The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
Let's talk Crypto! | Let's talk Crypto! | ||
Have you every wondered how cryptographic systems work? What makes them secure? Why should I trust them? How can I try to verify that a given system actually is secure? How do I find vulnerabilities in cryptographic systems and in what ways can I | Have you every wondered how cryptographic systems work? What makes them secure? Why should I trust them? How can I try to verify that a given system actually is secure? How do I find vulnerabilities in cryptographic systems and in what ways can I explot them? | ||
The '''Cryptography foo''' is a meet-up for all of us that want to know the answers to these questions or have some answers to some of these questions. | The '''Cryptography foo''' is a meet-up for all of us that want to know the answers to these questions or have some answers to some of these questions. |