| Date | User | Challenge | Score |
| tanelpeep | Symmetry | 50 | |
| quq | Legendre Symbol | 35 | |
| Mote | Inferius Prime | 30 | |
| Tekq14 | Computing Public Values | 25 | |
| Hyeonbin | Salty | 20 | |
| Dany10 | Token Appreciation | 5 | |
| yangwj | Euler's Totient | 20 | |
| yangwj | Public Keys | 15 | |
| yangwj | Modular Exponentiation | 10 | |
| kieuvip | CERTainly not | 30 | |
| SOOYOUNG_SHIN | Chinese Remainder Theorem | 40 | |
| tanelpeep | Flipping Cookie | 60 | |
| SOOYOUNG_SHIN | Modular Square Root | 35 | |
| yangwj | Bean Counter | 60 | |
| yangwj | Symmetry | 50 | |
| XPhuocNe | Adrien's Signs | 80 | |
| SOOYOUNG_SHIN | Legendre Symbol | 35 | |
| n0w333l | XOR Starter | 10 | |
| lmchkhi | XOR Properties | 15 | |
| Tekq14 | Generators of Groups | 20 | |
| yangwj | Flipping Cookie | 60 | |
| yangwj | ECB CBC WTF | 55 | |
| Iris1705 | RSA Signatures | 25 | |
| cdjs1432 | ECB Oracle | 60 | |
| SOOYOUNG_SHIN | Quadratic Residues | 25 | |
| SOOYOUNG_SHIN | Modular Inverting | 25 | |
| SOOYOUNG_SHIN | Modular Arithmetic 2 | 20 | |
| kieuvip | Privacy-Enhanced Mail? | 25 | |
| SamuelClarke | Greatest Common Divisor | 15 | |
| SOOYOUNG_SHIN | Modular Arithmetic 1 | 20 | |
| Peer | Background Reading | 5 | |
| SOOYOUNG_SHIN | Extended GCD | 20 | |
| Iris1705 | RSA Decryption | 20 | |
| shachar125 | ECB Oracle | 60 | |
| HyunseokJeong | Bean Counter | 60 | |
| HyunseokJeong | Symmetry | 50 | |
| HyunseokJeong | Flipping Cookie | 60 | |
| HyunseokJeong | ECB CBC WTF | 55 | |
| HyunseokJeong | ECB Oracle | 60 | |
| quq | Quadratic Residues | 25 | |
| HyunseokJeong | Passwords as Keys | 50 | |
| SOOYOUNG_SHIN | Greatest Common Divisor | 15 | |
| Iris1705 | Private Keys | 20 | |
| n0w333l | Bytes and Big Integers | 10 | |
| SOOYOUNG_SHIN | You either know, XOR you don't | 30 | |
| cdjs1432 | Bean Counter | 60 | |
| yangwj | ECB Oracle | 60 | |
| Peer | Export-grade | 100 | |
| HyunseokJeong | Modes of Operation Starter | 15 | |
| cdjs1432 | Symmetry | 50 |
You are now level Current level