| Date | User | Challenge | Score |
| Oskar404 | Base64 | 10 | |
| Oskar404 | Hex | 5 | |
| deep_blueshell | Hex | 5 | |
| Oglegoman | Diffusion through Permutation | 30 | |
| caffeine27 | Lazy CBC | 60 | |
| Oskar404 | ASCII | 5 | |
| pypykatz | Quadratic Residues | 25 | |
| fr_osted | Structure of AES | 15 | |
| Oskar404 | Great Snakes | 3 | |
| udhaya | Finding Flags | 2 | |
| Oskar404 | Finding Flags | 2 | |
| yuri981 | Favourite byte | 20 | |
| taenecia | Modular Binomials | 80 | |
| Oglegoman | Confusion through Substitution | 25 | |
| mochaowo | ECB Oracle | 60 | |
| RSeldon06 | CTRIME | 70 | |
| deep_blueshell | ASCII | 5 | |
| shr1_kumr | Extended GCD | 20 | |
| taenecia | Adrien's Signs | 80 | |
| Oglegoman | Round Keys | 20 | |
| pypykatz | Modular Inverting | 25 | |
| Hattmakare | Greatest Common Divisor | 15 | |
| taenecia | Chinese Remainder Theorem | 40 | |
| Falasi | Base64 | 10 | |
| RSeldon06 | Structure of AES | 15 | |
| 2ranjes | Great Snakes | 3 | |
| D4LT | Favourite byte | 20 | |
| taenecia | Modular Square Root | 35 | |
| RSeldon06 | Diffusion through Permutation | 30 | |
| RSeldon06 | Confusion through Substitution | 25 | |
| nizugu | Export-grade | 100 | |
| maejikal | Passwords as Keys | 50 | |
| Oglegoman | Structure of AES | 15 | |
| nizugu | Parameter Injection | 60 | |
| D4LT | XOR Properties | 15 | |
| Falasi | Hex | 5 | |
| nizugu | Deriving Symmetric Keys | 40 | |
| fr_osted | Resisting Bruteforce | 10 | |
| Oglegoman | Resisting Bruteforce | 10 | |
| fr_osted | Keyed Permutations | 5 | |
| Boldo | Base64 | 10 | |
| nizugu | Computing Shared Secrets | 30 | |
| RSeldon06 | Infinite Descent | 50 | |
| Oglegoman | Keyed Permutations | 5 | |
| nizugu | Computing Public Values | 25 | |
| RSeldon06 | Manyprime | 40 | |
| nizugu | Generators of Groups | 20 | |
| RSeldon06 | Square Eyes | 35 | |
| nizugu | Working with Fields | 10 | |
| RSeldon06 | Inferius Prime | 30 |
You are now level Current level