16:00
16:00
16:00
Intensional Partial Metric Spaces
Abstract
Partial metric spaces generalise metric spaces by allowing self-distance
to be a non-negative number. Originally motivated by the goal to
reconcile metric space topology with the logic of computable functions
and Dana Scott's innovative theory of topological domains they are now
too rigid a form of mathematics to be of use in modelling contemporary
applications software (aka 'Apps') which is increasingly concurrent,
pragmatic, interactive, rapidly changing, and inconsistent in nature.
This talks aims to further develop partial metric spaces in order to
catch up with the modern computer science of 'Apps'. Our illustrative
working example is that of the 'Lucid' programming language,and it's
temporal generalisation using Wadge's 'hiaton'.
16:00
Locally compact normal spaces: omega_1-compactness and sigma-countable compactness
Abstract
ABSTRACT: A space of countable extent, also called an omega_1-compact space, is one in which every closed discrete subspace is countable. The axiom used in the following theorem is consistent if it is consistent that there is a supercompact cardinal.
Theorem 1 The LCT axiom implies that every hereditarily normal, omega_1-compact space
is sigma-countably compact, i.e., the union of countably many countably compact subspaces.
Even for the specialized subclass of monotonically normal spaces, this is only a consistency result:
Theorem 2 If club, then there exists a locally compact, omega_1-compact monotonically
normal space that is not sigma-countably compact.
These two results together are unusual in that most independence results on
monotonically normal spaces depend on whether Souslin's Hypothesis (SH) is true,
and do not involve large cardinal axioms. Here, it is not known whether either
SH or its negation affect either direction in this independence result.
The following unsolved problem is also discussed:
Problem Is there a ZFC example of a locally compact, omega_1-compact space
of cardinality aleph_1 that is not sigma-countably compact?
15:00
Breaking Symmetric Cryptosystems using Quantum Period Finding
Abstract
Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography. This motivated the cryptographic community to search for quantum-safe solutions. On the other hand, the impact of quantum computing on secret key cryptography is much less understood. In this paper, we consider attacks where an adversary can query an oracle implementing a cryptographic primitive in a quantum superposition of different states. This model gives a lot of power to the adversary, but recent results show that it is nonetheless possible to build secure cryptosystems in it.
We study applications of a quantum procedure called Simon's algorithm (the simplest quantum period finding algorithm) in order to attack symmetric cryptosystems in this model. Following previous works in this direction, we show that several classical attacks based on finding collisions can be dramatically sped up using Simon's algorithm: finding a collision requires Ω(2n/2) queries in the classical setting, but when collisions happen with some hidden periodicity, they can be found with only O(n) queries in the quantum model.
We obtain attacks with very strong implications. First, we show that the most widely used modes of operation for authentication and authenticated encryption (e.g. CBC-MAC, PMAC, GMAC, GCM, and OCB) are completely broken in this security model. Our attacks are also applicable to many CAESAR candidates: CLOC, AEZ, COPA, OTR, POET, OMD, and Minalpher. This is quite surprising compared to the situation with encryption modes: Anand et al. show that standard modes are secure when using a quantum-secure PRF.
Second, we show that slide attacks can also be sped up using Simon's algorithm. This is the first exponential speed up of a classical symmetric cryptanalysis technique in the quantum model.
Commutator Subgroup and Quasimorphisms
Abstract
Quasimorphisms (QM) of groups to the reals are well studied and are linked to stable commutator length (scl) via Bavard Duality- Theorem. The notion of QM can be generalized to yield maps between groups such that each QM from one group pulls back to a QM in the other.
We will give both a short overview of features of scl and investigate these generalized QMs with large scale properties of the commutator group.
The cotangent complex and the derived de Rham algebra
Abstract
This is a survey (with some proofs) of chapter 2 of the notes http://renyi.mta.hu/~szamuely/beilintronew.pdf of T. Szamuely and G. Zabradi on Beilinson's approach to the p-adic Hodge decomposition theorem.
16:00
Descent of a sum of Consecutive Cubes ... Twice!!
Abstract
Given an integer $d$ such that $2 \leq d \leq 50$, we want to
answer the question: When is the sum of
$d$ consecutive cubes a perfect power? In other words, we want to find all
integer solutions to the equation
$(x+1)^3 + (x+2)^3 + \cdots + (x+d)^3 = y^p$. In this talk, we present some
of the techniques used to tackle such diophantine problems.