| Date | User | Challenge | Score |
| artsog | ECB CBC WTF | 55 | |
| kbar | RSA Decryption | 20 | |
| kbar | Private Keys | 20 | |
| kbar | Euler's Totient | 20 | |
| kbar | Public Keys | 15 | |
| Alexand0xer | ASCII | 5 | |
| artsog | ECB Oracle | 60 | |
| artsog | Passwords as Keys | 50 | |
| kbar | Modular Exponentiation | 10 | |
| yuris72 | Quadratic Residues | 25 | |
| Alexand0xer | Great Snakes | 3 | |
| avm | Backpack Cryptography | 120 | |
| ChillShoes | RSA Signatures | 25 | |
| kbar | Modular Binomials | 80 | |
| Alexand0xer | Finding Flags | 2 | |
| kbar | Adrien's Signs | 80 | |
| irritable_hacker | Jack's Birthday Confusion | 30 | |
| kbar | Chinese Remainder Theorem | 40 | |
| artsog | Modes of Operation Starter | 15 | |
| kbar | Modular Square Root | 35 | |
| kbar | Legendre Symbol | 35 | |
| cripsov | XOR Starter | 10 | |
| happyfeet | XOR Properties | 15 | |
| artsog | Bringing It All Together | 50 | |
| ChillShoes | RSA Decryption | 20 | |
| artsog | Diffusion through Permutation | 30 | |
| artsog | Confusion through Substitution | 25 | |
| artsog | Round Keys | 20 | |
| ChillShoes | Private Keys | 20 | |
| artsog | Structure of AES | 15 | |
| Iris___ | Finding Flags | 2 | |
| artsog | Export-grade | 100 | |
| philosophe | Quadratic Residues | 25 | |
| agomezmarti | Pad Thai | 80 | |
| artsog | Parameter Injection | 60 | |
| artsog | Resisting Bruteforce | 10 | |
| hburchfield | Base64 | 10 | |
| krash | Bytes and Big Integers | 10 | |
| artsog | Deriving Symmetric Keys | 40 | |
| krash | Base64 | 10 | |
| ChillShoes | Euler's Totient | 20 | |
| krash | Hex | 5 | |
| artsog | Computing Shared Secrets | 30 | |
| krash | ASCII | 5 | |
| krash | Great Snakes | 3 | |
| artsog | Computing Public Values | 25 | |
| krash | Finding Flags | 2 | |
| odi | Scalar Multiplication | 35 | |
| odi | Point Addition | 30 | |
| philosophe | Modular Inverting | 25 |
You are now level Current level