Village Setup (Volunteers and Organizers Only)
Volunteer Huddle
Welcome - Friday
Hacking on Multiparty Computation
SHA-3 vs the world
WS: Mansion Apartment Shack House: How To Explain Crypto To Practic
Alice and Bob are Slightly Less Confused
WS: Breaking the Uber Badge Ciphers
WS: FeatherDuster and Cryptanalib workshop
Protecting Users' Privacy in a Location-Critical Enterprise: The Ch
Breaking TLS: A Year in Incremental Privacy Improvements
WS: NoiseSocket: Extending Noise to Make Every TCP Connection Secur
A New Political Era: Time to start wearing tin-foil hats following
Security Analysis of the Telegram IM
Underhanded Crypto Announcement
Cryptanalysis in the Time of Ransomware
WS: Supersingular Isogeny Diffie-Hellman
Unfairplay (NOT RECORDED)
Welcome - Saturday
The Surveillance Capitalism Will Continue Until Morale Improves
WS: Implementing An Elliptic Curve in Go
Privacy is Not An Add-On: Designing for Privacy from the Ground Up
Operational Security Lessons from the Dark Web
WS: Secrets Management in the Cloud
The Symantec/Chrome SSL debacle - how to do this better...
WS: SECURE COMMUNICATIONS IN ANDROID WITH TLS/SSL
Have you seen my naked selfies? Neither has my snoopy boyfriend. Pr
Yet another password hashing talk
Core Illumination: Traffic Analysis in Cyberspace
rustls: modern\, fast\, safer TLS
Blue Team TLS Hugs
Automated Testing using Crypto Differential Fuzzing (DO NOT RECORD)
Welcome - Sunday
WS: Reasoning about Consensus Algorithms
Cypherpunks History
The Key Management Facility of the Root Zone DNSSEC KSK
The Policy & Business Case for Privacy By Design
The Why and How for Secure Automatic Patch Management
Closing