2007-2008 seminars

Apr
29
2008

Computer Science/Discrete Mathematics Seminar II

Optimal Monotone Encodings
Rani Hod
10:30am|S-101

Moran, Naor and Segev have asked what is the minimal r = r(n, k) for which there exists an (n,k)-monotone encoding of length r , i.e., a monotone injective function from subsets of size up to k of {1, 2,...,n} to r bits. Monotone encodings are...

Apr
28
2008

Computer Science/Discrete Mathematics Seminar I

Security Under Key-Dependent Inputs
Shai Halevi
11:15am|S-101

In this work we re-visit the question of building cryptographic primitives that remain secure even when queried on inputs that depend on the secret key. This was investigated by Black, Rogaway, and Shrimpton in the context of randomized encryption...

Apr
15
2008

Computer Science/Discrete Mathematics Seminar II

Nearly Diagonally Dominant Matrices and Their Applications
10:30am|S-101

I will describe a lower bound for the rank of any real matrix in which all diagonal entries are significantly larger in absolute value than all other entries. This simple result has a surprising number of applications in Geometry, Coding Theory...

Apr
14
2008

Computer Science/Discrete Mathematics Seminar I

Embeddings of Discrete Groups and the Speed of Random Walks
11:15am|S-101

Let G be a finitely generated group equipped with the word metric. Assume that G does not admit a bi-Lipschitz embedding into Hilbert space. How can we quantify the extent to which G is non-Hilbertian? A natural approach is to consider the Hilbert...

Apr
08
2008

Computer Science/Discrete Mathematics Seminar II

Spherical Cubes, or Coordinated Random Choices in High Dimensions
10:30am|S-101

We give a probabilistic protocol that allows any two points in R^d to agree on a nearby integer lattice point in Z^d . The protocol uses shared randomness, but no communication. If the distance between the two points is delta, the probability of...

Apr
07
2008

Computer Science/Discrete Mathematics Seminar I

Merkle Puzzles are Optimal
Mohammad Mohmoody Ghidary
11:15am|S-101

We prove that every key exchange protocol in the random oracle model in which the honest users make at most $n$ queries to the oracle can be broken by an adversary making $O(n^2)$ queries to the oracle. This improves on the previous $\Tilde{O}(n^6)$...

Apr
01
2008

Computer Science/Discrete Mathematics Seminar II

The Distribution of Polynomials Over Finite Fields
10:30am|S-101

I will present a recent result of Green and Tao showing the following. Let P:F^n --> F be a polynomial in n variables over F of degree at most d . We say that P is "equidistributed" if it takes on each of its |F| values close to equally often. We...

Mar
31
2008

Computer Science/Discrete Mathematics Seminar I

On Proving Hardness of Improper Learning from Worst-Case Assumptions
Benny Applebaum
11:15am|S-101

Learning theory, and in particular PAC learning, was introduced by Valiant in 1984 and has since become a major area of research in theoretical and applied computer science. One natural question that was posed at the very inception of the field is...