Date | User | Challenge | Score |
gabri1135 | Successive Powers | 60 | |
TheTon | Favourite byte | 20 | |
mkvitkina | XOR Starter | 10 | |
enyun | XOR Starter | 10 | |
KLPP | Signature (TSJ CTF) | 0 | |
m0re | Gotta Go Fast | 40 | |
mkvitkina | Bytes and Big Integers | 10 | |
doublefree | XOR Starter | 10 | |
diegopetrola | ECB Oracle | 60 | |
kamikadze13 | XOR Starter | 10 | |
doublefree | Bytes and Big Integers | 10 | |
amanay | Base64 | 10 | |
enyun | Bytes and Big Integers | 10 | |
Ngias | Modular Inverting | 25 | |
zorblin | Bytes and Big Integers | 10 | |
Moorts | CSIDH Key Exchange | 90 | |
enyun | Base64 | 10 | |
Ngias | Modular Arithmetic 2 | 20 | |
IMNOTHERE | Greatest Common Divisor | 15 | |
ISSAM71 | Greatest Common Divisor | 15 | |
enyun | Hex | 5 | |
amanay | Hex | 5 | |
Ngias | Modular Arithmetic 1 | 20 | |
doublefree | Base64 | 10 | |
kCSE | Base64 | 10 | |
Ruspanera06 | RSA Signatures | 25 | |
kCSE | Hex | 5 | |
amanay | ASCII | 5 | |
semkin | Lemur XOR | 40 | |
amanay | Great Snakes | 3 | |
Ruspanera06 | RSA Decryption | 20 | |
Ruspanera06 | Private Keys | 20 | |
mrtorture | Modular Arithmetic 1 | 20 | |
Ruspanera06 | Euler's Totient | 20 | |
Ruspanera06 | Public Keys | 15 | |
Ruspanera06 | Modular Exponentiation | 10 | |
croc_or_crack | Network Attacks | 5 | |
lolitaall | Structure of AES | 15 | |
k1r4_021 | Legendre Symbol | 35 | |
IMNOTHERE | You either know, XOR you don't | 30 | |
amanay | Finding Flags | 2 | |
ChiaraS | Confusion through Substitution | 25 | |
Ngias | Extended GCD | 20 | |
mkvitkina | Base64 | 10 | |
TheTon | XOR Properties | 15 | |
mrtorture | Extended GCD | 20 | |
christians7 | You either know, XOR you don't | 30 | |
christians7 | Favourite byte | 20 | |
mkvitkina | Hex | 5 | |
christians7 | XOR Properties | 15 |
You are now level Current level