| DLOG on the Surface | 0 |
| Isogenies | Twisted CSIDH Isogenies | 70 | |
| Isogenies | Prime Power Isogenies | 50 | |
| Isogenies | CSIDH Key Exchange | 90 | |
| Isogenies | Special Isogenies | 30 | |
| Isogenies | Three Isogenies | 35 | |
| Isogenies | SIDH Key Exchange | 80 | |
| Isogenies | Composite Isogenies | 60 | |
| Isogenies | Two Isogenies | 30 | |
| Isogenies | Breaking SIDH | 250 | |
| Isogenies | What's My Kernel | 70 | |
| Isogenies | André Encoding | 80 | |
| Isogenies | Better than Linear | 85 | |
| Isogenies | Abelian SIDH | 90 | |
| Isogenies | Dual Masters | 90 | |
| Isogenies | Meet me in the Claw | 120 | |
| Isogenies | A True Genus | 175 | |
| Isogenies | DLOG on the Surface | 40 | |
| Crypto on the Web | RSA or HMAC? Part 2 | 100 | |
| Crypto on the Web | JSON in JSON | 40 | |
| Crypto on the Web | RSA or HMAC? | 35 | |
| Mathematics | Modular Binomials | 80 | |
| Mathematics | Successive Powers | 60 | |
| Mathematics | Legendre Symbol | 35 | |
| Mathematics | Modular Square Root | 35 | |
| Mathematics | Chinese Remainder Theorem | 40 | |
| Symmetric Ciphers | Resisting Bruteforce | 10 | |
| Symmetric Ciphers | Keyed Permutations | 5 | |
| Crypto on the Web | JWT Secrets | 25 | |
| Crypto on the Web | Saying Hello | 20 | |
| Crypto on the Web | TLS Handshake | 15 | |
| Crypto on the Web | Sharks on the Wire | 10 | |
| Crypto on the Web | Secure Protocols | 5 | |
| Crypto on the Web | No Way JOSE | 20 | |
| Crypto on the Web | JWT Sessions | 10 | |
| Crypto on the Web | Token Appreciation | 5 | |
| Lattices | Find the Lattice | 100 | |
| ZKPs | ZKP Introduction | 5 | |
| Lattices | From Private to Public Key LWE | 25 | |
| Lattices | LWE Intro | 10 | |
| Lattices | Gaussian Reduction | 50 | |
| Lattices | What's a Lattice? | 40 | |
| Lattices | LWE Background | 5 | |
| Lattices | Gram Schmidt | 30 | |
| Lattices | Size and Basis | 15 | |
| Lattices | Vectors | 10 | |
| Mathematics | Quadratic Residues | 25 | |
| General | Privacy-Enhanced Mail? | 25 | |
| General | Modular Inverting | 25 | |
| General | Modular Arithmetic 2 | 20 | |
| General | Modular Arithmetic 1 | 20 | |
| General | Extended GCD | 20 | |
| General | CERTainly not | 30 | |
| General | Transparency | 50 | |
| General | SSH Keys | 35 | |
| General | Greatest Common Divisor | 15 | |
| General | Lemur XOR | 40 | |
| General | Encoding Challenge | 40 | |
| General | You either know, XOR you don't | 30 | |
| General | Favourite byte | 20 | |
| General | XOR Properties | 15 | |
| General | XOR Starter | 10 | |
| General | Bytes and Big Integers | 10 | |
| General | Base64 | 10 | |
| General | Hex | 5 | |
| General | ASCII | 5 | |
| Introduction | Network Attacks | 5 | |
| Introduction | Great Snakes | 3 | |
| Introduction | Finding Flags | 2 | |
| Elliptic Curves | Point Negation | 10 | |
| Elliptic Curves | Background Reading | 5 |
You are now level Current level