{ "name": "Block ciphers", "order": 4, "challenges": [ { "id": "59a5801209a6acac5983b668", "title": "Introduction", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b181", "title": "Substitution-Permutation networks", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b182", "title": "Linear cryptanalysis", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b183", "title": "Piling-up lemma", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b184", "title": "Linear approximations of S-boxes", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b185", "title": "Linear attack on an SPN", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] } ] }