Skip to main content
  • Koç University
  • Computer Engineering
  • Crypto Search
 Cryptography, Security, and Privacy Research Group Cryptography, Security, and Privacy Research Group
  • The Enigma Device

  • Cryptogram

  • Breaking The Code

  • TÜBİTAK Ödüllü Kriptoloji Soruları ve Çözümleri (Turkish)

  • Puzzle 1 (Turkish)
  • Puzzle 2 (Turkish)
  • Puzzle 3 (Turkish)
  • Puzzle 4 (Turkish)
  • Puzzle 5 (Turkish & English)
  • Puzzle 6 (Turkish)
  • Puzzle 7 (Turkish)
  • More Puzzles (Turkish)
Puzzle 1 (Turkish) ›
  • Log in to post comments

Crypto Puzzles

  • Home
  • People
    • Work with Us
  • Lectures and Videos
    • Pathway to Crypto
    • Proofs in Cryptography
    • Presentations
  • Current Projects
    • Secure Cloud Storage
    • Cloud Computation
    • Outsourced Databases
    • Fair Exchange
    • Password-based Authentication
    • Genetic Authentication on the Cloud
    • Searchable Encryption
    • Security and Attacks
    • Future Projects
  • Past Projects
    • Crypto for Cloud
    • Brownie Cashlib
  • Computation and Complexity
  • Kuulfact
  • Links
  • Publicity (News)
  • DOWNLOAD
  • Request new password

Search form

Important Collections

  • Must-See Videos
  • Events and Announcements
  • Crypto Puzzles
  • Interesting Papers

Subscribe

Subscribe to Syndicate

IACR Eprint

  • Solving a $6120$-bit DLP on a Desktop Computer
  • Efficient Circuit-based PSI via Cuckoo Hashing
  • A Framework for Efficient and Composable Oblivious Transfer
  • Obfuscation Using Tensor Products
  • A note on high-security general-purpose elliptic curves
More

Want to work with us? Look at our "work with us" page.