| Date | User | Challenge | Score |
| baawgai | Hex | 5 | |
| Otgontugs | Favourite byte | 20 | |
| baawgai | ASCII | 5 | |
| hthh | Everything is Still Big | 100 | |
| kerel | Diffusion through Permutation | 30 | |
| hthh | Crossed Wires | 100 | |
| bechir_x09 | SSH Keys | 35 | |
| bechir_x09 | CERTainly not | 30 | |
| lochin123 | Curves and Logs | 40 | |
| lochin123 | Efficient Exchange | 50 | |
| feapef | Modes of Operation Starter | 15 | |
| YousSphinx | Bespoke Padding | 100 | |
| Sukanurka | Favourite byte | 20 | |
| tomlv511 | Finding Flags | 2 | |
| bechir_x09 | Privacy-Enhanced Mail? | 25 | |
| conmeodilac | Bean Counter | 60 | |
| ireng | Finding Flags | 2 | |
| lochin123 | Scalar Multiplication | 35 | |
| Ah_Error | Everything is Big | 70 | |
| Otgontugs | XOR Properties | 15 | |
| lochin123 | Point Addition | 30 | |
| kerel | Confusion through Substitution | 25 | |
| hthh | Everything is Big | 70 | |
| lochin123 | Point Negation | 10 | |
| Romyna | Pairing-Based Cryptography | 50 | |
| lochin123 | Background Reading | 5 | |
| skiller3478 | Chinese Remainder Theorem | 40 | |
| pixel_BC | LWE Background | 5 | |
| kerel | Round Keys | 20 | |
| feapef | Bringing It All Together | 50 | |
| nihhajawarembang | Greatest Common Divisor | 15 | |
| 01169322 | Logon Zero | 80 | |
| kerel | Structure of AES | 15 | |
| Otgontugs | XOR Starter | 10 | |
| skiller3478 | Modular Square Root | 35 | |
| pixel_BC | Jack's Birthday Confusion | 30 | |
| baawgai | Modular Square Root | 35 | |
| Sukanurka | XOR Properties | 15 | |
| bechir_x09 | Modular Inverting | 25 | |
| pixel_BC | Jack's Birthday Hash | 20 | |
| hthh | Modulus Inutilis | 50 | |
| baawgai | Legendre Symbol | 35 | |
| bechir_x09 | Modular Arithmetic 2 | 20 | |
| skiller3478 | Legendre Symbol | 35 | |
| hthh | Salty | 20 | |
| bechir_x09 | Modular Arithmetic 1 | 20 | |
| hthh | Manyprime | 40 | |
| Siphedrion | What's a Lattice? | 40 | |
| baawgai | Quadratic Residues | 25 | |
| lekzard117 | Resisting Bruteforce | 10 |
You are now level Current level