We go all multi-media on you this time, with the YouTube presentation from last year's EuroCrypt Rump Session of the talk which won the best talk award. But this we will leave to the end of our issue. An analysis of patent attacks is our first paper, followed by a discussion on the role of Alice and Bob in cryptographic protocols. Then as our penultimate contribution we find a talk on fortytwo fish, which continues (slightly) a Douglas Adams theme from Volume 4.
Enjoy, or not, as the case may be.