| ASAC — A Strong(er) ADFGVX Cipher — Part 1 | 1,433 | July 23, 2016, 12:33 a.m. |
| Enigma Messages with Repeated Letters — Part 4 | 100 | April 20, 2016, 10:25 p.m. |
| AES key — encoded in the machine readable zone of a European ePassport | 1,105 | March 24, 2016, 7:01 p.m. |
| M-138 — Part 4 | 1,149 | March 10, 2016, 9:26 p.m. |
| M-138 — Part 3 | 1,150 | Feb. 27, 2016, 1:33 a.m. |
| CMEA 2 | 13,370 | Feb. 1, 2016, 4:13 p.m. |
| CMEA 1 | 1,099 | Jan. 31, 2016, 8:40 p.m. |
| ORYX Stream Cipher — Part 4a | 1,134 | Jan. 15, 2016, 11:31 p.m. |
| ORYX Stream Cipher Part II | 1,099 | Jan. 3, 2016, 3:54 p.m. |
| ORYX Stream Cipher — Part 3 (revised) | 1,120 | Dec. 31, 2015, 1:58 p.m. |
| ORYX Stream Cipher Part I | 1,099 | Dec. 24, 2015, 1:15 p.m. |
| A hidden word — Part 2 | 100 | Nov. 18, 2015, 8:14 p.m. |
| Smartcard RSA | 1,100 | Nov. 18, 2015, 5:30 p.m. |
| Lunchtime Attack on the Fully Homomorphic Encryption Scheme | 1,101 | Nov. 15, 2015, 9:22 p.m. |
| News from Castle Mansfeld | 133 | Nov. 15, 2015, 9:20 p.m. |
| Unknown Author | 900 | Nov. 5, 2015, 7:36 p.m. |
| Weakened Granit — Part 1 | 133 | Sept. 26, 2015, 1:17 p.m. |
| Number Sequence — Part 8 | 111 | Sept. 22, 2015, 4:39 p.m. |
| Flawed Usage of a OTP Cipher by the BND | 1,337 | Sept. 21, 2015, 9:32 p.m. |
| Snow White and the seven dwarfs | 100 | Aug. 3, 2015, 10:48 p.m. |
| Weakened Handycipher — Part 3 | 1,485 | May 23, 2015, 12:58 a.m. |
| Weakened Handycipher — Part 2 | 1,502 | May 21, 2015, 6:04 p.m. |
| Weakened Handycipher — Part 1 | 1,613 | May 17, 2015, 6:02 p.m. |
| Number Sequence — Part 6 | 117 | March 28, 2015, 8:39 p.m. |
| Spanish Strip Cipher — Part 2 | 1,160 | March 3, 2015, 10:44 p.m. |
| Concealed Messages — Vigenère's Night Sky | 1,118 | Feb. 14, 2015, 11:07 a.m. |
| Ku Klux Klan | 1,000 | Feb. 6, 2015, 6:50 p.m. |
| Unusual encryption using a diophantine equation | 1,111 | Feb. 3, 2015, 6:02 p.m. |
| Pigpen with a twist — Part 3 | 1,111 | Jan. 20, 2015, 3:45 p.m. |
| Double Column Transposition — Part 2 | 1,176 | Jan. 5, 2015, 2:01 p.m. |
| Kaskade-S/T — Part 2 | 1,108 | Jan. 1, 2015, midnight |
| Double Column Transposition — Part 4 | 1,181 | Dec. 30, 2014, 1:44 a.m. |
| M-138 — Part 2 | 1,660 | Dec. 27, 2014, 6:36 p.m. |
| M-138 — Part 1 | 125 | Dec. 27, 2014, 1:40 a.m. |
| Double Columnar Transposition | 100 | Dec. 22, 2014, 6:25 p.m. |
| Playfair Encryption | 100 | Dec. 21, 2014, 9:45 p.m. |
| Playfair with hints about the grid | 100 | Dec. 19, 2014, 11:57 p.m. |
| Brute-Force-Attack on Triple-DES with Reduced Key Space | 1,105 | Dec. 17, 2014, 7:31 p.m. |
| Monoalphabetic Substitution with Camouflage — Part 5 | 1,118 | Dec. 16, 2014, 11:53 p.m. |
| Monoalphabetic substitution with camouflage — Part 3 | 1,115 | Dec. 14, 2014, 8:52 p.m. |
| Monoalphabetic substitution with camouflage — Part 2 | 1,115 | Dec. 13, 2014, 12:56 a.m. |
| Unconcealed RSA messages | 1,114 | Dec. 10, 2014, 3:54 p.m. |
| BCR code (Book-Caesar-RSA) | 1,125 | Dec. 2, 2014, 6:56 p.m. |
| Not-so-Secret Message from Malawi — Part I (RSA) | 1,105 | Nov. 30, 2014, 10:51 p.m. |
| Partial Key Exposure with RSA — Part 1 | 1,117 | Nov. 29, 2014, 12:38 a.m. |
| RSA: Two different keys — same ciphertext | 1,112 | Nov. 27, 2014, 9:43 p.m. |
| Hybrid Encryption I | 1,106 | Nov. 26, 2014, 10:42 p.m. |
| Broadcasting and low exponent — RSA Attack | 1,112 | Nov. 26, 2014, 6:54 p.m. |
| Alice's Birthday Party (Part 2) | 1,106 | Nov. 26, 2014, 1 a.m. |
| Alice's Birthday Party (Part 1) | 1,106 | Nov. 24, 2014, 10:10 p.m. |
| Enigma Part 2 | 1,106 | Nov. 21, 2014, 1:07 p.m. |
| Enigma Part 1 | 1,106 | Nov. 18, 2014, 9:23 p.m. |
| Enigma Messages | 100 | Nov. 17, 2014, 6:33 p.m. |
| Enigma Messages with Repeated Letters — Part 5 | 100 | Nov. 13, 2014, 11:32 p.m. |
| Enigma Messages with Repeated Letters — Part 3 | 100 | Nov. 12, 2014, 5:57 p.m. |
| Enigma Messages with Repeated Letters — Part 2 | 100 | Nov. 12, 2014, 1:23 a.m. |
| An Invisible Message | 100 | Nov. 9, 2014, 10:40 p.m. |
| Factorization Cipher — Part 3 | 1,117 | Nov. 8, 2014, 12:32 a.m. |
| Factorization Cipher — Part 2 | 1,116 | Nov. 8, 2014, 12:29 a.m. |
| Kaskade-S/T — Part 5 | 1,111 | Oct. 23, 2014, 7:33 p.m. |
| Kaskade-S/T — Part 3 | 1,109 | Oct. 23, 2014, 7:26 p.m. |
| Kaskade-S/T — Part 1 | 100 | Oct. 1, 2014, 12:23 a.m. |
| Music Code — Part 2 | 1,112 | Sept. 30, 2014, 5:02 p.m. |
| Music Code — Part 1 | 100 | Sept. 30, 2014, 4:54 p.m. |
| The Last Note | 125 | Sept. 26, 2014, 3:07 p.m. |
| Spanish Strip Cipher — Part 1 | 1,196 | Sept. 14, 2014, 1:33 p.m. |
| Keyshanc — Part 2 | 1,124 | Sept. 8, 2014, 1:23 p.m. |
| Keyshanc — Part 1 | 1,124 | Sept. 5, 2014, 1:05 p.m. |
| Pigpen with a twist — Part 2 | 1,115 | Sept. 4, 2014, 3:32 p.m. |
| Strange Message from Thessaloniki | 100 | Aug. 30, 2014, 9:41 p.m. |
| Recycled One-Time Pad | 100 | Aug. 29, 2014, 11:33 p.m. |
| Monoalphabetic substitution with camouflage — Part 1 | 100 | Aug. 28, 2014, 12:07 a.m. |
| Multilingual Monoalphabetic Substitution | 100 | Aug. 27, 2014, 12:46 a.m. |
| Cascading Encryption — Part 1/3 | 100 | Aug. 26, 2014, 4:41 p.m. |
| Hill Cipher with Sudoku Key | 100 | Aug. 23, 2014, 11:09 p.m. |
| Enigma Messages with Repeated Letters — Part 1 | 100 | Aug. 9, 2014, 9:31 p.m. |
| Enigma Combinatorics | 100 | Aug. 9, 2014, 8:08 p.m. |
| Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 | 100 | Aug. 6, 2014, 6:02 p.m. |
| ECDH-Key Exchange for Beginners | 100 | Aug. 4, 2014, 5:50 p.m. |
| ¿No Hablas Español? No problemo! | 100 | Aug. 3, 2014, 8:28 p.m. |
| ADFGVX — Part 2 | 100 | Aug. 3, 2014, 1:26 p.m. |
| ADFGVX — Part 1 | 100 | Aug. 3, 2014, 11:55 a.m. |
| Zodiac Cipher | 100 | Aug. 2, 2014, 12:28 p.m. |
| Trifid Cipher | 100 | July 31, 2014, 11:33 p.m. |
| Nils away on travel | 100 | July 30, 2014, 10:30 p.m. |
| The Book Code: A Challenge for Bookworms | 100 | July 30, 2014, 7:37 p.m. |
| Molehunt (Part 3/3) | 1,108 | July 30, 2014, 2:35 p.m. |
| Molehunt (Part 2/3) | 100 | July 25, 2014, 10:46 p.m. |
| Molehunt (Part 1/3) | 100 | July 25, 2014, 12:44 a.m. |
| Pigpen with a twist — Part 1 | 100 | July 17, 2014, 6:22 p.m. |
| Monoalphabetic Substitution | 100 | July 16, 2014, 10:08 p.m. |
| Modified Caesar Cipher | 100 | July 16, 2014, 8:33 p.m. |
| How do you become a big cryptographer? | 100 | July 16, 2014, 3:57 p.m. |
| Number Sequence — Part 3 | 100 | July 15, 2014, 1:02 p.m. |
| Classical Ciphers^3 | 100 | July 14, 2014, 9:54 p.m. |
| A really long number sequence | 1,117 | July 12, 2014, 5:20 p.m. |
| One-Time Pad with Flaws | 100 | July 10, 2014, 9:12 p.m. |
| A hidden word | 100 | July 9, 2014, 9:35 p.m. |
| Number Sequence | 100 | July 8, 2014, 4:12 p.m. |
| Factorization Cipher — Part 1 | 100 | July 7, 2014, 7:08 p.m. |
| A Secret Message from Castle Mansfeld | 100 | July 6, 2014, 2:43 p.m. |
| A modified homophonic cipher with reduced alphabets — Part 2 | 100 | July 5, 2014, 6:35 p.m. |
| Number Sequence — Part 4 | 100 | July 5, 2014, 6:10 p.m. |
| A modified homophonic cipher with reduced alphabets — Part 1 | 100 | July 3, 2014, 9:14 p.m. |
| Cracking SHA1-Hashed Passwords | 1,113 | July 3, 2014, 4:04 p.m. |
| Letter to the Templars — Part 3 | 1,134 | July 2, 2014, 10:38 p.m. |
| Letter from the Alleged Countess Julie von Ortenburg | 100 | July 2, 2014, 7:55 p.m. |
| From Russia with Love | 100 | July 1, 2014, 10:43 p.m. |
| Reserve Hand Procedure — Part 1 | 100 | July 1, 2014, 7:17 p.m. |
| Grille Cipher | 100 | July 1, 2014, 1:28 p.m. |
| Affine Codes / Modulo Arithmetic with N / Extended Euclid | 100 | June 30, 2014, 5:15 p.m. |
| Letter to the Templars — Part 2 | 100 | June 30, 2014, 2:13 p.m. |
| Letter to the Templars — Part 1 | 100 | June 29, 2014, 4:43 p.m. |
| Number Sequence — Part 2 | 100 | June 29, 2014, 2:59 p.m. |
| Beaver Code | 100 | June 29, 2014, 2:22 p.m. |
| Original Caesar Cipher | 100 | June 28, 2014, 11:44 p.m. |
| Caesar Encryption | 100 | June 28, 2014, 10:02 p.m. |