Program

Overview

Our summit is structured around four key categories, ensuring a diverse and inclusive program that brings together participants from different geographic and scientific backgrounds. Our primary goal is to document ideas and plan concrete actions to better support underrepresented groups in cryptography while showcasing the exceptional career paths and research contributions of these communities. Additionally, we aim to foster potential scientific collaborations among members of the cryptography community from underrepresented backgrounds.

We will have: a. Scientific Presentations, b. Diversity Discussions and c. Education Workshops.

Program

Our temporary program is:


Time Monday Tuesday Wednesday Thursday Friday
9:00 - 9:30Registration (all day) RegistrationRegistrationRegistrationRegistration
9:30 - 10:00Coffee & SnacksCoffee & SnacksCoffee & SnacksCoffee & Snacks
9:45 - 10:00Opening Remarks
10:00 - 11:00Invited TalkInvited TalkGroup ActivityConclusion
11:00 - 12:00Poster sessionEducational TalkGroup Activity ConclusionClosing remarks
12:00 - 13:30LunchLunchLunch
13:30 - 14:30Invited TalkPanelPoster session
14:30 - 15:00Coffee BreakCoffee BreakCoffee Break
15:00 - 16:30PanelGroup ActivityEducational Talk
16:30 - 17:00Group ActivityGroup ActivityInformal Break
17:00 - 18:00Group ActivityGroup ActivityEducational Talk

Scientific Talks

We will have two scientific presentations given by

Panel Discussions

We will have two panel discussions on the topics of

Poster Session

Submissions for posters are closed


The accepted posters to the event are:

  • Meenakshi Iyer on Generative AI.
  • Soda Diop on Gröbner-Shirshov bases in a field.
  • Joseline Youego on BrHackeuses.
  • Diane Leblanc-Albarel on Women in Engineering (WIE) SB Affinity Group Leuven.
  • Andreas Brüggemann on German Self-Determination Act (SBGG).
  • Olta Bytyci on NIZKP and Machine Learning.
  • Reyhane Falanji on accountability.
  • Sebati Ghosh on Protecting Minority Ethnic Communities Online.
  • Erin Hales on Neurodiverse spaces in academia.
  • Lucas Ottow on Threshold public key encryption.
  • Lucy Sharma on Biometric authentication.