Program for Women in Mathematics

Program for Women in Mathematics

Mathematics of Modern Cryptography Daily Schedule May 19-25, 2018 **Support for this event is provided by the generosity of Lisa Simonyi, a grant from the National Science Foundation, and Princeton University. Saturday, May 19 3:00 p.m. – 6:00 p.m. Registration & Reception Simons Hall, Dilworth Room 5:00 p.m. – 6:00 p.m. Women in Science Seminar – Introductions Simons Hall, Dilworth Room 6:15 p.m. IAS VAN to Nassau Inn (1 van, first come first served-multiple trips) Front of Fuld Hall Sunday, May 20 7:00 a.m. – 8:30 a.m. Breakfast Nassau Inn 12:00 p.m. – 2:00 p.m. Lunch Simons Hall, Dilworth Room 2:00 p.m. – 3:00 p.m. Beginner Course preview Simonyi Hall 101 3:00 p.m. – 4:00 p.m. Advanced Course preview Simonyi Hall 101 4:15 p.m. – 5:15 p.m. Women in Science Panel – Q&A participant choice Simons Hall, Dilworth Room 5:15 p.m. – 7:00 p.m. Dinner Simons Hall, Dilworth Room 7:00 p.m. – 9:00 p.m. Movie: Imitation Game (Wolfensohn Hall) Wolfensohn Hall 9:15 p.m. IAS VAN to Nassau Inn (1 van, first come, first served –multiple trips) Front of Fuld Hall Monday, May 21 7:00 am – 8:30 am Breakfast Nassau Inn 8:15 a.m. IAS VAN to Fuld Hall (2 vans, first come, first served) Nassau Inn 8:45 a.m. Tour of the Institute Fuld Hall Common Room 9:15 a.m. – 10:15 a.m. Beginner Lecture Course Simonyi Hall 101 Toni Bluher, NSA, “Mathematics in Cryptography” 10:15 a.m. – 11:15 a.m. Beginner Review Session Simonyi Hall 101 11:15 a.m. – 11:30 a.m. Break 11:30 a.m. – 12:30 p.m. Advanced Lecture Course Simonyi Hall 101 Kristin Lauter, Microsoft Research, “Mathematics of Post-Quantum Cryptography” 12:30 p.m. – 1:45 p.m. Lunch Simons Hall 1:45 p.m. – 2:45 p.m. Advanced Review Session Simonyi Hall 101 2:45 p.m. – 4:15 p.m. Research Seminars Simonyi Hall 101 Kelsey Horan, “A Fast Quantum Algorithm for Solving Multivariate Quadratic Questions” Angela Robinson, “The Tractability of the Discrete Logarithm Problem in S_n and Hybrid Encryption in the Quantum Random Oracle Model” Elizabeth Wilcox, “The Chermak-Delgado Lattice of a Finite Group” 4:15 p.m. – 4:45 p.m. Afternoon Tea Fuld Hall Common Room 4:45 p.m. – 5:45 p.m. Colloquium Simonyi Hall 101 Jill Pipher, Brown University, “NTRU lattice-based algorithms: history and modern developments” 5:45 p.m. – 7:45 p.m. Opening Dinner Simons Hall, Dining Hall Chat with Jill Pipher, Brown University 7:45 p.m. IAS VAN to Nassau Inn (1 van, first come first served-multiple trips) Front of Fuld Hall Tuesday, May 22 7:00 a.m. - 8:30 a.m. Breakfast Nassau Inn 8:15 a.m. IAS VAN to Fuld Hall (2 vans, first come, first served) Nassau Inn 9:00 a.m. Group Photo Fuld Hall Common Room 9:15 a.m. – 10:15 a.m. Beginner Lecture Course Simonyi Hall 101 Toni Bluher, NSA, “Mathematics in Cryptography” 10:15 a.m. – 11: 15 a.m. Beginner Review Session Simonyi Hall 101 11:15 a.m. – 11:30 a.m. Break 11: 30 a.m. – 12:30 p.m. Advanced Lecture Course Simonyi Hall 101 Kristin Lauter, Microsoft Research, “Mathematics of Post-Quantum Cryptography” 12:30 p.m. – 2:00 p.m. Lunch Simons Hall 2:00 p.m. – 3:00 p.m. Advanced Review Session Simonyi Hall 101 3:00 p.m. – 4:15 p.m. Ambassador Review: Yang Xiao, Brown University Simonyi Hall 101 Ha Tran, “Well-known Ideal Lattices from Cyclotomic Fields” Fattaneh Bayatbabolghani, “Enforcing Input Correctness via Certification in Gabled Circuit Evaluation” 4:15 p.m. – 4:45 p.m. Afternoon Tea Fuld Hall Common Room 4:45 p.m. – 5:45 p.m. Women in Science Seminar Simonyi Hall 101 Career Panel 5:45 p.m. – 7:45 p.m. Dinner Simons Hall, Dilworth Room 7:45 p.m. IAS VAN to Nassau Inn (1 van, first come first served-multiple trips) Front of Fuld Hall Wednesday, May 23 Princeton University Day (see separate schedule) 7:00 a.m. – 8:30 a.m. Breakfast Nassau Inn 9:00 a.m. – Depart for Princeton University Meet in lobby of Nassau Inn. Walk over to Princeton Univ, Fine Hall. Thursday, May 24 7:00 a.m. - 8:30 a.m. Breakfast Nassau Inn 8:15 a.m. IAS VAN to Fuld Hall (2 vans, first come, first served) Nassau Inn 9:15 a.m. – 10:15 a.m. Beginner Lecture Course Simonyi Hall 101 Toni Bluher, NSA, “Mathematics in Cryptography” 10:00 a.m. – 2:00 p.m. T-shirt Sale **CASH ONLY Simons Hall, Harry’s Bar 10:15 a.m. – 11:15 a.m. Beginner Review Session Simonyi Hall 101 11:15 a.m. – 11:30 a.m. Break 11:30 a.m. – 12:30 p.m. Advanced Lecture Course Simonyi Hall 101 Kristin Lauter, Microsoft Research, “Mathematics of Post- Quantum Cryptography” 12:30 p.m. – 2:00 p.m. Lunch Simons Hall 2:00 p.m. – 3:00 p.m. Advanced Review Session Simonyi Hall 101 3:00 p.m. – 4:00 p.m. Women in Science Seminar Simonyi Hall 101 Ambassador Program: Introduction 4:00 p.m. – 4:30 p.m. Afternoon Tea Fuld Hall Common Room 4:30 p.m. – 5:30 p.m. Women in Science Seminar Simonyi Hall 101 Ambassador Program: Results 5:45 p.m. – 7:45 p.m. 25th Anniversary & Closing Dinner Simons Hall, Dining Room 7:45 p.m. IAS VAN to Nassau Inn (1 van, first come first served-multiple trips) Front of Fuld Hall Friday, May 25 7:00 a.m. - 8:30 a.m. Breakfast Nassau Inn 8:15 a.m. IAS VAN to Fuld Hall (2 vans, first come, first served) Nassau Inn 9:00 a.m. – 10:00 a.m. Beginner Lecture Course Simonyi Hall 101 Toni Bluher, NSA, “Mathematics in Cryptography” 10:00 a.m. – 10:15 a.m. Break 10:15 a.m. – 11:15 a.m. Advanced Lecture Course Simonyi Hall 101 Kristin Lauter, Microsoft Research, “Mathematics of Post- Quantum Cryptography” 11:15 a.m. – 11:30 a.m. Break 11:30 a.m. – 12:30 p.m. Research Seminars Simonyi Hall 101 Betül Durak, “Breaking the Format-Preserving Encryption Standard Over Small Domains” Soodeh Dadras, “Security of Control Systems in Autonomous Vehicle Platooning” 12:30 p.m. – 2:00 p.m. Lunch Simons Hall 2:00 p.m. – IAS VAN to Nassau Inn (1 van, first come first served-multiple trips) Front of Fuld Hall ~end .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us