| Date | User | Challenge | Score |
| tarik10 | Extended GCD | 20 | |
| mppl2404 | Resisting Bruteforce | 10 | |
| kjs36202 | Inferius Prime | 30 | |
| tts76 | Great Snakes | 3 | |
| mppl2404 | Keyed Permutations | 5 | |
| nania | XOR Starter | 10 | |
| Antares | Public Keys | 15 | |
| kmarty | Public Keys | 15 | |
| Ridwan1642 | Factoring | 15 | |
| kmarty | Modular Inverting | 25 | |
| kmarty | Modular Arithmetic 2 | 20 | |
| FranciscoCiego | Round Keys | 20 | |
| chikyu | XOR Starter | 10 | |
| kmarty | Modular Arithmetic 1 | 20 | |
| JO_007 | Static Client | 100 | |
| shpark1104 | Everything is Still Big | 100 | |
| Ablo | Legendre Symbol | 35 | |
| nania | Bytes and Big Integers | 10 | |
| j_m | Modular Inverting | 25 | |
| emKhoi2k10 | You either know, XOR you don't | 30 | |
| chikyu | Bytes and Big Integers | 10 | |
| emKhoi2k10 | Favourite byte | 20 | |
| mmd1hp | Modulus Inutilis | 50 | |
| emKhoi2k10 | XOR Properties | 15 | |
| kjs36202 | Factoring | 15 | |
| j_m | Modular Arithmetic 2 | 20 | |
| tarik10 | Greatest Common Divisor | 15 | |
| shpark1104 | Fast Primes | 75 | |
| mppl2404 | Modular Square Root | 35 | |
| 7mudii | Bytes and Big Integers | 10 | |
| Aryaethn | Size and Basis | 15 | |
| medb | Twin Keys | 100 | |
| Aryaethn | Vectors | 10 | |
| Ridwan1642 | RSA Signatures | 25 | |
| mppl2404 | Legendre Symbol | 35 | |
| emKhoi2k10 | XOR Starter | 10 | |
| emKhoi2k10 | Bytes and Big Integers | 10 | |
| medb | WOTS Up 2 | 90 | |
| emKhoi2k10 | Base64 | 10 | |
| mmd1hp | Salty | 20 | |
| emKhoi2k10 | Hex | 5 | |
| emKhoi2k10 | ASCII | 5 | |
| emKhoi2k10 | Great Snakes | 3 | |
| emKhoi2k10 | Finding Flags | 2 | |
| louis25 | Moving Problems | 150 | |
| FranciscoCiego | Structure of AES | 15 | |
| Panef | Favourite byte | 20 | |
| j_m | Modular Arithmetic 1 | 20 | |
| Panef | XOR Properties | 15 | |
| Panef | XOR Starter | 10 |
You are now level Current level