Linked Presentation: "These results must be false": A usability evaluation of constant-time analysis tools"You have to read 50 different RFCs that contradict each other": An Interview Study on the Experiences of Implementing Cryptographic StandardsA Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted ServiceExploring digital security and privacy in relative poverty in Germany through qualitative interviewsSecurity and Privacy Software Creators' Perspectives on Unintended ConsequencesThe Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts"But they have overlooked a few things in Afghanistan:" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections