Seminar

Wednesday, December 3, 2025 10:30 am - 11:30 am EST (GMT -05:00)

Crypto Reading Group -Nic Swanson

Title:PRISM: Simple And Compact Identification and Signatures From Large Prime Degree Isogenies

Speaker Nic Swanson
Affiliation University of Waterloo
Location MC 5479

Abstract: The problem of computing an isogeny of large prime degree from a supersingular elliptic curve of unknown endomorphism ring is assumed to be hard both for classical as well as quantum computers. 

In this work, we first build a two-round identification protocol whose security reduces to this problem. The challenge consists of a random large prime q and the prover simply replies with an efficient representation of an isogeny of degree q from its public key. 
Using the hash-and-sign paradigm, we then derive a signature scheme with a very simple and flexible signing procedure and prove its security in the standard model. 
Our optimized C implementation of the signature scheme shows that signing is roughly 1.8× faster than all SQIsign variants, whereas verification is 1.4× times slower. The sizes of the public key and signature are comparable to existing schemes.
Friday, November 28, 2025 3:30 pm - 4:30 pm EST (GMT -05:00)

Tutte Colloquium - Euiwoong Lee

Title:Asymptotically Optimal Hardness for k-Set Packing and k-Matroid Intersection

Speaker: Euiwoong Lee
Affiliation: University of Michigan
Location: MC 5501

Abstract: For any epsilon > 0, we prove that k-Dimensional Matching is hard to approximate within a factor of k/(12 + epsilon) for large k unless NP \subseteq BPP. Listed in Karp's 21 NP-complete problems, k-Dimensional Matching is a benchmark computational complexity problem which we find as a special case of many constrained optimization problems over independence systems including: k-Set Packing, k-Matroid Intersection, and Matroid k-Parity. For all the aforementioned problems, the best known lower bound was an Omega(k /log(k))-hardness by Hazan, Safra, and Schwartz. In contrast, state-of-the-art algorithms achieved an approximation of O(k). Our result narrows down this gap to a constant and thus provides a rationale for the observed algorithmic difficulties. 

The crux of our result hinges on a novel approximation preserving gadget from R-degree bounded k-CSPs over alphabet size R to kR-Dimensional Matching. Along the way, we prove that R-degree bounded k-CSPs over alphabet size R are hard to approximate within a factor Omega_k(R) using known randomised sparsification methods for CSPs.
Joint work with Ola Svensson and Theophile Thiery
Monday, November 24, 2025 11:30 am - 12:30 pm EST (GMT -05:00)

Algebraic Graph Theory-Shivaramakrishna Pragada

Title: Structure of Eigenvectors of Graphs 

Speaker: Shivaramakrishna Pragada
Affiliation:

Simon Fraser University

Location: Please contact Sabrina Lato for Zoom link.

Abstract: Let G be a graph on n vertices with characteristic polynomial φ_G(λ). A graph is said to be irreducible if the characteristic polynomial of its

adjacency matrix is irreducible. For every irreducible graph G, we show that each eigenvector of its adjacency matrix has pairwise distinct, non-zero entries.
More generally, consider a graph G whose characteristic polynomial factors over Q as φ_G(λ) = p_1(λ)· · · p_k(λ), where the polynomials p_i(λ) are distinct irreducible factors. For any eigenvalue θ with minimal polynomial p_j (λ), we prove a structure theorem of eigenspaces corresponding each polynomial p_j (λ). We derive a lower bound on the number of distinct entries that must appear in every eigenvector corresponding to θ.
It is conjectured that almost all graphs have irreducible characteristic polynomials, this has recently been confirmed under the assumption of the Extended Riemann Hypothesis. We pose new structural questions about irreducible graphs and present preliminary progress toward understanding their eigenvectors and spectral properties.
Monday, November 24, 2025 3:00 pm - 4:00 pm EST (GMT -05:00)

Graphs and Matroids - Thinula De Silva

Title:Non-uniform Kahn-Kalai: the fractional version, the dual and its power in capturing “thresholds"

Speaker: Thinula De Silva
Affiliation: University of Waterloo
Room: MC 6029

Abstract:There have been several advancements in the study of thresholds in recent years, including the groundbreaking proof of the Kahn-Kalai conjecture by Park and Pham. B. Park and Vondrák also later extended this work in the non-uniform setting (where we allow different edges to have different probabilities, unlike G(n, p)). In many concrete applications of determining thresholds in G(n, p), “spread" is used to prove the 1-statement. In this talk, we extend the notion of “spread" in the non-uniform setting to test its power in capturing the “threshold". This talk is based on joint work with Jane Gao.

Thursday, November 27, 2025 2:30 pm - 3:30 pm EST (GMT -05:00)

Algebraic and enumerative combinatorics seminar-Zeus Dantas E Moura

Title: Algebraic and enumerative combinatorics seminar

Speaker Zeus Dantas E Moura
Affiliation University of Wtaerloo
Location MC 6029

Abstract:

Permuted-basement Macdonald polynomials E_α^σ(x_1, ..., x_n; q, t) are nonsymmetric generalizations of symmetric Macdonald polynomials indexed by a composition α and a permutation σ. They can be described combinatorially as generating functions over augmented fillings of shape α and basement σ.

We construct deterministic and probabilistic bijections on fillings that prove identities relating

E_α^σ, E_α^{σ s_i}, E_{s_i α}^σ, and E_{s_i α}^{σ s_i}.

These identities arise from two operations on the shape and basement: swapping adjacent parts of the shape, which expands

E_α^σ intoE_{s_i α}^σ and E_{s_i α}^{σ s_i}; and swapping adjacent basement entries,

which gives E_α^σ = E_α^{σ s_i} when α_i = α_{i+1}.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.

Wednesday, November 19, 2025 10:30 am - 11:30 am EST (GMT -05:00)

Crypto Reading Group -Roy Stracovsky

Title:Enhancing Anamorphic Cryptography

Speaker Roy Stracovsky
Affiliation Georgia Tech
Location MC 5479

Abstract: Anamorphic cryptography (Persiano, Phan, and Yung, Eurocrypt 2022) allows users who share a “double key” to hide encrypted messages in ciphertexts and signatures to allow covert communication under a hypothetical “dictator” who can monitor all communication or force parties to give up their cryptographic keys in order to check for compliance.

In this talk, I will present joint work with Joseph Jaeger which enhances the security and functionality of anamorphic cryptography. We first enhance the security of anamorphic signatures by proposing two parallel notions of unforgeability (against the aforementioned dictator or instead a recipient) which close gaps in existing definitions termed robustness (Banfi, Gegier, Hirt, Maurer, and Rito, Eurocrypt 2024) and private anamorphism (Kutylowski, Persiano, Phan, Yung, and Zawada, Crypto 2023). Previously proposed anamorphic schemes do not necessarily achieve our new definitions but can sometimes be made to do so by modifying the scheme or by leveraging stronger assumptions on the underlying building blocks.
For our second enhancement, we introduce techniques to stealthily exchange keys via anamorphic cryptosystems, allowing covert communication between users that do not a priori share a double key. We propose and analyze multiple protocols in a four-quadrant security model capturing passive versus active adversaries who may or may not perform key compromise.
Monday, November 17, 2025 11:30 am - 12:30 pm EST (GMT -05:00)

Algebraic Graph Theory-Yujia Shi

Title: Fast quantum state transfer on paths via localized eigenvectors

Speaker: Yujia Shi
Affiliation:

Creighton University

Location: Please contact Sabrina Lato for Zoom link.

Abstract: 

 In a quantum state transfer problem, adding identical weighted self-loops to the endpoints of a path can improve the transfer fidelity, a phenomenon known as asymptotic state transfer. When the transfer time is chosen as t = pi / (lambda1 - lambda2), one can compute a lower bound on the fidelity between the two endpoints that depends only on the loop weights. A larger loop weight ensures higher fidelity but also increases the readout time. In the work of Chen, Mereau, and Feder, the path is modified by adding weighted edges to the third and third-from-last vertices, which achieves asymptotic state transfer between the endpoints in a shorter time. In this talk, I will present a variation in which weighted loops are added to the neighbors of the endpoints instead. This modification produces a pair of eigenvectors localized at the end vertices, and unlike in the previous cases, the difference between their corresponding eigenvalues grows more slowly. It provides an explanation for the shorter transfer time observed in this setting.
This is a joint work with Gabor Lippner
Monday, November 17, 2025 3:00 pm - 4:00 pm EST (GMT -05:00)

Graphs and Matroids - Jonathan Leake

Title:The Heron-Rota-Welsh conjecture via Lorentzian polynomials

Speaker: Jonathan Leake
Affiliation: University of Waterloo
Room: MC 6029

Abstract:The Heron-Rota-Welsh conjecture asserts that the characteristic polynomial of a matroid has log-concave coefficients. This conjecture was open since the 1970s until it was proven by Adiprasito, Huh, and Katz in 2018 using their newly developed combinatorial Hodge theory. Their proof was groundbreaking, but rather complicated. In this talk, we will give a proof of this fact using Lorentzian polynomials, which otherwise will use nothing more than basic theory of matroids, linear algebra, and convexity.

Monday, November 10, 2025 3:00 pm - 4:00 pm EST (GMT -05:00)

Graphs and Matroids - Mathieu Rundstrom

Title:Almost Regular Matroids

Speaker: Mathieu Rundstrom
Affiliation: University of Waterloo
Room: MC 6029

Abstract: Regular matroids form an important and extensively studied class of matroids and have numerous known descriptions and characterizations. In the 1980s, Truemper gave a constructive description of the related class of almost regular matroids: non-regular matroids $M$ such that for every element $e$ of $M$ either $M/e$ or $M\backslash e$ is regular. In this talk, we present a description of almost regular matroids in terms of grafts. A consequence of this description is that almost regular matroids have bounded complexity. We outline some of the proof ideas after introducing the necessary background.

Thursday, November 13, 2025 2:30 pm - 3:30 pm EST (GMT -05:00)

Algebraic and enumerative combinatorics seminar-Pierre Popoli

Title: Generalized Abelian Complexities for Pisot-Type Substitutive Sequences

Speaker Pierre Popoli
Affiliation University of Wtaerloo
Location MC 6029

Abstract: Two finite words are said to be abelian equivalent if one is a permutation of the letters of the other. For an infinite word, one can investigate the associated complexity function, called Abelian complexity, which is a classical object of study in combinatorics on words. In particular, many works study the abelian complexity of automatic sequences, where a longstanding conjecture states that the abelian complexity of an automatic sequence is a regular sequence. We have studied when the abelian complexity can be computed efficiently, in particular using the theorem prover Walnut. To this end, we study words that are fixed points of Pisot-type substitution and prove that these words satisfy the conjecture. If time permits, I will present k-abelian complexities, which are intermediate complexities between the abelian complexity and the factor complexity. I will also explain how our results can be extended to these
complexities and how we can obtain a two-dimensional linear representation of some examples. This talk is based on joint work with J-M Couvreur, M. Delacourt, N. Ollinger, J. Shallit, and M. Stipulanti (arXiv: 2504.13584).

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.