Wed, 08 Jun 2016
16:00
C2

Intensional Partial Metric Spaces

Steve Matthews
(Warwick)
Abstract

Partial metric spaces generalise metric spaces by allowing self-distance
to be a non-negative number. Originally motivated by the goal to
reconcile metric space topology with the logic of computable functions
and Dana Scott's innovative theory of topological domains they are now
too rigid a form of mathematics to be of use in modelling contemporary
applications software (aka 'Apps') which is increasingly concurrent,
pragmatic, interactive, rapidly changing, and inconsistent in nature.
This talks aims to further develop partial metric spaces in order to
catch up with the modern computer science of 'Apps'. Our illustrative
working example is that of the 'Lucid' programming language,and it's
temporal generalisation using Wadge's 'hiaton'.

Wed, 18 May 2016
16:00
C2

Locally compact normal spaces: omega_1-compactness and sigma-countable compactness

Peter Nyikos
(South Carolina)
Abstract

ABSTRACT: A space of countable extent, also called an omega_1-compact space, is one in which every closed discrete subspace is countable.  The axiom used in the following theorem is consistent if it is consistent that there is a supercompact cardinal.

Theorem 1  The LCT axiom implies that every hereditarily normal, omega_1-compact space
is sigma-countably compact,  i.e., the union of countably many countably compact subspaces.

Even for the specialized subclass of monotonically normal spaces, this is only a consistency result:

Theorem 2   If club, then there exists a locally compact, omega_1-compact monotonically
normal space that is not sigma-countably compact.

These two results together are unusual in that most independence results on
monotonically normal spaces depend on whether Souslin's Hypothesis (SH) is true,
and do not involve large cardinal axioms. Here, it is not known whether either
SH or its negation affect either direction in this independence result.

The following unsolved problem is also discussed:

Problem  Is there a ZFC example of a locally compact, omega_1-compact space
of cardinality aleph_1 that is not sigma-countably compact?

Wed, 25 May 2016
15:00
L4

Breaking Symmetric Cryptosystems using Quantum Period Finding

Gaëtan Leurent
(INRIA)
Abstract

Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography. This motivated the cryptographic community to search for quantum-safe solutions. On the other hand, the impact of quantum computing on secret key cryptography is much less understood. In this paper, we consider attacks where an adversary can query an oracle implementing a cryptographic primitive in a quantum superposition of different states. This model gives a lot of power to the adversary, but recent results show that it is nonetheless possible to build secure cryptosystems in it.
We study applications of a quantum procedure called Simon's algorithm (the simplest quantum period finding algorithm) in order to attack symmetric cryptosystems in this model. Following previous works in this direction, we show that several classical attacks based on finding collisions can be dramatically sped up using Simon's algorithm: finding a collision requires Ω(2n/2) queries in the classical setting, but when collisions happen with some hidden periodicity, they can be found with only O(n) queries in the quantum model.
We obtain attacks with very strong implications. First, we show that the most widely used modes of operation for authentication and authenticated encryption (e.g. CBC-MAC, PMAC, GMAC, GCM, and OCB) are completely broken in this security model. Our attacks are also applicable to many CAESAR candidates: CLOC, AEZ, COPA, OTR, POET, OMD, and Minalpher. This is quite surprising compared to the situation with encryption modes: Anand et al. show that standard modes are secure when using a quantum-secure PRF.
Second, we show that slide attacks can also be sped up using Simon's algorithm. This is the first exponential speed up of a classical symmetric cryptanalysis technique in the quantum model.

Wed, 11 May 2016

16:00 - 17:00
C1

Commutator Subgroup and Quasimorphisms

Nicolaus Heuer
(Oxford)
Abstract

Quasimorphisms (QM) of groups to the reals are well studied and are linked to stable commutator length (scl) via Bavard Duality- Theorem. The notion of QM can be generalized to yield maps  between groups such that each QM from one group pulls back to a QM in the other.

We will give both a short overview of features of scl and investigate these generalized QMs with large scale properties of the commutator group. 

What were the causes of the crisis of 2008? New research by Oxford Mathematicians Doyne Farmer, Christoph Aymanns, Vincent W.C. Tan and colleague Fabio Caccioli from University College London shows that managing risk using the procedure recommended by Basel II (the worldwide recommendations on banking regulation), which is called Value at Risk, may have played a central role.
Mon, 09 May 2016
16:00
C3

Descent of a sum of Consecutive Cubes ... Twice!!

Vandita Patel
(Warwick University)
Abstract

Given an integer $d$ such that $2 \leq d \leq 50$, we want to
answer the question: When is the sum of
$d$ consecutive cubes a perfect power? In other words, we want to find all
integer solutions to the equation
$(x+1)^3 + (x+2)^3 + \cdots + (x+d)^3 = y^p$. In this talk, we present some
of the techniques used to tackle such diophantine problems.

 

Lowering IceCube's energy threshold for point source searches in the southern sky
Sarkar, S Astrophysical Journal Letters volume 824 issue 2 L28 (01 Jun 2016)
Subscribe to