Events

Filter by:

Limit to events where the title matches:
Limit to events where the first date of the event:
Date range
Limit to events where the type is one or more of:
Limit to events tagged with one or more of:
Limit to events where the audience is one or more of:
Monday, April 6, 2026 2:45 pm - 3:45 pm EDT (GMT -04:00)

Graphs and Matroids - Eileen Robinson-Coloring claw-free graphs of bounded codegree

Speaker: Eileen Robinson
Affiliation: Université libre de Bruxelles
Room: MC 5479

Abstract:We define the codegree of a given graph as the maximum number of neighbors that any two distinct vertices have in common.

In 2002, V. Vu proposed that for a given graph, its chromatic number should never be too much larger than its codegree, provided that its codegree is not too small as a proportion of its maximum degree.
Speaker: Ashleigh Adams
Affiliation: North Dakota State University
Location: MC 6029

Abstract: Webs are graphical objects that give a tangible, combinatorial way to compute and classify tensor invariants. Recently, Gaetz, Pechenik, Pfannerer, Striker, and Swanson (arXiv:2306.12501) found a rotation-invariant web basis for SL₄, as well as its quantum deformation U_q(sl₄), and a bijection between move equivalence classes of SL₄-webs and fluctuating tableaux such that web rotation corresponds to tableau promotion. They also found a bijection between the set of plane partitions in an a×b×c box and a benzene move equivalence class of SL₄-webs by determining the corresponding oscillating tableau. In this talk, I will similarly find the oscillating tableaux corresponding to plane partitions in certain symmetry classes by characterizing them via certain lattice words. A dynamical action on tableaux, called promotion, corresponds to rotation of SL₄-webs. I will show how promotion of certain subtableaux aligns with rotation of their respective webs. I will also show that this correspondence maps through a projection to either SL₂ or SL₃ webs. Moreover, this projection is exactly a partial evaluation of webs. This talk will be given through the lens of the combinatorics of webs and tableaux. Some of this work is joint with Jessica Striker.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.

Speaker: Mahrud Sayrafi
Affiliation: McMaster University
Location: MC 5417

Abstract: Exceptional collections are a powerful tool for understanding the derived category of coherent sheaves on algebraic varieties, with applications in commutative algebra, birational geometry, and mirror symmetry. While the existence of exceptional collections is known for classical varieties such as Grassmannians and flag varieties, constructing explicit collections for toric varieties presents challenges in combinatorial algebraic geometry. In this talk I will describe a computational approach to constructing full strong exceptional collections consisting of complexes of line bundles for toric varieties. No background in derived categories is assumed.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.

Speaker:

Elnaz Hessami Pilehrood
Affiliation: University of Waterloo
Location: MC 6029

Abstract:As cryptographic protocols transition to post-quantum security, most adopt hybrid solutions combining classical and post-quantum assumptions. This shift often sacrifices efficiency, compactness, or even security. One such property is deniability, which enables users to plausibly deny authorship of potentially incriminating messages. While classical protocols like X3DH key agreement (used in Signal and WhatsApp) provide deniability, post-quantum protocols like PQXDH and Apple’s iMessage with PQ3 do not. This work addresses this gap by investigating how to efficiently preserve deniability in post-quantum protocols. Specifically, we propose two hybrid schemes for authenticated key encapsulation mechanisms (AKEMs). The first is a black-box construction that preserves deniability when both constituent AKEMs are deniable. The second is Shadowfax, a non-black-box AKEM that achieves hybrid security, integrating a classical non-interactive key exchange, a post-quantum key encapsulation mechanism, and a post-quantum ring signature. Shadowfax satisfies deniability in both dishonest and honest receiver settings, relying on statistical security in the former and on a single pre- or post-quantum assumption in the latter. Finally, we provide several portable implementations of Shadowfax. When instantiated with standardised components (ML–KEM and Falcon), Shadowfax yields ciphertexts of 1 728 bytes and public keys of 2 036 bytes, with encapsulation and decapsulation costs of 1.8M and 0.7M cycles on an Apple M1 Pro.

Speaker: Tammy Kolda
Affiliation: MathSci.ai
Location: MC 5501

Abstract: Tensor decompositions are fundamental tools in scientific computing and data analysis. In many applications — such as simulation data on irregular grids, surrogate modeling for parameterized PDEs, or spectroscopic measurements — the data has both discrete and continuous structure, and may only be observed at scattered sample points. The CP-HIFI (hybrid infinite-finite) decomposition generalizes the Canonical Polyadic (CP) tensor decomposition to settings where some factors are finite-dimensional vectors and others are functions drawn from infinite-dimensional spaces — a natural framework when the underlying data has continuous structure. The decomposition can be applied to a fully observed tensor (aligned) or, when only scattered observations are available, to a sparsely sampled tensor (unaligned). Current methods compute CP-HIFI factors by solving a sequence of dense linear systems arising from regularized least-squares problems, but these direct solves become computationally prohibitive as problem size grows. We propose new algorithms that achieve the same accuracy while being orders of magnitude faster. For aligned tensors, we exploit the Kronecker structure of the system to efficiently compute its eigendecomposition without ever forming the full system, reducing the solve to independent scalar equations. For unaligned tensors, we introduce a preconditioned conjugate gradient method applied to a reformulated system with favorable spectral properties. We analyze the computational complexity and memory requirements of the new methods and demonstrate their effectiveness on problems with smooth functional modes. I will also discuss the “First Proof” project, which aims to understand the capabilities of AI systems on problems that come up in math research, and the role that results from that experiment played in this project.

Speaker:
Tyler Dunaisky
Affiliation: Purdue University
Location: MC 5417

Abstract: A cosmological correlator is an Euler integral, associated to a graph G, which encodes information about the state of the early universe. Evaluation of these integrals is extremely challenging, even in simple cases. However, it turns out the integrand can be identified with the so-called canonical form of the cosmological polytope, revealing a rich combinatorial structure and allowing the application of techniques from commutative algebra. I'll sketch my contribution to this story and advertise the fledgling field of positive geometry, which seeks to generalize the notion of canonical forms to geometric objects more exotic than polytopes.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.

Speaker:

Maggie Simmons
Affiliation: University of Waterloo
Location: MC 6029

Abstract:

Decryption errors play a crucial role in the security of KEMs based on
Fujisaki-Okamoto because the concrete security guarantees provided by
this transformation directly depend on the probability of such an event
being bounded by a small real number. In this paper we present an
approach to formally verify the claims of statistical probabilistic
bounds for incorrect decryption in lattice-based KEM constructions. Our
main motivating example is the PKE encryption scheme underlying ML-KEM.
We formalize the statistical event that is used in the literature to
heuristically approximate ML-KEM decryption errors and confirm that the
upper bounds given in the literature for this event are correct. We
consider FrodoKEM as an additional example, to demonstrate the wider
applicability of the approach and the verification of a correctness
bound without heuristic approximations. We also discuss other
(non-approximate) approaches to bounding the probability of ML-KEM
decryption.
Speaker:
Melissa Ulrika Sherman-Bennett
Affiliation: University of California, Davis
Location: MC 5417

Abstract: The set of dimers (aka perfect matchings) of a connected bipartite plane graph G is a distributive lattice, as shown by Propp. The order relation on this lattice comes from the "height" of a dimer, which is a vector of nonnegative integers. In this talk, I'll focus on the dimer face polynomial of G, which is the height generating function of all dimers of G. This polynomial has close connections to knot invariants on the one hand, and cluster algebras on the other. I'll discuss joint work with Mészáros, Musiker and Vidinas in which we explore these connections. No knowledge of knot theory or cluster algebras will be assumed.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.