{"guid":"962f467f-8c6b-44cc-98cd-673128a9aef5","title":"Cryptography beyond Encryption and Signatures","subtitle":null,"slug":"SHA2017-494-cryptography_beyond_encryption_and_signatures","link":"https://c3voc.de","description":"This talk will introduce a couple of less well known applications of cryptography. ","original_language":"eng","persons":["FJW"],"tags":["SHA2017","494"],"view_count":497,"promoted":false,"date":"2017-08-07T00:00:00.000+02:00","release_date":"2017-08-07T02:00:00.000+02:00","updated_at":"2025-11-05T23:00:05.169+01:00","length":1412,"duration":1412,"thumb_url":"https://static.media.ccc.de/media/events/SHA2017/494-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/SHA2017/494-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/SHA2017/962f467f-8c6b-44cc-98cd-673128a9aef5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/SHA2017/962f467f-8c6b-44cc-98cd-673128a9aef5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SHA2017-494-cryptography_beyond_encryption_and_signatures","url":"https://api.media.ccc.de/public/events/962f467f-8c6b-44cc-98cd-673128a9aef5","conference_title":"SHA2017: Still Hacking Anyway","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017","related":[{"event_id":4222,"event_guid":"bfaf0024-a741-4015-85df-49663c462cf8","weight":9},{"event_id":4240,"event_guid":"dec63dd2-d66b-419d-863d-c20fd5ce91dd","weight":20},{"event_id":4259,"event_guid":"b5a645a9-bbdc-433e-a77c-b416074a92ea","weight":20},{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":18},{"event_id":4288,"event_guid":"6e5a6877-3a72-464f-bf47-4bbd103b41fe","weight":11},{"event_id":4300,"event_guid":"d48d1713-333b-4515-b56d-bc12fa2d3c44","weight":15},{"event_id":4303,"event_guid":"384839be-beef-4ae4-939f-3c2046199c2b","weight":16},{"event_id":4310,"event_guid":"98a24995-17aa-415a-9cf5-906faa0d1475","weight":13},{"event_id":4311,"event_guid":"1159379e-b387-4660-a160-d996c7383c5a","weight":14},{"event_id":4322,"event_guid":"e41aee32-a8c0-4dce-b55a-a13aac7b5cad","weight":10},{"event_id":4323,"event_guid":"df804417-58b7-42fa-a626-83ed1663677f","weight":14},{"event_id":4341,"event_guid":"5c35e3c2-ec03-46f2-901c-90f3bead4a04","weight":12},{"event_id":4343,"event_guid":"57920452-ce5b-4194-a768-fed44de6d779","weight":12},{"event_id":4344,"event_guid":"e856b1b3-ac67-42a4-ab7a-50a8d58d413e","weight":9},{"event_id":4351,"event_guid":"06f3958c-0e2c-4dfc-804c-9493fae7fe9b","weight":9},{"event_id":4361,"event_guid":"54fd6dc6-c0c7-46d5-b122-4b94ec8ba635","weight":10},{"event_id":4364,"event_guid":"18911a7a-2c27-419e-86c4-4b4878991379","weight":11}],"recordings":[{"size":135,"length":1412,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-494-eng-Cryptography_beyond_Encryption_and_Signatures_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-07T21:25:11.480+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-hd/SHA2017-494-eng-Cryptography_beyond_Encryption_and_Signatures_hd.mp4","url":"https://api.media.ccc.de/public/recordings/18117","event_url":"https://api.media.ccc.de/public/events/962f467f-8c6b-44cc-98cd-673128a9aef5","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":21,"length":1397,"mime_type":"audio/mpeg","language":"eng","filename":"SHA2017-494-eng-Cryptography_beyond_Encryption_and_Signatures.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-07T21:30:11.318+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/mp3/SHA2017-494-eng-Cryptography_beyond_Encryption_and_Signatures.mp3","url":"https://api.media.ccc.de/public/recordings/18119","event_url":"https://api.media.ccc.de/public/events/962f467f-8c6b-44cc-98cd-673128a9aef5","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":18,"length":1397,"mime_type":"audio/opus","language":"eng","filename":"SHA2017-494-eng-Cryptography_beyond_Encryption_and_Signatures.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-07T21:30:25.296+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/opus/SHA2017-494-eng-Cryptography_beyond_Encryption_and_Signatures.opus","url":"https://api.media.ccc.de/public/recordings/18120","event_url":"https://api.media.ccc.de/public/events/962f467f-8c6b-44cc-98cd-673128a9aef5","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":44,"length":1412,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-494-eng-Cryptography_beyond_Encryption_and_Signatures_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-07T21:31:34.282+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-sd/SHA2017-494-eng-Cryptography_beyond_Encryption_and_Signatures_sd.mp4","url":"https://api.media.ccc.de/public/recordings/18123","event_url":"https://api.media.ccc.de/public/events/962f467f-8c6b-44cc-98cd-673128a9aef5","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":54,"length":1412,"mime_type":"video/webm","language":"eng","filename":"SHA2017-494-eng-Cryptography_beyond_Encryption_and_Signatures_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-07T22:00:11.388+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-sd/SHA2017-494-eng-Cryptography_beyond_Encryption_and_Signatures_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/18126","event_url":"https://api.media.ccc.de/public/events/962f467f-8c6b-44cc-98cd-673128a9aef5","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":154,"length":1412,"mime_type":"video/webm","language":"eng","filename":"SHA2017-494-eng-Cryptography_beyond_Encryption_and_Signatures_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-07T22:26:39.961+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-494-eng-Cryptography_beyond_Encryption_and_Signatures_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/18131","event_url":"https://api.media.ccc.de/public/events/962f467f-8c6b-44cc-98cd-673128a9aef5","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"}]}