As part of our series of research articles deliberately focusing on the rigour and intricacies of mathematics, we look at Oxford Mathematician Minyhong Kim's research in to the relationship between number theory and topology. Minhyong Kim is Professor of Number Theory here in Oxford and Fellow of Merton College.

It is probably well-known that number theory is the source of some of the oldest and most accessible questions in mathematics:

Mon, 27 Nov 2017

16:00 - 17:00
L4

Homogenization of the eigenvalues of the Neumann-Poincaré operator

Charles Dapogny
(Universite Grenoble-Alpes)
Abstract

In this presentation, we investigate the spectrum of the Neumann-Poincaré operator associated to a periodic distribution of small inclusions with size ε, and its asymptotic behavior as the parameter ε vanishes. Combining techniques pertaining to the fields of homogenization and potential theory, we prove that the limit spectrum is composed of the `trivial' eigenvalues 0 and 1, and of a subset which stays bounded away from 0 and 1 uniformly with respect to ε. This non trivial part is the reunion of the Bloch spectrum, accounting for the collective resonances between collections of inclusions, and of the boundary layer spectrum, associated to eigenfunctions which spend a not too small part of their energies near the boundary of the macroscopic device. These results shed new light about the homogenization of the voltage potential uε caused by a given source in a medium composed of a periodic distribution of small inclusions with an arbitrary (possibly negative) conductivity a surrounded by a dielectric medium, with unit conductivity.

Astrophysical neutrinos and cosmic rays observed by IceCube
Aartsen, M Ackermann, M Adams, J Aguilar, J Ahlers, M Ahrens, M Altmann, D Andeen, K Anderson, T Ansseau, I Anton, G Archinger, M Argüelles, C Auffenberg, J Axani, S Bai, X Barwick, S Baum, V Bay, R Beatty, J Becker Tjus, J Becker, K BenZvi, S Berley, D Bernardini, E Bernhard, A Besson, D Binder, G Bindig, D Bissok, M Blaufuss, E Blot, S Bohm, C Börner, M Bos, F Bose, D Böser, S Botner, O Braun, J Brayeur, L Bretz, H Bron, S Burgman, A Carver, T Casier, M Cheung, E Chirkin, D Christov, A Clark, K Classen, L Coenders, S Collin, G Conrad, J Cowen, D Cross, R Day, M de André, J De Clercq, C del Pino Rosendo, E Dembinski, H De Ridder, S Desiati, P de Vries, K de Wasseige, G de With, M DeYoung, T Díaz-Vélez, J di Lorenzo, V Dujmovic, H Dumm, J Dunkman, M Eberhardt, B Ehrhardt, T Eichmann, B Eller, P Euler, S Evenson, P Fahey, S Fazely, A Feintzeig, J Felde, J Filimonov, K Finley, C Flis, S Fösig, C Franckowiak, A Friedman, E Fuchs, T Gaisser, T Gallagher, J Gerhardt, L Ghorbani, K Giang, W Gladstone, L Glauch, T Glüsenkamp, T Advances in Space Research (30 May 2017)
Wed, 22 Nov 2017
15:00
L4

Breakdown Resilience of Key Exchange Protocols

Marc Fischlin
(Technische Universitat Darmstadt)
Abstract

Broken cryptographic algorithms and hardness assumptions are a constant
threat to real-world protocols. Prominent examples are
hash functions for which collisions become known, or number-theoretic
assumptions which are threatened by advances in quantum computing.
Especially when it comes to key exchange protocols, the switch to
quantum-resistant primitives has begun and aims to protect today’s
secrets against future developments, moving from common Diffie–Hellman
based solutions to Learning-With-Errors-based approaches. Remarkably,
the authentication step in such protocols is usually still carried out
with quantum-vulnerable signature schemes. The intuition here is that
the adversary would need to break this protocol primitive today, without
having quantum power yet. The question we address here is if this
intuition is justified, and if so, if we can show this rigorously. We
particularly consider the authenticated variant of the recently
introduced post-quantum secure key exchange protocol NewHope (Alkim et
al., USENIX Security 2016), as well as by TLS 1.3, which is currently
being developed by the Internet Engineering Task Force.

Subscribe to