 Alright, so I'm John Kelsey. I work at NIST, and I want to tell you what we're up to, at least some of what we're up to. So, the post-quantum crypto competition, that's the thing everybody knows about. You can, the slides are, I think, online, or you can ask me and I'll send them to you. So, there's a workshop right after crypto, so that's the place to really go for more information. But, you can see what's going on. We have still several submissions, and we're still kind of percolating on that, thinking about what the next step is as far as pairing things down, and stick around after crypto to find out more. We also are working on a standardization effort for lightweight crypto. That means crypto, you know, symmetric crypto that is less demanding than, say, AES. And so, you can see there's this process here for choosing one of these. We've had this competition started a little while ago. We have, like, a whole bunch of competitors, and we're getting ready to winnow things down a bit. And there'll be several more rounds, I think, before we get to a final answer here. And you can see the URL here, and there's also, there's a mailing list and all kinds of stuff, if you're interested. So, let's see. What else we got? Random Bit Generators. This is something I've been working on for basically my whole time at NIST. So, we recently, by recently, I mean, like a year ago, a year and a half ago, we published 90B, which is standard for entropy sources, entropy source evaluation. We are kind of trying to collect errata about this, like, basically errors in formulas, ambiguities, things like that. And we keep trying to get to a final point on that and then finding out that there are more, more comments. So, we hopefully will be putting out a revised version soon. We also have 90C, which will be coming out soon, and this is the final piece of this. This tells you how to take a DRBG from 90A, the Deterministic Random Bit Generator, and then an entropy source from 90B and put them together to make a full RBG. So, that will be coming out soon and we hope to get comments from it. So, let's see. Then the most interesting thing, probably, that I need to talk about is FIPS 186-5, the Digital Signature Standard. So, this is going to be out for public comment very soon. Important things. Number one, we're adding support for deterministic stuff, EDDSA, ECDSA Deterministic. We also have fixed this thing that we are not quite, I'm not quite sure why it wound up this way, where we weren't allowing large RSA Moduli. So, if you really want to do post-quantum RSA now, you know, you'll be okay. Yeah. The other thing is we're planning to kind of do away with DSA, with just integer DSA. So, there are a couple of reasons for this involving like, you know, it's kind of hard to get the parameters right, and also hardly anybody's using it. So, if you have strong feelings about this, like if us doing away with support for normal DSA is going to just kill you, let us know on the comment email, and there's, you know, you can catch up with me or Dustin, who's actually really the project lead on this. So, let's see. Then the NIST Threshold Crypto Project, which apparently looks like it's some sort of a cult thing involving summoning demons, but I'm not quite sure how that works. So, basically, we're working on standardizing threshold schemes, and then, you know, maybe threshold, like Jameer, maybe something like signing, you know, threshold signatures, threshold public schemes. So, this is a big project we've got. We've got a NISTR out. That's a white paper, basically. We had a workshop earlier this year, and we're kind of trying to figure out what to do next. And so, there's a roadmap that we're going to kind of put up, basically, to say how we're going to get to something standard, how we're going to get to standardizing things. So, that's, I think if some of you saw Louise's talk on Sunday, so you know more than everybody else about this. And the last kind of big thing is randomness beacons. So, the crypto, like the 890 series is about generating secret random numbers, things for keys. This is public randomness. The idea here is you have, you know, you have a source that, once a minute, produces a random number. It's got a digital signature. It's got a timestamp. They're hash chains. You can't, even the beacon operator can't change the past. And these are useful for various kinds of public coordination things, like audits and things like that. So, we've got a new standard for interoperable randomness beacons. It's, I think right now it's still out in draft, but if you want to download it from our website, you'll be able to find it and read it and give us comments. And there are two other organizations in Metro in Brazil and Universidade de Santiago in Chile that are running beacons and they're moving to our standard. And so, it'll be possible to interoperate combined beacons in a cryptographically secure way, cool stuff. So, if you want to look up, find more, you can talk to me or you can just look at these at the URL. And I think that's everything. So, thanks a lot.