HW1: Stream Cipher Biases, ECB Partial Plaintext Recovery, CTR Plaintext Recovery
HW2: Malleability Against SHA256 into CTR, Malleability Against Truncated HMAC-SHA256 into CTR, CBC Padding Oracle Attack
HW3: Exploiting CBC-MAC Collisions, MD5 Length Extension Attack, HMAC Timing Attack
HW4: ECDSA Nonce Reuse, Attacking Textbook RSA, Bleichenbacher’s RSA e=3 Signature Forgery
HW5: Invisible Salamanders in GCM, Compression-Oracle Attacks