Crypto 2015 rump session: Submission form

To request a talk slot at the Crypto 2015 rump session, fill out the following form before Monday 17 August 2015, 22:00 Santa Barbara time. Some submissions may have to be rejected because of time constraints; please remember that the rump session is meant for short and entertaining presentations.

The file-switching time before each rump-session talk often seems longer than the talk itself, and often is longer than the talk itself. The Crypto 2015 rump session will attempt to reduce the talk-switching time by concatenating PDFs for adjacent talks. If you plan to give a talk without slides, or if you don't have slides ready yet, please prepare and submit one slide stating your name and talk title.

Online updates of slides for previous submissions will be accepted until some time on Tuesday. Updated slides will not be accepted on USB sticks or by email.

Submission ID to make a new submission:

Submission ID to view/revise/withdraw an existing submission:

Requested minutes for talk (1, 2, 3, 4, 5, 6, or 7):

Example: 7


Example: When curtains block justice


Example: Cyrus R. Vance Jr., Francois Molins, Adrian Leppard, Javier Zaragozaaug, Steve Weis
Example: 2015.06.02--05: ACNS 2015, New York, USA,
For 0-minute conference announcements: Use "Authors" to specify the dates, conference abbreviation, conference location, and URL, in that order.


Example: Steve Weis

Email address (not for publication) for confirming submission:

Name of PDF file with slides to upload:

I am the speaker. I understand that rump sessions are often webcast and recorded.

Please include the audio and video of my talk in the online record of the rump session, if there is an official recording.

Please include these slides in the online record of the rump session.

Brief summary (not for publication) of this talk:

Example: Over 3 years ago, curtains were invented with provided 'full-window protection'. No longer could people be observed sleeping in their bedrooms from the street. Now, on behalf of crime victims the world over, we are asking whether these curtains are truly worth the cost. Curtains significantly limit our capacity to investigate these crimes and severely undermines our efficiency in the fight against terrorism. Why should we permit criminal activity to thrive behind drawn curtains, unavailable to law enforcement? See for more.
Example: In some situations the new SHA-3 standard allows collisions between hashes and truncations of longer hashes. We analyze the impact of these collisions on deployed protocols.

Explanation (not for publication) of why this talk belongs in the rump session:

Example: News. Found this result four weeks ago.
Example: Advertising result that appeared at TCC 2015 part 5: return of the multilinear maps.
Example: Have already bribed the rump-session chairs.
Example: Has been accepted for the Fifteenth NSA Workshop on Indigenous Cryptography.
Example: Will be funny, I promise.
Example: Was unfairly rejected from the regular program.