###
Chosen Plaintext Ring-LWE (CKKS) Attack

###
Recovering a curve from a point addition group law defined on it.

###
Recovering information within what appears to be randomness.

###
Attempting to learn Elliptic Curve Cryptography.

###
Finding nth root of certain upper triangular matrix.

###
Shortest path on a slightly obfuscated graph structure.

###
Straightforward blind format string exploit followed by simple reverse engineering.