Rows:
CHALLENGE | AUTHORS | SOLVES (CURRENT) | SOLVE RATE (AT CONTEST TIME) |
---|---|---|---|
WelcomeMisc | 1056solves | - | |
Simple LoginWeb | 463solves | Top 28%= 84/300 users | |
echoPwn | 288solves | Top 32%= 56/174 users | |
227solves | Top 15%= 71/458 users | ||
qrimeCrypto | 205solves | Top 38%= 91/239 users | |
Country DBWeb | 188solves | Top 33%= 246/729 teams | |
inboundPwn | 176solves | Top 28%= 57/197 users | |
masking tapeRev | 142solves | Top 19%= 61/316 users | |
before-writePwn | 134solves | - | |
catcpyPwn | 122solves | Top 20%= 41/197 users | |
JackpotWeb | 115solves | Top 29%= 63/213 users | |
Alpaca PollWeb | 108solves | Top 9%= 42/458 users | |
105solves | Top 15%= 42/279 users | ||
Rainbow Sweet AlchemistCrypto | 102solves | Top 17%= 42/239 users | |
hexechoPwn | 100solves | Top 15%= 27/174 users | |
OysterPwn | 93solves | Top 42%= 40/95 users | |
CaaSWeb | 78solves | Top 4%= 13/300 users | |
writePwn | 71solves | - | |
Pico Note 1Web | 66solves | Top 3%= 10/300 users | |
CakeGEARWeb | 65solves | Top 14%= 104/713 teams |
Rows:
出力からフラグを復元してください🐍
import os
from Crypto.Util.number import getPrime, bytes_to_long
m = bytes_to_long(os.getenv("FLAG").encode())
p = getPrime(96)
n = p * p * p
e = 65537
c = pow(m, e, n)
print(f"{n,c=}")
出力:
n,c=(272361880253535445317143279209232620259509770172080133049487958853930525983846305005657, 69147423377323669983172806367084358432369489877851180970277804462365354019444586165184)