Events

Filter by:

Limit to events where the title matches:
Limit to events where the first date of the event:
Date range
Limit to events where the type is one or more of:
Limit to events tagged with one or more of:
Limit to events where the audience is one or more of:
Speaker: Felipe Fidalgo
Affiliation: Universidade Federal de Santa Catarina
Location: MC 5501

Abstract:  Discretizable Distance Geometry Problems (DDGP) consist in a subclass of Distance Geometry Problems (DGP) where the search space can be discretized and reduced to a binary tree. Such problems can be tackled by applying a Branch-and- Prune algorithm (BP), which is able to perform an exhaustive enumeration of the solution set. 

In this work, we exploit the concept of symmetry in the search tree for splitting it into subtrees so that they can be explored only once, favouring and improvement on the algorithm performances. 
We present some computational experiments on a set of artificially generated instances, with exact distances, to validate the theoretical results.
Joint work with Douglas S. Gonçalves (UFSC, Brazil), Carlile Lavor (UNICAMP, Brazil), Leo Liberti (CNRS, France) and Antonio Mucherino (Université de Rennes, France).
Speaker: Mahrud Sayrafi
Affiliation: McMaster University
Location: MC 5417

Abstract:  Exceptional collections are a powerful tool for understanding the derived category of coherent sheaves on algebraic varieties, with applications in commutative algebra, birational geometry, and mirror symmetry. While the existence of exceptional collections is known for classical varieties such as Grassmannians and flag varieties, constructing explicit collections for toric varieties presents challenges in combinatorial algebraic geometry. In this talk I will describe a computational approach to constructing full strong exceptional collections consisting of complexes of line bundles for toric varieties. No background in derived categories is assumed.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.

Speaker: Tamas Schwarcz
Affiliation: London School of Economics
Location: MC 5501

Abstract:  The study of matroid tensor products dates back to the 1970s, extending the tensor operation from linear algebra to the combinatorial setting. While any two matroids representable over the same field admit a tensor product via the Kronecker product of matrices, Las Vergnas showed that such products do not exist for matroids in general, leaving the area underexplored. In this work, we utilize this operation to study skew-representability — representation over division rings that need not be commutative — by proving that a matroid is skew-representable if and only if it admits iterated tensor products with specific test matroids. A key consequence is the existence of algorithmic certificates for non-representability. We further show that every rank-3 matroid admits a tensor product with any uniform matroid, constructing the unique freest such product. Finally, we demonstrate the power of this framework by deriving the first known linear rank inequality for (folded skew-)representable matroids that is independent of the common information property. 

Joint work with Kristóf Bérczi, Boglárka Gehér, András Imolay, László Lovász, and Carles Padró.
Speaker Sam Jaques,
Affiliation University of Waterloo
Location MC 6029

Abstract:  Modern secure communication systems, such as iMessage, WhatsApp, and Signal include intricate mechanisms that aim to achieve very strong security properties. These mechanisms typically involve continuously merging fresh secrets into the keying material that is used to encrypt messages during communications. In the literature, these mechanisms have been proven to achieve forms of Post-Compromise Security (PCS): the ability to provide communication security even if the full state of a party was compromised some time in the past. However, recent work has shown these proofs cannot be transferred to the end-user level, possibly because of usability concerns. This has raised the question of whether end-users can actually obtain PCS or not, and under which conditions.

Here we show and formally prove that communication systems that need to be resilient against certain types of state loss (which can occur in practice) fundamentally cannot achieve full PCS for end-users. Whereas previous work showed that the Signal messenger did not achieve this with its current session-management layer, we isolate the exact conditions that cause this failure, and we show why this cannot be simply solved in communication systems by implementing a different session-management layer or an entirely different protocol. Moreover, we clarify the trade-off of the maximum number of sessions between two users (40 in Signal) in terms of failure-resilience versus security.
Our results have direct consequences for the design of future secure communication systems and could motivate either the simplification of redundant mechanisms or the improvement of session-management designs to provide better security trade-offs with respect to state loss/failure tolerance.
Speaker: Seunghoon Lee
Affiliation: University of Waterloo
Location: MC 5501

Abstract:  The (parallel) pebbling game is a useful abstraction for analyzing the resources (e.g., space, space-time, amortized space-time) needed to evaluate a function f with a static data-dependency graph G on a (parallel) computer. The underlying question is purely combinatorial: what tradeoffs does a directed acyclic graph (DAG) force between storing intermediate values and recomputing them? This viewpoint has been particularly influential in cryptography, where many “Memory-Hard Function” (MHF) constructions can be modeled by evaluating a fixed DAG.

Classical pebbling, however, does not capture an essential constraint in quantum/reversible computation: intermediate information cannot be discarded freely, so cleanup must respect the dependency structure. While sequential reversible pebbling has been used to study space-time tradeoffs in sequential settings, it does not reflect the space-time tradeoffs for parallel quantum/reversible algorithms. To model this, we introduce the parallel reversible pebbling game and use it to analyze reversible space-time and amortized costs for important graph families, including line graphs and structured DAGs arising in MHF constructions (e.g., Argon2i and DRSample).
The talk highlights two core results: First, we give a lower bound on the reversible amortized space-time cost for a line graph, which yields a separation between classical and reversible pebbling costs, showing a super-constant (yet sub-polynomial) gap. Second, this overhead is nevertheless controlled: we show that any classical parallel pebbling can be transformed into a reversible one with only a sub-polynomial loss. This generic transformation serves as a central tool for analyzing broader graph families.
The talk will focus on the combinatorial aspects of cryptographic applications; no background in cryptography is assumed. Based on joint work with Jeremiah Blocki and Blake Holman: The Parallel Reversible Pebbling Game: Analyzing the Post-Quantum Security of iMHFs (TCC 2022), and The Impact of Reversibility on Parallel Pebbling (EUROCRYPT 2025).
Speaker: Moriah Elkin
Affiliation: Cornell University
Location: MC 5417

Abstract: In the space of type A quiver representations, putting rank conditions on the maps cuts out subvarieties called "open quiver loci." These subvarieties are closed under the group action that changes bases in the vector spaces, so their closures define classes in equivariant cohomology, called "quiver polynomials." Knutson, Miller, and Shimozono found a pipe dream formula to compute these polynomials in 2006. To study the geometry of the open quiver loci themselves, we might instead compute "equivariant Chern-Schwartz-MacPherson classes," which interpolate between cohomology classes and Euler characteristic. I will introduce objects called "chained generic pipe dreams" that allow us to compute these CSM classes combinatorially, and along the way give streamlined formulas for quiver polynomials.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.