xorxorxor
Exploiting xor with small key length
Exploiting xor with small key length
Nonce Reuse
generator g operates within a very small subgroup of the prime field
Breaking Cipher using linear algebra
Exploiting a Hash Length Extension vulnerability
challenge involves exploiting a custom Linear Congruential Generator where the RNG's parameters are derived from the prime factors of a multi-prime RSA modulus.
Breaking Affine Cipher
Håstad's Broadcast Attack