| Date | User | Challenge | Score |
| wanttobethebest | Fast Primes | 75 | |
| valh4x | Public Keys | 15 | |
| valh4x | RSA Signatures | 25 | |
| LeeWangWy | Legendre Symbol | 35 | |
| Anucker101 | Chinese Remainder Theorem | 40 | |
| valh4x | RSA Decryption | 20 | |
| valh4x | Factoring | 15 | |
| mbajic | Hex | 5 | |
| valh4x | Private Keys | 20 | |
| valh4x | Euler's Totient | 20 | |
| valh4x | Modular Exponentiation | 10 | |
| valh4x | Modular Inverting | 25 | |
| valh4x | Modular Arithmetic 2 | 20 | |
| valh4x | Modular Arithmetic 1 | 20 | |
| valh4x | Extended GCD | 20 | |
| valh4x | Greatest Common Divisor | 15 | |
| lemon1024 | Parameter Injection | 60 | |
| valh4x | You either know, XOR you don't | 30 | |
| valh4x | Favourite byte | 20 | |
| valh4x | XOR Properties | 15 | |
| valh4x | XOR Starter | 10 | |
| valh4x | Bytes and Big Integers | 10 | |
| valh4x | Base64 | 10 | |
| valh4x | Hex | 5 | |
| valh4x | ASCII | 5 | |
| S1RJAM3S | Non-Interactive | 35 | |
| n0ah | Modular Binomials | 80 | |
| Faiyaz95 | Keyed Permutations | 5 | |
| lemon1024 | Computing Shared Secrets | 30 | |
| lemon1024 | Computing Public Values | 25 | |
| wangfu | XOR Starter | 10 | |
| lemon1024 | Deriving Symmetric Keys | 40 | |
| far | Base64 | 10 | |
| n0ah | Adrien's Signs | 80 | |
| 0xMrB34rd | Deriving Symmetric Keys | 40 | |
| ahmqd | Hamiltonicity 1 | 100 | |
| ahmqd | Hamiltonicity (CryptoHack) | 0 | |
| 0xMrB34rd | Computing Shared Secrets | 30 | |
| Anucker101 | Modular Square Root | 35 | |
| 0xMrB34rd | Computing Public Values | 25 | |
| 0xMrB34rd | Generators of Groups | 20 | |
| n0ah | Chinese Remainder Theorem | 40 | |
| far | Hex | 5 | |
| expired | You either know, XOR you don't | 30 | |
| far | ASCII | 5 | |
| ClockUwU | Hash Stuffing | 50 | |
| far | Great Snakes | 3 | |
| 0xMrB34rd | Working with Fields | 10 | |
| 0xMrB34rd | Modulus Inutilis | 50 | |
| LeeWangWy | Quadratic Residues | 25 |
You are now level Current level