Date | User | Challenge | Score |
0xLLUUKKEE | Favourite byte | 20 | |
StitchMl | Modular Square Root | 35 | |
Psi505 | Euler's Totient | 20 | |
fuzzli | Diffusion through Permutation | 30 | |
Psi505 | Public Keys | 15 | |
Oce_ann | Hex | 5 | |
Oce_ann | ASCII | 5 | |
ibra01 | Hex | 5 | |
Oce_ann | Great Snakes | 3 | |
fuzzli | Confusion through Substitution | 25 | |
cse13224fsolomon | You either know, XOR you don't | 30 | |
ibra01 | ASCII | 5 | |
Oce_ann | Finding Flags | 2 | |
sifi_border | Successive Powers | 60 | |
cse13224mijasher | Modes of Operation Starter | 15 | |
cse13224ysadaat | PriMeD5 | 100 | |
cse13224rmudalia | What's a Lattice? | 40 | |
cse13224fsolomon | Favourite byte | 20 | |
met4sploit | XOR Starter | 10 | |
cse13224ysadaat | Hash Stuffing | 50 | |
cse13224bhaire | Favourite byte | 20 | |
ibra01 | Great Snakes | 3 | |
StitchMl | Legendre Symbol | 35 | |
cse13224mijasher | Bringing It All Together | 50 | |
sifi_border | Chinese Remainder Theorem | 40 | |
Archive | Privacy-Enhanced Mail? | 25 | |
Emma_vrn | Quadratic Residues | 25 | |
sifi_border | Modular Square Root | 35 | |
somerboy | Background Reading | 5 | |
ibra01 | Finding Flags | 2 | |
cse13224vdhir | RSA Decryption | 20 | |
fuzzli | Round Keys | 20 | |
Emma_vrn | Modular Inverting | 25 | |
cse13224vdhir | Private Keys | 20 | |
cse13224rmudalia | LWE Background | 5 | |
cse13224vdhir | Euler's Totient | 20 | |
met4sploit | Bytes and Big Integers | 10 | |
illuvision | Great Snakes | 3 | |
fuzzli | Structure of AES | 15 | |
illuvision | Finding Flags | 2 | |
met4sploit | Base64 | 10 | |
pc91 | Resisting Bruteforce | 10 | |
Emma_vrn | Modular Arithmetic 2 | 20 | |
fuzzli | Resisting Bruteforce | 10 | |
w4k4me | ECB Oracle | 60 | |
pc91 | Keyed Permutations | 5 | |
met4sploit | Hex | 5 | |
cse13224vdhir | Public Keys | 15 | |
Emma_vrn | Modular Arithmetic 1 | 20 | |
cse13224vdhir | Modular Exponentiation | 10 |
You are now level Current level