Welcome back, potential speaker. The CPV CFP is now open!

The Crypto & Privacy Village would not be possible without volunteers. Thank you to all of our volunteers for helping make the Crypto & Privacy Village at DEF CON possible! – There are different volunteer roles available to choose from, detailed info is available per role description. Each play an important and vital role to make CPV successful. – All volunteers who signup for 2 spots or more will receive: – A volunteer t-shirt – Special CPV ID – Guaranteed entry for all CPV talks when not in shift – Potentially other cool swag. Sign up link

The Crypto & Privacy Village is returning to DEF CON 26, and we’re looking for top-notch presentations and workshops to fill our schedule. In the past, the Village has featured workshops and talks on everything from quantum crypto to FOIA, discussions on privacy and crypto tools, and a key signing party.

Passionate about cryptography or privacy? Interested in helping people encrypt their lives? Have a talk that’s better suited for a niche audience? Submit YOUR proposal to the Crypto & Privacy Village Call for Presentations and Workshops!

Please, no sales pitches. If you have a unique perspective related to your company’s products, please make it as vendor-neutral as possible.

Please note that the Crypto & Privacy Village is not the place for talks about cryptocurrencies. Do you have a talk about the blockchain? Please make sure it relates to a topic in cryptography or privacy.

| SUBMISSION DEADLINE | June 15, 2018 at 11:59:59 PM PDT.

| WHERE TO SUBMIT | Please visit

Introductions & Overviews to cryptographic subfields (Crypto 101)
Cryptanalysis, side channels, & implementation-specific attacks on crypto
Algorithm- and protocol-level analysis of specific crypto/privacy tools
Post-quantum cryptography
Secure messaging (messages, email, etc.)
Hardware-based crypto and hardware acceleration
Useable cryptography (targeted/at-risk populations, the “reasonable” consumer)
Cryptographic APIs, open-source libraries, implementations, & standards
Public-Key Infrastructure
Transport Layer Security/Web Security
Privacy By Design
Privacy Engineering
Hacker con talks shouldn’t fit into nice, tidy boxes, so I’m doing something else