cryptoProhard
RSA?
grodno_new_year_2026
Task: RSA with primes of the form p = x^2 + 123*y^2 generated using small multipliers. Solution: CM-ECM attack using Hilbert class polynomial and quotient ring arithmetic to factor n.
$ ls tags/ techniques/
cm_ecmquotient_ring_arithmeticmontgomery_ladderx_only_multiplication
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [crypto][Pro]ChristmasRSA— grodno_new_year_2026
- [crypto][Pro]Ни в чём не ошибся— duckerz
- [crypto][Pro]Sophie German— hackerlab
- [reverse][Pro]Happy New Year— grodno_new_year_2026
- [crypto][Pro]Огромные цифры (Huge Numbers)— hackerlab