Registration 8:00 - 9:15
9:00 - 09:10
Organizers
09:10 - 10:00
Rei Safavi-Naini
10:00 - 10:30
Verifiable Credentials and Attribute-Based Signcryption for Secure Data Sharing
by Jodie Knapp
Preserving Privacy and Security in Federated Learning Systems
by Zeynab Mottaqi
Blind Multisignature Schemes
by Joseline Youego
MPC With Delayed Parties Over Star-Like Networks
by Mariana Gama
Coffee Break 10:30 - 11:00
11:00 - 11:50
Dörte Resch
11:50 - 12:30
Threshold Structure Preserving Signatures
by Jenit Tomy
Enhancing Private Set Intersection for Broader Applications
by Peihan Miao
Verifiable Delay Functions and their (Unexpected) Applications
by Charlotte Hoffmann
Lunch 12:30 - 13:30
13:30 - 15:00
With Huijia (Rachel) Lin, Dakshita Khurana, Anne Canteaut, Agnès Leroy
Coffee Break 15:00 - 15:30
15:30 - 16:10
Security Bounds for Proof-Carrying Data from Straightline Extractors
by Ziyi Guan
Solving the Tensor Isomorphism Problem on special orbits with low rank points
by Laurane Marco
Mathematical Tools for Post-quantum Cryptography
by Soda Diop
16:10 - 16:50
PIR + FHE: Chip’n’Dale of privacy (A survey on PIR and FHE)
by Luiza Barros Reis Soezima
Ensuring Privacy and Robustness in Computation of Machine Learning Algorithms
by Chrysa Oikonomou
Training Programs for Woman PhDs; Sharing an Experience
by Mahshid Riahinia
Preprocessing Techniques in Algebraic Cryptanalysis
by Kristýna Mašková
Security Analysis of NIST’s Federation Assurance Levels for SSO
by Ronja Wagner
Protocols in the Shared EPR Pairs Model
by Anne Müller
16:50 - 17:00
Organizers