plasma
plasma
16:00
Sobolev and Lipschitz regularity for bounded minimizers of some anisotropic orthotropic functionals
Abstract
We prove higher differentiability of bounded local minimizers to some degenerate functionals satisfying anisotropic growth conditions. In the two-dimensional case we also study the Lipschitz regularity of such minimizers without any limitation on the exponents of anisotropy.
12:00
Very weak solutions to non-Newtonian fluids
Abstract
12:00
Self-similar solutions for the Navier-Stokes equations
Abstract
Tbd
12:00
A new approach to study strong advection problems
Abstract
12:00
The inverse Calderón problem with Lipschitz conductivities
Abstract
12:00
Long-time existence for Yang-Mills flow
Abstract
I'll discuss the problem of controlling energy concentration in YM flow over a four-manifold. Based on a study of the rotationally symmetric case, it was conjectured in 1997 that bubbling can only occur at infinite time. My thesis contained some strong elementary results on this problem, which I've now solved in full generality by a more involved method.
15:00
Classical key exchange protocols secure against quantum adversaries
Abstract
Not considering classified work, the first person to have asked and solved the problem of secure communication over insecure communication channels was Ralph Merkle, in a project for a Computer securitjohn y course at UC Berkeley in 1974. In this work, he gave a protocol that allow two legitimate parties to establish a secret key with an effort of the order of N, but such that an eavesdropper can not discover the secret key with non-vanishing probability if he is not willing to spend an effort of at least the order of N^2.
In this talk, we will consider key exchange protocols in the presence of a quantum eavesdropper. Unfortunately, it is easy to see that in this case, breaking Merkle’s original protocol only requires an effort of the order of N, similar to the one of the legitimate parties. We will show how to restore the security by presenting two sequences of protocols with the following properties:
- In the first sequence, the legitimate parties have access to a quantum computer, and the eavesdropper's effort is arbitrarily close to N^2.
- In the second sequence, the protocols are classical, but the eavesdropper’s effort is arbitrarily close to N^{3/2}.
We will show the key exchange protocols, the quantum attacks with the proof of their optimality. We will focus mostly on the techniques from quantum algorithms and complexity theory used to devise quantum algorithms and to prove lower bounds. The underlying tools are the quantum walk formalism, and the quantum adversary lower bound method, respectively. Finally, we will introduce a new method to prove average-case quantum query complexity lower bounds.
Representations of finite groups over self-injective rings
Abstract
For a group algebra over a self-injective ring
there are two stable categories: the usual one modulo projectives
and a relative one where one works modulo representations
which are free over the coefficient ring.
I'll describe the connection between these two stable categories,
which are "birational" in an appropriate sense.
I'll then make some comments on the specific case
where the coefficient ring is Z/nZ and give a more
precise description of the relative stable category.