| Date | User | Challenge | Score |
| jsaguy | Base64 | 10 | |
| panhrist | Efficient Exchange | 50 | |
| Juanalonso21 | Finding Flags | 2 | |
| alphabino02 | Round Keys | 20 | |
| itzdenki | ASCII | 5 | |
| itzdenki | Great Snakes | 3 | |
| airconditioner4 | Modes of Operation Starter | 15 | |
| itzdenki | Finding Flags | 2 | |
| panhrist | Curves and Logs | 40 | |
| mill9re | Favourite byte | 20 | |
| federico27 | CERTainly not | 30 | |
| panhrist | Scalar Multiplication | 35 | |
| panhrist | Point Addition | 30 | |
| N01r | Hex | 5 | |
| jkendall | Extended GCD | 20 | |
| federico27 | Privacy-Enhanced Mail? | 25 | |
| djarnis2 | XOR Properties | 15 | |
| panhrist | Point Negation | 10 | |
| NEBILX | Public Keys | 15 | |
| panhrist | Background Reading | 5 | |
| jsaguy | Hex | 5 | |
| GHL | From Private to Public Key LWE | 25 | |
| GHL | LWE Low Bits Message | 20 | |
| NEBILX | Modular Exponentiation | 10 | |
| Kicks299 | Favourite byte | 20 | |
| Tyres_OFlaherty | Great Snakes | 3 | |
| akio | Modular Square Root | 35 | |
| Tyres_OFlaherty | Finding Flags | 2 | |
| AmrRabie | U-turn (Breizh CTF) | 0 | |
| GHL | LWE High Bits Message | 15 | |
| jsaguy | ASCII | 5 | |
| rs_sku | XOR Starter | 10 | |
| akio | Legendre Symbol | 35 | |
| 0xAnwar | Bringing It All Together | 50 | |
| Hanging_Tree | Network Attacks | 5 | |
| jsaguy | Great Snakes | 3 | |
| GHL | LWE Intro | 10 | |
| GHL | LWE Background | 5 | |
| Glxblt | A Twisted Mind | 80 | |
| Dmeetrogon | Modular Arithmetic 2 | 20 | |
| noir1458 | Modular Square Root | 35 | |
| rs_sku | Bytes and Big Integers | 10 | |
| Zvarethos007 | ASCII | 5 | |
| 0xAnwar | Diffusion through Permutation | 30 | |
| jsaguy | Finding Flags | 2 | |
| Zvarethos007 | Great Snakes | 3 | |
| Leorizs | You either know, XOR you don't | 30 | |
| lamng | Find the Lattice | 100 | |
| Zvarethos007 | Finding Flags | 2 | |
| dkoazwlearning | The Matrix | 75 |
You are now level Current level