The Crypto 2015 rump session took place Tuesday 18 August 2015 from 19:15 PDT to 22:50 PDT. (Actually, it started several minutes late: the IACR Award Ceremony began at 19:00 PDT and went over its scheduled time despite being run by a Swiss.) Daniel J. Bernstein and Tanja Lange served as chairs.
The call for submissions has been archived below. Slides were gradually made available during the rump session from presenters who agreed to have their slides officially online. Unfortunately, the usual webcast and recording mechanisms were not provided, but there are at least some video recordings, and rumors of more comprehensive audio recordings.
|Crypto 2015 rump session, Tuesday 18 August 2015|
|19:15||Jon Callas, Tamzen Cannoy, Nicko Van Someren||Tamzen Cannoy||Rump Session Adult Beverage Imbibing Game||slides|
|19:18||Rosario Gennaro, Matt Robshaw||Rosario Gennaro||Crypto 2015 Program Co-Chairs Report||slides|
|19:22||Daniel J. Bernstein||Daniel J. Bernstein||Financial report||slides|
|19:25||Yevgeniy Dodis||Yevgeniy Dodis||On the Future of IACR conferences and journals||slides|
|19:30||Jean-Jacques Quisquater||Jean-Jacques Quisquater||CRYPTO in 2030||slides|
|19:35||Whitfield Diffie||Whitfield Diffie||Breaking teleprinter ciphers at Bletchley Park finally published||slides|
|19:36||Hovav Shacham||Hovav Shacham||Enjoy the Wi-Fi!|
|19:41||Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou||Moti Yung||Cliptography: Clipping the Power of Kleptographic Attacks||slides|
|19:48||Abelson, Anderson, Bellovin, Benaloh, Blaze, Diffie, Gilmore, Green, Neumann, Landau, Rivest, Schiller, Schneier, Specter, Weitzner||Rivest||Keys Under Doormats||slides|
|19:53||Greg Rose, Yehuda Lindell||Greg Rose||You think your government is nuts? Petition the Australian Government!||slides|
|19:58||Oscar Garcia-Morchon||Oscar Garcia-Morchon||The HIMMO Contest||slides|
|20:03||Eran Tromer||Eran Tromer||IO obfuscation||slides|
|20:40||Alex Halderman and Nadia Heninger||Nadia Heninger||Indiscreet tweets||slides|
|20:47||John Kelsey||John Kelsey||What's Up with SHA3||slides|
|20:54||Pierre Karpman||Pierre Karpman||The Real SHA-2,3,...||slides|
|20:59||Daniel J. Bernstein, Peter Schwabe, Gilles Van Assche||Daniel J. Bernstein||Is SHA-3 too complicated?||slides|
|21:02||Tor Helleseth||Tor Helleseth||Arctic Crypt - A new crypto world record||slides|
|21:04||Alex Biryukov, Léo Perrin, Aleksei Udovenko||Léo Perrin||The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob||slides|
|21:08||Achiya Bar-On||Adi Shamir||Making a Best Paper Bester: Improved Attacks on Full MISTY1||slides|
|21:13||Mike Hamburg||Mike Hamburg||STROBE lite protocol framework for lazy people||slides|
|21:18||Jon Callas||Jon Callas||Secure multitrack computation||slides|
|21:22||Biryukov, Dinu, Groszschadl, Khovratovich, Le Corre, Perrin||Perrin||The ACRYPT project: Lightweight Cryptography for the Internet of Things||slides|
|21:25||Derek Atkins||Derek Atkins||A Lightweight, Highly Performant Public Key Exchange||slides|
|22:05||Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer||Daniel Genkin, Eran Tromer||PITA: Breaking Bread||slides|
|22:12||Magnus Find and Rene Peralta||Magnus Find||Multiplying faster than Dan||slides|
|22:17||Josh Benaloh and many, many others||Josh Benaloh||Consensus Report on End-to-End Verifiable Internet Voting||slides|
|22:22||David Chaum||David Chaum||Random-Sample Voting|
|22:25||Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti||Ivan Visconti||Improved OR Composition of Sigma-Protocols|
|22:29||Jeremiah Blocki, Hong-Sheng Zhou||Hong-Sheng Zhou||HumanCoin||slides|
|22:33||Eric Miles, Amit Sahai, Mor Weiss||Mor Weiss||Protecting Obfuscation Against Arithmetic Attacks||slides|
|22:36||Prabhanjan Ananth, Abhishek Jain, Amit Sahai||Prabhanjan Ananth||Indistinguishability Obfuscation from Non Compact Functional Encryption||slides|
|22:40||Vipul Goyal, Aayush Jain and Dakshita Khurana||Dakshita Khurana||Witness Signatures and Non-Malleable MIPs||slides|
|22:45||Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs||Aloni Cohen||Coffee Stains||slides|
|22:48||Nigel Smart||Nigel Smart||Two Meetings: RWC 2016 and Real-World-MPC||slides|
|2015.09.28--29: DIAC 2015, Singapore, http://www1.spms.ntu.edu.sg/~diac2015/|
|2015.09.30--10.03: ASK 2015, Singapore, http://www1.spms.ntu.edu.sg/~ask/2015/|
When did Osvik, Shamir, and Tromer announce AES key extraction in 65 milliseconds? When did Kelsey, Schneier, Vaudenay, and Wagner expose cryptographic plagiarism? When did Alice meet Bob face to face for the first time? The Crypto 2005 rump session!
When did Bleichenbacher announce pencil-and-paper RSA forgeries? When did Cryptico announce a $1000 prize for the best cryptanalysis of Rabbit? When did Callas, Cannoy, and van Someren introduce lettuce-based cryptography? The Crypto 2006 rump session!
When did Biham, Dunkelman, Indesteege, Keller, and Preneel announce successful cryptanalysis of KeeLoq? When did Clark and Sale challenge the cryptographic community to race a rebuilt Colossus? When did Tromer, Ellison, Miller, and Wright present the perfect one-way hash? The Crypto 2007 rump session!
When did Tromer announce successful cryptanalysis of the Gpcode.ak ransomware virus? When did Enright, Rescorla, Savage, Shacham, and Yilek present a factorization of the IACR public key? When did Rescorla, Savage, Shacham, and Spies introduce dryness-rights management? The Crypto 2008 rump session!
When did Petit and Quisquater announce preimages in the SL_2 hash? When did Stevens demonstrate live man-in-the-middle attacks on HTTPS via MD5 collisions? When did Suga introduce UbeHashCoool? The Crypto 2009 rump session!
When did Gentry and Halevi announce FHE cryptanalytic challenges with public keys too large to fit on IBM's web servers? When did the mobile-phone industry open up ZUC for public review? When did Heninger and Shacham present a two-thousand-slide historical review of cryptography? The Crypto 2010 rump session!
When did Bogdanov, Khovratovich, and Rechberger announce biclique cryptanalysis of full AES? When did Peters demonstrate the benefits of Springer's editing? When did Suga introduce the mop construction? The Crypto 2011 rump session!
When did Vaudenay announce successful cryptanalysis of a cryptosystem published at Crypto 2012? When did Matsui offer $1500 to beat a dead FEAL? When did Heninger demonstrate RSA private-key recovery via Google? The Crypto 2012 rump session!
When did Shamir announce a 2^64 attack against 4 steps of the LED-128 block cipher? When did NIST announce a public online service to generate random numbers for you? When did a dozen copies of Keith Alexander burst into song? The Crypto 2013 rump session!
When did Genkin and Tromer demonstrate a side-channel attack through a sausage? When did Rivest and Schuldt announce another RC4-like stream cipher? When did Eve learn to look on the bright side of DES? The Crypto 2014 rump session!
The first Crypto rump session took place in 1981 and was immediately heralded as the most important meeting in cryptography. Each subsequent Crypto rump session has reached a new level of historical significance, outstripped only by the Crypto rump sessions that followed it. The Crypto 2015 rump session will attempt to live up to, and if possible exceed, the exceptionally high standards set by previous Crypto rump sessions; but it relies critically on your contributions! Do you have breaking news, progress reports, or other topics of interest to the cryptographic community? Can you keep your talk short and entertaining? Fill out the submission form and ask for a talk slot!
As an added incentive for putting serious effort into non-serious rump-session talks, the editors of the Journal of Craptology usually promise to invite a paper from the most entertaining rump-session speakers. But we haven't heard from them yet.