publish call for submissionsusernames, associated email addresses and encrypted passwords. it's...

60

Upload: others

Post on 28-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 2: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

publish call for submissions

choose a type of crypto primitive

receive submissions

receive cryptanalysis papers

shortlist a few submissions

choose one or more

Page 3: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 4: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 5: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 6: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 7: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

Page 8: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

Page 9: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 10: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

✓✓✓

Page 11: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 12: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 14: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 15: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

Page 16: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

Page 17: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

CAESAR submission deadline: Jan 15, 2014

Page 18: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 19: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

Password Hashing Competition

Page 20: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 21: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 22: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 23: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 24: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 25: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 26: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 27: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 28: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 29: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 30: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 31: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 32: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 33: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 34: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 35: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

http://www.tarsnap.com/scrypt/scrypt.pdf

Page 36: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

http://www.tarsnap.com/scrypt/scrypt.pdf

Page 37: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 38: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 39: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 40: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

b83546b4

Page 41: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

b83546b4 b2e2a2f5

Page 42: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

b83546b4 b2e2a2f5 10cbd82a

Page 43: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

b83546b4 b2e2a2f5 10cbd82a ... 57500361 299c689f

Page 44: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

b83546b4 b2e2a2f5 10cbd82a ... 57500361 299c689f

Page 45: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

b83546b4 b2e2a2f5 10cbd82a ... 57500361 299c689f

Page 46: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

b83546b4 b2e2a2f5 10cbd82a ... 57500361 299c689f

Page 47: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

b83546b4 b2e2a2f5 10cbd82a ... 57500361 299c689f

Page 48: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

b83546b4 b2e2a2f5 10cbd82a ... 57500361 299c689f

Page 49: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

b83546b4 b2e2a2f5 10cbd82a ... 57500361 299c689f

Page 50: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

Page 51: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

Page 52: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

Page 53: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

Page 54: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

Page 55: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

“complexity provides both opportunity and hiding places for attackers“ --Dan Geer

Page 56: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

Page 57: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

Page 58: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com
Page 59: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com

Page 60: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com