Crypto 2015 rump session

The Crypto 2015 rump session took place Tuesday 18 August 2015 from 19:15 PDT to 22:50 PDT. (Actually, it started several minutes late: the IACR Award Ceremony began at 19:00 PDT and went over its scheduled time despite being run by a Swiss.) Daniel J. Bernstein and Tanja Lange served as chairs.

The call for submissions has been archived below. Slides were gradually made available during the rump session from presenters who agreed to have their slides officially online. Unfortunately, the usual webcast and recording mechanisms were not provided, but there are at least some video recordings, and rumors of more comprehensive audio recordings.

Authors Speaker Title Slides Crypto 2015 rump session, Tuesday 18 August 2015 Session 1 19:15 Jon Callas, Tamzen Cannoy, Nicko Van Someren Tamzen Cannoy Rump Session Adult Beverage Imbibing Game slides 19:18 Rosario Gennaro, Matt Robshaw Rosario Gennaro Crypto 2015 Program Co-Chairs Report slides 19:22 Daniel J. Bernstein Daniel J. Bernstein Financial report slides 19:25 Yevgeniy Dodis Yevgeniy Dodis On the Future of IACR conferences and journals slides 19:30 Jean-Jacques Quisquater Jean-Jacques Quisquater CRYPTO in 2030 slides 19:35 Whitfield Diffie Whitfield Diffie Breaking teleprinter ciphers at Bletchley Park finally published slides 19:36 Hovav Shacham Hovav Shacham Enjoy the Wi-Fi! 19:41 Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou Moti Yung Cliptography: Clipping the Power of Kleptographic Attacks slides 19:48 Abelson, Anderson, Bellovin, Benaloh, Blaze, Diffie, Gilmore, Green, Neumann, Landau, Rivest, Schiller, Schneier, Specter, Weitzner Rivest Keys Under Doormats slides 19:53 Greg Rose, Yehuda Lindell Greg Rose You think your government is nuts? Petition the Australian Government! slides 19:58 Oscar Garcia-Morchon Oscar Garcia-Morchon The HIMMO Contest slides 20:03 Eran Tromer Eran Tromer IO obfuscation slides 20:10 Break Session 2 20:40 Alex Halderman and Nadia Heninger Nadia Heninger Indiscreet tweets slides 20:47 John Kelsey John Kelsey What's Up with SHA3 slides 20:54 Pierre Karpman Pierre Karpman The Real SHA-2,3,... slides 20:59 Daniel J. Bernstein, Peter Schwabe, Gilles Van Assche Daniel J. Bernstein Is SHA-3 too complicated? slides 21:02 Tor Helleseth Tor Helleseth Arctic Crypt - A new crypto world record slides 21:04 Alex Biryukov, Léo Perrin, Aleksei Udovenko Léo Perrin The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob slides 21:08 Achiya Bar-On Adi Shamir Making a Best Paper Bester: Improved Attacks on Full MISTY1 slides 21:13 Mike Hamburg Mike Hamburg STROBE lite protocol framework for lazy people slides 21:18 Jon Callas Jon Callas Secure multitrack computation slides 21:22 Biryukov, Dinu, Groszschadl, Khovratovich, Le Corre, Perrin Perrin The ACRYPT project: Lightweight Cryptography for the Internet of Things slides 21:25 Derek Atkins Derek Atkins A Lightweight, Highly Performant Public Key Exchange slides 21:30 Netscape Netscape 500 bits slides 21:35 Break Session 3 22:05 Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer Daniel Genkin, Eran Tromer PITA: Breaking Bread slides 22:12 Magnus Find and Rene Peralta Magnus Find Multiplying faster than Dan slides 22:17 Josh Benaloh and many, many others Josh Benaloh Consensus Report on End-to-End Verifiable Internet Voting slides 22:22 David Chaum David Chaum Random-Sample Voting 22:25 Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti Ivan Visconti Improved OR Composition of Sigma-Protocols 22:29 Jeremiah Blocki, Hong-Sheng Zhou Hong-Sheng Zhou HumanCoin slides 22:33 Eric Miles, Amit Sahai, Mor Weiss Mor Weiss Protecting Obfuscation Against Arithmetic Attacks slides 22:36 Prabhanjan Ananth, Abhishek Jain, Amit Sahai Prabhanjan Ananth Indistinguishability Obfuscation from Non Compact Functional Encryption slides 22:40 Vipul Goyal, Aayush Jain and Dakshita Khurana Dakshita Khurana Witness Signatures and Non-Malleable MIPs slides 22:45 Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs Aloni Cohen Coffee Stains slides 22:48 Nigel Smart Nigel Smart Two Meetings: RWC 2016 and Real-World-MPC slides 22:50 Fin! Announcements, http://www.iacr.org/events/ 2015.09.28--29: DIAC 2015, Singapore, http://www1.spms.ntu.edu.sg/~diac2015/ 2015.09.30--10.03: ASK 2015, Singapore, http://www1.spms.ntu.edu.sg/~ask/2015/

Call for submissions (archived)

When did Osvik, Shamir, and Tromer announce AES key extraction in 65 milliseconds? When did Kelsey, Schneier, Vaudenay, and Wagner expose cryptographic plagiarism? When did Alice meet Bob face to face for the first time? The Crypto 2005 rump session!

When did Bleichenbacher announce pencil-and-paper RSA forgeries? When did Cryptico announce a $1000 prize for the best cryptanalysis of Rabbit? When did Callas, Cannoy, and van Someren introduce lettuce-based cryptography? The Crypto 2006 rump session!

When did Biham, Dunkelman, Indesteege, Keller, and Preneel announce successful cryptanalysis of KeeLoq? When did Clark and Sale challenge the cryptographic community to race a rebuilt Colossus? When did Tromer, Ellison, Miller, and Wright present the perfect one-way hash? The Crypto 2007 rump session!

When did Tromer announce successful cryptanalysis of the Gpcode.ak ransomware virus? When did Enright, Rescorla, Savage, Shacham, and Yilek present a factorization of the IACR public key? When did Rescorla, Savage, Shacham, and Spies introduce dryness-rights management? The Crypto 2008 rump session!

When did Petit and Quisquater announce preimages in the SL_2 hash? When did Stevens demonstrate live man-in-the-middle attacks on HTTPS via MD5 collisions? When did Suga introduce UbeHashCoool? The Crypto 2009 rump session!

When did Gentry and Halevi announce FHE cryptanalytic challenges with public keys too large to fit on IBM's web servers? When did the mobile-phone industry open up ZUC for public review? When did Heninger and Shacham present a two-thousand-slide historical review of cryptography? The Crypto 2010 rump session!

When did Bogdanov, Khovratovich, and Rechberger announce biclique cryptanalysis of full AES? When did Peters demonstrate the benefits of Springer's editing? When did Suga introduce the mop construction? The Crypto 2011 rump session!

When did Vaudenay announce successful cryptanalysis of a cryptosystem published at Crypto 2012? When did Matsui offer $1500 to beat a dead FEAL? When did Heninger demonstrate RSA private-key recovery via Google? The Crypto 2012 rump session!

When did Shamir announce a 2^64 attack against 4 steps of the LED-128 block cipher? When did NIST announce a public online service to generate random numbers for you? When did a dozen copies of Keith Alexander burst into song? The Crypto 2013 rump session!

When did Genkin and Tromer demonstrate a side-channel attack through a sausage? When did Rivest and Schuldt announce another RC4-like stream cipher? When did Eve learn to look on the bright side of DES? The Crypto 2014 rump session!

The first Crypto rump session took place in 1981 and was immediately heralded as the most important meeting in cryptography. Each subsequent Crypto rump session has reached a new level of historical significance, outstripped only by the Crypto rump sessions that followed it. The Crypto 2015 rump session will attempt to live up to, and if possible exceed, the exceptionally high standards set by previous Crypto rump sessions; but it relies critically on your contributions! Do you have breaking news, progress reports, or other topics of interest to the cryptographic community? Can you keep your talk short and entertaining? Fill out the submission form and ask for a talk slot!

As an added incentive for putting serious effort into non-serious rump-session talks, the editors of the Journal of Craptology usually promise to invite a paper from the most entertaining rump-session speakers. But we haven't heard from them yet.