Scene Image

CryptoCon

Who needs keys when you have hashes?

In a world where cryptographic hash functions are the key to survival, you must navigate through a network of machines to achieve asynchronous Byzantine consensus without relying on trusted setups or public-key cryptography. Battle against time and unseen adversaries as you strive to uncover the secrets of the ACS protocol and emerge victorious in a post-quantum secure environment.