## Events Search and Views Navigation

## October 2018

### Larry Rolen – Vanderbilt University

Jensen-Pólya Criterion for the Riemann Hypothesis and Related Problems In this talk, I will summarize forthcoming work with Griffin, Ono, and Zagier. In 1927 Pólya proved that the Riemann Hypothesis is equivalent to the hyperbolicity of Jensen polynomials for Riemann's Xi-function. This hyperbolicity has…

Find out more »## November 2018

### Daniel Apon – National Institute of Standards and Technology

NIST's Post-Quantum Cryptography Project (2012-2024) In recent years, there has been a substantial amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional (classical/digital) computers. If…

Find out more »### Umberto Martínez-Peñas – University of Toronto

Sum-Rank Codes and Linearized Reed-Solomon Codes The sum-rank metric naturally extends both the Hamming and rank metrics in coding theory. In this talk, we will present linearized Reed-Solomon codes, which constitute the first general family of maximum sum-rank distance (MSRD)…

Find out more »### Jintai Ding – University of Cincinnati

Quantum-Proof Blockchain. Blockchain technology is now going through explosive development with the aim to develop a new generation of revolutionary financial technology. The most successful example is new digital currency bitcoin. The fundamental building block in blochchain technology is actually cryptographic algorithms,…

Find out more »## April 2019

### Introductory lecture

The introductory lecture is aimed at sharing background material so that students are better prepared to understand the main seminar. The introductory lecture is open only to students.

Find out more »### Abbey Bourdon – Wake Forest University

Sporadic Points on Modular Curves Our work is motivated by the following classification problem: For a fixed positive integer d, what finite groups arise as the torsion subgroup of an elliptic curve defined over a number field of degree d? In…

Find out more »### Ryann Cartor – University of Louisville

Studying C∗: An Introduction to Multivariate Post-Quantum Cryptography This talk will provide an introduction to post-quantum cryptography, specifically multivariate cryptography. C∗ was the first massively multivariate cryptosystem presented, but has since been broken. Many modifications have been introduced to regain…

Find out more »### Brandon Goodell – Monero Research Labs

Expensive Coffee: Exploiting Subgroup Cofactors for Fun and Profit The Monero cryptocurrency uses the elliptic curve group of Ed25519 for when constructing linkable ring signatures. The number of group elements in this elliptic curve group is 8p where the prime…

Find out more »