| Lattices | Backpack Cryptography | 120 | |
| Lattices | Gram Schmidt | 30 | |
| Lattices | Find the Lattice | 100 | |
| Lattices | Gaussian Reduction | 50 | |
| Lattices | What's a Lattice? | 40 | |
| Lattices | Size and Basis | 15 | |
| Lattices | Vectors | 10 | |
| Symmetric Ciphers | Forbidden Fruit | 150 | |
| Symmetric Ciphers | Paper Plane | 120 | |
| Symmetric Ciphers | CTRIME | 70 | |
| Symmetric Ciphers | Stream of Consciousness | 80 | |
| Symmetric Ciphers | Bean Counter | 60 | |
| Symmetric Ciphers | Symmetry | 50 | |
| Symmetric Ciphers | Lazy CBC | 60 | |
| Symmetric Ciphers | Flipping Cookie | 60 | |
| Symmetric Ciphers | ECB CBC WTF | 55 | |
| Symmetric Ciphers | ECB Oracle | 60 | |
| Symmetric Ciphers | Passwords as Keys | 50 | |
| Symmetric Ciphers | Modes of Operation Starter | 15 | |
| Symmetric Ciphers | Bringing It All Together | 50 | |
| Symmetric Ciphers | Diffusion through Permutation | 30 | |
| Symmetric Ciphers | Confusion through Substitution | 25 | |
| Symmetric Ciphers | Round Keys | 20 | |
| Symmetric Ciphers | Structure of AES | 15 | |
| Symmetric Ciphers | Resisting Bruteforce | 10 | |
| Symmetric Ciphers | Keyed Permutations | 5 | |
| Mathematics | Successive Powers | 60 | |
| Mathematics | Chinese Remainder Theorem | 40 | |
| Mathematics | Modular Square Root | 35 | |
| Mathematics | Legendre Symbol | 35 | |
| Mathematics | Quadratic Residues | 25 | |
| Misc | Lo-Hi Card Game | 120 | |
| Lattices | Too Many Errors | 100 | |
| Misc | Gotta Go Fast | 40 | |
| Misc | No Leaks | 100 | |
| General | Hex | 5 | |
| General | ASCII | 5 | |
| Introduction | Network Attacks | 5 | |
| Introduction | Great Snakes | 3 | |
| Introduction | Finding Flags | 2 |
You are now level Current level