| Diffie-Hellman | Export-grade | 100 | |
| Diffie-Hellman | Parameter Injection | 60 | |
| Hash Functions | MDFlag | 125 | |
| CTF Archive | Hamiltonicity (CryptoHack) | 0 | |
| ZKPs | Hamiltonicity 1 | 100 | |
| Symmetric Ciphers | Symmetry | 50 | |
| Symmetric Ciphers | Flipping Cookie | 60 | |
| Symmetric Ciphers | Triple DES | 60 | |
| Symmetric Ciphers | Lazy CBC | 60 | |
| Symmetric Ciphers | Resisting Bruteforce | 10 | |
| Symmetric Ciphers | Keyed Permutations | 5 | |
| Misc | L-Win | 120 | |
| Misc | Toshi's Treasure | 150 | |
| Misc | Armory | 100 | |
| Misc | Bit by Bit | 100 | |
| Misc | Bruce Schneier's Password | 100 | |
| Mathematics | Cofactor Cofantasy | 150 | |
| Mathematics | Real Eisenstein | 150 | |
| Mathematics | Unencryptable | 125 | |
| Mathematics | Broken RSA | 100 | |
| Mathematics | Modular Binomials | 80 | |
| Mathematics | Adrien's Signs | 80 | |
| Mathematics | Chinese Remainder Theorem | 40 | |
| Mathematics | Modular Square Root | 35 | |
| Mathematics | Legendre Symbol | 35 | |
| Mathematics | Quadratic Residues | 25 | |
| Lattices | Bounded Noise | 50 | |
| Lattices | Noise Free | 40 | |
| Lattices | From Private to Public Key LWE | 25 | |
| Lattices | LWE Low Bits Message | 20 | |
| Lattices | LWE High Bits Message | 15 | |
| Lattices | LWE Intro | 10 | |
| Lattices | LWE Background | 5 | |
| Lattices | Backpack Cryptography | 120 | |
| Lattices | Find the Lattice | 100 | |
| Lattices | Gaussian Reduction | 50 | |
| Lattices | What's a Lattice? | 40 | |
| Lattices | Gram Schmidt | 30 | |
| Lattices | Size and Basis | 15 | |
| Lattices | Vectors | 10 | |
| Elliptic Curves | Elliptic Nodes | 150 | |
| Diffie-Hellman | Deriving Symmetric Keys | 40 | |
| Diffie-Hellman | Computing Shared Secrets | 30 | |
| Diffie-Hellman | Computing Public Values | 25 | |
| Diffie-Hellman | Generators of Groups | 20 | |
| Diffie-Hellman | Working with Fields | 10 | |
| Elliptic Curves | Exceptional Curves | 100 | |
| Symmetric Ciphers | ECB CBC WTF | 55 | |
| Hash Functions | Merkle Trees | 25 | |
| Misc | No Leaks | 100 | |
| Misc | Gotta Go Fast | 40 | |
| Elliptic Curves | Smooth Criminal | 60 | |
| ZKPs | Mister Saplins The Prover | 125 | |
| ZKPs | Fischlin Transform | 180 | |
| CTF Archive | Fischlin's Transformation (CryptoHack) | 0 | |
| ZKPs | Too Honest | 50 | |
| ZKPs | Non-Interactive | 35 | |
| ZKPs | Honest Verifier Zero Knowledge | 30 | |
| ZKPs | Special Soundness | 25 | |
| ZKPs | Proofs of Knowledge | 20 | |
| ZKPs | ZKP Introduction | 5 | |
| RSA | Everything is Big | 70 | |
| RSA | Modulus Inutilis | 50 | |
| RSA | Salty | 20 | |
| RSA | Manyprime | 40 | |
| RSA | Square Eyes | 35 | |
| RSA | Monoprime | 30 | |
| RSA | Inferius Prime | 30 | |
| RSA | Factoring | 15 | |
| RSA | RSA Signatures | 25 | |
| RSA | RSA Decryption | 20 | |
| RSA | Private Keys | 20 | |
| RSA | Euler's Totient | 20 | |
| RSA | Public Keys | 15 | |
| RSA | Modular Exponentiation | 10 | |
| Hash Functions | Jack's Birthday Confusion | 30 | |
| Hash Functions | Jack's Birthday Hash | 20 | |
| Mathematics | Successive Powers | 60 | |
| General | Modular Inverting | 25 | |
| General | Modular Arithmetic 2 | 20 | |
| General | Modular Arithmetic 1 | 20 | |
| General | Extended GCD | 20 | |
| General | Greatest Common Divisor | 15 | |
| General | Lemur XOR | 40 | |
| General | You either know, XOR you don't | 30 | |
| General | Favourite byte | 20 | |
| General | XOR Properties | 15 | |
| General | XOR Starter | 10 | |
| General | Encoding Challenge | 40 | |
| General | Bytes and Big Integers | 10 | |
| General | Base64 | 10 | |
| General | Hex | 5 | |
| General | ASCII | 5 | |
| Introduction | Network Attacks | 5 | |
| Introduction | Great Snakes | 3 | |
| Introduction | Finding Flags | 2 | |
| Hash Functions | MD0 | 80 | |
| Hash Functions | Hash Stuffing | 50 | |
| Hash Functions | Collider | 50 | |
| Symmetric Ciphers | The Good, The Pad, The Ugly | 100 | |
| Symmetric Ciphers | Pad Thai | 80 | |
| Hash Functions | No Difference | 175 | |
| Hash Functions | Mixed Up | 120 | |
| Hash Functions | Invariant | 250 | |
| Hash Functions | WOTS Up 2 | 90 | |
| Hash Functions | WOTS Up | 75 | |
| Mathematics | Prime and Prejudice | 200 | |
| Mathematics | No Way Back Home | 100 | |
| Elliptic Curves | Efficient Exchange | 50 | |
| Elliptic Curves | Curves and Logs | 40 | |
| Elliptic Curves | Scalar Multiplication | 35 | |
| Elliptic Curves | Point Addition | 30 | |
| Elliptic Curves | Point Negation | 10 | |
| Elliptic Curves | Background Reading | 5 | 
          You are now level Current level