CTF. We get a privet key with hidden part and from the clear part, we need to recover the entire key
60
+
</p>
61
+
</li>
51
62
52
-
<h2><ahref="https://hackmd.io/DBUeU7cMQlihBUVSYPhJlQ" target="_blank">2021 CryptoCTF </a>, <ahref="https://hackmd.io/81k7HZi1QVCcxT0rksbGAA" target="_blank">2021 CryptoCTF </a>, <ahref="https://hackmd.io/p0CTvBKbSpSfFmLLoNjw0Q#Wolf" target="_blank">2021 CryptoCTF </a>, <ahref="https://blog.cryptohack.org/cryptoctf2021-hard#tiny-ecc">2021 CryptoCTF unsolved flag</a></h2> All the write-up from the 2021 CryptoCTF by the Cryptohack team (i was into it ! but they were too fast for me xD )</p>
This was the hard version of a challenge I tried to solve at the 2020 FCSC. This challenge was really hard so I focused on the easier version, Baby xoring which I also didn't solved.
<h2><ahref="https://bitsdeep.com/write-ups/fcsc-2021-write-ups-for-the-crypto-challenges/" target="_blank">2021 FCSC</a></h2> you can find all the write-up about crypto of the 2021 FCSC ctf made by Enoent</p>
56
-
<hr>
57
-
58
-
<h2><ahref="https://jsur.in/posts/2021-08-29-cakectf-2021-writeups#party-ticket" target="_blank">CakeCTF 2021 Writeups</a></h2> Nice write-up about coppersmith</p>
0 commit comments