Seminar

Monday, March 30, 2026 12:30 pm - 1:30 pm EDT (GMT -04:00)

C&O Reading Group - Jacob Skitsko-A Simple Proof of Hardness of Matrix Completion

Speaker:

Jacob Skitsko
Affiliation: University of Waterloo
Location: MC 6029

Abstract:

In the matrix completion problem, we are given an incomplete matrix A as input. Some entries are filled in, and some entries have the value "*". Our task is to fill in the "*" entries so that the resulting completed matrix has minimum rank. We'll discuss a simple proof from Shitov showing that it is hard to distinguish between an incomplete matrix having a rank 3 completion, or all completions requiring at least rank 4.
The idea is to index the matrix by vectors. These vectors will represent a circuit computing a family of polynomials, f(x) in F. The hope is that any rank 3 completion will be forced to fill in the matrix values according to these vector labels. Thus, the completion will specify values for x_i, x_j, x_i + x_j, x_i * x_j, ... , and so on until it specifies values for our polynomials f(x). If we force the f(x) in F entries to be 0, then this is exactly a solution to the polynomial system F. Seeing why any rank 3 completion should be forced to operate in this way takes a bit of squinting, but is overall quite pleasant.
Speaker: Hadleigh Frost
Affiliation: Institute for Advanced Study
Location: MC 5417

Abstract: Cosmological correlation functions probe the quantum origins of structure in the universe and are a prototype for many calculations in physics. I will share recent work on the complexes, fans and polytopes associated to these functions based on arXiv:2602.21194 and ongoing work. Two structures lie at the heart of this story: (1) incidence relations between chains and anti-chains, (2) a notion of "nested sets of nested sets". Both structures can be studied for an arbitrary lattice, but building sets of the boolean lattice are my main motivation.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.

Monday, March 30, 2026 2:45 pm - 3:45 pm EDT (GMT -04:00)

Graphs and Matroids - Lise Turner-Anemones and Matroids of High Branch-Depth

Speaker: Lise Turner
Affiliation: University of Waterloo
Room: MC 5479

Abstract:We prove a conjecture by DeVos, Kwon and Oum on the unavoidable minors of matroids of high branch-depth. We also consider the properties of collections of crossing low order separations known as anemones. This is joint work with Jim Geelen and Rutger Cambell.

Friday, March 27, 2026 3:30 pm - 4:30 pm EDT (GMT -04:00)

Tutte Colloquium -Therese Biedl-Planar graph drawing, meet MSOL

Speaker: Therese Biedl
Affiliation: University of Waterloo
Location: MC 5501

Abstract: It is well-known that every planar graph has a planar drawing with straight-line segments, even if vertices are restricted to lie on a grid with linear coordinates.  In this talk, we will study the question of finding planar graph drawings where the height H of the grid is as small as possible.   Dujmovic et al gave an FPT-algorithm that finds the minimum height.  However, it is not particularly adaptable to closely related problems, such as finding rectilinear drawings of minimum height.    We therefore study a new and completely different approach to test whether a graph has a drawing of height H.     Since such graphs have pathwidth O(H), a natural approach is to appeal to Courcelle's theorem.  This requires phrasing the problem in so-called monadic second-order logic (MSOL), but MSOL supports neither arbitrarily large integers nor permutations, making it difficult to use for graph drawing problems.   In this talk, we show that with some detours we can phrase the question of whether G has a straight-line drawing of height H in a radically different way ("no face has a fish") that can be easily expressed in MSOL.

(Joint work with Ignaz Rutter)

Speaker:

Mohammad Hajiabadi
Affiliation: University of Waterloo
Location: MC 6029

Abstract:CCA security is a fundamental notion in cryptography. There are standard techniques to generically achieve CCA security for all-or-nothing type public-key encryption schemes, such as heuristic approaches based on Fujisaki–Okamoto, or constructions in the standard model using tools like hinting PRGs. However, in more advanced settings, such as functional encryption or threshold encryption, these generic approaches break down. Moreover, defining CCA security in these settings is itself non-trivial and leads to subtle definitional challenges.

In this talk, I will discuss these issues, highlight the key obstacles, and present several open problems, along with possible directions for addressing them.
Speaker: Ian George
Affiliation: University of Waterloo
Location: MC 5417

Abstract: Causal Set Theory (CST) is a theory of quantum gravity where spacetime is taken to be a locally finite poset, called a causal set.  A central problem in CST is to determine physically relevant properties from the purely combinatorial information of the causal set.  In 2014 Glaser and Surya demonstrated that the distribution of interval sizes of a causal set sprinkled into a region of Minkowski space contains information about the dimension of the underlying spacetime.  In 2026 Surya showed that this distribution can be used to define a “closeness” function on causal sets that distinguishes by dimension and global topology.  In this talk we present work motivated by these results which investigates the more general notion of convex sets, instead of intervals, of a poset.  First, we will introduce a generating polynomial for convex sets in a finite poset and explore some of its properties.  We will then show that this polynomial is a complete invariant for the family of series-parallel posets.  Lastly, we discuss early results on the utility of this polynomial in CST.  The pre-seminar will introduce relevant background on CST.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.

Monday, March 23, 2026 11:30 am - 12:30 pm EDT (GMT -04:00)

Algebraic Graph Theory-Zhaochen Ding-A construction of multicovers of a cycle

Speaker: Zhaochen Ding
Affiliation:

University of Primorska

Location: Please contact Sabrina Lato for Zoom link.

Abstract: Praeger-Xu graphs are a family of multicovers of cycles, known for some of their surprising properties. A fundamental observation is that these graphs can be constructed from De Bruijn graphs. In this presentation, we will generalize the definition of De Bruijn graphs to create a broader family of multicovers. Finally, we will compute the automorphism group and show some applications of our constructions. This is a joint work with Ci Xuan Wu.

Speaker:

Noah Weninger
Affiliation: University of Waterloo
Location: MC 6029

Abstract:In the knapsack interdiction problem, there are two players and $n$ items, each with some profit, removal cost, and packing weight. First, the interdictor selects items to remove; the total removal cost must fit within the interdiction budget. Then, the follower solves a knapsack problem on the remaining items. The objective is to select an interdiction set which minimizes the follower's maximum profit. This problem is $\Sigma_2^p$-complete.


We present a $(2+\epsilon)$-approximation with running time polynomial in $n$ and $1/\epsilon$. We start by showing that after LP-relaxing the follower's knapsack, the problem becomes solvable with dynamic programming in pseudopolynomial time, and yields a 2-approximation for the original problem. We then show that this dynamic program can be rounded to get an FPTAS for the 2-approximate problem. Although there is already a PTAS known for knapsack interdiction (Chen et al, 2022), our algorithm is considerably simpler and faster: to achieve a 3-approximation, the PTAS needs running time $\Omega(n^{100})$, whereas ours is only $\tilde O(n^3)$.
Friday, March 20, 2026 10:30 am - 11:30 am EDT (GMT -04:00)

Crypto Reading Group - Pranshu Kumar-Generic Transformations for Updatable PKEs

Speaker:

Pranshu Kumar
Affiliation: University of Waterloo
Location: MC 6029

Abstract:Updatable Public-Key Encryption (UPKE) augments the security of PKE with Forward Secrecy properties. It was originally proposed by Jost et al. (EUROCRYPT 2019) to provide security guarantees in secure messaging applications efficiently. Later, Alwen et al. (CRYPTO 2020) showed that TreeKEM, when used for Continuous Group Key Agreement (CGKA) in Message Layer Security (MLS), failed to achieve adequate security and proposed using UPKEs to modify TreeKEM. Since then, UPKEs have become a part of the Message Layer Security specification, and their security properties have been extensively studied. Alwen, Fuchsbauer, and Mularczyk (AFM, Eurocrypt’24) presented the strongest security notion to date, adding many additional properties that strengthen its security in CGKA and MLS.

Friday, March 20, 2026 3:30 pm - 4:30 pm EDT (GMT -04:00)

Tutte Colloquium -Bruno Sterner-Large smooth twins from short lattice vectors

Speaker: Bruno Sterner
Affiliation: University of Waterloo
Location: MC 5501

Abstract: We discuss the challenging problem of finding pairs of consecutive smooth integers, which we refer to as a smooth twin. In other words the largest prime factor in the twin is relatively small. This computational number theoretic problem has appeared in the context of isogeny-based cryptography whereby a select number of cryptosystems use such twins as part of their parameter setup. The challenging part to the problem is finding smooth twins whose largest prime factor is as small as possible. Prior to this work, twins of this nature have at most 74-bits which is much too small for cryptographic relevance. We bridge this gap by presenting a new method that finds significantly larger smooth twins with as small as possible smoothness bound. The idea of our algorithm is based on the well known and studied problem of finding short vectors in a well constructed lattice. We report a 196-bit smooth twin which falls in this regime as well as a few larger twins that have small (but not the smallest) smoothness bounds.