1 |
Number Sequence |
I |
3986 |
100 |
2 |
Original Caesar Cipher |
I |
2748 |
100 |
3 |
Number Sequence — Part 2 |
I |
1942 |
100 |
4 |
Caesar Encryption |
I |
1314 |
100 |
5 |
Beaver Code |
I |
1085 |
100 |
6 |
Letter to the Templars — Part 1 |
I |
949 |
100 |
7 |
Number Sequence — Part 3 |
I |
913 |
100 |
8 |
Letter to the Templars — Part 2 |
I |
759 |
100 |
9 |
Number Sequence — Part 4 |
I |
756 |
100 |
10 |
A hidden word |
I |
747 |
100 |
11 |
Letter to the Templars — Part 3 |
II |
644 |
1087 |
12 |
Affine Codes / Modulo Arithmetic with N / Extended Euclid |
I |
532 |
100 |
13 |
Monoalphabetic Substitution |
I |
519 |
100 |
14 |
Cracking SHA1-Hashed Passwords |
II |
488 |
1083 |
15 |
Factorization Cipher — Part 1 |
I |
461 |
100 |
16 |
Grille Cipher |
I |
440 |
100 |
17 |
Advent-Challenge — Part 1 |
I |
378 |
100 |
18 |
A modified homophonic cipher with reduced alphabets — Part 1 |
I |
368 |
100 |
19 |
Number Sequence — Part 8 |
I |
328 |
100 |
20 |
A modified homophonic cipher with reduced alphabets — Part 2 |
I |
316 |
100 |
21 |
One-Time Pad with Flaws |
I |
289 |
100 |
22 |
Alice's Birthday Party (Part 1) |
II |
275 |
1082 |
23 |
Alice's Birthday Party (Part 2) |
II |
269 |
1082 |
24 |
Snow White and the seven dwarfs |
I |
268 |
100 |
25 |
From Russia with Love |
I |
256 |
100 |
26 |
Broadcasting and low exponent — RSA Attack |
II |
213 |
1084 |
27 |
Modified Caesar Cipher |
I |
211 |
100 |
28 |
How do you become a big cryptographer? |
I |
204 |
100 |
29 |
M-138 — Part 1 |
I |
186 |
100 |
30 |
Reserve Hand Procedure — Part 1 |
I |
182 |
100 |
31 |
Not-so-Secret Message from Malawi — Part I (RSA) |
II |
181 |
1082 |
32 |
Brute-Force-Attack on Triple-DES with Reduced Key Space |
II |
179 |
1082 |
33 |
Letter from the Alleged Countess Julie von Ortenburg |
I |
166 |
100 |
34 |
Classical Ciphers^3 |
I |
163 |
100 |
35 |
Enigma Messages with Repeated Letters — Part 1 |
I |
160 |
100 |
36 |
Hybrid Encryption I |
II |
154 |
1082 |
37 |
Nils away on travel |
I |
152 |
100 |
38 |
RSA: Two different keys — same ciphertext |
II |
149 |
1084 |
39 |
Pigpen with a twist — Part 1 |
I |
144 |
100 |
40 |
Factorization Cipher — Part 2 |
II |
138 |
1085 |
41 |
Molehunt (Part 1/3) |
I |
137 |
100 |
42 |
¿No Hablas Español? No problemo! |
I |
135 |
100 |
43 |
The Book Code: A Challenge for Bookworms |
I |
135 |
100 |
44 |
Molehunt (Part 2/3) |
I |
132 |
100 |
45 |
Cryptanalysis Hacking Puzzles — Part 2 |
I |
129 |
100 |
46 |
Number Sequence — Part 6 |
I |
127 |
100 |
47 |
Autokey Cipher |
I |
126 |
100 |
48 |
Enigma Part 1 |
II |
125 |
1082 |
49 |
A Secret Message from Castle Mansfeld |
I |
118 |
100 |
50 |
M-138 — Part 2 |
II |
116 |
1095 |
51 |
Trifid Cipher |
I |
114 |
100 |
52 |
A really long number sequence |
II |
111 |
1084 |
53 |
ADFGVX — Part 2 |
I |
110 |
100 |
54 |
Image Noise |
I |
109 |
100 |
55 |
Playfair Encryption |
I |
102 |
100 |
56 |
ADFGVX — Part 1 |
I |
102 |
100 |
57 |
Playfair with hints about the grid |
I |
101 |
100 |
58 |
Kaskade-S/T — Part 1 |
I |
100 |
100 |
59 |
Double Columnar Transposition |
I |
98 |
100 |
60 |
Enigma Combinatorics |
I |
96 |
100 |
61 |
Number Sequence — Part 10 |
I |
95 |
100 |
62 |
Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 |
I |
93 |
100 |
63 |
ECDH-Key Exchange for Beginners |
I |
89 |
100 |
64 |
Heartbleed — Part 1 |
I |
89 |
100 |
65 |
Number Sequence — Part 9 |
I |
88 |
100 |
66 |
Factorization Cipher — Part 3 |
II |
87 |
1085 |
67 |
A hidden word — Part 2 |
I |
86 |
100 |
68 |
Zodiac Cipher |
I |
85 |
100 |
69 |
Enigma Part 2 |
II |
83 |
1082 |
70 |
Hill Cipher with Sudoku Key |
I |
81 |
100 |
71 |
Number Sequence — Part 5 |
I |
81 |
100 |
72 |
ORYX Stream Cipher Part I |
II |
79 |
1082 |
73 |
Partial Key Exposure with RSA — Part 1 |
II |
79 |
1085 |
74 |
The Last Note |
I |
79 |
100 |
75 |
Molehunt (Part 3/3) |
II |
76 |
1082 |
76 |
Number Sequence — Part 7 |
I |
74 |
100 |
77 |
Enigma Messages with Repeated Letters — Part 3 |
I |
73 |
100 |
78 |
Enigma Messages with Repeated Letters — Part 2 |
I |
72 |
100 |
79 |
Smartcard RSA |
II |
70 |
1082 |
80 |
Enigma Messages with Repeated Letters — Part 5 |
I |
70 |
100 |
81 |
Enigma Messages |
I |
70 |
100 |
82 |
Multilingual Monoalphabetic Substitution |
I |
69 |
100 |
83 |
Cascading Encryption — Part 1/3 |
I |
66 |
100 |
84 |
BCR code (Book-Caesar-RSA) |
II |
66 |
1087 |
85 |
Turing Bombe Enigma I |
I |
65 |
100 |
86 |
AES key — encoded in the machine readable zone of a European ePassport |
II |
65 |
1085 |
87 |
Enigma Messages with Repeated Letters — Part 4 |
I |
64 |
100 |
88 |
Recycled One-Time Pad |
I |
62 |
100 |
89 |
Heartbleed — Part 2 |
I |
60 |
100 |
90 |
Unusual encryption using a diophantine equation |
II |
59 |
1084 |
91 |
Monoalphabetic substitution with camouflage — Part 1 |
I |
58 |
100 |
92 |
An Invisible Message |
I |
56 |
100 |
93 |
Modular Sequences |
I |
55 |
100 |
94 |
M-138 — Part 3 |
II |
53 |
1095 |
95 |
The Einstein Enigma |
II |
52 |
1116 |
96 |
Kaskade-S/T — Part 2 |
II |
49 |
1083 |
97 |
News from Castle Mansfeld |
I |
48 |
100 |
98 |
RSA Factoring Challenge: RSA-704 |
II |
47 |
0 |
99 |
Monoalphabetic substitution with camouflage — Part 2 |
II |
47 |
1085 |
100 |
Unconcealed RSA messages |
II |
47 |
1085 |
101 |
ORYX Stream Cipher Part II |
II |
47 |
1082 |
102 |
Keyshanc — Part 1 |
II |
45 |
1086 |
103 |
New Year's Greetings — Part 1 |
I |
45 |
100 |
104 |
Monoalphabetic substitution with camouflage — Part 4 |
I |
45 |
100 |
105 |
Monoalphabetic substitution with camouflage — Part 3 |
II |
43 |
1085 |
106 |
Lunchtime Attack on the Fully Homomorphic Encryption Scheme |
II |
43 |
1083 |
107 |
Summer Job |
II |
43 |
1120 |
108 |
Advent-Challenge — Part 2 |
II |
42 |
1114 |
109 |
New Year's Greetings — Part 2 |
I |
42 |
100 |
110 |
Weakened Granit — Part 1 |
I |
42 |
100 |
111 |
Strange Message from Thessaloniki |
I |
42 |
100 |
112 |
Double Column Transposition — Part 4 |
II |
42 |
1092 |
113 |
RSA Factoring Challenge: RSA-210 |
II |
42 |
0 |
114 |
Music Code — Part 1 |
I |
40 |
100 |
115 |
Music Code — Part 2 |
II |
40 |
1084 |
116 |
CMEA 1 |
II |
40 |
1083 |
117 |
Double Column Transposition — Part 2 |
II |
40 |
1092 |
118 |
An 'unhearable' message |
I |
39 |
100 |
119 |
New Year's Greetings — Part 3 |
I |
39 |
100 |
120 |
Pigpen with a twist — Part 2 |
II |
37 |
1084 |
121 |
New Year's Greetings — Part 4 |
I |
37 |
100 |
122 |
Ku Klux Klan |
X |
36 |
var |
123 |
Advent Challenge — Part 4 |
II |
35 |
1114 |
124 |
Keyshanc — Part 2 |
II |
35 |
1086 |
125 |
Advent Challenge — Part 3 |
II |
35 |
1114 |
126 |
Double Column Transposition — Part 3 |
II |
35 |
1092 |
127 |
Pigpen with a twist — Part 3 |
II |
34 |
1084 |
128 |
Not-so-Secret Message from Malawi — Part II (ECC) |
II |
34 |
1082 |
129 |
Trendy Messenger |
II |
31 |
1120 |
130 |
Homophonic Encryption — Part 1 |
II |
31 |
1135 |
131 |
Heartbleed — Part 3 |
II |
30 |
1094 |
132 |
ORYX Stream Cipher — Part 3 (revised) |
II |
30 |
1089 |
133 |
Fastest in the West |
II |
30 |
1120 |
134 |
Kaskade-S/T — Part 3 |
II |
29 |
1083 |
135 |
Lattice Part 1 |
II |
28 |
1083 |
136 |
Find the right route — Part 1 |
I |
28 |
101 |
137 |
CMEA 2 |
III |
27 |
13083 |
138 |
Double Column Transposition — Part 1 |
II |
27 |
1092 |
139 |
Monoalphabetic Substitution with Camouflage — Part 5 |
II |
27 |
1086 |
140 |
Spanish Strip Cipher — Part 1 |
II |
27 |
1092 |
141 |
Monoalphabetic Substitution with Nostradamus Flavor |
II |
27 |
1130 |
142 |
Polyhomophonic Substitution — Part 1 |
I |
26 |
100 |
143 |
RSA Factoring Challenge: RSA-220 |
II |
26 |
0 |
144 |
Lightweight Introduction to Lattices — Part 1 |
I |
26 |
100 |
145 |
Typex — Part 1 |
II |
25 |
1088 |
146 |
Cryptanalysis Hacking Puzzles — Part 1 |
I |
25 |
100 |
147 |
Homophonic Encryption — Part 2 |
II |
24 |
1135 |
148 |
Homophonic Encryption — Part 3 |
II |
23 |
1135 |
149 |
RSA with Special d |
III |
23 |
13077 |
150 |
Typex — Part 2 |
II |
22 |
1089 |
151 |
RSA Factoring Challenge: RSA-230 |
II |
22 |
0 |
152 |
Homophonic Encryption — Part 4 |
II |
22 |
1135 |
153 |
Spanish Strip Cipher — Part 2 |
II |
22 |
1092 |
154 |
Lightweight Introduction to Lattices — Part 2 |
I |
21 |
100 |
155 |
Lightweight Introduction to Lattices — Part 3 |
II |
20 |
1191 |
156 |
Handycipher made in love — Part 1 |
II |
20 |
1130 |
157 |
Polyphonic Substitution Cipher — Part 1 |
II |
17 |
1151 |
158 |
AES ECB Wrong Encoding |
II |
17 |
1114 |
159 |
Breaking a Filter Generator |
II |
17 |
1124 |
160 |
M-138 — Part 4 |
II |
17 |
1095 |
161 |
The LoRa Cipher: Logic Randomness — Part 1 |
II |
17 |
1161 |
162 |
Purple 1 |
II |
16 |
1082 |
163 |
Concealed Messages — Vigenère's Night Sky |
X |
16 |
var |
164 |
Sigaba Part 1 |
II |
15 |
1082 |
165 |
ASAC — A Strong(er) ADFGVX Cipher — Part 1 |
II |
15 |
1103 |
166 |
New Year's Greetings — Part 5 |
II |
15 |
1101 |
167 |
Weakened Handycipher — Part 1 |
II |
15 |
1097 |
168 |
Handycipher made in love — Part 2 |
II |
15 |
1136 |
169 |
A Cloaked Substitution Cipher — Part 1 |
II |
15 |
1142 |
170 |
Polyhomophonic Substitution — Part 2 |
II |
15 |
1167 |
171 |
Weakened Handycipher — Part 3 |
II |
14 |
1097 |
172 |
A Cloaked Substitution Cipher — Part 2 |
II |
14 |
1143 |
173 |
Flawed Usage of a OTP Cipher by the BND |
II |
14 |
1098 |
174 |
Polyphonic Substitution Cipher — Part 2 |
II |
14 |
1157 |
175 |
Cipher ID — Part 1 |
II |
14 |
1150 |
176 |
Weakened Handycipher — Part 2 |
II |
13 |
1097 |
177 |
Cascading Encryption — Part 2/3 |
II |
13 |
1089 |
178 |
The T52 Sturgeon Challenge — Part 1 |
II |
13 |
1140 |
179 |
Cascading Encryption — Part 3/3 |
II |
12 |
1089 |
180 |
RSA Factoring Challenge: RSA-240 |
III |
12 |
0 |
181 |
The T52 Sturgeon Challenge — Part 2 |
II |
12 |
1140 |
182 |
Polyhomophonic Substitution — Part 3 |
II |
12 |
1169 |
183 |
Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 |
II |
11 |
1083 |
184 |
ORYX Stream Cipher — Part 4a |
II |
11 |
1092 |
185 |
Find the right route — Part 3 |
I |
10 |
104 |
186 |
The T52 Sturgeon Challenge — Part 3 |
II |
10 |
1140 |
187 |
Kaskade-S/T — Part 5 |
II |
10 |
1083 |
188 |
RSA Factoring Challenge: RSA-250 |
III |
10 |
0 |
189 |
Akelarre Part 1 |
II |
10 |
1082 |
190 |
The T52 Sturgeon Challenge — Part 4 |
II |
9 |
1140 |
191 |
RSA Factoring Challenge: RSA-232 |
III |
9 |
0 |
192 |
Hilly — Part 1 |
II |
8 |
1107 |
193 |
The SZ42 Challenge — Part 2 |
II |
8 |
1198 |
194 |
Find the right route — Part 2 |
I |
8 |
103 |
195 |
The SZ42 Challenge — Part 1 |
II |
8 |
1193 |
196 |
Double Column Transposition — Part 5 |
II |
8 |
1093 |
197 |
Handycipher — Part 2 |
II |
7 |
1096 |
198 |
The SZ42 Challenge — Part 3 |
II |
7 |
1202 |
199 |
The SIGABA Challenge — Part 1 |
II |
7 |
1163 |
200 |
The SIGABA Challenge — Part 2 |
II |
7 |
1164 |
201 |
The SZ42 Challenge — Part 4 |
II |
7 |
1208 |
202 |
Holographic Encryption — Part 1 |
II |
6 |
1108 |
203 |
The T52 Sturgeon Challenge — Part 12 |
II |
6 |
1142 |
204 |
Kaskade-S/T — Part 6 (RansomKaskade Part 1) |
II |
6 |
1110 |
205 |
The T52 Sturgeon Challenge — Part 8 |
II |
6 |
1142 |
206 |
Handycipher — Part 3 |
III |
6 |
13312 |
207 |
The SZ42 Challenge — Part 5 |
II |
6 |
1209 |
208 |
The T52 Sturgeon Challenge — Part 11 |
II |
6 |
1142 |
209 |
Weakened Handycipher — Part 5 |
II |
5 |
1103 |
210 |
The T52 Sturgeon Challenge — Part 7 |
II |
5 |
1142 |
211 |
The SIGABA Challenge — Part 3 |
III |
5 |
14318 |
212 |
Weakened Handycipher — Part 4 |
II |
5 |
1103 |
213 |
Handycipher — Part 5 |
III |
5 |
13427 |
214 |
The SZ42 Challenge — Part 8 |
II |
5 |
1247 |
215 |
"The Road" — Part 1 |
II |
5 |
1127 |
216 |
The T52 Sturgeon Challenge — Part 9 |
II |
5 |
1142 |
217 |
Handycipher — Part 1 |
II |
5 |
1096 |
218 |
The T52 Sturgeon Challenge — Part 10 |
II |
5 |
1142 |
219 |
The SZ42 Challenge — Part 6 |
II |
5 |
1226 |
220 |
Weakened Handycipher — Part 6 |
II |
5 |
1103 |
221 |
Handycipher — Part 6 |
III |
5 |
13427 |
222 |
The Heavy T52 Sturgeon Challenge — Part 4 |
III |
4 |
14389 |
223 |
The SIGABA Challenge — Part 4 |
III |
4 |
14330 |
224 |
Notes of an Italian Soldier |
X |
4 |
var |
225 |
Handycipher — Part 4 |
III |
4 |
13427 |
226 |
Spirale — Part 2 |
II |
4 |
1098 |
227 |
Spirale — Part 1 |
II |
4 |
1098 |
228 |
The SZ42 Challenge — Part 7 |
II |
4 |
1244 |
229 |
The T52 Sturgeon Challenge — Part 5 |
II |
4 |
1142 |
230 |
Sigaba Part 2 |
III |
4 |
13077 |
231 |
The T52 Sturgeon Challenge — Part 6 |
II |
4 |
1142 |
232 |
Extended Handycipher — Part 2 |
II |
3 |
1096 |
233 |
The Vatican Challenge — Part 1 |
X |
3 |
var |
234 |
Spirale — Part 3 |
II |
3 |
1098 |
235 |
The Vatican Challenge — Part 2 |
X |
3 |
var |
236 |
Differential Cryptanalysis — Part 2 |
II |
3 |
1158 |
237 |
The Heavy T52 Sturgeon Challenge — Part 7 |
III |
3 |
14408 |
238 |
The SZ42 Challenge — Part 9 |
II |
3 |
1333 |
239 |
Weakened ElsieFour — Part 3 |
II |
3 |
1112 |
240 |
Weakened ElsieFour — Part 1 |
II |
3 |
1118 |
241 |
Extended Handycipher — Part 1 |
II |
3 |
1096 |
242 |
Extended Handycipher — Part 3 |
II |
3 |
1096 |
243 |
Extended Handycipher — Part 4 |
III |
3 |
13427 |
244 |
Handycipher — Part 9 |
III |
3 |
13488 |
245 |
Handycipher — Part 8 |
III |
3 |
13488 |
246 |
Holographic Encryption — Part 2 |
II |
3 |
1108 |
247 |
Christmas Challenge 2019: Differential Cryptanalysis — Part 1 |
II |
3 |
1154 |
248 |
ElsieFour — Part 1 |
III |
3 |
13580 |
249 |
Extended Handycipher — Part 5 |
III |
3 |
13427 |
250 |
ORYX Stream Cipher — Part 4b |
III |
2 |
13251 |
251 |
Double Column Transposition |
X |
2 |
var |
252 |
The Heavy T52 Sturgeon Challenge — Part 3 |
III |
2 |
14100 |
253 |
Catherine of Aragon's Letter to King Ferdinand, her Father (1509) |
X |
2 |
var |
254 |
The SIGABA Challenge — Part 5 |
III |
2 |
14346 |
255 |
Handycipher — Part 7 |
III |
2 |
13488 |
256 |
The Heavy T52 Sturgeon Challenge — Part 5 |
III |
2 |
14403 |
257 |
Extended Handycipher — Part 6 |
III |
2 |
13427 |
258 |
Unknown Author |
X |
2 |
var |
259 |
Handycipher — Part 10 |
II |
1 |
1138 |
260 |
ASAC — A Strong(er) ADFGVX Cipher — Part 2 |
II |
1 |
1103 |
261 |
Monoalphabetic Substitution with Camouflage — Part 6 |
II |
1 |
1086 |
262 |
The Heavy T52 Sturgeon Challenge — Part 1 |
III |
1 |
14068 |
263 |
The Vatican Challenge — Part 4 |
X |
1 |
var |
264 |
Beale Ciphers |
X |
1 |
var |
265 |
Substitution Cipher with Non-Prefix Codes |
III |
1 |
13105 |
266 |
The Heavy T52 Sturgeon Challenge — Part 9 |
III |
1 |
14424 |
267 |
The Heavy T52 Sturgeon Challenge — Part 6 |
III |
1 |
14405 |
268 |
Hilly — Part 2 |
II |
1 |
1113 |
269 |
The Vatican Challenge — Part 5 |
X |
0 |
var |
270 |
The Heavy T52 Sturgeon Challenge — Part 8 |
III |
0 |
14410 |
271 |
The Vatican Challenge — Part 3 |
X |
0 |
var |
272 |
The SIGABA Challenge — Part 6 |
III |
0 |
14367 |
273 |
The Heavy T52 Sturgeon Challenge — Part 2 |
III |
0 |
14079 |
274 |
Double Column Transposition Reloaded — Part 3 |
III |
0 |
13230 |
275 |
RSA Factoring Challenge: RSA-320 |
III |
0 |
13133 |
276 |
RSA Factoring Challenge: RSA-330 |
III |
0 |
13133 |
277 |
RSA Factoring Challenge: RSA-310 |
III |
0 |
13133 |
278 |
RSA Factoring Challenge: RSA-1024 |
III |
0 |
13133 |
279 |
RSA Factoring Challenge: RSA-300 |
III |
0 |
13133 |
280 |
RSA Factoring Challenge: RSA-309 |
III |
0 |
13133 |
281 |
RSA Factoring Challenge: RSA-340 |
III |
0 |
13133 |
282 |
RSA Factoring Challenge: RSA-350 |
III |
0 |
13133 |
283 |
RSA Factoring Challenge: RSA-390 |
III |
0 |
13133 |
284 |
RSA Factoring Challenge: RSA-400 |
III |
0 |
13133 |
285 |
RSA Factoring Challenge: RSA-380 |
III |
0 |
13133 |
286 |
RSA Factoring Challenge: RSA-370 |
III |
0 |
13133 |
287 |
RSA Factoring Challenge: RSA-360 |
III |
0 |
13133 |
288 |
RSA Factoring Challenge: RSA-290 |
III |
0 |
13133 |
289 |
RSA Factoring Challenge: RSA-280 |
III |
0 |
13133 |
290 |
World Record Challenge: Break 65 Bits of AES |
III |
0 |
13077 |
291 |
Recovering the Private Key in the Fully Homomorphic Encryption Scheme |
III |
0 |
13087 |
292 |
Kryptos |
X |
0 |
var |
293 |
Dorabella |
X |
0 |
var |
294 |
D'Agapeyeff |
X |
0 |
var |
295 |
Twelve-Year-Old Murder Case |
X |
0 |
var |
296 |
Kaskade-S/T — Part 4 |
II |
0 |
1083 |
297 |
RSA Factoring Challenge: RSA-270 |
III |
0 |
13133 |
298 |
RSA Factoring Challenge: RSA-896 |
III |
0 |
13133 |
299 |
RSA Factoring Challenge: RSA-260 |
III |
0 |
13133 |
300 |
The third ENIGMA M4 message |
X |
0 |
var |
301 |
Digital Signatures: DSA with Medium Fields |
III |
0 |
13114 |
302 |
RSA Factoring Challenge: RSA-410 |
III |
0 |
13133 |
303 |
RSA Factoring Challenge: RSA-420 |
III |
0 |
13133 |
304 |
Double-Column Transposition/Granit — Part 3 |
II |
0 |
1097 |
305 |
Spirale — Part 4 |
III |
0 |
13349 |
306 |
Double-Column Transposition/Granit — Part 2 |
II |
0 |
1097 |
307 |
Double-Column Transposition/Granit — Part 1 |
II |
0 |
1097 |
308 |
Spanish Strip Cipher — Part 3 |
X |
0 |
var |
309 |
ORYX Stream Cipher — Part 4c |
III |
0 |
13251 |
310 |
Weakened Granit — Part 2 |
II |
0 |
1098 |
311 |
Weakened Granit — Part 3 |
II |
0 |
1098 |
312 |
Weakened ElsieFour — Part 2 |
II |
0 |
1118 |
313 |
"The Road" — Part 2 |
II |
0 |
1127 |
314 |
ASAC — A Strong(er) ADFGVX Cipher — Part 5 |
II |
0 |
1103 |
315 |
ASAC — A Strong(er) ADFGVX Cipher — Part 4 |
II |
0 |
1103 |
316 |
ASAC — A Strong(er) ADFGVX Cipher — Part 3 |
II |
0 |
1103 |
317 |
Double Column Transposition Reloaded — Part 2 |
III |
0 |
13230 |
318 |
Double Column Transposition Reloaded — Part 1 |
III |
0 |
13230 |
319 |
RSA Factoring Challenge: RSA-460 |
III |
0 |
13133 |
320 |
RSA Factoring Challenge: RSA-1536 |
III |
0 |
13133 |
321 |
RSA Factoring Challenge: RSA-450 |
III |
0 |
13133 |
322 |
RSA Factoring Challenge: RSA-440 |
III |
0 |
13133 |
323 |
RSA Factoring Challenge: RSA-430 |
III |
0 |
13133 |
324 |
RSA Factoring Challenge: RSA-470 |
III |
0 |
13133 |
325 |
RSA Factoring Challenge: RSA-480 |
III |
0 |
13133 |
326 |
RSA Factoring Challenge: RSA-2048 |
III |
0 |
13133 |
327 |
ORYX Stream Cipher — Part 4d |
III |
0 |
13203 |
328 |
RSA Factoring Challenge: RSA-617 |
III |
0 |
13133 |
329 |
RSA Factoring Challenge: RSA-500 |
III |
0 |
13133 |
330 |
RSA Factoring Challenge: RSA-490 |
III |
0 |
13133 |
331 |
"The Road" — Part 3 |
II |
0 |
1127 |