Slides are available from all presenters who agreed to have their slides officially online. Slides were already gradually made available during the rump session.
The rump session was broadcast as a live Silverlight stream from the following URL: http://gauchocast.ucsb.edu/Panopto/Pages/Viewer/Default.aspx?id=6075c6c2-b2db-4faa-a112-71158db9db1f Silverlight viewer for Windows: http://www.microsoft.com/silverlight/ Silverlight viewer for Linux (Pipelight): https://launchpad.net/pipelight
The call for submissions has been archived below.
Authors | Speaker | Title | Slides | |
---|---|---|---|---|
Crypto 2013 rump session, Tuesday 20 August 2013 | ||||
Session 1 | ||||
19:30 | Ran Canetti and Juan Garay | Ran Canetti | Chairs' report for Crypto 2013 | slides |
19:37 | Andrea Forte, Juan Garay, Trevor Jim, Yevgeniy Vahlis | Juan Garay | EyeDecrypt -- Private Interactions in Plain Sight | slides |
19:42 | Sasha Boldyreva | Sasha Boldyreva | How to make 400+ cryptographers appreciate your creativity | slides |
19:44 | David Chaum | David Chaum | Majority Decisions .org | |
19:48 | Mitsuru Matsui | Mitsuru Matsui | The FEAL Cipher Prize Problem -Winner Announcement- | slides |
19:50 | Eli Biham and Yaniv Carmeli | Adi Shamir | Solving the FEAL 25 Years Prize Problems | slides |
19:57 | Nadia Heninger | Nadia Heninger | Factoring as a service | slides |
20:02 | Yvo Desmedt, Jean-Jacques Quisquater, Moti Yung | Moti Yung | Cryptanalysis of MDS-POTI | slides |
20:09 | John Kelsey | John Kelsey | NIST Update | slides |
20:15 | Keith Alexander, Keith Alexander | Keith Alexander, Keith Alexander, Keith Alexander | Spyin' NSA | slides |
20:20 | Break | |||
Session 2 | ||||
20:50 | Nadhem AlFardan, Dan Bernstein, Kenny Paterson, Bertram Poettering, Jacob Schuldt | Jacob Schuldt | On the Security of RC4 in TLS | slides |
20:55 | Gora Adj, Alfred Menezes, Thomaz Oliveira and Francisco Rodríguez-Henríquez | Francisco Rodríguez-Henríquez | Weakness of GF$(3^{6 \cdot 509})$ for Discrete Logarithm Cryptography | slides |
21:02 | Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters | Sanjam Garg | Candidate Indistinguishability Obfuscation, Or Sell Apple, Buy Samsung | slides |
21:07 | Amit Sahai and Brent Waters | Brent Waters | How to Use Indistinguishability Obfuscation: Deniable Encryption, and More | slides |
21:13 | Aggelos Kiayias and Qiang Tang | Aggelos Kiayias | How to keep a secret: Leakage Deterring Public-Key Cryptosystems | slides |
21:17 | Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs | Yevgeniy Dodis | Random Number Generation, Revisited | slides |
21:22 | Jeremiah Blocki, Manuel Blum, Anupam Datta | Jeremiah Blocki | Naturally Rehearsing Passwords | slides |
21:27 | Benjamin Fuller, Xianrui Meng, Leonid Reyzin | Benjamin Fuller | Computational Fuzzy Extractors | slides |
21:32 | Daniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren | Nadia Heninger | Factoring RSA keys from certified smart cards: Coppersmith in the wild | slides |
21:38 | Tomasz Kazana | Tomasz Kazana | Warsaw is cool | slides |
21:41 | Average Joe | Average Joe, Average Joe, Average Joe | Under Surveillance | slides |
21:45 | Break | |||
Session 3 | ||||
22:15 | Itai Dinur, Orr Dunkelman, Nathan Keller and Adi Shamir | Adi Shamir | An Improved Attack on 4-Round Even-Mansour with 2 Alternating Keys | slides |
22:21 | Dominique Unruh | Dominique Unruh | Quantum Time Capsules & Unknown Recipient Encryption | slides |
22:25 | Aggelos Kiayias and Stavros Papadopoulos and Nikos Triandopoulos and Thomas Zacharias | Aggelos Kiayias | Delegatable Pseudorandom Functions and Applications | slides |
22:29 | Yutaka Kawai, Katsuyuki Takashima | Katsuyuki Takashima | Fully-Anonymous Functional Proxy-Re-Encryption | slides |
22:34 | Charanjit S. Jutla and Arnab Roy | Arnab Roy | Shorter Quasi-Adaptive NIZKs for Linear Subspaces | slides |
22:39 | Luis Brandao | Luis Brandao | Communication complexity of the forge-and-lose technique | slides |
22:44 | Marcel Keller, Peter Scholl, Nigel Smart | Marcel Keller | The million-entry ORAM on MPC | slides |
22:46 | Numerous (several papers involved) | Elaine Shi | Practical ORAM: From Theory to Secure Processor to Compiler | |
22:51 | Elaine Shi, Emil Stefanov, Babis Papamanthou | Elaine Shi | Truly Practical Dynamic Proofs of Retrievability (Without Oblivious RAM) | |
22:55 | Yehuda Lindell | Yehuda Lindell | Announcing SCAPI: the Secure Computation API | slides |
23:00 | Fin! | |||
Announcements, http://www.iacr.org/events/ | ||||
2013.12.01: Algorithmica Call for Papers: Special Issue on Algorithms for Secure Computation, http://www.springer.com/computer/theoretical+computer+science/journal/453 | ||||
2013.11, Berlin, before CCS: PUFFIN workshop, http://puffin.eu.org | ||||
2013.11.18--20, Okinawa, Japan: The 8th International Workshop on Security (IWSEC2013), http://www.iwsec.org/2013/ | ||||
2013.12.01--05, Bangalore, India: Asiacrypt 2013, make sure to apply for visas NOW! See slides online, http://www.iacr.org/conferences/asiacrypt2013 | ||||
2014: Lausanne, Switzerland: ACNS 2014 |
When did Osvik, Shamir, and Tromer announce AES key extraction in 65 milliseconds? When did Kelsey, Schneier, Vaudenay, and Wagner expose cryptographic plagiarism? When did Alice meet Bob face to face for the first time? The Crypto 2005 rump session!
When did Bleichenbacher announce pencil-and-paper RSA forgeries? When did Cryptico announce a $1000 prize for the best cryptanalysis of Rabbit? When did Callas, Cannoy, and van Someren introduce lettuce-based cryptography? The Crypto 2006 rump session!
When did Biham, Dunkelman, Indesteege, Keller, and Preneel announce successful cryptanalysis of KeeLoq? When did Clark and Sale challenge the cryptographic community to race a rebuilt Colossus? When did Tromer, Ellison, Miller, and Wright present the perfect one-way hash? The Crypto 2007 rump session!
When did Tromer announce successful cryptanalysis of the Gpcode.ak ransomware virus? When did Enright, Rescorla, Savage, Shacham, and Yilek present a factorization of the IACR public key? When did Rescorla, Savage, Shacham, and Spies introduce dryness-rights management? The Crypto 2008 rump session!
When did Petit and Quisquater announce preimages in the SL_2 hash? When did Stevens demonstrate live man-in-the-middle attacks on HTTPS via MD5 collisions? When did Suga introduce UbeHashCoool? The Crypto 2009 rump session!
When did Gentry and Halevi announce FHE cryptanalytic challenges with public keys too large to fit on IBM's web servers? When did the mobile-phone industry open up ZUC for public review? When did Heninger and Shacham present a two-thousand-slide historical review of cryptography? The Crypto 2010 rump session!
When did Bogdanov, Khovratovich, and Rechberger announce biclique cryptanalysis of full AES? When did Peters demonstrate the benefits of Springer's editing? When did Suga introduce the mop construction? The Crypto 2011 rump session!
When did Vaudenay announce successful cryptanalysis of a cryptosystem published at Crypto 2012? When did Matsui offer $1500 to beat a dead FEAL? When did Heninger demonstrate RSA private-key recovery via Google? The Crypto 2012 rump session!
The first Crypto rump session took place in 1981 and was immediately heralded as the most important meeting in cryptography. Each subsequent Crypto rump session has reached a new level of historical significance, outstripped only by the Crypto rump sessions that followed it. The Crypto 2013 rump session will attempt to live up to, and if possible exceed, the exceptionally high standards set by previous Crypto rump sessions; but it relies critically on your contributions! Do you have breaking news, progress reports, or other topics of interest to the cryptographic community? Can you keep your talk short and entertaining? Fill out the submission form and ask for a talk slot!
As an added incentive for putting serious effort into non-serious rump-session talks, the editors of the Journal of Craptology usually promise to invite a paper from the most entertaining rump-session speakers. But we haven't heard from them yet.