Tabletop Cryptography
This Year in Crypto & Privacy
Practical Text-Based Steganography: Exfiltrating Data from Secure Networks and Socially Engineering SecOps Analysts [WORKSHOP]
When Privacy Goes Poof! Why It's Gone and Never Coming Back
Lessons from the Hacking of Ashley Madison
Instegogram: Exploiting Instagram for C2 via Image Steganography
Introducing Man In The Contacts attack to trick encrypted messaging apps
Getting Started with Cryptography in Python [WORKSHOP]
privacy by design - it's n0t that difficult
State of the Curve: 2016
Oops, I Cracked My PANs
JWTs in a flash!
The State of HTTPS: Securing Web Traffic Is Not What It Used to Be
Overview and Evolution of Password-Based Authentication Schemes
Open House - Key Signing Party & Lightning Talks
Breaking Bad Crypto: BB'06 [WORKSHOP]
EFF - Ask the EFF: The Year in Digital Civil Liberties
Highlights from the Matasano Challenges [WORKSHOP]
Managing Digital Codesigning Identities in an Engineering Company
Crypto for Criminals - The OPSEC Concerns in Using Cryptography
Backdooring Cryptocurrencies: The Underhanded Crypto Contest Winners