Seminar

Wednesday, November 12, 2025 10:30 am - 11:30 am EST (GMT -05:00)

Crypto Reading Group -Yuheng (Elle) Wen

Title:Seems Legit: Automated Analysis of  Subtle Attacks on Protocols that Use Signatures

Speaker Yuheng (Elle) Wen
Affiliation University of Waterloo
Location MC 5479

Abstract: The standard definition of security for digital signatures—existential unforgeability—does not ensure certain properties that protocol designers might expect. For example, in many modern signature schemes, one signature may verify against multiple distinct public keys. It is left to protocol designers to ensure that the absence of these properties does not lead to attacks. Modern automated protocol analysis tools are able to provably exclude large classes of attacks on complex real-world protocols such as TLS 1.3 and 5G. However, their abstraction of signatures (implicitly) assumes much more than existential unforgeability, thereby missing several classes of practical attacks. We give a hierarchy of new formal models for signature schemes that captures these subtleties, and thereby allows us to analyse (often unexpected) behaviours of real-world protocols that were previously out of reach of symbolic analysis. We implement our models in the Tamarin Prover, yielding the first way to perform these analyses automatically, and validate them on several case studies. In the process, we find new attacks on DRKey and SOAP’s WS-Security, both protocols which were previously proven secure in traditional symbolic models.

Monday, November 10, 2025 11:30 am - 12:30 pm EST (GMT -05:00)

Algebraic Graph Theory-Chris Godsil

Title: Eigenpolytopes

Speaker: Chris Godsil
Affiliation:

University of Waterloo

Location: Please contact Sabrina Lato for Zoom link.

Abstract: Each eigenspace of a graph gives rise to a real convex polytope. This connection works best for highly regular graphs - distance-regular graphs or, more generally, walk-regular graphs. I will discuss this relationship and give some applications, including a proof of the Erdos-Ko-Rado theorem.

Friday, November 14, 2025 3:30 pm - 4:30 pm EST (GMT -05:00)

Tutte Colloquium - Sander Rhebergen

Title: Parameter robust preconditioning

Speaker: Sander Rhebergen
Affiliation: University of Waterloo
Location: MC 5501

Abstract: The discretization of a partial differential equation (PDE) results in a linear system and iterative solvers are typically used to solve these linear systems, especially if these linear systems are large. Krylov subspace methods are an important class of iterative methods but for these methods to be effective they must be combined with a preconditioner. However, finding a good preconditioner for a given discretization of a PDE is a nontrivial task and so in the first part of this talk I will summarize some useful results from the literature that use a Functional Analysis framework to identify preconditioners for symmetric PDEs.

     Many PDEs depend on parameters such as viscosity, permeability, a discrete time-step, etc. and these parameters can have a large effect on the convergence of preconditioned Krylov subspace methods if they are not properly accounted for by the preconditioner. In the second part of this talk I will show how the Functional Analysis framework is used to identify preconditioners such that the convergence of a preconditioned Krylov subspace method is robust with respect to these parameters.
     In the final part of this talk I will discuss discretizations that allow for static condensation. Static condensation is the process of eliminating certain degrees of freedom from the linear system with the purpose of reducing the size of the linear system. The main question I will answer is: If one has a parameter robust preconditioner for a linear system before static condensation, is the preconditioner still parameter robust after static condensation?
Monday, November 3, 2025 3:00 pm - 4:00 pm EST (GMT -05:00)

Graphs and Matroids - Theodore Morrison

Title:The satisfiability threshold and solution space of random uniquely extendable CSPs

Speaker: Theodore Morrison
Affiliation: University of Waterloo
Room: MC 6029

Abstract: A random constraint satisfaction problem (CSP) consists of a set of variables and a set of randomly chosen constraints. Many commonly studied CSPs are constructed by choosing constraints of a specific form. One such problem is $k$-UE-SAT, where each constraint is chosen from the set of uniquely extendable (UE) constraints. A conjecture due to Molloy and Connamacher gives an exact value for the high probability satisfiability threshold of $k$-UE-SAT problems. We make progress towards this conjecture by showing that a subclass of random CSPs with UE constraints has the conjectured satisfiability threshold. We also describe the solution space geometry for this class of CSPs, and make further conjectures about the general $k$-UE-SAT problem.This talk is based on joint work with Jane Gao.

Thursday, November 6, 2025 2:30 pm - 3:30 pm EST (GMT -05:00)

Algebraic and enumerative combinatorics seminar-Leigh Foster

Title: Tilings of Benzels (and other finite regions) in the hexagon grid

Speaker Leigh Foster
Affiliation University of Wtaerloo
Location MC 6029

Abstract: In 1990, Conway and Lagarias introduced tilability criteria for tilability for finite regions of the hexagon and square grids. In the same year, Thurston expanded upon their work, introducing the height function criterion. We will discuss some new results in tilability: A new tilability criteria via the SL_2(C) double dimer model, and enumeration of tilings of special regions called Benzels, introduced in 2020 by Propp, using a technique called compression. If time allows, we will also discuss ongoing work that expands Thurston's height function to stone-and-bone tilings of the hexagon grid.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.

Monday, November 3, 2025 11:30 am - 12:30 pm EST (GMT -05:00)

Algebraic Graph Theory-Martin Štefaňák

Title: Recurrence of unitary and stochastic quantum walks

Speaker: Martin Štefaňák
Affiliation:

Czech Technical University in Prague

Location: Please contact Sabrina Lato for Zoom link.

Abstract: Recurrence means a return of the dynamical system to its initial state. Classical result of Polya [1] from 1920’s shows that a random walk on a line and a 2D grid returns to the origin with certainty, while it is transient on higher-dimensional lattices. For quantum walks, detection of recurrence requires partial measurement after each step, yielding a conditional quantum dynamic. We review the method to study quantum recurrence based on generating functions [2], focusing on the quantum walk on a line. Combination of measurement induced effects and faster spreading implies that a quantum walk on a line can escape to infinity without ever returning to the origin. Finally, we present a recent extension of the study of recurrence to quantum stochastic walks [3], which interpolates between quantum and classical walk dynamics [4]. Surprisingly, we find that introducing classical randomness can reduce the recurrence probability --- despite the fact that the classical random walk returns with certainty --- and we identify the conditions under which this intriguing phenomenon occurs.

[1] G. Pólya, Math. Ann. 84, 149 (1921)
[2] F. A. Grünbaum, et al., Commun. Math. Phys. 320, 543 (2013)
[3] F. A. Grünbaum and L. Velázquez, Advances Math. 326, 352 (2018)
[4] M. Štefaňák, et al., arXiv:2501.08674
Wednesday, November 5, 2025 10:30 am - 11:30 am EST (GMT -05:00)

Crypto Reading Group -Camryn Steckel

Title:Hybrid Signature Schemes

Speaker Camryn Steckel
Affiliation University of Waterloo
Location MC 5479

Abstract: The transition to post quantum cryptography comes with many challenges. On the one hand, classically secure algorithms are well-tested, and we have a high degree of confidence in them against classical adversaries, but they are vulnerable to quantum computers. On the other hand, we currently have no reason to believe that post quantum algorithms are vulnerable to either classical or quantum adversaries, however, they are still relatively new, and because of that, they have not been scrutinized to the degree of their classical counterparts. Additionally, the transition will not happen instantaneously, and there will be a period of time where some interfaces are able to support post quantum algorithms while others can only support classical ones. One possible solution to these challenges (on the digital signature side of things) is to use hybrid signature schemes, which, loosely speaking, are digital signature schemes based off of both a classical and a hybrid digital signature scheme, which are secure if at least one of the underlying signature schemes is secure. In this talk, I will cover a few different signature combiners, and compare and contrast both how they work and the properties they guarantee. This talk is based off of the papers "A Note on Hybrid Signature Schemes" by Nina Bindel and Britta Hale, and "Bird of Prey: Practical Signature Combiners Preserving Strong Existential Unforgeability" by Jonas Janneck.

Friday, November 7, 2025 3:30 pm - 4:30 pm EST (GMT -05:00)

Tutte Colloquium - Tracy Chin

Title: Valuated Delta Matroids and Principal Minors

Speaker: Tracy Chin
Affiliation: University of Washington
Location: MC 5501

Abstract: Delta matroids are a generalization of matroids that arise naturally from combinatorial objects such as matchings, ribbon graphs, and principal minors of symmetric and skew symmetric matrices. In this talk, we will define valuated delta matroids and explore their connection with principal minors of Hermitian matrices, generalizing work by Rincón on valuated even delta matroids and skew symmetric matrices. Based on joint work with Nathan Cheung, Gaku Liu, and Cynthia Vinzant.

Friday, October 31, 2025 3:30 pm - 4:30 pm EDT (GMT -04:00)

Tutte Colloquium - Karen Yeats

Title: Combinatorics of causal set theory

Speaker: Karen Yeats
Affiliation: University of Waterloo
Location: MC 5501

Abstract: Causal set theory is an approach to quantum gravity where spacetime is a locally finite poset. This approach asks interesting questions about posets that are as of yet little explored in combinatorics. I'll explain how I got interested in this subject recently and some of the aspects that might particularly appeal to a discrete mathematician.

Monday, October 27, 2025 11:30 am - 12:30 pm EDT (GMT -04:00)

Algebraic Graph Theory-Prangya Parida

Title: Cover-free Families on Graphs

Speaker: Prangya Parida
Affiliation:

University of Ottawa

Location: Please contact Sabrina Lato for Zoom link.

Abstract: A family of subsets of a t-set is a d-cover-free family or d-CFF if no subset in the family is contained in the union of any d other subsets. Let t(d, n) denote the minimum t for which there exists a d-CFF of a t-set with n subsets. t(1, n) is determined using Sperner’s theorem. For d ≥ 2, we rely on bounds for t(d, n). Erdős, Frankl, and Füredi proved 3.106 log(n) < t(2, n) < 5.512 log(n). 

A 2-CFF can be generalized by using a graph G with vertices corresponding to subsets in the set system. A G-CFF is a set system such that each edge of G specifies a pair of subsets not contained in each other and whose union must not contain any other subset. Let t(G) denote the minimum t for which there exists a G-CFF. Thus, t(K_n) = t(2, n). 
In this talk, we discuss some classic results on cover-free families, along with general constructions of G-CFFs and specific constructions for certain families of graphs. We show that for a graph G with n vertices (no isolated vertices), t(1, n) ≤ t(G) ≤ t(2, n), and that for an infinite family of star graphs S_n with n vertices, t(S_n) = t(1, n). Interestingly, we show how we can use a mixed-radix Gray code to construct CFFs on paths (P_n) and cycles (C_n) with n vertices. This leads to the bound log(n) ≤ t(G) ≤ 1.89 log(n), where G is either P_n or C_n.
This is joint work with Lucia Moura.