RISC Seminars (Research on Information Security and Cryptology)

     Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers]
(To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
Joint RISC/DIAMANT/Intercity Seminar
Date:May 24
Location:CWI, Room Z009 (Euler room)
Schedule: 
10:00-11:00Herman te Riele (CWI):
New Computations on Mertens Conjecture
Abstract: Let mu(.) be the well-known Moebius function and let M(x) be the sum of mu(n) over the positive integers n not exceeding x. The Mertens conjecture that |M(x)|/sqrt(x) < 1 for all x > 1 was disproved in 1985 by Odlyzko and Te Riele: they showed that there exists an x > 1 for which |M(x)|/sqrt(x) > 1.009. In this talk results of new computations, using LLL, will be presented which improve this result. In addition, the explicit upper bound of Pintz on the smallest number for which the Mertens conjecture is false, namely, exp(3.21 * 10^64), is reduced and numerical results are presented which suggest that the largest values of |M(x)|/sqrt(x) grow like sqrt( log log log x ) with x. This is joint work with Tadej Kotnik of the University of Ljubljana, Slovenia.
11:00-12:00Manindra Agrawal (IIT Kanpur):
Determinant Versus Permanent
Abstract: Complexities of determinant and permanent computations characterize respectively the classes GapL and GapP. This suggests that computing permanent is much harder than computing determinant, however, there exists no proof yet. In this talk, I will survey previous attempts to prove above, and describe a new approach to the problem.
14:00-15:00Robbert de Haan (CWI):
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract: The problem of perfectly secure message transmission (PSMT) concerns two synchronized non-faulty processors sender and receiver that are connected by a synchronous network of n >= 2t+1 noiseless 2-way communication channels. Their goal is to communicate privately and reliably, despite the presence of an adversary that may actively corrupt at most t of those channels. These properties should hold information theoretically and without error.
We propose an asymptotically optimal solution for this problem. The proposed protocol consists of two communication rounds, and a total of O(l n) bits are exchanged in order to transmit a message of l bits.
15:00-16:00Ronald de Wolf (CWI):
Quantum Proofs for Classical Theorems
Abstract: In the last decade the theory of quantum mechanical computers has developed, and we now know that quantum computers can be exponentially faster than classical computers when solving certain problems (this probably includes factoring). A more recent and very different application of quantum computers is as a mathematical tool to prove or reprove theorems about *classical* computers. We will give four examples, from the areas of communication complexity, error-correcting codes, complexity classes, and matrix rigidity.
0.05379s