Chosen Plaintext Ring-LWE (CKKS) Attack
Recovering a curve from a point addition group law defined on it.
Recovering information within what appears to be randomness.
Attempting to learn Elliptic Curve Cryptography.
Finding nth root of certain upper triangular matrix.
Shortest path on a slightly obfuscated graph structure.
Straightforward blind format string exploit followed by simple reverse engineering.