publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not...
Transcript of publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not...
![Page 1: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/1.jpg)
![Page 2: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/2.jpg)
publish call for submissions
choose a type of crypto primitive
receive submissions
receive cryptanalysis papers
shortlist a few submissions
choose one or more
![Page 3: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/3.jpg)
![Page 4: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/4.jpg)
![Page 5: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/5.jpg)
![Page 6: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/6.jpg)
![Page 7: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/7.jpg)
≈
![Page 8: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/8.jpg)
→
→
→
→
![Page 9: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/9.jpg)
![Page 10: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/10.jpg)
✓✓✓
![Page 11: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/11.jpg)
![Page 12: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/12.jpg)
![Page 13: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/13.jpg)
http://competitions.cr.yp.to/caesar-call-2.html
![Page 14: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/14.jpg)
![Page 15: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/15.jpg)
–
•
•
•
–
•
•
–
•
•
•
![Page 16: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/16.jpg)
–
–
–
–
–
–
![Page 17: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/17.jpg)
CAESAR submission deadline: Jan 15, 2014
![Page 18: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/18.jpg)
![Page 19: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/19.jpg)
Password Hashing Competition
![Page 20: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/20.jpg)
![Page 21: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/21.jpg)
![Page 22: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/22.jpg)
![Page 23: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/23.jpg)
![Page 24: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/24.jpg)
![Page 25: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/25.jpg)
![Page 26: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/26.jpg)
![Page 27: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/27.jpg)
![Page 28: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/28.jpg)
![Page 29: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/29.jpg)
![Page 30: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/30.jpg)
![Page 31: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/31.jpg)
![Page 32: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/32.jpg)
![Page 33: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/33.jpg)
![Page 34: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/34.jpg)
![Page 37: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/37.jpg)
![Page 38: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/38.jpg)
![Page 39: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/39.jpg)
![Page 40: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/40.jpg)
b83546b4
![Page 41: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/41.jpg)
b83546b4 b2e2a2f5
![Page 42: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/42.jpg)
b83546b4 b2e2a2f5 10cbd82a
![Page 43: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/43.jpg)
b83546b4 b2e2a2f5 10cbd82a ... 57500361 299c689f
![Page 44: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/44.jpg)
b83546b4 b2e2a2f5 10cbd82a ... 57500361 299c689f
![Page 45: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/45.jpg)
⊕
b83546b4 b2e2a2f5 10cbd82a ... 57500361 299c689f
![Page 46: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/46.jpg)
⊕
b83546b4 b2e2a2f5 10cbd82a ... 57500361 299c689f
![Page 47: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/47.jpg)
⊕
b83546b4 b2e2a2f5 10cbd82a ... 57500361 299c689f
![Page 48: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/48.jpg)
⊕
b83546b4 b2e2a2f5 10cbd82a ... 57500361 299c689f
![Page 49: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/49.jpg)
⊕
b83546b4 b2e2a2f5 10cbd82a ... 57500361 299c689f
![Page 50: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/50.jpg)
–
–
![Page 51: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/51.jpg)
–
–
–
![Page 52: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/52.jpg)
–
–
![Page 53: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/53.jpg)
–
–
–
–
![Page 54: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/54.jpg)
–
–
–
–
–
![Page 55: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/55.jpg)
–
–
–
“complexity provides both opportunity and hiding places for attackers“ --Dan Geer
![Page 56: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/56.jpg)
–
–
–
–
–
–
–
![Page 57: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/57.jpg)
–
–
–
![Page 58: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/58.jpg)
![Page 59: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/59.jpg)
–
–
–
–
–
–
![Page 60: publish call for submissionsusernames, associated email addresses and encrypted passwords. It's not clear how the hackers managed to gain access to Evernote's systems, or how arstechnica.com](https://reader033.fdocuments.net/reader033/viewer/2022060513/5f7b86dcbfff70784338a109/html5/thumbnails/60.jpg)