Date | User | Challenge | Score |
azw | LWE Background | 5 | |
Misay | Favourite byte | 20 | |
Misay | XOR Properties | 15 | |
Misay | XOR Starter | 10 | |
QnJpYW4 | Parameter Injection | 60 | |
Misay | Bytes and Big Integers | 10 | |
Misay | Base64 | 10 | |
y_chang3344 | Export-grade | 100 | |
Misay | Hex | 5 | |
Misay | ASCII | 5 | |
Misay | Great Snakes | 3 | |
Misay | Finding Flags | 2 | |
Blue_ | ECB CBC WTF | 55 | |
Blue_ | Passwords as Keys | 50 | |
hsjsstn | Greatest Common Divisor | 15 | |
CristFlores1 | No Way JOSE | 20 | |
CristFlores1 | JWT Sessions | 10 | |
jhkim | Finding Flags | 2 | |
QnJpYW4 | Deriving Symmetric Keys | 40 | |
CristFlores1 | Token Appreciation | 5 | |
QnJpYW4 | Computing Shared Secrets | 30 | |
picodegallo | Encoding Challenge | 40 | |
Khal | Flipping Cookie | 60 | |
QnJpYW4 | Computing Public Values | 25 | |
Deyerli | Confusion through Substitution | 25 | |
hexiao3812 | Private Keys | 20 | |
QnJpYW4 | Generators of Groups | 20 | |
Blue_ | Round Keys | 20 | |
hexiao3812 | Euler's Totient | 20 | |
QnJpYW4 | Working with Fields | 10 | |
y_chang3344 | Parameter Injection | 60 | |
Kaiiii | Resisting Bruteforce | 10 | |
Kaiiii | Keyed Permutations | 5 | |
paulinegaminge | What's a Lattice? | 40 | |
Deyerli | Round Keys | 20 | |
Krishnai | Greatest Common Divisor | 15 | |
Deyerli | Structure of AES | 15 | |
hexiao3812 | Public Keys | 15 | |
hexiao3812 | Modular Exponentiation | 10 | |
hexiao3812 | Point Negation | 10 | |
paulinegaminge | Gram Schmidt | 30 | |
hexiao3812 | Background Reading | 5 | |
Deyerli | Resisting Bruteforce | 10 | |
s4hm4d | Curveball | 100 | |
hexiao3812 | You either know, XOR you don't | 30 | |
hexiao3812 | Favourite byte | 20 | |
rokiell | Base64 | 10 | |
Deyerli | Keyed Permutations | 5 | |
CristFlores1 | Modulus Inutilis | 50 | |
Krishnai | You either know, XOR you don't | 30 |
You are now level Current level