| Date | User | Challenge | Score |
| sreekanthankn | Diffusion through Permutation | 30 | |
| Rajit123 | Finding Flags | 2 | |
| sreekanthankn | Confusion through Substitution | 25 | |
| LeeWangWy | Size and Basis | 15 | |
| vic1208 | SSH Keys | 35 | |
| inv | Special Soundness | 25 | |
| Kia | You either know, XOR you don't | 30 | |
| Kia | Favourite byte | 20 | |
| Kia | XOR Properties | 15 | |
| sreekanthankn | Round Keys | 20 | |
| Ramin | Favourite byte | 20 | |
| Kia | XOR Starter | 10 | |
| Tulgaa | Micro Transmissions | 120 | |
| Ramin | You either know, XOR you don't | 30 | |
| Kia | Bytes and Big Integers | 10 | |
| Tulgaa | Digestive | 60 | |
| Eljoy | You either know, XOR you don't | 30 | |
| Tulgaa | Elliptic Nodes | 150 | |
| Sibayan | Greatest Common Divisor | 15 | |
| gchiu02 | XOR Starter | 10 | |
| Kyle_0215 | Monoprime | 30 | |
| Eljoy | Favourite byte | 20 | |
| Tulgaa | Moving Problems | 150 | |
| sreekanthankn | Structure of AES | 15 | |
| Tulgaa | Edwards Goes Degenerate | 100 | |
| Rangkiasm | ECB CBC WTF | 55 | |
| Kia | Base64 | 10 | |
| Tulgaa | Missing Modulus | 80 | |
| Kia | Hex | 5 | |
| Sibayan | You either know, XOR you don't | 30 | |
| Eljoy | XOR Properties | 15 | |
| Tulgaa | Nativity | 60 | |
| inv | Proofs of Knowledge | 20 | |
| Eljoy | XOR Starter | 10 | |
| Tulgaa | Double and Broken | 50 | |
| Ramin | XOR Properties | 15 | |
| Ramin | XOR Starter | 10 | |
| sreekanthankn | Resisting Bruteforce | 10 | |
| Tulgaa | Bounded Noise | 50 | |
| gchiu02 | Bytes and Big Integers | 10 | |
| sreekanthankn | Keyed Permutations | 5 | |
| isaac2289 | Modular Arithmetic 1 | 20 | |
| Tulgaa | Exceptional Curves | 100 | |
| Eljoy | Bytes and Big Integers | 10 | |
| LeeWangWy | Vectors | 10 | |
| dautay | Finding Flags | 2 | |
| Kyle_0215 | Factoring | 15 | |
| Tulgaa | Smooth Criminal | 60 | |
| pavelanni | Base64 | 10 | |
| Tulgaa | Efficient Exchange | 50 |
You are now level Current level