| Date | User | Challenge | Score |
| Kas_d_Attay | Computing Shared Secrets | 30 | |
| Kas_d_Attay | Computing Public Values | 25 | |
| Kas_d_Attay | Generators of Groups | 20 | |
| Kas_d_Attay | Working with Fields | 10 | |
| Kas_d_Attay | Modulus Inutilis | 50 | |
| ispo | Smooth Criminal | 60 | |
| Kas_d_Attay | Salty | 20 | |
| Chen | Chinese Remainder Theorem | 40 | |
| paulti | Factoring | 15 | |
| paulti | RSA Signatures | 25 | |
| paulti | RSA Decryption | 20 | |
| paulti | Private Keys | 20 | |
| eirene | Extended GCD | 20 | |
| paulti | Euler's Totient | 20 | |
| paulti | Public Keys | 15 | |
| paulti | Modular Exponentiation | 10 | |
| BaBYBu11 | Manyprime | 40 | |
| radare | The Matrix Revolutions | 125 | |
| NoamN | CERTainly not | 30 | |
| paulti | CTRIME | 70 | |
| Kinokoda | Modular Square Root | 35 | |
| BillerKean | You either know, XOR you don't | 30 | |
| Kinokoda | Modular Binomials | 80 | |
| s0ngbird | Confusion through Substitution | 25 | |
| BillerKean | Favourite byte | 20 | |
| BillerKean | XOR Properties | 15 | |
| hedge_hedgehog | Passwords as Keys | 50 | |
| jotaghz | Let's Prove It Again | 175 | |
| MaxK | Modular Arithmetic 1 | 20 | |
| WQuench | XOR Starter | 10 | |
| Kinokoda | Adrien's Signs | 80 | |
| BillerKean | XOR Starter | 10 | |
| Mejkl | Endless Emails | 150 | |
| BillerKean | Bytes and Big Integers | 10 | |
| NoamN | Privacy-Enhanced Mail? | 25 | |
| patryk | JSON in JSON | 40 | |
| ASN_123 | Greatest Common Divisor | 15 | |
| semisweetdude | Greatest Common Divisor | 15 | |
| BillerKean | Base64 | 10 | |
| patryk | RSA or HMAC? | 35 | |
| BillerKean | Hex | 5 | |
| BillerKean | ASCII | 5 | |
| BillerKean | Great Snakes | 3 | |
| 0xdaemon | Crossed Wires | 100 | |
| BillerKean | Finding Flags | 2 | |
| glitchcat | XOR Starter | 10 | |
| juxf0rfun | You either know, XOR you don't | 30 | |
| patryk | JWT Secrets | 25 | |
| mary12555488 | Monoprime | 30 | |
| _Zer0__ | Hex | 5 |
You are now level Current level