1 |
Number Sequence |
I |
4016 |
100 |
2 |
Original Caesar Cipher |
I |
2772 |
100 |
3 |
Number Sequence — Part 2 |
I |
1962 |
100 |
4 |
Caesar Encryption |
I |
1323 |
100 |
5 |
Beaver Code |
I |
1091 |
100 |
6 |
Letter to the Templars — Part 1 |
I |
955 |
100 |
7 |
Number Sequence — Part 3 |
I |
920 |
100 |
8 |
Letter to the Templars — Part 2 |
I |
764 |
100 |
9 |
Number Sequence — Part 4 |
I |
763 |
100 |
10 |
A hidden word |
I |
749 |
100 |
11 |
Letter to the Templars — Part 3 |
II |
650 |
1087 |
12 |
Affine Codes / Modulo Arithmetic with N / Extended Euclid |
I |
536 |
100 |
13 |
Monoalphabetic Substitution |
I |
520 |
100 |
14 |
Cracking SHA1-Hashed Passwords |
II |
492 |
1083 |
15 |
Factorization Cipher — Part 1 |
I |
464 |
100 |
16 |
Grille Cipher |
I |
444 |
100 |
17 |
Advent-Challenge — Part 1 |
I |
380 |
100 |
18 |
A modified homophonic cipher with reduced alphabets — Part 1 |
I |
370 |
100 |
19 |
Number Sequence — Part 8 |
I |
331 |
100 |
20 |
A modified homophonic cipher with reduced alphabets — Part 2 |
I |
318 |
100 |
21 |
One-Time Pad with Flaws |
I |
293 |
100 |
22 |
Alice's Birthday Party (Part 1) |
II |
277 |
1082 |
23 |
Snow White and the seven dwarfs |
I |
271 |
100 |
24 |
Alice's Birthday Party (Part 2) |
II |
271 |
1082 |
25 |
From Russia with Love |
I |
257 |
100 |
26 |
Broadcasting and low exponent — RSA Attack |
II |
216 |
1084 |
27 |
Modified Caesar Cipher |
I |
215 |
100 |
28 |
How do you become a big cryptographer? |
I |
205 |
100 |
29 |
M-138 — Part 1 |
I |
189 |
100 |
30 |
Reserve Hand Procedure — Part 1 |
I |
182 |
100 |
31 |
Not-so-Secret Message from Malawi — Part I (RSA) |
II |
182 |
1082 |
32 |
Brute-Force-Attack on Triple-DES with Reduced Key Space |
II |
181 |
1082 |
33 |
Letter from the Alleged Countess Julie von Ortenburg |
I |
166 |
100 |
34 |
Classical Ciphers^3 |
I |
164 |
100 |
35 |
Enigma Messages with Repeated Letters — Part 1 |
I |
160 |
100 |
36 |
Hybrid Encryption I |
II |
158 |
1082 |
37 |
Nils away on travel |
I |
152 |
100 |
38 |
RSA: Two different keys — same ciphertext |
II |
150 |
1084 |
39 |
Pigpen with a twist — Part 1 |
I |
144 |
100 |
40 |
Molehunt (Part 1/3) |
I |
141 |
100 |
41 |
Factorization Cipher — Part 2 |
II |
139 |
1085 |
42 |
The Book Code: A Challenge for Bookworms |
I |
137 |
100 |
43 |
¿No Hablas Español? No problemo! |
I |
136 |
100 |
44 |
Molehunt (Part 2/3) |
I |
135 |
100 |
45 |
Cryptanalysis Hacking Puzzles — Part 2 |
I |
131 |
100 |
46 |
Number Sequence — Part 6 |
I |
129 |
100 |
47 |
Enigma Part 1 |
II |
127 |
1082 |
48 |
Autokey Cipher |
I |
127 |
100 |
49 |
M-138 — Part 2 |
II |
118 |
1094 |
50 |
A Secret Message from Castle Mansfeld |
I |
118 |
100 |
51 |
Trifid Cipher |
I |
114 |
100 |
52 |
A really long number sequence |
II |
111 |
1084 |
53 |
ADFGVX — Part 2 |
I |
111 |
100 |
54 |
Image Noise |
I |
111 |
100 |
55 |
ADFGVX — Part 1 |
I |
103 |
100 |
56 |
Playfair Encryption |
I |
103 |
100 |
57 |
Kaskade-S/T — Part 1 |
I |
101 |
100 |
58 |
Playfair with hints about the grid |
I |
101 |
100 |
59 |
Double Columnar Transposition |
I |
100 |
100 |
60 |
Enigma Combinatorics |
I |
96 |
100 |
61 |
Number Sequence — Part 10 |
I |
95 |
100 |
62 |
Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 |
I |
93 |
100 |
63 |
Number Sequence — Part 9 |
I |
91 |
100 |
64 |
A hidden word — Part 2 |
I |
89 |
100 |
65 |
Heartbleed — Part 1 |
I |
89 |
100 |
66 |
ECDH-Key Exchange for Beginners |
I |
89 |
100 |
67 |
Factorization Cipher — Part 3 |
II |
88 |
1085 |
68 |
Zodiac Cipher |
I |
86 |
100 |
69 |
Enigma Part 2 |
II |
84 |
1082 |
70 |
Partial Key Exposure with RSA — Part 1 |
II |
81 |
1085 |
71 |
Hill Cipher with Sudoku Key |
I |
81 |
100 |
72 |
Number Sequence — Part 5 |
I |
81 |
100 |
73 |
ORYX Stream Cipher Part I |
II |
79 |
1082 |
74 |
The Last Note |
I |
79 |
100 |
75 |
Molehunt (Part 3/3) |
II |
78 |
1082 |
76 |
Number Sequence — Part 7 |
I |
75 |
100 |
77 |
Enigma Messages with Repeated Letters — Part 3 |
I |
73 |
100 |
78 |
Enigma Messages with Repeated Letters — Part 2 |
I |
72 |
100 |
79 |
Smartcard RSA |
II |
71 |
1082 |
80 |
Enigma Messages |
I |
70 |
100 |
81 |
Enigma Messages with Repeated Letters — Part 5 |
I |
70 |
100 |
82 |
Multilingual Monoalphabetic Substitution |
I |
69 |
100 |
83 |
BCR code (Book-Caesar-RSA) |
II |
67 |
1087 |
84 |
Cascading Encryption — Part 1/3 |
I |
67 |
100 |
85 |
AES key — encoded in the machine readable zone of a European ePassport |
II |
66 |
1085 |
86 |
Turing Bombe Enigma I |
I |
65 |
100 |
87 |
Enigma Messages with Repeated Letters — Part 4 |
I |
64 |
100 |
88 |
Recycled One-Time Pad |
I |
62 |
100 |
89 |
Unusual encryption using a diophantine equation |
II |
61 |
1084 |
90 |
Heartbleed — Part 2 |
I |
60 |
100 |
91 |
Monoalphabetic substitution with camouflage — Part 1 |
I |
59 |
100 |
92 |
An Invisible Message |
I |
56 |
100 |
93 |
Modular Sequences |
I |
55 |
100 |
94 |
M-138 — Part 3 |
II |
54 |
1094 |
95 |
The Einstein Enigma |
II |
52 |
1115 |
96 |
Kaskade-S/T — Part 2 |
II |
50 |
1083 |
97 |
RSA Factoring Challenge: RSA-704 |
II |
49 |
0 |
98 |
News from Castle Mansfeld |
I |
48 |
100 |
99 |
Monoalphabetic substitution with camouflage — Part 2 |
II |
48 |
1085 |
100 |
Unconcealed RSA messages |
II |
48 |
1084 |
101 |
ORYX Stream Cipher Part II |
II |
47 |
1082 |
102 |
Monoalphabetic substitution with camouflage — Part 4 |
I |
46 |
100 |
103 |
New Year's Greetings — Part 1 |
I |
45 |
100 |
104 |
Keyshanc — Part 1 |
II |
45 |
1086 |
105 |
Monoalphabetic substitution with camouflage — Part 3 |
II |
44 |
1085 |
106 |
Advent-Challenge — Part 2 |
II |
44 |
1113 |
107 |
RSA Factoring Challenge: RSA-210 |
II |
44 |
0 |
108 |
Summer Job |
II |
43 |
1119 |
109 |
Lunchtime Attack on the Fully Homomorphic Encryption Scheme |
II |
43 |
1083 |
110 |
Strange Message from Thessaloniki |
I |
42 |
100 |
111 |
Double Column Transposition — Part 4 |
II |
42 |
1092 |
112 |
New Year's Greetings — Part 2 |
I |
42 |
100 |
113 |
Weakened Granit — Part 1 |
I |
42 |
100 |
114 |
CMEA 1 |
II |
41 |
1082 |
115 |
Music Code — Part 1 |
I |
40 |
100 |
116 |
An 'unhearable' message |
I |
40 |
100 |
117 |
Double Column Transposition — Part 2 |
II |
40 |
1092 |
118 |
Music Code — Part 2 |
II |
40 |
1083 |
119 |
New Year's Greetings — Part 3 |
I |
39 |
100 |
120 |
New Year's Greetings — Part 4 |
I |
37 |
100 |
121 |
Pigpen with a twist — Part 2 |
II |
37 |
1084 |
122 |
Advent Challenge — Part 3 |
II |
36 |
1113 |
123 |
Not-so-Secret Message from Malawi — Part II (ECC) |
II |
36 |
1082 |
124 |
Ku Klux Klan |
X |
36 |
var |
125 |
Advent Challenge — Part 4 |
II |
36 |
1113 |
126 |
Double Column Transposition — Part 3 |
II |
35 |
1092 |
127 |
Pigpen with a twist — Part 3 |
II |
35 |
1084 |
128 |
Keyshanc — Part 2 |
II |
35 |
1086 |
129 |
Find the right route — Part 1 |
I |
33 |
101 |
130 |
Homophonic Encryption — Part 1 |
II |
32 |
1133 |
131 |
Kaskade-S/T — Part 3 |
II |
31 |
1083 |
132 |
Trendy Messenger |
II |
31 |
1119 |
133 |
ORYX Stream Cipher — Part 3 (revised) |
II |
30 |
1089 |
134 |
Heartbleed — Part 3 |
II |
30 |
1093 |
135 |
Fastest in the West |
II |
30 |
1119 |
136 |
RSA Factoring Challenge: RSA-220 |
II |
29 |
0 |
137 |
Lightweight Introduction to Lattices — Part 1 |
I |
29 |
100 |
138 |
Monoalphabetic Substitution with Camouflage — Part 5 |
II |
28 |
1085 |
139 |
Spanish Strip Cipher — Part 1 |
II |
28 |
1092 |
140 |
Double Column Transposition — Part 1 |
II |
28 |
1092 |
141 |
Lattice Part 1 |
II |
28 |
1083 |
142 |
CMEA 2 |
III |
27 |
13079 |
143 |
Monoalphabetic Substitution with Nostradamus Flavor |
II |
27 |
1129 |
144 |
Polyhomophonic Substitution — Part 1 |
I |
26 |
100 |
145 |
Cryptanalysis Hacking Puzzles — Part 1 |
I |
25 |
100 |
146 |
Homophonic Encryption — Part 2 |
II |
25 |
1133 |
147 |
Typex — Part 1 |
II |
25 |
1088 |
148 |
RSA Factoring Challenge: RSA-230 |
II |
25 |
0 |
149 |
Homophonic Encryption — Part 3 |
II |
24 |
1133 |
150 |
Homophonic Encryption — Part 4 |
II |
23 |
1133 |
151 |
RSA with Special d |
III |
23 |
13073 |
152 |
Spanish Strip Cipher — Part 2 |
II |
22 |
1092 |
153 |
Lightweight Introduction to Lattices — Part 2 |
I |
22 |
100 |
154 |
Typex — Part 2 |
II |
22 |
1088 |
155 |
Lightweight Introduction to Lattices — Part 3 |
II |
21 |
1181 |
156 |
Handycipher made in love — Part 1 |
II |
21 |
1129 |
157 |
M-138 — Part 4 |
II |
19 |
1094 |
158 |
Polyphonic Substitution Cipher — Part 1 |
II |
18 |
1147 |
159 |
Breaking a Filter Generator |
II |
17 |
1122 |
160 |
Purple 1 |
II |
17 |
1082 |
161 |
AES ECB Wrong Encoding |
II |
17 |
1113 |
162 |
The LoRa Cipher: Logic Randomness — Part 1 |
II |
17 |
1156 |
163 |
Concealed Messages — Vigenère's Night Sky |
X |
16 |
var |
164 |
Handycipher made in love — Part 2 |
II |
16 |
1134 |
165 |
Polyhomophonic Substitution — Part 2 |
II |
16 |
1161 |
166 |
A Cloaked Substitution Cipher — Part 1 |
II |
15 |
1140 |
167 |
New Year's Greetings — Part 5 |
II |
15 |
1100 |
168 |
Sigaba Part 1 |
II |
15 |
1082 |
169 |
Polyphonic Substitution Cipher — Part 2 |
II |
15 |
1152 |
170 |
Weakened Handycipher — Part 1 |
II |
15 |
1096 |
171 |
ASAC — A Strong(er) ADFGVX Cipher — Part 1 |
II |
15 |
1102 |
172 |
Cipher ID — Part 1 |
II |
14 |
1147 |
173 |
A Cloaked Substitution Cipher — Part 2 |
II |
14 |
1140 |
174 |
RSA Factoring Challenge: RSA-240 |
III |
14 |
0 |
175 |
Flawed Usage of a OTP Cipher by the BND |
II |
14 |
1097 |
176 |
Weakened Handycipher — Part 3 |
II |
14 |
1096 |
177 |
The T52 Sturgeon Challenge — Part 1 |
II |
13 |
1137 |
178 |
Cascading Encryption — Part 2/3 |
II |
13 |
1088 |
179 |
Weakened Handycipher — Part 2 |
II |
13 |
1096 |
180 |
Find the right route — Part 3 |
I |
13 |
102 |
181 |
Polyhomophonic Substitution — Part 3 |
II |
12 |
1163 |
182 |
RSA Factoring Challenge: RSA-250 |
III |
12 |
0 |
183 |
The T52 Sturgeon Challenge — Part 2 |
II |
12 |
1137 |
184 |
Find the right route — Part 2 |
I |
12 |
101 |
185 |
Cascading Encryption — Part 3/3 |
II |
12 |
1088 |
186 |
ORYX Stream Cipher — Part 4a |
II |
11 |
1092 |
187 |
Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 |
II |
11 |
1083 |
188 |
RSA Factoring Challenge: RSA-232 |
III |
11 |
0 |
189 |
The T52 Sturgeon Challenge — Part 3 |
II |
10 |
1137 |
190 |
Kaskade-S/T — Part 5 |
II |
10 |
1083 |
191 |
Akelarre Part 1 |
II |
10 |
1082 |
192 |
The T52 Sturgeon Challenge — Part 4 |
II |
9 |
1137 |
193 |
Double Column Transposition — Part 5 |
II |
8 |
1092 |
194 |
Hilly — Part 1 |
II |
8 |
1106 |
195 |
The SZ42 Challenge — Part 2 |
II |
8 |
1186 |
196 |
The SZ42 Challenge — Part 1 |
II |
8 |
1183 |
197 |
The SIGABA Challenge — Part 2 |
II |
7 |
1158 |
198 |
The SZ42 Challenge — Part 4 |
II |
7 |
1193 |
199 |
The SIGABA Challenge — Part 1 |
II |
7 |
1158 |
200 |
Handycipher — Part 2 |
II |
7 |
1095 |
201 |
The SZ42 Challenge — Part 3 |
II |
7 |
1189 |
202 |
The T52 Sturgeon Challenge — Part 8 |
II |
6 |
1139 |
203 |
Handycipher — Part 3 |
III |
6 |
13304 |
204 |
Holographic Encryption — Part 1 |
II |
6 |
1107 |
205 |
The T52 Sturgeon Challenge — Part 12 |
II |
6 |
1139 |
206 |
The T52 Sturgeon Challenge — Part 11 |
II |
6 |
1139 |
207 |
Kaskade-S/T — Part 6 (RansomKaskade Part 1) |
II |
6 |
1109 |
208 |
The SZ42 Challenge — Part 5 |
II |
6 |
1195 |
209 |
"The Road" — Part 1 |
II |
5 |
1125 |
210 |
The T52 Sturgeon Challenge — Part 9 |
II |
5 |
1139 |
211 |
Handycipher — Part 5 |
III |
5 |
13416 |
212 |
Handycipher — Part 6 |
III |
5 |
13416 |
213 |
The T52 Sturgeon Challenge — Part 10 |
II |
5 |
1139 |
214 |
The T52 Sturgeon Challenge — Part 7 |
II |
5 |
1139 |
215 |
The SZ42 Challenge — Part 8 |
II |
5 |
1220 |
216 |
The SZ42 Challenge — Part 6 |
II |
5 |
1206 |
217 |
The SIGABA Challenge — Part 3 |
III |
5 |
14246 |
218 |
Weakened Handycipher — Part 6 |
II |
5 |
1102 |
219 |
Weakened Handycipher — Part 5 |
II |
5 |
1102 |
220 |
Weakened Handycipher — Part 4 |
II |
5 |
1102 |
221 |
Spirale — Part 1 |
II |
5 |
1097 |
222 |
Spirale — Part 2 |
II |
5 |
1097 |
223 |
Handycipher — Part 1 |
II |
5 |
1095 |
224 |
The SZ42 Challenge — Part 7 |
II |
4 |
1217 |
225 |
The SIGABA Challenge — Part 4 |
III |
4 |
14257 |
226 |
Spirale — Part 3 |
II |
4 |
1097 |
227 |
Sigaba Part 2 |
III |
4 |
13073 |
228 |
Handycipher — Part 4 |
III |
4 |
13416 |
229 |
The T52 Sturgeon Challenge — Part 6 |
II |
4 |
1139 |
230 |
The T52 Sturgeon Challenge — Part 5 |
II |
4 |
1139 |
231 |
Notes of an Italian Soldier |
X |
4 |
var |
232 |
The Heavy T52 Sturgeon Challenge — Part 4 |
III |
4 |
14310 |
233 |
Differential Cryptanalysis — Part 2 |
II |
3 |
1154 |
234 |
The Vatican Challenge — Part 1 |
X |
3 |
var |
235 |
Weakened ElsieFour — Part 1 |
II |
3 |
1117 |
236 |
Christmas Challenge 2019: Differential Cryptanalysis — Part 1 |
II |
3 |
1150 |
237 |
The Vatican Challenge — Part 2 |
X |
3 |
var |
238 |
Weakened ElsieFour — Part 3 |
II |
3 |
1111 |
239 |
Extended Handycipher — Part 2 |
II |
3 |
1096 |
240 |
Extended Handycipher — Part 1 |
II |
3 |
1096 |
241 |
Extended Handycipher — Part 3 |
II |
3 |
1096 |
242 |
ElsieFour — Part 1 |
III |
3 |
13564 |
243 |
The SZ42 Challenge — Part 10 |
II |
3 |
1349 |
244 |
Extended Handycipher — Part 5 |
III |
3 |
13416 |
245 |
Extended Handycipher — Part 4 |
III |
3 |
13416 |
246 |
The Heavy T52 Sturgeon Challenge — Part 7 |
III |
3 |
14326 |
247 |
The SZ42 Challenge — Part 9 |
II |
3 |
1259 |
248 |
Holographic Encryption — Part 2 |
II |
3 |
1107 |
249 |
Handycipher — Part 8 |
III |
3 |
13476 |
250 |
Handycipher — Part 9 |
III |
3 |
13476 |
251 |
The Heavy T52 Sturgeon Challenge — Part 3 |
III |
2 |
14054 |
252 |
Catherine of Aragon's Letter to King Ferdinand, her Father (1509) |
X |
2 |
var |
253 |
ORYX Stream Cipher — Part 4b |
III |
2 |
13244 |
254 |
The SIGABA Challenge — Part 5 |
III |
2 |
14272 |
255 |
Unknown Author |
X |
2 |
var |
256 |
The Heavy T52 Sturgeon Challenge — Part 5 |
III |
2 |
14322 |
257 |
Double Column Transposition |
X |
2 |
var |
258 |
Handycipher — Part 7 |
III |
2 |
13476 |
259 |
Extended Handycipher — Part 6 |
III |
2 |
13416 |
260 |
Substitution Cipher with Non-Prefix Codes |
III |
1 |
13100 |
261 |
Monoalphabetic Substitution with Camouflage — Part 6 |
II |
1 |
1086 |
262 |
The SIGABA Challenge — Part 6 |
III |
1 |
14291 |
263 |
The SZ42 Challenge — Part 11 |
II |
1 |
1349 |
264 |
The Heavy T52 Sturgeon Challenge — Part 9 |
III |
1 |
14340 |
265 |
The Heavy T52 Sturgeon Challenge — Part 6 |
III |
1 |
14324 |
266 |
Handycipher — Part 10 |
II |
1 |
1136 |
267 |
The Heavy T52 Sturgeon Challenge — Part 1 |
III |
1 |
14024 |
268 |
The Vatican Challenge — Part 4 |
X |
1 |
var |
269 |
Hilly — Part 2 |
II |
1 |
1112 |
270 |
Beale Ciphers |
X |
1 |
var |
271 |
ASAC — A Strong(er) ADFGVX Cipher — Part 2 |
II |
1 |
1102 |
272 |
Double-Column Transposition/Granit — Part 3 |
II |
0 |
1097 |
273 |
RSA Factoring Challenge: RSA-400 |
III |
0 |
13128 |
274 |
ASAC — A Strong(er) ADFGVX Cipher — Part 5 |
II |
0 |
1102 |
275 |
ASAC — A Strong(er) ADFGVX Cipher — Part 4 |
II |
0 |
1102 |
276 |
ASAC — A Strong(er) ADFGVX Cipher — Part 3 |
II |
0 |
1102 |
277 |
The Heavy T52 Sturgeon Challenge — Part 8 |
III |
0 |
14328 |
278 |
RSA Factoring Challenge: RSA-360 |
III |
0 |
13128 |
279 |
Double-Column Transposition/Granit — Part 2 |
II |
0 |
1097 |
280 |
RSA Factoring Challenge: RSA-380 |
III |
0 |
13128 |
281 |
Double-Column Transposition/Granit — Part 1 |
II |
0 |
1097 |
282 |
Kryptos |
X |
0 |
var |
283 |
RSA Factoring Challenge: RSA-370 |
III |
0 |
13128 |
284 |
RSA Factoring Challenge: RSA-350 |
III |
0 |
13128 |
285 |
RSA Factoring Challenge: RSA-390 |
III |
0 |
13128 |
286 |
RSA Factoring Challenge: RSA-340 |
III |
0 |
13128 |
287 |
Spirale — Part 4 |
III |
0 |
13341 |
288 |
RSA Factoring Challenge: RSA-896 |
III |
0 |
13128 |
289 |
RSA Factoring Challenge: RSA-270 |
III |
0 |
13128 |
290 |
RSA Factoring Challenge: RSA-260 |
III |
0 |
13128 |
291 |
Weakened Granit — Part 3 |
II |
0 |
1098 |
292 |
Weakened Granit — Part 2 |
II |
0 |
1098 |
293 |
RSA Factoring Challenge: RSA-280 |
III |
0 |
13128 |
294 |
RSA Factoring Challenge: RSA-290 |
III |
0 |
13128 |
295 |
RSA Factoring Challenge: RSA-320 |
III |
0 |
13128 |
296 |
RSA Factoring Challenge: RSA-330 |
III |
0 |
13128 |
297 |
RSA Factoring Challenge: RSA-310 |
III |
0 |
13128 |
298 |
RSA Factoring Challenge: RSA-1024 |
III |
0 |
13128 |
299 |
RSA Factoring Challenge: RSA-300 |
III |
0 |
13128 |
300 |
RSA Factoring Challenge: RSA-309 |
III |
0 |
13128 |
301 |
RSA Factoring Challenge: RSA-410 |
III |
0 |
13128 |
302 |
RSA Factoring Challenge: RSA-420 |
III |
0 |
13128 |
303 |
"The Road" — Part 3 |
II |
0 |
1125 |
304 |
The Vatican Challenge — Part 5 |
X |
0 |
var |
305 |
"The Road" — Part 2 |
II |
0 |
1125 |
306 |
Digital Signatures: DSA with Medium Fields |
III |
0 |
13109 |
307 |
RSA Factoring Challenge: RSA-2048 |
III |
0 |
13128 |
308 |
The third ENIGMA M4 message |
X |
0 |
var |
309 |
D'Agapeyeff |
X |
0 |
var |
310 |
The Vatican Challenge — Part 3 |
X |
0 |
var |
311 |
ORYX Stream Cipher — Part 4d |
III |
0 |
13198 |
312 |
Double Column Transposition Reloaded — Part 1 |
III |
0 |
13224 |
313 |
Recovering the Private Key in the Fully Homomorphic Encryption Scheme |
III |
0 |
13083 |
314 |
Twelve-Year-Old Murder Case |
X |
0 |
var |
315 |
Double Column Transposition Reloaded — Part 3 |
III |
0 |
13224 |
316 |
Kaskade-S/T — Part 4 |
II |
0 |
1083 |
317 |
RSA Factoring Challenge: RSA-617 |
III |
0 |
13128 |
318 |
RSA Factoring Challenge: RSA-500 |
III |
0 |
13128 |
319 |
World Record Challenge: Break 65 Bits of AES |
III |
0 |
13073 |
320 |
The Heavy T52 Sturgeon Challenge — Part 2 |
III |
0 |
14034 |
321 |
RSA Factoring Challenge: RSA-450 |
III |
0 |
13128 |
322 |
RSA Factoring Challenge: RSA-440 |
III |
0 |
13128 |
323 |
RSA Factoring Challenge: RSA-430 |
III |
0 |
13128 |
324 |
Weakened ElsieFour — Part 2 |
II |
0 |
1117 |
325 |
ORYX Stream Cipher — Part 4c |
III |
0 |
13244 |
326 |
RSA Factoring Challenge: RSA-460 |
III |
0 |
13128 |
327 |
RSA Factoring Challenge: RSA-480 |
III |
0 |
13128 |
328 |
RSA Factoring Challenge: RSA-490 |
III |
0 |
13128 |
329 |
Spanish Strip Cipher — Part 3 |
X |
0 |
var |
330 |
Dorabella |
X |
0 |
var |
331 |
RSA Factoring Challenge: RSA-1536 |
III |
0 |
13128 |
332 |
RSA Factoring Challenge: RSA-470 |
III |
0 |
13128 |
333 |
Double Column Transposition Reloaded — Part 2 |
III |
0 |
13224 |