| Date | User | Challenge | Score |
| kamilsan | Curves and Logs | 40 | |
| debugger2006 | Favourite byte | 20 | |
| kamilsan | Scalar Multiplication | 35 | |
| lauragarcia66 | Finding Flags | 2 | |
| Ter3Sni | Flipping Cookie | 60 | |
| kamilsan | Point Addition | 30 | |
| aayshush | Adrien's Signs | 80 | |
| Vision_ | Modular Arithmetic 1 | 20 | |
| kamilsan | The j-invariant | 20 | |
| kamilsan | Introduction to Isogenies | 10 | |
| lesluka | Hex | 5 | |
| aalq_3 | XOR Starter | 10 | |
| g0ld3np4r3y | Unencryptable | 125 | |
| debugger2006 | XOR Properties | 15 | |
| lesluka | ASCII | 5 | |
| aalq_3 | Bytes and Big Integers | 10 | |
| rjmafoaka | Confusion through Substitution | 25 | |
| Mat_ | Bytes and Big Integers | 10 | |
| NetDoor | JSON in JSON | 40 | |
| lesluka | Great Snakes | 3 | |
| e52maw | Passwords as Keys | 50 | |
| lesluka | Finding Flags | 2 | |
| sdigs | Resisting Bruteforce | 10 | |
| Mat_ | Base64 | 10 | |
| debugger2006 | XOR Starter | 10 | |
| darkknight | Bytes and Big Integers | 10 | |
| AHLAM | Diffusion through Permutation | 30 | |
| aalq_3 | Base64 | 10 | |
| sl0wguy | You either know, XOR you don't | 30 | |
| AHLAM | Confusion through Substitution | 25 | |
| mass_ | Base64 | 10 | |
| aalq_3 | Hex | 5 | |
| aayshush | Chinese Remainder Theorem | 40 | |
| ValT | Everything is Big | 70 | |
| debugger2006 | Bytes and Big Integers | 10 | |
| dominicteece | Bytes and Big Integers | 10 | |
| rjmafoaka | Round Keys | 20 | |
| Brodyaga | Extended GCD | 20 | |
| lerequin | Manyprime | 40 | |
| powtoo | XOR Starter | 10 | |
| sheperd22 | You either know, XOR you don't | 30 | |
| debugger2006 | Base64 | 10 | |
| darkknight | Base64 | 10 | |
| sl0wguy | Favourite byte | 20 | |
| sheperd22 | Favourite byte | 20 | |
| sl0wguy | XOR Properties | 15 | |
| vanMjnh | Mister Saplin's Preview | 80 | |
| sheperd22 | XOR Properties | 15 | |
| aayshush | Modular Square Root | 35 | |
| powtoo | Bytes and Big Integers | 10 |
You are now level Current level