FSE 2016 rump session: Submission form


To request a talk slot at the FSE 2016 rump session, fill out the following form before Tuesday 22 March 2016, 11:00 Bochum time. Some submissions may have to be rejected because of time constraints; please remember that the rump session is meant for short and entertaining presentations.

The file-switching time before each rump-session talk often seems longer than the talk itself, and often is longer than the talk itself. The FSE 2016 rump session will attempt to reduce the talk-switching time by concatenating PDFs for adjacent talks. If you plan to give a talk without slides, or if you don't have slides ready yet, please prepare and submit one slide stating your name and talk title.

Online updates of slides for previous submissions will be accepted until 14:00 on Tuesday. Updated slides will not be accepted on USB sticks or by email.


Submission ID to make a new submission:

Submission ID to view/revise/withdraw an existing submission:


Requested minutes for talk (1, 2, 3, 4, 5, 6, or 7):

Example: 7

Title:

Example: The best defense is a good offense

Authors:

Example: Michael Rogers and Adam Schiff

Speaker:

Example: Michael Rogers

Email address (not for publication) for confirming submission:

Name of PDF file with slides to upload:

I am the speaker. I understand that rump sessions are often webcast and recorded.

Please include the audio and video of my talk in the online record of the rump session, if there is an official recording.

Please include these slides in the online record of the rump session.

Brief summary (not for publication) of this talk:

Example: To increase community trust in Simon and Speck, we've decided to drop the pretense that IAD is a separate organization from the much larger component of NSA dedicated to attacks. See https://www.schneier.com/blog/archives/2016/02/nsa_reorganizin.html.
Example: This talk introduces Spooky, a non-NIST cipher standard. This standard achieves unbreakability by incorporating challenge-response protocols into cipher design: each attempted attack triggers a change to the standard to resist the attack.

Explanation (not for publication) of why this talk belongs in the rump session:

Example: News. Found this result four weeks ago.
Example: Advertising result that appeared at Asiacrypt 2015.
Example: Have already bribed the rump-session chairs.
Example: Has been accepted for Eurocrypt 2016.
Example: Will be funny, I promise.
Example: Was unfairly rejected from the regular program.