| 10:40 | Introduction |
| 10:45 | Session 1: Semantics |
| 10:45 | Härmel Nestra | Double Applicative Functors |
| 11:10 | Hendrik Maarand | Certified Foata Normalization for Generalized Traces |
| 11:35 | Coffee break |
| 12:05 | Session 2: Misc |
| 12:05 | Silvio Capobianco | Nonuniversality in Computation: a (non)-disproof of the Church-Turing thesis |
| 12:30 | Abdullah Makkeh | Bivariate Partial Information Decomposition: The Optimization Perspective |
| 12:55 | Lunch (in Restaurant "Gunpowder Cellar") |
| 14:25 | Session 4: Cryptography |
| 14:25 | Bingsheng Zhang | Statement Voting and Liquid Democracy |
| 14:50 | Alisa Pankova | Privacy-preserving duplication detection |
| 15:15 | Toomas Krips | Golden Section Numbers in Secure Multiparty Computation |
| 15:40 | Peeter Laud | Secure Multiparty Sorting Protocols with Covert Privacy |
| 16:05 | Coffee break |
| 16:35 | Session 3: Coding Theory etc |
| 16:35 | Ivo Kubjas | Two-Party Function Computation on the Reconciled Data |
| 17:00 | Vitaly Skachek | Constructions and Bounds for Batch Codes with Small Parameters |
| 17:25 | Yauhen Yakimenka | Distance Properties of Short LDPC Codes and their Impact on the BP, ML and Near-ML Decoding Performance |
| 17:50 | Ludmila Glinskih | Satisfiable Tseitin formulas are hard for nondeterministic read-once branching programs |
| 18:15 | Adjourn |
| 19:00 | Dinner (in restaurant "Polpo") |
| 09:30 | Session 5: Automata |
| 09:30 | Hellis Tamm | Theoretical aspects of symbolic automata |
| 09:55 | Aliya Khadieva | Reordering Method for Quantum and Classical Ordered Binary Decision Diagrams |
| 10:20 | Markus Whiteland | On $k$-Abelian Equivalence Classes via Regularity |
| 10:45 | Juhani Karhumäki | Reachability via co-operating morphism |
| 11:10 | Coffee break |
| 11:40 | Session 6: Quantum Cryptography |
| 11:40 | Aleksandrs Belovs | Provably secure key establishment against quantum adversaries |
| 12:05 | Ehsan Ebrahimi | On Quantum Indifferentiability |
| 12:30 | Tore Vincent Carstens | On quantum indistinguishability under chosen plaintext attacks |
| 12:55 | Lunch (in Restaurant "Gunpowder Cellar") |
| 14:25 | Session 7: Cryptography |
| 14:25 | Marek Sýs | Factorization of widely used RSA moduli |
| 15:25 | Michal Zajac | A Subversion-resistant SNARK |
| 15:50 | Janno Siim | An Efficient Pairing-Based Shuffle Argument |
| 16:15 | Coffee break |
| 16:45 | Session 8: Quantum Computing |
| 16:45 | Andris Ambainis | Quantum algorithms for trees of unknown structure |
| 17:10 | Kamil Khadiev | Quantum versus Classical Online Algorithms with Advice and Restricted Memory |
| 17:35 | Jevgenijs Vihrovs | All Classical Adversary Methods are Equivalent for Total Functions |
| 18:00 | Adjourn |
| 19:00 | Dinner (in restaurant "Vilde ja Vine") |
| 20:30 | Sauna (in the Institute of Political Studies) |
| 09:30 | Session 9: Image Recognition and Crypto |
| 09:30 | Egils Avots | Audio based emotion recognition in an uncontrolled environment |
| 09:55 | Fatemeh Noroozi | Audio-Visual Emotion Recognition in Video Clips |
| 10:20 | Mohammad Fawaz Yousef Anagreh | Accelerate Performance of Calculation for Elliptic Curve Cryptosystem Based on MOF by Parallel Computing |
| 10:45 | City tour |
| 12:15 | Session 10: Quantum Complexity |
| 12:15 | Abuzer Yakaryilmaz | Magic coins are useful for small-space quantum machines |
| 12:40 | Maksims Dimitrijevs | Uncountable realtime probabilistic classes |
| 13:05 | Lunch (in Restaurant "Gunpowder Cellar") |
| 14:35 | Session 11: Distributed and Graph Algorithms |
| 14:35 | Jukka Suomela | Understanding Computation via Computation |
| 15:35 | Petteri Kaski | Delegatable and error-tolerant algorithms |
| 16:00 | Ivan Bliznets | Parameterized Algorithms for Partitioning Graphs into Highly Connected Clusters |
| 16:25 | Coffee break |
| 16:50 | Adjourn |