| Date | User | Challenge | Score |
| pacillians | Bean Counter | 60 | |
| kitxt | Working with Fields | 10 | |
| hyperegg | Modular Arithmetic 2 | 20 | |
| grousey | Modular Inverting | 25 | |
| litgift | Bytes and Big Integers | 10 | |
| I6nat1us_2011 | Vectors | 10 | |
| telepuzik | Finding Flags | 2 | |
| Jinx | The Matrix Revolutions | 125 | |
| awergrtb | Bytes and Big Integers | 10 | |
| hyperegg | Modular Arithmetic 1 | 20 | |
| v10g | Bytes and Big Integers | 10 | |
| gejin1017462464 | Passwords as Keys | 50 | |
| sourfish | Bytes and Big Integers | 10 | |
| awergrtb | Base64 | 10 | |
| whoami4 | Passwords as Keys | 50 | |
| hzy | You either know, XOR you don't | 30 | |
| hzy | Favourite byte | 20 | |
| v10g | Base64 | 10 | |
| hzy | XOR Properties | 15 | |
| hzy | XOR Starter | 10 | |
| platon17 | Bean Counter | 60 | |
| v10g | Hex | 5 | |
| platon17 | Symmetry | 50 | |
| hyperegg | Extended GCD | 20 | |
| v10g | ASCII | 5 | |
| platon17 | Flipping Cookie | 60 | |
| platon17 | ECB CBC WTF | 55 | |
| platon17 | ECB Oracle | 60 | |
| gejin1017462464 | Modes of Operation Starter | 15 | |
| v10g | Great Snakes | 3 | |
| v10g | Finding Flags | 2 | |
| platon17 | Passwords as Keys | 50 | |
| LXl491214 | Gaussian Reduction | 50 | |
| LXl491214 | What's a Lattice? | 40 | |
| gejin1017462464 | Bringing It All Together | 50 | |
| LXl491214 | Gram Schmidt | 30 | |
| rafaeldd91 | You either know, XOR you don't | 30 | |
| LXl491214 | Size and Basis | 15 | |
| pacillians | Symmetry | 50 | |
| LXl491214 | Vectors | 10 | |
| Jinx | Trust Games | 150 | |
| claudevicuna | Modular Exponentiation | 10 | |
| patawee | Structure of AES | 15 | |
| Jinx | Bruce Schneier's Password | 100 | |
| iwin2048 | Greatest Common Divisor | 15 | |
| Jinx | Toshi's Treasure | 150 | |
| ninjojo | XOR Starter | 10 | |
| patawee | Resisting Bruteforce | 10 | |
| Banana_Babanana | Missing Modulus | 80 | |
| guyanyong | Export-grade | 100 |
You are now level Current level