Events

Filter by:

Limit to events where the title matches:
Limit to events where the first date of the event:
Date range
Limit to events where the type is one or more of:
Limit to events tagged with one or more of:
Limit to events where the audience is one or more of:
Monday, November 17, 2025 11:30 am - 12:30 pm EST (GMT -05:00)

Algebraic Graph Theory-Yujia Shi

Title: Fast quantum state transfer on paths via localized eigenvectors

Speaker: Yujia Shi
Affiliation:

Creighton University

Location: Please contact Sabrina Lato for Zoom link.

Abstract: 

 In a quantum state transfer problem, adding identical weighted self-loops to the endpoints of a path can improve the transfer fidelity, a phenomenon known as asymptotic state transfer. When the transfer time is chosen as t = pi / (lambda1 - lambda2), one can compute a lower bound on the fidelity between the two endpoints that depends only on the loop weights. A larger loop weight ensures higher fidelity but also increases the readout time. In the work of Chen, Mereau, and Feder, the path is modified by adding weighted edges to the third and third-from-last vertices, which achieves asymptotic state transfer between the endpoints in a shorter time. In this talk, I will present a variation in which weighted loops are added to the neighbors of the endpoints instead. This modification produces a pair of eigenvectors localized at the end vertices, and unlike in the previous cases, the difference between their corresponding eigenvalues grows more slowly. It provides an explanation for the shorter transfer time observed in this setting.
This is a joint work with Gabor Lippner
Monday, November 17, 2025 3:00 pm - 4:00 pm EST (GMT -05:00)

Graphs and Matroids - Jonathan Leake

Title:The Heron-Rota-Welsh conjecture via Lorentzian polynomials

Speaker: Jonathan Leake
Affiliation: University of Waterloo
Room: MC 6029

Abstract:The Heron-Rota-Welsh conjecture asserts that the characteristic polynomial of a matroid has log-concave coefficients. This conjecture was open since the 1970s until it was proven by Adiprasito, Huh, and Katz in 2018 using their newly developed combinatorial Hodge theory. Their proof was groundbreaking, but rather complicated. In this talk, we will give a proof of this fact using Lorentzian polynomials, which otherwise will use nothing more than basic theory of matroids, linear algebra, and convexity.

Wednesday, November 19, 2025 10:30 am - 11:30 am EST (GMT -05:00)

Crypto Reading Group -Roy Stracovsky

Title:Enhancing Anamorphic Cryptography

Speaker Roy Stracovsky
Affiliation Georgia Tech
Location MC 5479

Abstract: Anamorphic cryptography (Persiano, Phan, and Yung, Eurocrypt 2022) allows users who share a “double key” to hide encrypted messages in ciphertexts and signatures to allow covert communication under a hypothetical “dictator” who can monitor all communication or force parties to give up their cryptographic keys in order to check for compliance.

In this talk, I will present joint work with Joseph Jaeger which enhances the security and functionality of anamorphic cryptography. We first enhance the security of anamorphic signatures by proposing two parallel notions of unforgeability (against the aforementioned dictator or instead a recipient) which close gaps in existing definitions termed robustness (Banfi, Gegier, Hirt, Maurer, and Rito, Eurocrypt 2024) and private anamorphism (Kutylowski, Persiano, Phan, Yung, and Zawada, Crypto 2023). Previously proposed anamorphic schemes do not necessarily achieve our new definitions but can sometimes be made to do so by modifying the scheme or by leveraging stronger assumptions on the underlying building blocks.
For our second enhancement, we introduce techniques to stealthily exchange keys via anamorphic cryptosystems, allowing covert communication between users that do not a priori share a double key. We propose and analyze multiple protocols in a four-quadrant security model capturing passive versus active adversaries who may or may not perform key compromise.
Monday, November 24, 2025 11:30 am - 12:30 pm EST (GMT -05:00)

Algebraic Graph Theory-Shivaramakrishna Pragada

Title: Structure of Eigenvectors of Graphs 

Speaker: Shivaramakrishna Pragada
Affiliation:

Simon Fraser University

Location: Please contact Sabrina Lato for Zoom link.

Abstract: Let G be a graph on n vertices with characteristic polynomial φ_G(λ). A graph is said to be irreducible if the characteristic polynomial of its

adjacency matrix is irreducible. For every irreducible graph G, we show that each eigenvector of its adjacency matrix has pairwise distinct, non-zero entries.
More generally, consider a graph G whose characteristic polynomial factors over Q as φ_G(λ) = p_1(λ)· · · p_k(λ), where the polynomials p_i(λ) are distinct irreducible factors. For any eigenvalue θ with minimal polynomial p_j (λ), we prove a structure theorem of eigenspaces corresponding each polynomial p_j (λ). We derive a lower bound on the number of distinct entries that must appear in every eigenvector corresponding to θ.
It is conjectured that almost all graphs have irreducible characteristic polynomials, this has recently been confirmed under the assumption of the Extended Riemann Hypothesis. We pose new structural questions about irreducible graphs and present preliminary progress toward understanding their eigenvectors and spectral properties.
Monday, November 24, 2025 3:00 pm - 4:00 pm EST (GMT -05:00)

Graphs and Matroids - Thinula De Silva

Title:Non-uniform Kahn-Kalai: the fractional version, the dual and its power in capturing “thresholds"

Speaker: Thinula De Silva
Affiliation: University of Waterloo
Room: MC 6029

Abstract:There have been several advancements in the study of thresholds in recent years, including the groundbreaking proof of the Kahn-Kalai conjecture by Park and Pham. B. Park and Vondrák also later extended this work in the non-uniform setting (where we allow different edges to have different probabilities, unlike G(n, p)). In many concrete applications of determining thresholds in G(n, p), “spread" is used to prove the 1-statement. In this talk, we extend the notion of “spread" in the non-uniform setting to test its power in capturing the “threshold". This talk is based on joint work with Jane Gao.

Thursday, November 27, 2025 2:30 pm - 3:30 pm EST (GMT -05:00)

Algebraic and enumerative combinatorics seminar-Zeus Dantas E Moura

Title: Algebraic and enumerative combinatorics seminar

Speaker Zeus Dantas E Moura
Affiliation University of Wtaerloo
Location MC 6029

Abstract:

Permuted-basement Macdonald polynomials E_α^σ(x_1, ..., x_n; q, t) are nonsymmetric generalizations of symmetric Macdonald polynomials indexed by a composition α and a permutation σ. They can be described combinatorially as generating functions over augmented fillings of shape α and basement σ.

We construct deterministic and probabilistic bijections on fillings that prove identities relating

E_α^σ, E_α^{σ s_i}, E_{s_i α}^σ, and E_{s_i α}^{σ s_i}.

These identities arise from two operations on the shape and basement: swapping adjacent parts of the shape, which expands

E_α^σ intoE_{s_i α}^σ and E_{s_i α}^{σ s_i}; and swapping adjacent basement entries,

which gives E_α^σ = E_α^{σ s_i} when α_i = α_{i+1}.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.

Friday, November 28, 2025 3:30 pm - 4:30 pm EST (GMT -05:00)

Tutte Colloquium - Euiwoong Lee

Title:Asymptotically Optimal Hardness for k-Set Packing and k-Matroid Intersection

Speaker: Euiwoong Lee
Affiliation: University of Michigan
Location: MC 5501

Abstract: For any epsilon > 0, we prove that k-Dimensional Matching is hard to approximate within a factor of k/(12 + epsilon) for large k unless NP \subseteq BPP. Listed in Karp's 21 NP-complete problems, k-Dimensional Matching is a benchmark computational complexity problem which we find as a special case of many constrained optimization problems over independence systems including: k-Set Packing, k-Matroid Intersection, and Matroid k-Parity. For all the aforementioned problems, the best known lower bound was an Omega(k /log(k))-hardness by Hazan, Safra, and Schwartz. In contrast, state-of-the-art algorithms achieved an approximation of O(k). Our result narrows down this gap to a constant and thus provides a rationale for the observed algorithmic difficulties. 

The crux of our result hinges on a novel approximation preserving gadget from R-degree bounded k-CSPs over alphabet size R to kR-Dimensional Matching. Along the way, we prove that R-degree bounded k-CSPs over alphabet size R are hard to approximate within a factor Omega_k(R) using known randomised sparsification methods for CSPs.
Joint work with Ola Svensson and Theophile Thiery
Monday, December 1, 2025 3:00 pm - 4:00 pm EST (GMT -05:00)

Graphs and Matroids - Fernanda Rivera Omana

Title:Erdős-Pósa theorem for matroids

Speaker: Fernanda Rivera Omana
Affiliation: University of Waterloo
Room: MC 6029

Abstract: We will look at an analogue theorem of the classical Erdős-Pósa Theorem. We prove a $GF(q)$-representable matroid analogue of Robertson and Seymour's theorem that planar graphs have an Erdős-Pósa property. Given a matroid $N$, we prove that for every matroid $M$ with bounded branch width, $M$ either contains $r$ skew copies of $N$, or there is a small perturbation of $M$ that doesn't contain $N$ as a minor.

Wednesday, December 3, 2025 10:30 am - 11:30 am EST (GMT -05:00)

Crypto Reading Group -Nic Swanson

Title:PRISM: Simple And Compact Identification and Signatures From Large Prime Degree Isogenies

Speaker Nic Swanson
Affiliation University of Waterloo
Location MC 5479

Abstract: The problem of computing an isogeny of large prime degree from a supersingular elliptic curve of unknown endomorphism ring is assumed to be hard both for classical as well as quantum computers. 

In this work, we first build a two-round identification protocol whose security reduces to this problem. The challenge consists of a random large prime q and the prover simply replies with an efficient representation of an isogeny of degree q from its public key. 
Using the hash-and-sign paradigm, we then derive a signature scheme with a very simple and flexible signing procedure and prove its security in the standard model. 
Our optimized C implementation of the signature scheme shows that signing is roughly 1.8× faster than all SQIsign variants, whereas verification is 1.4× times slower. The sizes of the public key and signature are comparable to existing schemes.
Thursday, December 4, 2025 2:30 pm - 3:30 pm EST (GMT -05:00)

Algebraic and enumerative combinatorics seminar-Taylor Brysiewicz

Title: The degrees of Stiefel Manifolds

Speaker Taylor Brysiewicz
Affiliation Western
Location MC 6029

Abstract:

The set of orthonormal bases for k-planes in R^n is cut out by the equations X*X^T = I
where X is a k x n matrix of variables and I is k x k identity. This space, known as the Stiefel manifold St(k,n), generalizes the orthogonal group and can be realized as the homogeneous space O(n)/O(n-k). Its algebraic closure
gives a complex affine variety, and thus, it has a degree.

I will discuss our derivation of these degrees. Extending 2017 work on the degrees of special orthogonal groups, joint work with Fulvio Gesmundo gives a combinatorial formula in terms of non-intersecting lattice paths.
This result relies on representation theory, commutative algebra, Ehrhart theory, polyhedral geometry, and enumerative combinatorics.

I will conclude with some open problems inspired by these objects.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.