Our program contains scientific presentations, poster sessions, panel discussions, education workshops, and diversity-related working groups sessions.
Time | Tuesday | Wednesday | Thursday | Friday |
---|---|---|---|---|
* Chatham House Rule applies to all sessions unless explicitly mentioned. * | ||||
9:00 - 9:30 |
Registration + Coffee & Snacks Hall, Building 2 GatherTown |
|||
9:30 - 9:45 |
Coffee & Snacks Hall, Building 2 GatherTown |
Coffee & Snacks Great Hall, Building 5 GatherTown |
Coffee & Snacks
Great Hall, Building 5 GatherTown |
|
9:45 - 10:00 |
Opening
Amphi, Building 2 GatherTown |
|||
10:00 - 11:00 |
Invited Talk 1
Marta Bellés Muñoz Dusk Network Theoretical aspects of practical cryptography Amphi, Building 2 GatherTown |
Joint meeting with WISC
Parallel event in Bochum, Germany Amphi, Building 2 GatherTown |
Working Groups: Session III
Working rooms, Building 5 Online working groups on GatherTown |
Working Groups: Wrap up
Working rooms, Building 5 Online working groups on GatherTown |
11:00 - 11:15 |
Pitching Posters Amphi, Building 2 GatherTown |
Panel 2: Breaking the cycle Amphi, Building 2 Ilaria Chillotti, Reyhane Falanji, Martha Hovd, Adeline Roux-Langlois Moderator: Nora Khayata Amphi, Building 2 GatherTown |
Working Groups: Session IV
Working rooms, Building 5 Online working groups on GatherTown |
Working Groups: Conclusion
Amphitheatre, Building 2 Online working groups on GatherTown |
11:15 - 11:45 |
Posters Session In front of Amphitheatre, Building 2 In-person |
|||
11:45 - 12:00 |
Closing Amphi, Building 2 GatherTown |
|||
12:00 - 13:15 |
Lunch Great Hall, Building 5 |
Lunch Great Hall, Building 5 |
Lunch Great Hall, Building 5 |
|
13:15 - 13:30 |
IACR 101 by Allison Bishop Working rooms, Building 5 & Online |
|||
13:30 - 14:15 |
Invited Talk 2
Chaya Ganesh Indian Institute of Science Cryptographic proofs for privacy and integrity Amphi, Building 2 GatherTown |
Working Groups: Session I
Working rooms, Building 5 Online working groups on GatherTown |
Posters Session Online on GatherTown Free time for in-person attendees |
|
14:15 - 14:30 |
Coffee Break
Great Hall, Building 5 GatherTown |
|||
14:30 - 14:45 |
Coffee Break
Hall, Building 2 GatherTown |
Coffee Break
Hall, Building 2 GatherTown |
||
14:45 - 15:00 |
Working Groups: Session II
Working rooms, Building 5 Online working groups on GatherTown |
|||
15:00 - 15:30 |
Panel 1: Advocating for Diversity Chris Brzuska, Tako Boris Fouotsa, Erin Hales, Sofía Celi Moderator: Nora Khayata Amphi, Building 2 GatherTown |
Educational Talk 2
Natacha Portier ENS Lyon Workshop on Impostor Syndrome Amphi, Building 2 Online groups on GatherTown |
||
15:30 - 16:15 |
Educational Talk 1
Kylie Ariel Bemis Northeastern University Data Sovereignty under Tyranny Amphi, Building 2 GatherTown |
|||
16:15 - 16:30 |
Working Groups: Kick Off
Amphi, Building 2 Online working groups on GatherTown |
|||
16:30 - 17:00 | Going to city center | |||
17:00 - 17:15 | Free time | |||
17:15 - 17:30 |
Group Photo In front of building 5 |
|||
17:30 - 18:00 |
Wine & Cheese Great Hall, Building 5 Not available online :( |
Guided Tour of Montpellier by Montpellier Tourism Office 30 Allée Jean de Lattre de Tassigny By tram: Line 1 towards "Odysseum", stop at "Comédie" Not available online :( |
||
18:00 - 18:30 |
Beach Trip Not available online :( |
|||
18:30 - 19:30 |
Free time Enjoy Montpellier! |
The event will be recorded.
The event will only be in person.
The event will only be online.
Download the program, as pdf.
Speaker: Marta Bellés Muñoz
Abstract: My experience with zero-knowledge proof systems has largely been driven by practical needs, which eventually led to theoretical results. In this talk, I will present the most significant outcomes, including work on arithmetic circuits and the study of elliptic curves. The highlight is a result showing that no known families of pairing-friendly curves are involved in a 2-cycle with any pairing-friendly curve of cryptographic interest (beyond the well-known MNT cycles).
Speaker: Chaya Ganesh
Abstract:
A common denominator of conventional financial systems, trusted execution environments (like SGX), blockchain technology, and ZK-rollups is the promise of computational integrity -- doing the right computation on potentially secret inputs, even when there is no trust.
In this talk, we will define computational integrity and show how one can verify the correctness of a computation much more efficiently than having to re-perform the computation. We will introduce the notion of succinct proof systems that allow a prover to convince a verifier about the correctness of computation such that verification is exponentially faster than the computation itself, and zero-knowledge where the verifier learns nothing beyond the truth of the statement. We will see applications of zkSNARKs (Zero-knowledge Succinct Non-interactive ARguments of Knowledge), a kind of succinct arguments in decentralized systems like blockchain technology for both privacy and scalability issues, and outline the design principle underlying zkSNARK constructions.
Speaker: Kylie Ariel Bemis
Abstract:
The rise of AI and high-tech government surveillance pose new challenges to the worldwide struggle for human rights and liberties. Nowhere is this more apparent than the descent of the United States of America into authoritarianism, which has prominently featured the use of generative AI and attacks on citizens’ private data within the federal government. Tyranny in the 21st century relies not only on fear through military might, but also the breakdown of truth, data privacy, and reliable provenance of information.
Indigenous communities are painfully familiar with this brand of technological tyranny, but it is a new threat for the majority of Americans and many others living in backsliding democracies. However, based on lessons from around the world, there are ways for nonviolent civil resistance movements to fight back against authoritarianism. Experts in digital security and data privacy will play a vital role in these movements to defend the human rights, liberties, and data sovereignty of vulnerable communities and nations.
Speaker: Natacha Portier
Abstract:
Impostor Syndrome is a widespread phenomenon: 70 percent of people have experienced feelings of fraudulence in their life. It is especially significant among high achieving women and academics of every gender. The syndrome is characterized by not owning your own success, thinking other people overestimate you and fearing being found out. It can be hugely detrimental to the accomplishments of one’s goal and to the well-being of the person experiencing it.
The aim of this 3 hours workshop is to learn how to recognize the Impostor Syndrome in one’s thinking and to know which strategies to put into place to prevent it in order to reach your professional goals. This will be accomplished by awareness-raising through questioning and shared experiences, introducing theoretical input and giving practical implementation.
For more details on the scientific and educational speakers, as well as the panelists, visit this page.
Submissions for posters are closed
The accepted posters to the event are: