Date | User | Challenge | Score |
Stermi125 | Export-grade | 100 | |
arash1314 | Network Attacks | 5 | |
L64 | Edwards Goes Degenerate | 100 | |
pop_eax | Working with Fields | 10 | |
arash1314 | Great Snakes | 3 | |
yepchaos | Modes of Operation Starter | 15 | |
arash1314 | Finding Flags | 2 | |
husky_du | Finding Flags | 2 | |
moosesue | Modular Binomials | 80 | |
pop_eax | Modulus Inutilis | 50 | |
opcode86 | Successive Powers | 60 | |
sujandhakal | Bytes and Big Integers | 10 | |
yepchaos | Diffusion through Permutation | 30 | |
andutu0 | Modular Binomials | 80 | |
albanesimatias | Favourite byte | 20 | |
LittleNoPro | Efficient Exchange | 50 | |
yepchaos | Confusion through Substitution | 25 | |
sujandhakal | Base64 | 10 | |
yepchaos | Round Keys | 20 | |
OrdinaryPersonn | XOR Properties | 15 | |
Caffeine | Bytes and Big Integers | 10 | |
pop_eax | Salty | 20 | |
WABOBA | Extended GCD | 20 | |
nicolabalzano | Diffusion through Permutation | 30 | |
ZDGLCJV | Adrien's Signs | 80 | |
IIJ_10_anoop | Modular Square Root | 35 | |
xyz044 | Bytes and Big Integers | 10 | |
pop_eax | Manyprime | 40 | |
haruki | Round Keys | 20 | |
auric | Round Keys | 20 | |
ngoccry_2006 | Chinese Remainder Theorem | 40 | |
Gongulus | Resisting Bruteforce | 10 | |
pop_eax | Monoprime | 30 | |
xyz044 | Base64 | 10 | |
Julie_Yeh | Greatest Common Divisor | 15 | |
haruki | Structure of AES | 15 | |
LittleNoPro | Curves and Logs | 40 | |
zoltus | OR Proof (CryptoHack) | 0 | |
zoltus | OR Proof | 75 | |
haruki | Resisting Bruteforce | 10 | |
LittleNoPro | Scalar Multiplication | 35 | |
haruki | Keyed Permutations | 5 | |
mind_ctrl | Finding Flags | 2 | |
humaidcensus | Working with Fields | 10 | |
severus1105 | Flipping Cookie | 60 | |
lethe | ASCII | 5 | |
xyz044 | Hex | 5 | |
lethe | Finding Flags | 2 | |
lethe | Network Attacks | 5 | |
xyz044 | ASCII | 5 |
You are now level Current level