| Date | User | Challenge | Score |
| AllFine | ECB Oracle | 60 | |
| priv3bo | Favourite byte | 20 | |
| ec1ipse | Modular Inverting | 25 | |
| priv3bo | XOR Properties | 15 | |
| nurdabazarbay | Favourite byte | 20 | |
| ec1ipse | Modular Arithmetic 2 | 20 | |
| nurdabazarbay | XOR Properties | 15 | |
| ec1ipse | Modular Arithmetic 1 | 20 | |
| silentRoar | Modes of Operation Starter | 15 | |
| ec1ipse | Extended GCD | 20 | |
| priv3bo | XOR Starter | 10 | |
| nurdabazarbay | XOR Starter | 10 | |
| nurdabazarbay | Bytes and Big Integers | 10 | |
| MrJLD | Bean Counter | 60 | |
| priv3bo | Bytes and Big Integers | 10 | |
| nurdabazarbay | Base64 | 10 | |
| ec1ipse | Greatest Common Divisor | 15 | |
| nurdabazarbay | Hex | 5 | |
| nurdabazarbay | ASCII | 5 | |
| priv3bo | Base64 | 10 | |
| nurdabazarbay | Great Snakes | 3 | |
| kshah03 | Export-grade | 100 | |
| nurdabazarbay | Finding Flags | 2 | |
| kshah03 | Parameter Injection | 60 | |
| Erhan | Symmetry | 50 | |
| artio90 | Inferius Prime | 30 | |
| Erhan | Flipping Cookie | 60 | |
| kshah03 | Deriving Symmetric Keys | 40 | |
| ec1ipse | You either know, XOR you don't | 30 | |
| kshah03 | Computing Shared Secrets | 30 | |
| Chaya | Finding Flags | 2 | |
| kshah03 | Computing Public Values | 25 | |
| kien | Favourite byte | 20 | |
| kshah03 | Generators of Groups | 20 | |
| kshah03 | Working with Fields | 10 | |
| kekhol | Extended GCD | 20 | |
| artio90 | Factoring | 15 | |
| kshah03 | Modulus Inutilis | 50 | |
| kshah03 | Salty | 20 | |
| kshah03 | Manyprime | 40 | |
| loafiee | Lazy CBC | 60 | |
| kevmill29 | Base64 | 10 | |
| dustflare7805 | Bytes and Big Integers | 10 | |
| kevmill29 | Hex | 5 | |
| dustflare7805 | Base64 | 10 | |
| dustflare7805 | Hex | 5 | |
| blazhenny | ECB Oracle | 60 | |
| kshah03 | Monoprime | 30 | |
| kshah03 | Factoring | 15 | |
| Farabi1231 | Modes of Operation Starter | 15 |
You are now level Current level