| Number Sequence — Part 10 | 113 | April 26, 2018, 12:22 a.m. |
| Advent-Challenge — Part 1 | 200 | Dec. 9, 2017, 12:52 a.m. |
| Number Sequence — Part 9 | 150 | Nov. 18, 2017, 4:55 p.m. |
| ASAC — A Strong(er) ADFGVX Cipher — Part 1 | 1,613 | July 13, 2016, 8:20 p.m. |
| Keyshanc — Part 2 | 1,107 | April 23, 2016, 5:36 p.m. |
| Pigpen with a twist — Part 2 | 1,102 | April 23, 2016, 1:14 a.m. |
| ORYX Stream Cipher Part II | 1,097 | April 20, 2016, 3:36 p.m. |
| Double Column Transposition — Part 1 | 1,128 | April 16, 2016, 12:12 a.m. |
| Double Column Transposition — Part 3 | 1,130 | April 14, 2016, 3:11 p.m. |
| Double Column Transposition — Part 4 | 1,131 | April 13, 2016, 7:14 p.m. |
| Double Column Transposition — Part 2 | 1,130 | April 13, 2016, 10:17 a.m. |
| New Year's Greetings — Part 4 | 200 | March 21, 2016, 3:49 p.m. |
| New Year's Greetings — Part 3 | 200 | March 21, 2016, 3:33 p.m. |
| New Year's Greetings — Part 2 | 200 | March 21, 2016, 3:27 p.m. |
| New Year's Greetings — Part 1 | 200 | March 21, 2016, 3:23 p.m. |
| Pigpen with a twist — Part 3 | 1,104 | Jan. 16, 2016, 8:14 p.m. |
| Unconcealed RSA messages | 1,105 | Jan. 2, 2016, 8:24 p.m. |
| Unusual encryption using a diophantine equation | 1,105 | Dec. 7, 2015, 2:01 p.m. |
| Lunchtime Attack on the Fully Homomorphic Encryption Scheme | 1,101 | Dec. 6, 2015, 5:29 p.m. |
| Image Noise | 200 | Nov. 21, 2015, 12:20 a.m. |
| News from Castle Mansfeld | 150 | Nov. 14, 2015, 11:38 p.m. |
| A hidden word — Part 2 | 101 | Oct. 9, 2015, 12:57 a.m. |
| Flawed Usage of a OTP Cipher by the BND | 1,292 | Oct. 8, 2015, 9:06 p.m. |
| Weakened Granit — Part 1 | 200 | Sept. 24, 2015, 7:44 p.m. |
| Number Sequence — Part 8 | 200 | Sept. 14, 2015, 10:39 a.m. |
| Keyshanc — Part 1 | 1,113 | Aug. 2, 2015, 6:55 p.m. |
| Music Code — Part 2 | 1,105 | July 29, 2015, 6:13 p.m. |
| Music Code — Part 1 | 100 | July 29, 2015, 6:10 p.m. |
| Monoalphabetic substitution with camouflage — Part 4 | 100 | July 24, 2015, 3:59 p.m. |
| Monoalphabetic Substitution with Camouflage — Part 5 | 1,112 | July 22, 2015, 10:23 p.m. |
| Monoalphabetic substitution with camouflage — Part 3 | 1,109 | July 21, 2015, 8:37 p.m. |
| Monoalphabetic substitution with camouflage — Part 2 | 1,109 | July 20, 2015, 10:52 p.m. |
| Monoalphabetic substitution with camouflage — Part 1 | 100 | July 3, 2015, 2:02 p.m. |
| Number Sequence — Part 7 | 102 | May 20, 2015, 11:20 p.m. |
| Number Sequence — Part 6 | 125 | March 26, 2015, 8:14 p.m. |
| M-138 — Part 3 | 1,444 | Jan. 5, 2015, 3:01 a.m. |
| M-138 — Part 2 | 1,824 | Dec. 25, 2014, 2:38 a.m. |
| M-138 — Part 1 | 200 | Dec. 24, 2014, 4:32 p.m. |
| Kaskade-S/T — Part 2 | 1,108 | Dec. 19, 2014, 8:44 p.m. |
| Factorization Cipher — Part 3 | 1,116 | Dec. 16, 2014, 5:20 p.m. |
| Molehunt (Part 3/3) | 1,105 | Dec. 15, 2014, 6:42 p.m. |
| Partial Key Exposure with RSA — Part 1 | 1,117 | Dec. 5, 2014, 1:22 a.m. |
| Smartcard RSA | 1,106 | Dec. 2, 2014, 11:38 p.m. |
| ORYX Stream Cipher Part I | 1,106 | Nov. 25, 2014, 9:14 p.m. |
| Factorization Cipher — Part 2 | 1,117 | Oct. 10, 2014, 2:50 a.m. |
| An 'unhearable' message | 100 | Sept. 28, 2014, 12:15 a.m. |
| An Invisible Message | 100 | Sept. 26, 2014, 12:42 a.m. |
| Strange Message from Thessaloniki | 100 | Sept. 25, 2014, 7:30 p.m. |
| Number Sequence — Part 5 | 100 | Sept. 25, 2014, 2:37 p.m. |
| Enigma Combinatorics | 100 | Sept. 25, 2014, 2:13 p.m. |
| AES key — encoded in the machine readable zone of a European ePassport | 1,119 | Sept. 23, 2014, 12:52 p.m. |
| The Last Note | 200 | Sept. 23, 2014, 12:23 a.m. |
| Enigma Part 2 | 1,107 | Sept. 19, 2014, 1:14 p.m. |
| Enigma Part 1 | 1,107 | Sept. 19, 2014, 12:06 p.m. |
| Hybrid Encryption I | 1,107 | Sept. 19, 2014, 1:21 a.m. |
| Heartbleed — Part 2 | 200 | Aug. 29, 2014, 5:17 a.m. |
| Heartbleed — Part 1 | 200 | Aug. 29, 2014, 2:38 a.m. |
| Turing Bombe Enigma I | 100 | Aug. 8, 2014, 11:36 p.m. |
| Kaskade-S/T — Part 1 | 100 | Aug. 8, 2014, 9:40 p.m. |
| Broadcasting and low exponent — RSA Attack | 1,115 | Aug. 8, 2014, 6:26 p.m. |
| Monoalphabetic Substitution | 100 | July 31, 2014, 11:48 p.m. |
| RSA: Two different keys — same ciphertext | 1,116 | July 31, 2014, 11:15 p.m. |
| Not-so-Secret Message from Malawi — Part I (RSA) | 1,108 | July 31, 2014, 11:14 p.m. |
| A really long number sequence | 1,116 | July 31, 2014, 11:13 p.m. |
| Brute-Force-Attack on Triple-DES with Reduced Key Space | 1,108 | July 31, 2014, 11:11 p.m. |
| BCR code (Book-Caesar-RSA) | 1,131 | July 31, 2014, 11:10 p.m. |
| Zodiac Cipher | 100 | July 31, 2014, 11:09 p.m. |
| Trifid Cipher | 100 | July 31, 2014, 11:06 p.m. |
| Recycled One-Time Pad | 100 | July 31, 2014, 11:04 p.m. |
| Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 | 100 | July 31, 2014, 11:03 p.m. |
| Playfair with hints about the grid | 100 | July 31, 2014, 11:02 p.m. |
| ¿No Hablas Español? No problemo! | 100 | July 31, 2014, 11:01 p.m. |
| Multilingual Monoalphabetic Substitution | 100 | July 31, 2014, 11 p.m. |
| Cascading Encryption — Part 1/3 | 100 | July 31, 2014, 10:59 p.m. |
| Hill Cipher with Sudoku Key | 100 | July 31, 2014, 10:58 p.m. |
| Enigma Messages with Repeated Letters — Part 5 | 101 | July 31, 2014, 10:56 p.m. |
| Enigma Messages with Repeated Letters — Part 4 | 101 | July 31, 2014, 10:55 p.m. |
| Enigma Messages with Repeated Letters — Part 3 | 101 | July 31, 2014, 10:54 p.m. |
| Enigma Messages with Repeated Letters — Part 2 | 100 | July 31, 2014, 10:53 p.m. |
| Enigma Messages | 100 | July 31, 2014, 10:52 p.m. |
| ECDH-Key Exchange for Beginners | 100 | July 31, 2014, 10:50 p.m. |
| Double Columnar Transposition | 100 | July 31, 2014, 10:49 p.m. |
| Playfair Encryption | 100 | July 31, 2014, 10:48 p.m. |
| ADFGVX — Part 2 | 100 | July 31, 2014, 10:47 p.m. |
| ADFGVX — Part 1 | 100 | July 31, 2014, 10:46 p.m. |
| Enigma Messages with Repeated Letters — Part 1 | 100 | July 31, 2014, 10:40 p.m. |
| Nils away on travel | 100 | July 31, 2014, 10:39 p.m. |
| The Book Code: A Challenge for Bookworms | 100 | July 31, 2014, 10:35 p.m. |
| A Secret Message from Castle Mansfeld | 100 | July 31, 2014, 10:34 p.m. |
| Molehunt (Part 1/3) | 100 | July 31, 2014, 10:33 p.m. |
| Molehunt (Part 2/3) | 100 | July 31, 2014, 10:32 p.m. |
| Pigpen with a twist — Part 1 | 100 | July 31, 2014, 10:31 p.m. |
| From Russia with Love | 100 | July 31, 2014, 10:29 p.m. |
| How do you become a big cryptographer? | 100 | July 31, 2014, 10:29 p.m. |
| Classical Ciphers^3 | 100 | July 31, 2014, 10:27 p.m. |
| Modified Caesar Cipher | 100 | July 31, 2014, 10:25 p.m. |
| Letter from the Alleged Countess Julie von Ortenburg | 100 | July 31, 2014, 10:22 p.m. |
| Reserve Hand Procedure — Part 1 | 100 | July 31, 2014, 10:21 p.m. |
| Alice's Birthday Party (Part 2) | 1,108 | July 31, 2014, 10:18 p.m. |
| Alice's Birthday Party (Part 1) | 1,108 | July 31, 2014, 10:17 p.m. |
| Snow White and the seven dwarfs | 100 | July 31, 2014, 10:13 p.m. |
| Cracking SHA1-Hashed Passwords | 1,112 | July 31, 2014, 10:12 p.m. |
| One-Time Pad with Flaws | 100 | July 31, 2014, 10:11 p.m. |
| A modified homophonic cipher with reduced alphabets — Part 2 | 100 | July 31, 2014, 10:01 p.m. |
| Grille Cipher | 100 | July 31, 2014, 9:58 p.m. |
| Letter to the Templars — Part 3 | 1,133 | July 31, 2014, 9:54 p.m. |
| A hidden word | 100 | July 31, 2014, 9:53 p.m. |
| A modified homophonic cipher with reduced alphabets — Part 1 | 100 | July 31, 2014, 9:51 p.m. |
| Factorization Cipher — Part 1 | 100 | July 31, 2014, 9:49 p.m. |
| Affine Codes / Modulo Arithmetic with N / Extended Euclid | 100 | July 31, 2014, 9:48 p.m. |
| Number Sequence — Part 4 | 100 | July 31, 2014, 9:47 p.m. |
| Letter to the Templars — Part 2 | 100 | July 31, 2014, 9:45 p.m. |
| Letter to the Templars — Part 1 | 100 | July 31, 2014, 9:32 p.m. |
| Number Sequence — Part 3 | 100 | July 31, 2014, 9:31 p.m. |
| Beaver Code | 100 | July 31, 2014, 9:28 p.m. |
| Caesar Encryption | 100 | July 31, 2014, 9:26 p.m. |
| Number Sequence — Part 2 | 100 | July 31, 2014, 9:24 p.m. |
| Original Caesar Cipher | 100 | July 31, 2014, 9:22 p.m. |
| Number Sequence | 100 | July 31, 2014, 9:20 p.m. |