webnotice

Speaker: Jonathan Boretsky
Affiliation: McGill University
Location: MC 5417

Abstract: For all positive integers l and r, we determine the maximum number of elements of a simple rank-r positroid without the rank-2 uniform matroid U(2, l+2) as a minor, and characterize the matroids with the maximum number of elements. This result continues a long line of research into upper bounds on the number of elements of matroids from various classes that forbid U(2, l+2) as a minor, including works of Kung, of Geelen–Nelson, and of Geelen–Nelson–Walsh. This is the first paper to study positroids in this context, and it suggests methods to study similar problems for other classes of matroids, such as gammoids or base-orderable matroids. This project is based on joint work with Zach Walsh.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.

Friday, February 6, 2026 10:30 am - 11:30 am EST (GMT -05:00)

Crypto Reading Group -Maggie Simmons-Enabling FrodoKEM on Embedded Devices

Speaker Maggie Simmons
Affiliation University of Waterloo
Location MC 6029

Abstract:  FrodoKEM is a lattice-based Key Encapsulation Mechanism (KEM) based on unstructured lattices. From a security point of view this makes it a conservative option to achieve post-quantum security, hence why it is favored over the NIST winners by several European authorities (e.g., German BSI and French ANSSI). Relying on unstructured instead of structured lattices (e.g., CRYSTALS-Kyber) comes at the cost of additional memory usage, which is particularly critical for embedded security applications such as smart cards. For example, prior FrodoKEM-640 implementations (using AES) on Cortex-M4 require more than 80 kB of stack making it impossible to run on embedded systems. In this work, we explore several stack reduction strategies and the resulting time versus memory trade-offs. Concretely, we reduce the stack consumption of FrodoKEM by a factor 2–3× compared to the smallest known implementations with almost no impact on performance. We also present various time-memory trade-offs going as low as 8 kB for all AES parameter sets, and below 4 kB for FrodoKEM-640. By introducing a minor tweak to the FrodoKEM specifications, we additionally reduce the stack consumption down to 8 kB for all the SHAKE versions. As a result, this work enables FrodoKEM on embedded systems.

Wednesday, February 4, 2026 3:00 pm - 4:00 pm EST (GMT -05:00)

Graphs and Matroids - Jim Geelen-Keeping connectivity under taking minors

Speaker: Jim Geelen
Affiliation: University of Waterloo
Room: MC 5501

Abstract: Suppose that you are given an ordering of the elements of a $k$-connected matroid, and you want to remove the elements one at a time, in the given order, keeping the intermediate matroids as highly connected as possible. How much connectivity can you keep?

Friday, January 30, 2026 3:30 pm - 4:30 pm EST (GMT -05:00)

Tutte Colloquium - Jonathan Leake-Log-concavity, Sampling, and Lorentzian Polynomials

Speaker: Jonathan Leake
Affiliation: University of Waterloo
Location: MC 5501

Abstract:  In this talk, we demonstrate a connection between log-concavity statements and sampling algorithms via high-dimensional expanders and Lorentzian polynomials. To do this, we first discuss two conjectures which were resolved about 5-10 years ago: one on the log-concavity of independent sets of matroids (due to Brändén-Huh and Anari-Liu-Oveis Gharan-Vinzant), and one on efficiently sampling bases of matroids (due to Anari-Liu-Oveis Gharan-Vinzant). From there we will present some new results on generalized graph colorings which extend these and other previous results. In particular, we will discuss how this can be used to obtain log-concavity statements and sampling algorithms for linear extensions of posets. Joint work with Kasper Lindberg and Shayan Oveis Gharan.

Monday, January 26, 2026 11:30 am - 12:30 pm EST (GMT -05:00)

Algebraic Graph Theory-Sebastian Cioabă-Spectral Moore theorems for graphs and hypergraphs

Speaker: Sebastian Cioabă
Affiliation:

University of Delaware

Location: Please contact Sabrina Lato for Zoom link.

Abstract: The spectrum of a graph is closely related to many graph parameters. In particular, the spectral gap of a regular graph which is the difference between its valency and second eigenvalue, is widely seen an algebraic measure of connectivity and plays a key role in the theory of expander and Ramanujan graphs. In this talk, I will give an overview of recent work studying the maximum order v(k,\theta)  of a regular graph (bipartite graph or hypergraph) of given valency k whose second largest eigenvalue is at most a given value \theta. This problem can be seen as a spectral Moore problem and has connections to Alon-Boppana theorems for graphs and hypergraphs and with the usual Moore or degree-diameter problem. 

Speaker Mojtaba Fadavi
Affiliation University of Waterloo
Location MC 6029

Abstract: A (t,n)-threshold signature scheme splits a signing key among "n" participants so that any "t" can jointly produce a valid signature under a single public key, while fewer than "t" cannot. There are three common types of threshold signature schemes: (i) Robust schemes, which guarantee signature production provided at least "t" parties are honest; (ii) Identifiable-abort schemes, which may fail to produce a signature but expose at least one misbehaving signer; and (iii) Simple schemes, which guarantee neither robustness nor identifiable abort, but output a valid signature when "t" honest participants collaborate without deviating from the protocol.

Motivated by NIST's recent emphasis on post-quantum multiparty and threshold designs, this talk presents a new approach to centralized, lattice-based (t,n)-threshold signatures. We first construct a (t,n)-threshold one-time signature and then upgrade it to a many-time scheme by combining it with a long-term signature so that all threshold signatures verify under a single public key.

Speaker: Nathan Pagliaroli
Affiliation: University of Waterloo
Location: MC 5417

Abstract: Tensor integrals are the generating functions of triangulations of pseudo-manifolds. Such triangulations are constructed by gluing simplices along facets. These generating functions satisfy an infinite system of recursive equations called the Dyson-Schwinger equations, derived by reclusively gluing together triangulations. Such integrals also satisfy positivity constraints. By combining the Dyson-Schwinger equations and positivity constraints in a process called bootstrapping we are able to deduce known results for the generating functions of certain classes of triangulations as well as find new explicit formulae. This talk is based on joint work with Carlos I. Perez-Sanchez and Brayden Smith.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.

Monday, January 19, 2026 11:30 am - 12:30 pm EST (GMT -05:00)

Algebraic Graph Theory-Hermie Monterde-Conrad-Quantum walks on infinite graphs

Speaker: Hermie Monterde
Affiliation:

University of Regina

Location: Please contact Sabrina Lato for Zoom link.

Abstract: A weighted graph G with countable vertex set is bounded if there is an upper bound on the maximum of the sum of absolute values of all edge weights incident to a vertex in G. Most work done on quantum walks focus on finite graphs. In this talk, we extend the theory to bounded infinite graphs and discuss results concerning the rarity of perfect state transfer. This is joint work with Chris Godsil, Steve Kirkland, Sarojini Mohapatra and Hiranmoy Pal.

Speaker Sam Jaques
Affiliation University of Waterloo
Location MC 6029

Abstract:  Modern secure communication systems, such as iMessage, WhatsApp, and Signal include intricate mechanisms that aim to achieve very strong security properties. These mechanisms typically involve continuously merging fresh secrets into the keying material that is used to encrypt messages during communications. In the literature, these mechanisms have been proven to achieve forms of Post-Compromise Security (PCS): the ability to provide communication security even if the full state of a party was compromised some time in the past. However, recent work has shown these proofs cannot be transferred to the end-user level, possibly because of usability concerns. This has raised the question of whether end-users can actually obtain PCS or not, and under which conditions.

Here we show and formally prove that communication systems that need to be resilient against certain types of state loss (which can occur in practice) fundamentally cannot achieve full PCS for end-users. Whereas previous work showed that the Signal messenger did not achieve this with its current session-management layer, we isolate the exact conditions that cause this failure, and we show why this cannot be simply solved in communication systems by implementing a different session-management layer or an entirely different protocol. Moreover, we clarify the trade-off of the maximum number of sessions between two users (40 in Signal) in terms of failure-resilience versus security.
Our results have direct consequences for the design of future secure communication systems and could motivate either the simplification of redundant mechanisms or the improvement of session-management designs to provide better security trade-offs with respect to state loss/failure tolerance.
Speaker: Moriah Elkin
Affiliation: Cornell University
Location: MC 5417

Abstract: In the space of type A quiver representations, putting rank conditions on the maps cuts out subvarieties called "open quiver loci." These subvarieties are closed under the group action that changes bases in the vector spaces, so their closures define classes in equivariant cohomology, called "quiver polynomials." Knutson, Miller, and Shimozono found a pipe dream formula to compute these polynomials in 2006. To study the geometry of the open quiver loci themselves, we might instead compute "equivariant Chern-Schwartz-MacPherson classes," which interpolate between cohomology classes and Euler characteristic. I will introduce objects called "chained generic pipe dreams" that allow us to compute these CSM classes combinatorially, and along the way give streamlined formulas for quiver polynomials.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.