Learning Noisy Characters, Multiplication Codes, and Cryptographic Hardcore Predicates by Adi Akavia

Total Page:16

File Type:pdf, Size:1020Kb

Learning Noisy Characters, Multiplication Codes, and Cryptographic Hardcore Predicates by Adi Akavia Learning Noisy Characters, Multiplication Codes, and Cryptographic Hardcore Predicates by Adi Akavia Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY February 2008 @ Massachusetts Institute of Technology 2008. All rights reserved. A uthor ....... ................................ Department of Electrical Engineering and Computer Science January 30, 2008 Certified by............. ........ Shafi Goldwasser RSA Professor of Electrical Engineering and Computer Science Thesis Supervisor Accepted by .. ............. ...................... ............. Chairman, Department Committee on Graduate Students MASSACHUSETTS INSW OF TEOHNOLOGY APR 0 7 2008 ARCHIVEs LIBRARIES Learning Noisy Characters, Multiplication Codes, and Cryptographic Hardcore Predicates by Adi Akavia Submitted to the Department of Electrical Engineering and Computer Science on January 30, 2008, in partial fulfillment of the requirements for the degree of Doctor of Philosophy Abstract We present results in cryptography, coding theory and sublinear algorithms. In cryptography, we introduce a unifying framework for proving that a Boolean predicate is hardcore for a one-way function and apply it to a broad family of functions and predicates, showing new hardcore predicates for well known one-way function candidates such as RSA and discrete-log as well as reproving old results in an entirely different way. Our proof framework extends the list-decoding method of Goldreich and Levin [38] for showing hardcore predicates, by introducing a new class of error correcting codes and new list-decoding algorithm we develop for these codes. In coding theory, we introduce a novel class of error correcting codes that we name: Multiplication codes (MPC). We develop decoding algorithms for MPC codes, showing they achieve desirable combinatorial and algorithmic properties, including: (1) binary MPC of constant distance and exponential encoding length for which we provide efficient local list decoding and local self correctingalgorithms; (2) binary MPC of constant distance and polynomial encoding length for which we provide efficient decoding algorithm in random noise model; (3) binary MPC of constant rate and distance. MPC codes are unique in particular in achieving properties as above while having a large group as their underlying algebraic structure. In sublinear algorithms, we present the SFT algorithm for finding the sparse Fourier approximation of complex multi-dimensional signals in time logarithmic in the signal length. We also present additional algorithms for related settings, differing in the model by which the input signal is given, in the considered approximation measure, and in the class of addressed signals. The sublinear algorithms we present are central components in achieving our results in cryptography and coding theory. Reaching beyond theoretical computer science, we suggest employing our algorithms as tools for performance enhancement in data intensive applications, in particular, we suggest replacing the O(Nlog N)-time FFT algorithm with our e(log N)-time SFT algorithm for settings where a sparse approximation suffices. Thesis Supervisor: Shafi Goldwasser Title: RSA Professor of Electrical Engineering and Computer Science Acknowledgments My deepest thanks are to Shafi Goldwasser who has been a wonderful advisor, mentor and friend in all these years since I first set foot in her office. I feel blissed and privileged to have had her guidance through the paths of research. Her insights and perspectives on research along with her determination in conducting one have taught me invaluable lessons. Her kindness, support and encouragement while being my advisor have been indispensable. No words can express how indebted I am to her. Much of this thesis is due to a joint work with Shafi and with Muli Safra; I'm indebted to Shafi and to Muli for their vital contribution to this work. Parts of this thesis are due to a joint work with Ramarathnam Venkatesan; it's a pleasure to thank Venkie for these parts in particular and for his collaboration as a whole. I am indebted to Oded Goldreich and to Vinod Vaikuntanathan for endless dis- cussions influencing my entire academic education and this dissertation in particular. I benefited a great deal from discussions with Nati Linial, Alon Rosen, Adi Shamir, Madhu Sudan, Salil Vadhan, Avi Wigderson, as well as with the fellow students of the theory lab at MIT - many thanks to you all. I am grateful to my thesis committee members Ron Rivest and Madhu Sudan. Finally, many thanks to Sara, Marty and Erik, Michal, Yonatan, Alon and Yuval for being my home away from home; to Eema and Aba, Uri, Tamar, Ella and the rest of the family for their endless support and encouragement; and last but not least, many many thanks to Doron for his constant support and love even during the long months I disappeared into this dissertation. Contents 1 Introduction 13 1.1 Cryptographic Hardcore Predicates ...... ........... 14 1.2 A Study of Multiplication Codes ... ..... .......... 21 1.3 Learning Characters with Noise ... ..... .......... 28 1.4 Algorithms for Data Intensive Applications .. .......... 36 1.5 Conclusions & Thesis Organization .. .... .......... 38 2 Preliminaries 39 2.1 Notations and Terminology .. ..... ... 39 2.2 Fourier Transform over Finite Abelian Groups 40 2.3 Error Correcting Codes . ..... ..... .. 42 2.4 One-Way Functions and Hardcore Predicates . 45 2.5 Tail Inequalities in Probability . ... ..... 46 3 Learning Characters with Noise in Query Access Model 49 3.1 Introduction ............................ .... 49 3.2 The SFT Algorithm ........................ .... 51 3.2.1 The SFT Algorithm over N ............... ... 52 3.2.2 The SFT Algorithm over ZN, x ... x Zk. ....... ... 55 3.2.3 The SFT Algorithm over Finite Abelian Groups . ... ... 59 3.3 Analysis of the SFT Algorithm ................. ... 59 3.3.1 Analysis of the SFT Algorithm over ZZN ........ ... 59 3.3.2 Analysis of the SFT Algorithm over ZN, X ... X ZNk . .. 67 3.3.3 Analysis of SFT Algorithm over Finite Abelian Groups ... 72 3.4 Properties of Filters ha,b and h ',a,'b ............... ... 73 3.4.1 Properties of ha,b: Proof of Lemma 3.19 . ....... ... 73 3.4.2 Technical Proposition on Consecutive Characters Sum ... 75 3.4.3 Properties of h",a,b: Proof of Lemma 3.27 . ...... ... 77 4 Learning Characters with Noise in Random Samples Access Model 4.1 Introduction. ......................... 4.2 Overview of Definitions and Results ................... 4.2.1 rLCN in Bounded Distance Noise Models . .......... 4.2.2 rLCN in Noise Models Simulating Product Group Structure 4.3 Proof of Tractability Results . ...................... 4.4 Proof of Random Self Reducibility Result . 4.5 Algorithm for rLCN: Proof of Theorem 4.10 5 Learning Characters with Noise in Intermediate Access Models 5.1 Introduction . ... ................. ... 96 5.2 Overview of Definitions and Results ...... .. ... 97 5.2.1 Interval Access Model ......... .. ... 98 5.2.2 GP-Access Model and DH-Access Model . ... 99 5.2.3 Subset Access Model ............ .... 100 5.2.4 Further Results ............... ... 102 5.3 Omitted Proofs .. .................. ... 103 6 Codes for Finite Abelian Groups: Multiplication Codes 105 6.1 Introduction ........................ ........ 105 6.2 Overview of Results and Techniques ..... .. .......... 113 6.2.1 List Decoding via Learning . .... ............... 113 6.2.2 Self Correcting via Testing . ... ... .... .. 119 6.2.3 Distance Bounding using Fourier Analysis . .... .... .. 122 6.2.4 Codes for Groups with Small Generating Set . ..... .... 123 6.2.5 Linear Encoding Length via Restrictions .. .... .... .. 127 6.2.6 Soft Local Error Reduction for Concatenated ABNNR Codes . 129 6.3 List Decoding via Learning . ....................... 132 6.3.1 Combinatorial List Decoding Bound .... ... ..... 133 6.3.2 List Decoding Algorithm . ..................... 133 6.3.3 Concentration and Agreement Lemma . ... .... ... .. 135 6.3.4 List Decoding Codes CP for Well Concentrated P ... .... 136 6.3.5 List Decoding Chal f . ... .... 138 6.4 Distance Bounding using Fourier Spectrum .. ... .. ........ 138 6.5 Self Correcting via Testing . ....................... 141 6.6 Linear Encoding Length via Restrictions . .... .. ... .. 147 6.7 Codes for Groups of Small Generating Sets . ... .. ... ...... 149 6.8 Soft Error Reduction for Concatenated ABNNR Codes . .... ... 150 7 Cryptographic Hardcore Predicates via List Decoding 157 7.1 Introduction . ........................ .... 158 7.2 Hardcore Predicates via List Decoding .......... .. 163 7.3 Number Theoretic Hardcore Predicates . ......... .. 167 7.3.1 Segment Predicates . ................ .... 167 7.3.2 Proving Segment Predicates Hardcore . .. ... .... 168 7.4 Simultaneous Bits Security . ................ .. 173 7.5 On Diffie-Hellman Hardcore Predicates . ......... .. 176 List of Figures 6-1 ABNNR code concatenated with binary code .............. 130 List of Tables 1.1 Example of predicates and codes .. ................ .. .. 17 1.2 Algorithms for Learning Characters with Noise ............. 32 7.1 Example of predicates and codes .. ................ .. .. 161 Chapter 1 Introduction This thesis presents results in three areas: cryptography, coding theory and sublinear algorithms. In cryptography, we introduce a unifying framework for proving that a Boolean predicate is hardcore for a one-way function and apply
Recommended publications
  • Information and Announcements Mathematics Prizes Awarded At
    Information and Announcements Mathematics Prizes Awarded at ICM 2014 The International Congress of Mathematicians (ICM) is held once in four years under the auspices of the International Mathematical Union (IMU). The ICM is the largest, and the most prestigious, meeting of the mathematics community. During the ICM, the Fields Medal, the Nevanlinna Prize, the Gauss Prize, the Chern Medal and the Leelavati Prize are awarded. The Fields Medals are awarded to mathematicians under the age of 40 to recognize existing outstanding mathematical work and for the promise of future achievement. A maximum of four Fields Medals are awarded during an ICM. The Nevanlinna Prize is awarded for outstanding contributions to mathematical aspects of information sciences; this awardee is also under the age of 40. The Gauss Prize is given for mathematical research which has made a big impact outside mathematics – in industry or technology, etc. The Chern Medal is awarded to a person whose mathematical accomplishments deserve the highest level of recognition from the mathematical community. The Leelavati Prize is sponsored by Infosys and is a recognition of an individual’s extraordinary achievements in popularizing among the public at large, mathematics, as an intellectual pursuit which plays a crucial role in everyday life. The 27th ICM was held in Seoul, South Korea during August 13–21, 2014. Fields Medals The following four mathematicians were awarded the Fields Medal in 2014. 1. Artur Avila, “for his profound contributions to dynamical systems theory, which have changed the face of the field, using the powerful idea of renormalization as a unifying principle”. Work of Artur Avila (born 29th June 1979): Artur Avila’s outstanding work on dynamical systems, and analysis has made him a leader in the field.
    [Show full text]
  • A Decade of Lattice Cryptography
    Full text available at: http://dx.doi.org/10.1561/0400000074 A Decade of Lattice Cryptography Chris Peikert Computer Science and Engineering University of Michigan, United States Boston — Delft Full text available at: http://dx.doi.org/10.1561/0400000074 Foundations and Trends R in Theoretical Computer Science Published, sold and distributed by: now Publishers Inc. PO Box 1024 Hanover, MA 02339 United States Tel. +1-781-985-4510 www.nowpublishers.com [email protected] Outside North America: now Publishers Inc. PO Box 179 2600 AD Delft The Netherlands Tel. +31-6-51115274 The preferred citation for this publication is C. Peikert. A Decade of Lattice Cryptography. Foundations and Trends R in Theoretical Computer Science, vol. 10, no. 4, pp. 283–424, 2014. R This Foundations and Trends issue was typeset in LATEX using a class file designed by Neal Parikh. Printed on acid-free paper. ISBN: 978-1-68083-113-9 c 2016 C. Peikert All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise, without prior written permission of the publishers. Photocopying. In the USA: This journal is registered at the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923. Authorization to photocopy items for in- ternal or personal use, or the internal or personal use of specific clients, is granted by now Publishers Inc for users registered with the Copyright Clearance Center (CCC). The ‘services’ for users can be found on the internet at: www.copyright.com For those organizations that have been granted a photocopy license, a separate system of payment has been arranged.
    [Show full text]
  • Short Low-Rate Non-Binary Turbo Codes Gianluigi Liva, Bal´Azs Matuz, Enrico Paolini, Marco Chiani
    Short Low-Rate Non-Binary Turbo Codes Gianluigi Liva, Bal´azs Matuz, Enrico Paolini, Marco Chiani Abstract—A serial concatenation of an outer non-binary turbo decoding thresholds lie within 0.5 dB from the Shannon code with different inner binary codes is introduced and an- limit in the coherent case, for a wide range of coding rates 1 alyzed. The turbo code is based on memory- time-variant (1/3 ≤ R ≤ 1/96). Remarkably, a similar result is achieved recursive convolutional codes over high order fields. The resulting codes possess low rates and capacity-approaching performance, in the noncoherent detection framework as well. thus representing an appealing solution for spread spectrum We then focus on the specific case where the inner code is communications. The performance of the scheme is investigated either an order-q Hadamard code or a first order length-q Reed- on the additive white Gaussian noise channel with coherent and Muller (RM) code, due to their simple fast Hadamard trans- noncoherent detection via density evolution analysis. The pro- form (FHT)-based decoding algorithms. The proposed scheme posed codes compare favorably w.r.t. other low rate constructions in terms of complexity/performance trade-off. Low error floors can be thus seen either as (i) a serial concatenation of an outer and performances close to the sphere packing bound are achieved Fq-based turbo code with an inner Hadamard/RM code with down to small block sizes (k = 192 information bits). antipodal signalling, or (ii) as a coded modulation Fq-based turbo/LDPC code with q-ary (bi-) orthogonal modulation.
    [Show full text]
  • Orthogonal Arrays and Codes
    Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-OA, is a λvt x k array of v symbols, such that in any t columns of the array every one of the possible vt t-tuples of symbols occurs in exactly λ rows. We have previously defined an OA of strength 2. If all the rows of the OA are distinct we call it simple. If the symbol set is a finite field GF(q), the rows of an OA can be viewed as vectors of a vector space V over GF(q). If the rows form a subspace of V the OA is said to be linear. [Linear OA's are simple.] Constructions Theorem: If there exists a Hadamard matrix of order 4m, then there exists a 2-(2,4m-1,m)-OA. Pf: Let H be a standardized Hadamard matrix of order 4m. Remove the first row and take the transpose to obtain a 4m by 4m-1 array, which is a 2-(2,4m-1,m)-OA. a a a a a a a a a a b b b b 2-(2,7,2)-OA a b b a a b b a b b b b a a constructed from an b a b a b a b order 8 Hadamard b a b b a b a matrix b b a a b b a b b a b a a b Linear Constructions Theorem: Let M be an mxn matrix over Fq with the property that every t columns of M are linearly independent.
    [Show full text]
  • TC08 / 6. Hadamard Codes 3.12.07 SX
    TC08 / 6. Hadamard codes 3.12.07 SX Hadamard matrices. Paley’s construction of Hadamard matrices Hadamard codes. Decoding Hadamard codes Hadamard matrices A Hadamard matrix of order is a matrix of type whose coefficients are1 or 1 and such that . Note that this relation is equivalent to say that the rows of have norm √ and that any two distinct rows are orthogonal. Since is invertible and , we see that 2 and hence is also a Hadamard matrix. Thus is a Hadamard matrix if and only if its columns have norm √ and any two distinct columns are orthogonal. If is a Hadamard matrix of order , then det ⁄ . In particular we see that the Hadamard matrices satisfy the equality in Hadamard’s inequality: / |det| ∏∑ , which is valid for all real matrices of order . Remark. The expression / is the supremum of the value of det when runs over the real matrices such that 1. Moreover, the equality is reached if and only if is a Hadamard matrix. 3 If we change the signs of a row (column) of a Hadamard matrix, the result is clearly a Hadamard matrix. If we permute the rows (columns) of a Hadamard matrix, the result is another Hadamard matrix. Two Hadamard matrices are called equivalent (or isomorphic) if it is to go from one to the other by means of a sequence of such operations. Observe that by changing the sign of all the columns that begin with 1, and afterwards all the rows that begin with 1, we obtain an equivalent Hadamard matrix whose first row and first column only contain 1.
    [Show full text]
  • Annual Rpt 2004 For
    I N S T I T U T E for A D V A N C E D S T U D Y ________________________ R E P O R T F O R T H E A C A D E M I C Y E A R 2 0 0 3 – 2 0 0 4 EINSTEIN DRIVE PRINCETON · NEW JERSEY · 08540-0631 609-734-8000 609-924-8399 (Fax) www.ias.edu Extract from the letter addressed by the Institute’s Founders, Louis Bamberger and Mrs. Felix Fuld, to the Board of Trustees, dated June 4, 1930. Newark, New Jersey. It is fundamental in our purpose, and our express desire, that in the appointments to the staff and faculty, as well as in the admission of workers and students, no account shall be taken, directly or indirectly, of race, religion, or sex. We feel strongly that the spirit characteristic of America at its noblest, above all the pursuit of higher learning, cannot admit of any conditions as to personnel other than those designed to promote the objects for which this institution is established, and particularly with no regard whatever to accidents of race, creed, or sex. TABLE OF CONTENTS 4·BACKGROUND AND PURPOSE 7·FOUNDERS, TRUSTEES AND OFFICERS OF THE BOARD AND OF THE CORPORATION 10 · ADMINISTRATION 12 · PRESENT AND PAST DIRECTORS AND FACULTY 15 · REPORT OF THE CHAIRMAN 20 · REPORT OF THE DIRECTOR 24 · OFFICE OF THE DIRECTOR - RECORD OF EVENTS 31 · ACKNOWLEDGMENTS 43 · REPORT OF THE SCHOOL OF HISTORICAL STUDIES 61 · REPORT OF THE SCHOOL OF MATHEMATICS 81 · REPORT OF THE SCHOOL OF NATURAL SCIENCES 107 · REPORT OF THE SCHOOL OF SOCIAL SCIENCE 119 · REPORT OF THE SPECIAL PROGRAMS 139 · REPORT OF THE INSTITUTE LIBRARIES 143 · INDEPENDENT AUDITORS’ REPORT 3 INSTITUTE FOR ADVANCED STUDY BACKGROUND AND PURPOSE The Institute for Advanced Study was founded in 1930 with a major gift from New Jer- sey businessman and philanthropist Louis Bamberger and his sister, Mrs.
    [Show full text]
  • A Simple Low Rate Turbo-Like Code Design for Spread Spectrum Systems Durai Thirupathi and Keith M
    A simple low rate turbo-like code design for spread spectrum systems Durai Thirupathi and Keith M. Chugg Communication Sciences Institute Dept. of Electrical Engineering University of Southern California, Los Angeles 90089-2565 thirupat,chugg ¡ @usc.edu Abstract chine. The disadvantage of the SOTC is that the decoding com- plexity increases dramatically with decrease in code rate. On In this paper, we introduce a simple method to construct the other hand, THC, which is constructed using weaker con- very low rate recursive systematic convolutional codes from a stituent codes has slower rate of convergence which might not standard rate- ¢¤£¦¥ convolutional code. These codes in turn are be a desired property for practical applications. So, in design- used in parallel concatenation to obtain very low rate turbo like ing very low rate turbo-like codes for practical applications, one codes. The resulting codes are rate compatible and require low of the critical issues is to design strong enough constituent con- complexity decoders. Simulation results show that an additional volutional codes with decoding complexity of the overall code coding gain of 0.9 dB in additive white Gaussian noise (AWGN) being almost independent of the code rate. channel and 2 dB in Rayleigh fading channel is possible com- In this paper, we introduce a technique to construct such a pared to rate-1/3 turbo code. The low rate coding scheme in- class of low rate convolutional codes. These codes are then creases the capacity by more than 25% when applied to multi- used to build very low rate turbo codes. Since these codes are ple access environments such as Code Division Multiple Access constructed from rate- ¢¤£¦¥ parent codes, the complexity of the (CDMA).
    [Show full text]
  • Local List-Decoding of Reed-Muller Codes Over F2 Original Paper by Gopalan, Klivans, and Zuckerman [6, 7]
    Local List-Decoding of Reed-Muller Codes over F2 Original paper by Gopalan, Klivans, and Zuckerman [6, 7] Sahil Singla Manzil Zaheer Computer Science Department Electrical and Computer Engineering Carnegie Mellon University Carnegie Mellon University [email protected] [email protected] December 7, 2014 Abstract In this report we study the paper titled, \List-Decoding Reed-Muller Codes over Small Fields" by Parikshit Gopalan, Adam R. Klivans and David Zuckerman [6, 7]. The Reed-Muller codes are multivariate generalization of Reed-Solomon codes, which use polynomials in multiple variables to encode messages through functional encoding. Next, any list decoding problem for a code has two facets: Firstly, what is the max- imal radius up to which any ball of that radius contains only a constant number of codewords. Secondly, how to find these codewords in an efficient manner. The paper by GKZ presents the first local list-decoding algorithm for the r-th order Reed-Muller code RM(r; m) over F2 for r ≥ 2. Given an oracle for a received word m R : F2 ! F2, their randomized local list-decoding algorithm produces a list containing all degree r polynomials within relative distance (2−r − ) from R for any > 0 in time poly(mr; r). Since RM(r; m) has relative distance 2r, their algorithm beats the Johnson bound for r ≥ 2. Moreover, as the list size could be exponential in m at radius 2−r, their bound is optimal in the local setting. 1 Contents 1 Introduction 3 1.1 Basics of Code . .3 1.1.1 Johnson Bound .
    [Show full text]
  • Abhyaas News Board … for the Quintessential Test Prep Student
    June 5, 2017 ANB20170606 Abhyaas News Board … For the quintessential test prep student News of the month GST Rates Finalized The Editor’s Column Dear Student, The month of May is the month of entrance exams with the CLAT, AILET, SET and other law exams completed and results pouringin. GST rates have been finalized. ICJ has stayed the The stage is set for the GST rollout with all the states execution of Kulbhushan Jadhav in Pakistan. Justice having agreed for the rollout on July 1st. Tax slabs for Leila Seth, the first chief justice of a state high court the various products/services are as follows: passed away. No tax Goods - No tax will be imposed on items like Jute, The entire world has been affected by the fresh meat, fish, chicken, eggs, milk, butter milk, curd, ransomware attack on computers. Mumbai Indians natural honey, fresh fruits and vegetables, etc are the winners of the tenth edition of the IPL. Services - Hotels and lodges with tariff below Rs 1,000 5% Slab Read on to go through the current affairs for the Goods - Apparel below Rs 1000, packaged food items, month of May 2017. footwear below Rs 500, coffee, tea, spices, etc Services - Transport services (Railways, air transport), small restaurants 12% Slab Goods - Apparel above Rs 1000, butter, cheese, ghee, dry fruits in packaged form, fruit juices, Ayurvedic medicines, sewing machine, cellphones,etc Padma Parupudi Services - Non-AC hotels, business class air ticket, fertilisers, Work Contracts will fall 18% Slab Index: Goods - Most items are under this tax slab which include footwear costing more than Rs 500, Page 2: Persons in News cornflakes, pastries and cakes, preserved vegetables, Page 4: Places in News jams, ice cream, instant food mixes, etc.
    [Show full text]
  • Master Thesis
    Mohamed Khider University of Biskra Faculty of Letters and Languages Department of Foreign Languages MASTER THESIS Letters and Foreign Languages English Language Civilization and Literature Submitted and Defended by: Khadidja BOUZOUAID The Development and the Impact of the Indian Immigrants Elite on the British Higher Educational System Between (2007 -2016) A Dissertation Submitted to the Departmentof Foreign Languages in Partial Fulfillment for the Requirement of the Master‟s Degree in Literature and Civilization Broard of Examiners: Mrs.Amri Chenini Bouthaina Chairperson University of Biskra Mrs. Zerigui Naima Supervisor University of Biskra Mr. Smatti Said Examiner University of Biskra Academic Year: 2019-2020 Bouzouaid II Dedication To the soul of my father Bouzouaid III Acknowledgements Praise is to God, who helped me to complete this work. I would like to pay tribute to all the staff of the English Language Department. I would like to express my deep appreciation to my supervisor Mrs. Naima Zerigui, who makes me fall in love with the module of the British Civilization. And this thesis could not have been accomplished without her valuable guidance and comments. I extend my gratitude to the chair of the jury, Mrs. Amri Chenini Bouthaina, and the examiner, Mr. Smtti Said, for having accepted to read and examine my dissertation. Bouzouaid IV Abstract This dissertation attempts to study the issue of immigration to the United Kingdom. It attempts to shed light on the Indian immigrant elite, mainly those with high educational level and professional competence. Yet, the dissertation‟s major problematic is to find out the reasons and motives behind the immigration of this category of the Indian society to the UK and its major impact, specifically on the higher education system.
    [Show full text]
  • Subhash Khot, Playing Unique Games in Washington Square Park
    Quanta Magazine Subhash Khot, Playing Unique Games in Washington Square Park Grand ideas have a way of turning up in unusual settings, far from an office or a chalkboard. Months ago, Quanta Magazine set out to photograph some of the world’s most accomplished scientists and mathematicians in their favorite places to think, tinker and create. This series explores the role of cherished spaces — public or private, spare or crowded, inside or out — in clearing a path to inspiration. By Thomas Lin and Olena Shmahalo and Lucy Reading-Ikkanda Béatrice de Géa for Quanta Magazine Subhash Khot’s favorite place to think about computational complexity is Washington Square Park in New York City. https://www.quantamagazine.org/subhash-khot-playing-unique-games-in-washington-square-park-20170710/ July 10, 2017 Quanta Magazine As a Princeton University graduate student in 2001, Subhash Khot was visiting his family in India and thinking about his research on the limits of computation when he came up with a good, if seemingly modest, idea. He was thinking about an analytic theorem that Johan Håstad, one of his mentors, had formulated (and Jean Bourgain had proved) and how it could be applied to the “hardness of approximation.” But there was a missing ingredient. While most computer scientists work to expand the capabilities of computers, computational complexity experts like Khot try to determine which problems are impossible for computers to solve within a reasonable time frame. Once a problem has been classified as “hard” in this way, the natural next question to ask is about its hardness of approximation: whether a computer can efficiently find an approximate solution good enough to put to practical use.
    [Show full text]
  • Annual Report 2018 Edition TABLE of CONTENTS 2018
    Annual Report 2018 Edition TABLE OF CONTENTS 2018 GREETINGS 3 Letter From the President 4 Letter From the Chair FLATIRON INSTITUTE 7 Developing the Common Language of Computational Science 9 Kavli Summer Program in Astrophysics 12 Toward a Grand Unified Theory of Spindles 14 Building a Network That Learns Like We Do 16 A Many-Method Attack on the Many Electron Problem MATHEMATICS AND PHYSICAL SCIENCES 21 Arithmetic Geometry, Number Theory and Computation 24 Origins of the Universe 26 Cracking the Glass Problem LIFE SCIENCES 31 Computational Biogeochemical Modeling of Marine Ecosystems (CBIOMES) 34 Simons Collaborative Marine Atlas Project 36 A Global Approach to Neuroscience AUTISM RESEARCH INITIATIVE (SFARI) 41 SFARI’s Data Infrastructure for Autism Discovery 44 SFARI Research Roundup 46 The SPARK Gambit OUTREACH AND EDUCATION 51 Science Sandbox: “The Most Unknown” 54 Math for America: The Muller Award SIMONS FOUNDATION 56 Financials 58 Flatiron Institute Scientists 60 Mathematics and Physical Sciences Investigators 62 Mathematics and Physical Sciences Fellows 63 Life Sciences Investigators 65 Life Sciences Fellows 66 SFARI Investigators 68 Outreach and Education 69 Simons Society of Fellows 70 Supported Institutions 71 Advisory Boards 73 Board of Directors 74 Simons Foundation Staff 3 LETTER FROM THE PRESIDENT As one year ends and a new one begins, it is always a In the pages that follow, you will also read about the great pleasure to look back over the preceding 12 months foundation’s grant-making in Mathematics and Physical and reflect on all the fascinating and innovative ideas Sciences, Life Sciences, autism science (SFARI), Outreach conceived, supported, researched and deliberated at the and Education, and our Simons Collaborations.
    [Show full text]