2007-2008 seminars

Mar
25
2008

Computer Science/Discrete Mathematics Seminar II

Expander Cryptography -- Cryptography With Constant Computational Overhead
Amit Sahai
10:30am|S-101

Current constructions of cryptographic primitives typically involve a large multiplicative computational overhead that grows with the desired level of security. We explore the possibility of implementing cryptographic primitives (such as encryption...

Mar
24
2008

Computer Science/Discrete Mathematics Seminar I

Testing Symmetric Properties of Distributions
Paul Valiant and Paul Valiant
11:15am|S-101

We introduce the notion of a Canonical Tester for a class of properties on distributions, that is, a tester strong and general enough that ``a distribution property in the class is testable if and only if the Canonical Tester tests it''. We...

Mar
10
2008

Computer Science/Discrete Mathematics Seminar I

A Frieman Isomorphism-type Lemma for Polynomials
Philip Matchett Wood
11:15am|West Bldg. Lecture Hall

A Freiman isomorphism is a fundamental object in additive combinatorics that allows one to move an additive problem from one group to another, all while preserving the salient additive properties. In this talk, we will discuss a new mapping result...

Mar
04
2008

Computer Science/Discrete Mathematics Seminar II

The Sign-Rank of AC^0
10:30am|S-101

The sign-rank of a real matrix M is the smallest rank of any real matrix whose entries have the same sign as the entries of M . We exhibit a 2^n x 2^n matrix computable by depth 2 circuits of polynomial size whose sign-rank is exponential in n . Our...

Mar
03
2008

Computer Science/Discrete Mathematics Seminar I

Disjointness is Hard in the Multi-Party Number-On-The-Forehead Model
Troy Lee
11:15am|S-101

The disjointness function---determining if a number of sets share a common element---is a notorious example in communication complexity of a function which is hard, but it is hard to show it is hard. Determining both the randomized and quantum...

Feb
26
2008

Computer Science/Discrete Mathematics Seminar II

Sound 3-Query PCPPs Are Long
Arie Matsliah
10:30am|S-101

We present a tradeoff between the length of a 3-query probabilistically checkable proof of proximity (PCPP) and the best possible soundness obtained by querying it. Consider the task of distinguishing between "good" inputs w \in {0,1}^n that are...

Feb
25
2008

Computer Science/Discrete Mathematics Seminar I

Security Under Key-Dependent Inputs
Shai Halevi
11:15am|S-101

In this work we re-visit the question of building cryptographic primitives that remain secure even when queried on inputs that depend on the secret key. This was investigated by Black, Rogaway, and Shrimpton in the context of randomized encryption...