Cryptography Seminar
Title: LWE part 3: The relation with BDD
| Speaker: | Luis Ruiz |
| Affiliation: | University of Waterloo |
| Room: | MC 6486 |
Abstract: The last piece of the puzzling reduction
Title: LWE part 3: The relation with BDD
| Speaker: | Luis Ruiz |
| Affiliation: | University of Waterloo |
| Room: | MC 6486 |
Abstract: The last piece of the puzzling reduction
Title: The combinatorics of Standard Young tableaux of bounded height
| Speaker: | Marni Mishna |
| Affiliation: | Simon Fraser University |
| Room: | MC 5501 |
Abstract:
Standard Young tableaux are a classic object of mathematics, appearing in problems from representation theory to bijective combinatorics.
Title: An elementary approach to the quasipolynomiality of the Kronecker coefficients
Title: Spins Lattices, Graphs and Quantum State Revivals
| Speaker: | Luc Vinet |
| Affiliation: | Université de Montréal |
| Room: | MC 5501 |
Abstract:
This talk will describe how certain features of quantum transport along spin chains can be enabled.
Title: Transversals in covers of graphs
| Speaker: | Krystal Guo |
| Affiliation: | Université Libre de Bruxelles |
| Room: | MC 5501 |
Abstract:
We study a polynomial with connections to correspondence colouring (also known as DP-colouring) and the Unique Games Conjecture.
Title: Interpolating between the characteristic and matching polynomials of a graph
| Speaker: | Chris Godsil |
| Affiliation: | University of Waterloo |
| Room: | MC 5501 |
Abstract:
The characteristic polynomial Φ(X, t) of a graph X has two obvious combinatorial connections.
Title: Robust discrete optimization and network flows (paper by Bertsimas and Sim)
Title: Graphs and Unitals
Title: Robust Solutions of Optimization Problems Affected by Uncertain Probabilities (paper by Ben-Tal A et al )
Title: Quantum Collision-Finding in Non-Uniform Random Functions
| Speaker: | Ted Eaton |
| Affiliation: | ISARA Corporatio |
| Room: | MC 6486 |
Abstract: Proving the security of a scheme against a quantum adversary often makes the strong assumption of modelling the hash function as uniformly random. In this work, we study the generic security of non-uniform random functions, specifically those with min-entropy k. This has applications to the quantum security of the Fujisaki-Okamoto transformation, as well as allowing for more relaxed security assumptions. We discuss previous results and sketch a proof for an asymptotic upper and lower bound of 2k/3 quantum queries.