| Date | User | Challenge | Score |
| L64 | Couples | 100 | |
| 00xCanelo | Monoprime | 30 | |
| Lucen | ASCII | 5 | |
| adamjr11 | Euler's Totient | 20 | |
| Solitarius1upus | Secure Protocols | 5 | |
| Lucen | Great Snakes | 3 | |
| Lucen | Finding Flags | 2 | |
| oiu890 | Modes of Operation Starter | 15 | |
| cryforme | RSA Decryption | 20 | |
| SpilledBeans | Parameter Injection | 60 | |
| 00xCanelo | Factoring | 15 | |
| Luci | Extended GCD | 20 | |
| Pnqqrjuqjfxj | Confusion through Substitution | 25 | |
| Solitarius1upus | Private Keys | 20 | |
| LanceM | ASCII | 5 | |
| 00xCanelo | RSA Signatures | 25 | |
| Pnqqrjuqjfxj | Round Keys | 20 | |
| Temax | Public Keys | 15 | |
| longin | Keyed Permutations | 5 | |
| Pnqqrjuqjfxj | Structure of AES | 15 | |
| CBUBCIZK | Keyed Permutations | 5 | |
| BonziSki | Structure of AES | 15 | |
| Grid13 | Structure of AES | 15 | |
| porolishinan | ECB Oracle | 60 | |
| Gabiso | XOR Starter | 10 | |
| Jach | ASCII | 5 | |
| Grid13 | Resisting Bruteforce | 10 | |
| adamjr11 | Public Keys | 15 | |
| adamjr11 | Modular Exponentiation | 10 | |
| cryforme | Private Keys | 20 | |
| xfnx | An Exceptional Twisted Mind | 125 | |
| herotrouble | Euler's Totient | 20 | |
| Gabiso | Bytes and Big Integers | 10 | |
| Akshay2005 | You either know, XOR you don't | 30 | |
| Galois | Non-Interactive | 35 | |
| BonziSki | Resisting Bruteforce | 10 | |
| cryforme | Euler's Totient | 20 | |
| AESpider | Exceptional Curves | 100 | |
| Solitarius1upus | Euler's Totient | 20 | |
| TinyLean | Resisting Bruteforce | 10 | |
| interrupt | XOR Properties | 15 | |
| appmobile | ASCII | 5 | |
| BonziSki | Keyed Permutations | 5 | |
| Pnqqrjuqjfxj | Resisting Bruteforce | 10 | |
| appmobile | Great Snakes | 3 | |
| d3f4ult2_0 | Diffusion through Permutation | 30 | |
| appmobile | Finding Flags | 2 | |
| Solitarius1upus | Public Keys | 15 | |
| Gabiso | Base64 | 10 | |
| adagbla | Greatest Common Divisor | 15 |
You are now level Current level