Events

Filter by:

Limit to events where the title matches:
Limit to events where the first date of the event:
Date range
Limit to events where the type is one or more of:
Limit to events tagged with one or more of:
Limit to events where the audience is one or more of:
Wednesday, November 12, 2025 10:30 am - 11:30 am EST (GMT -05:00)

Crypto Reading Group -Yuheng (Elle) Wen

Title:Seems Legit: Automated Analysis of  Subtle Attacks on Protocols that Use Signatures

Speaker Yuheng (Elle) Wen
Affiliation University of Waterloo
Location MC 5479

Abstract: The standard definition of security for digital signatures—existential unforgeability—does not ensure certain properties that protocol designers might expect. For example, in many modern signature schemes, one signature may verify against multiple distinct public keys. It is left to protocol designers to ensure that the absence of these properties does not lead to attacks. Modern automated protocol analysis tools are able to provably exclude large classes of attacks on complex real-world protocols such as TLS 1.3 and 5G. However, their abstraction of signatures (implicitly) assumes much more than existential unforgeability, thereby missing several classes of practical attacks. We give a hierarchy of new formal models for signature schemes that captures these subtleties, and thereby allows us to analyse (often unexpected) behaviours of real-world protocols that were previously out of reach of symbolic analysis. We implement our models in the Tamarin Prover, yielding the first way to perform these analyses automatically, and validate them on several case studies. In the process, we find new attacks on DRKey and SOAP’s WS-Security, both protocols which were previously proven secure in traditional symbolic models.

Thursday, November 13, 2025 2:30 pm - 3:30 pm EST (GMT -05:00)

Algebraic and enumerative combinatorics seminar-Pierre Popoli

Title: Generalized Abelian Complexities for Pisot-Type Substitutive Sequences

Speaker Pierre Popoli
Affiliation University of Wtaerloo
Location MC 6029

Abstract: Two finite words are said to be abelian equivalent if one is a permutation of the letters of the other. For an infinite word, one can investigate the associated complexity function, called Abelian complexity, which is a classical object of study in combinatorics on words. In particular, many works study the abelian complexity of automatic sequences, where a longstanding conjecture states that the abelian complexity of an automatic sequence is a regular sequence. We have studied when the abelian complexity can be computed efficiently, in particular using the theorem prover Walnut. To this end, we study words that are fixed points of Pisot-type substitution and prove that these words satisfy the conjecture. If time permits, I will present k-abelian complexities, which are intermediate complexities between the abelian complexity and the factor complexity. I will also explain how our results can be extended to these
complexities and how we can obtain a two-dimensional linear representation of some examples. This talk is based on joint work with J-M Couvreur, M. Delacourt, N. Ollinger, J. Shallit, and M. Stipulanti (arXiv: 2504.13584).

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.

Friday, November 14, 2025 3:30 pm - 4:30 pm EST (GMT -05:00)

Tutte Colloquium - Sander Rhebergen

Title: Parameter robust preconditioning

Speaker: Sander Rhebergen
Affiliation: University of Waterloo
Location: MC 5501

Abstract: The discretization of a partial differential equation (PDE) results in a linear system and iterative solvers are typically used to solve these linear systems, especially if these linear systems are large. Krylov subspace methods are an important class of iterative methods but for these methods to be effective they must be combined with a preconditioner. However, finding a good preconditioner for a given discretization of a PDE is a nontrivial task and so in the first part of this talk I will summarize some useful results from the literature that use a Functional Analysis framework to identify preconditioners for symmetric PDEs.

     Many PDEs depend on parameters such as viscosity, permeability, a discrete time-step, etc. and these parameters can have a large effect on the convergence of preconditioned Krylov subspace methods if they are not properly accounted for by the preconditioner. In the second part of this talk I will show how the Functional Analysis framework is used to identify preconditioners such that the convergence of a preconditioned Krylov subspace method is robust with respect to these parameters.
     In the final part of this talk I will discuss discretizations that allow for static condensation. Static condensation is the process of eliminating certain degrees of freedom from the linear system with the purpose of reducing the size of the linear system. The main question I will answer is: If one has a parameter robust preconditioner for a linear system before static condensation, is the preconditioner still parameter robust after static condensation?
Monday, November 17, 2025 11:30 am - 12:30 pm EST (GMT -05:00)

Algebraic Graph Theory-Yujia Shi

Title: Fast quantum state transfer on paths via localized eigenvectors

Speaker: Yujia Shi
Affiliation:

Creighton University

Location: Please contact Sabrina Lato for Zoom link.

Abstract: 

 In a quantum state transfer problem, adding identical weighted self-loops to the endpoints of a path can improve the transfer fidelity, a phenomenon known as asymptotic state transfer. When the transfer time is chosen as t = pi / (lambda1 - lambda2), one can compute a lower bound on the fidelity between the two endpoints that depends only on the loop weights. A larger loop weight ensures higher fidelity but also increases the readout time. In the work of Chen, Mereau, and Feder, the path is modified by adding weighted edges to the third and third-from-last vertices, which achieves asymptotic state transfer between the endpoints in a shorter time. In this talk, I will present a variation in which weighted loops are added to the neighbors of the endpoints instead. This modification produces a pair of eigenvectors localized at the end vertices, and unlike in the previous cases, the difference between their corresponding eigenvalues grows more slowly. It provides an explanation for the shorter transfer time observed in this setting.
This is a joint work with Gabor Lippner
Monday, November 17, 2025 3:00 pm - 4:00 pm EST (GMT -05:00)

Graphs and Matroids - Jonathan Leake

Title:The Heron-Rota-Welsh conjecture via Lorentzian polynomials

Speaker: Jonathan Leake
Affiliation: University of Waterloo
Room: MC 6029

Abstract:The Heron-Rota-Welsh conjecture asserts that the characteristic polynomial of a matroid has log-concave coefficients. This conjecture was open since the 1970s until it was proven by Adiprasito, Huh, and Katz in 2018 using their newly developed combinatorial Hodge theory. Their proof was groundbreaking, but rather complicated. In this talk, we will give a proof of this fact using Lorentzian polynomials, which otherwise will use nothing more than basic theory of matroids, linear algebra, and convexity.

Wednesday, November 19, 2025 10:30 am - 11:30 am EST (GMT -05:00)

Crypto Reading Group -Roy Stracovsky

Title:Enhancing Anamorphic Cryptography

Speaker Roy Stracovsky
Affiliation Georgia Tech
Location MC 5479

Abstract: Anamorphic cryptography (Persiano, Phan, and Yung, Eurocrypt 2022) allows users who share a “double key” to hide encrypted messages in ciphertexts and signatures to allow covert communication under a hypothetical “dictator” who can monitor all communication or force parties to give up their cryptographic keys in order to check for compliance.

In this talk, I will present joint work with Joseph Jaeger which enhances the security and functionality of anamorphic cryptography. We first enhance the security of anamorphic signatures by proposing two parallel notions of unforgeability (against the aforementioned dictator or instead a recipient) which close gaps in existing definitions termed robustness (Banfi, Gegier, Hirt, Maurer, and Rito, Eurocrypt 2024) and private anamorphism (Kutylowski, Persiano, Phan, Yung, and Zawada, Crypto 2023). Previously proposed anamorphic schemes do not necessarily achieve our new definitions but can sometimes be made to do so by modifying the scheme or by leveraging stronger assumptions on the underlying building blocks.
For our second enhancement, we introduce techniques to stealthily exchange keys via anamorphic cryptosystems, allowing covert communication between users that do not a priori share a double key. We propose and analyze multiple protocols in a four-quadrant security model capturing passive versus active adversaries who may or may not perform key compromise.
Monday, November 24, 2025 11:30 am - 12:30 pm EST (GMT -05:00)

Algebraic Graph Theory-Shivaramakrishna Pragada

Title: Structure of Eigenvectors of Graphs 

Speaker: Shivaramakrishna Pragada
Affiliation:

Simon Fraser University

Location: Please contact Sabrina Lato for Zoom link.

Abstract: Let G be a graph on n vertices with characteristic polynomial φ_G(λ). A graph is said to be irreducible if the characteristic polynomial of its

adjacency matrix is irreducible. For every irreducible graph G, we show that each eigenvector of its adjacency matrix has pairwise distinct, non-zero entries.
More generally, consider a graph G whose characteristic polynomial factors over Q as φ_G(λ) = p_1(λ)· · · p_k(λ), where the polynomials p_i(λ) are distinct irreducible factors. For any eigenvalue θ with minimal polynomial p_j (λ), we prove a structure theorem of eigenspaces corresponding each polynomial p_j (λ). We derive a lower bound on the number of distinct entries that must appear in every eigenvector corresponding to θ.
It is conjectured that almost all graphs have irreducible characteristic polynomials, this has recently been confirmed under the assumption of the Extended Riemann Hypothesis. We pose new structural questions about irreducible graphs and present preliminary progress toward understanding their eigenvectors and spectral properties.
Monday, November 24, 2025 3:00 pm - 4:00 pm EST (GMT -05:00)

Graphs and Matroids - Thinula De Silva

Title:Non-uniform Kahn-Kalai: the fractional version, the dual and its power in capturing “thresholds"

Speaker: Thinula De Silva
Affiliation: University of Waterloo
Room: MC 6029

Abstract:There have been several advancements in the study of thresholds in recent years, including the groundbreaking proof of the Kahn-Kalai conjecture by Park and Pham. B. Park and Vondrák also later extended this work in the non-uniform setting (where we allow different edges to have different probabilities, unlike G(n, p)). In many concrete applications of determining thresholds in G(n, p), “spread" is used to prove the 1-statement. In this talk, we extend the notion of “spread" in the non-uniform setting to test its power in capturing the “threshold". This talk is based on joint work with Jane Gao.

Thursday, November 27, 2025 2:30 pm - 3:30 pm EST (GMT -05:00)

Algebraic and enumerative combinatorics seminar-Zeus Dantas E Moura

Title: Algebraic and enumerative combinatorics seminar

Speaker Zeus Dantas E Moura
Affiliation University of Wtaerloo
Location MC 6029

Abstract:

Permuted-basement Macdonald polynomials E_α^σ(x_1, ..., x_n; q, t) are nonsymmetric generalizations of symmetric Macdonald polynomials indexed by a composition α and a permutation σ. They can be described combinatorially as generating functions over augmented fillings of shape α and basement σ.

We construct deterministic and probabilistic bijections on fillings that prove identities relating

E_α^σ, E_α^{σ s_i}, E_{s_i α}^σ, and E_{s_i α}^{σ s_i}.

These identities arise from two operations on the shape and basement: swapping adjacent parts of the shape, which expands

E_α^σ intoE_{s_i α}^σ and E_{s_i α}^{σ s_i}; and swapping adjacent basement entries,

which gives E_α^σ = E_α^{σ s_i} when α_i = α_{i+1}.

There will be a pre-seminar presenting relevant background at the beginning graduate level starting at 1:30pm.

Friday, November 28, 2025 3:30 pm - 4:30 pm EST (GMT -05:00)

Tutte Colloquium - Euiwoong Lee

Title:Asymptotically Optimal Hardness for k-Set Packing and k-Matroid Intersection

Speaker: Euiwoong Lee
Affiliation: University of Michigan
Location: MC 5501

Abstract: For any epsilon > 0, we prove that k-Dimensional Matching is hard to approximate within a factor of k/(12 + epsilon) for large k unless NP \subseteq BPP. Listed in Karp's 21 NP-complete problems, k-Dimensional Matching is a benchmark computational complexity problem which we find as a special case of many constrained optimization problems over independence systems including: k-Set Packing, k-Matroid Intersection, and Matroid k-Parity. For all the aforementioned problems, the best known lower bound was an Omega(k /log(k))-hardness by Hazan, Safra, and Schwartz. In contrast, state-of-the-art algorithms achieved an approximation of O(k). Our result narrows down this gap to a constant and thus provides a rationale for the observed algorithmic difficulties. 

The crux of our result hinges on a novel approximation preserving gadget from R-degree bounded k-CSPs over alphabet size R to kR-Dimensional Matching. Along the way, we prove that R-degree bounded k-CSPs over alphabet size R are hard to approximate within a factor Omega_k(R) using known randomised sparsification methods for CSPs.
Joint work with Ola Svensson and Theophile Thiery