This is the international reverse engineering challenge conducted by one of the U.S based security company. The purpose of this challenge is to evaluate the effectiveness of software protections. The contest is carried out in 3 phases where first and third phase involved breaking the protection of custom programs by using reverse engineering. One of the interesting part of this reversing challenge is the usage of floating point instructions.
I have published the detailed analysis of problem & solution on phase I and phase III of the challenge.If you have already tried and could not complete then it will be interesting to look back and see where you have failed. On the other hand, if you are casual reverser and wanted to have some food, then it is worth the time. In case if you get stuck during the reversing game, you can follow the article for reference.