Final Program and Abstracts

Total Page:16

File Type:pdf, Size:1020Kb

Final Program and Abstracts Final Program and Abstracts The Symposium on Simplicity in Algorithms will take place Wednesday, January 10. SODA is jointly sponsored by the ACM Special Interest Group on Algorithms and Computation Theory and the SIAM Activity Group on Discrete Mathematics. The SIAG on Discrete Mathematics focuses on combinatorics, graph theory, cryptography, discrete optimization, mathematical programming, coding theory, information theory, game theory, and theoretical computer science, including algorithms, complexity, circuit design, robotics, and parallel processing. This activity group provides an opportunity to unify pure discrete mathematics and areas of applied research such as computer science, operations research, combinatorics, and the social sciences. It organizes the SIAM Conference on Discrete Mathematics; co-sponsors, with ACM SIGACT, the annual Symposium on Discrete Algorithms; and sponsors minisymposia at SIAM meetings and conferences. The activity group also publishes an electronic newsletter and maintains a member directory. Every two years, the activity group also awards the Dénes König Prize to a young researcher for outstanding research in the area of discrete mathematics. Society for Industrial and Applied Mathematics 3600 Market Street, 6th Floor Philadelphia, PA 19104-2688 USA Telephone: +1-215-382-9800 Fax: +1-215-386-7999 Conference E-mail: [email protected] Conference Web: www.siam.org/meetings/ Membership and Customer Service: (800) 447-7426 (USA & Canada) or +1-215-382-9800 (worldwide) www.siam.org/meetings/da18 www.siam.org/meetings/alenex18 www.siam.org/meetings/analco18 2 ACM-SIAM Symposium on Discrete Algorithms, ALENEX & ANALCO Table of Contents Silvio Lattanzi Andreas Wiese Google Zurich, Switzerland Universidad de Chile, Santiago, Chile Paul Wollan Program-At-A-Glance… Yin Tat Lee University of Washington, USA University of Rome “La Sapienza”, Italy ..........................................See foldout Andrew McGregor David P. Woodruff General Information .............................. 2 University of Massachusetts, Amherst, USA Carnegie Mellon University, USA Get-togethers ......................................... 5 Ulrich Meyer Yuichi Yoshida Symposium on Simplicity Goethe University, Frankfurt, Germany National Institute of Informatics, Tokyo, in Algorithms .................................... 7 Japan Benjamin Moseley Best Paper and Best Student Paper Washington University in St. Louis, USA Steering Committee Awards............................................... 8 Wolfgang Mulzer Pavol Hell Invited Plenary Presentations ................ 9 Freie Universität Berlin, Germany Simon Fraser University, Canada Program Schedule ............................... 12 Huy Lê Nguyen Daniel Král Abstracts ............................................. 30 Northeastern University, USA University of Warwick, United Kingdom Speaker Index ...................................... 89 Krzysztof Onak Dana Randall Hotel Meeting Room Map ... Back Cover IBM Research, USA Georgia Institute of Technology, USA Gopal Pandurangan Cliff Stein University of Houston, USA Columbia University, USA (chair) SODA COMMITTEES Richard Peng Shang-Hua Teng Georgia Institute of Technology, USA University of Southern California, USA Program Committee Chair Marcin Pilipczuk Artur Czumaj University of Warsaw, Poland University of Warwick, United Kingdom ALENEX COMMITTEES Noga Ron-Zewi Program Committee Co-Chairs Program Committee Ben-Gurion University of the Negev, Israel Natan Rubin Rasmus Pagh Vladimir Braverman Ben Gurion University of the Negev, Israel Johns Hopkins University, USA IT University of Copenhagen, Denmark Aviad Rubinstein Niv Buchbinder University of California, Berkeley and Suresh Venkatasubramanian Tel-Aviv University, Israel Harvard University, USA University of Utah, USA Amin Coja-Oghlan Wojciech Samotij Goethe University, Frankfurt, Germany Tel Aviv University, Israel Program Committee Martin Dietzfelbinger Rahul Shah TU Ilmenau, Germany Louisiana State University, USA Gianlorenzo D’Angelo Ioana Dumitriu Rahul Savani Gran Sasso Science Institute, Italy University of Washington, USA University of Liverpool, United Kingdom Rolf Fagerberg Matthias Englert Asaf Shapira University of Southern Denmark, University of Warwick, United Kingdom Tel-Aviv University, Israel Denmark Kousha Etessami Anastasios Sidiropoulos Sorelle Friedler University of Edinburgh, United Kingdom University of Illinois at Chicago, USA Haverford College, USA Fedor V. Fomin Nike Sun Joachim Giesen University of Bergen, Norway University of California, Berkeley, USA University of Jena, Germany Mohsen Ghaffari Justin Thaler Aristides Gionis ETH Zürich, Switzerland Georgetown University, USA Aalto University, Finland Fabrizio Grandoni Jonathan Ullman Kunihiko Sadakane IDSIA, Switzerland Northeastern University, USA University of Tokyo, Japan Nicole Immorlica Erik Jan van Leeuwen Peter Sanders Microsoft Research New England, USA Utrecht University, The Netherlands Karlsruhe Institute of Technology, Germany Kasper Green Larsen Nisheeth Vishnoi Aarhus University, Denmark EPFL, Switzerland C. Seshadri University of California, Santa Cruz, USA ACM-SIAM Symposium on Discrete Algorithms, ALENEX & ANALCO 3 Nodari Sitchinava Paweł Hitczenko SIAM Registration Desk University of Hawaii at Manoa, USA Drexel University, USA The SIAM registration desk is located in Sabine Storandt Emma Yu Jin the Ballroom Foyer on the 2nd Floor. It University of Würzburg, Germany Technische Universität Wien, Austria is open during the following hours: Blair Sullivan Michael Mitzenmacher Saturday, January 6 North Carolina State University, USA Harvard University, USA 5:00 PM – 8:00 PM Sergei Vassilvitskii Daniel Panario Google, USA Carleton University, Canada Ke Yi Alfredo Viola Sunday, January 7 Hong Kong University of Science and Universidad de la República, Uruguay 8:00 AM – 5:00 PM Technology, Hong Kong Sebastian Wild University of Kaiserslautern, Germany Monday, January 8 Steering Committee Mark Wilson University of Auckland, New Zealand 8:00 AM – 5:00 PM Ulrik Brandes University of Konstanz, Germany Tuesday, January 9 Andrew V. Goldberg Steering Committee Amazon.com, USA (Chair) 8:00 AM – 5:00 PM Michael Drmota Michael Goodrich Technische Universität Wien, Austria University of California, Irvine, USA Wednesday, January 10 James Allen Fill (Jim Fill) Giuseppe F. Italiano Johns Hopkins University, USA 8:00 AM – 5:00 PM University of Rome “Tor Vergata”, Italy H.K. Hwang Vijaya Ramachandran Institute of Statistical Science, Academia University of Texas, Austin, USA Sinica, Taiwan Hotel Address Cliff Stein Conrado Martínez Astor Crowne Plaza - New Orleans Columbia University, USA Universitat Politècnica de Catalunya, Spain French Quarter Dorothea Wagner Markus Nebel 739 Canal Street at Bourbon Karlsruhe Institute of Technology, Germany Universität Bielefeld, Germany New Orleans, Louisiana 70130 USA Robert Sedgewick Phone Number: +1-504-962-0500 Princeton University, USA ANALCO COMMITTEES Toll Free Reservations (USA and Wojciech Szpankowski Canada): 877-408-9661 Program Committee Co-Chairs Purdue University, USA Reservation Fax: +1-504-962-0503 Mark Daniel Ward Hotel web address: http://www. Markus Nebel Purdue University, USA astorneworleans.com/ Universität Bielefeld, Germany Stephan Wagner Stellenbosch University, South Africa Hotel Telephone Number Program Committee To reach an attendee or leave a message, Child Care call +1-504-962-0500. If the attendee Frédérique Bassino is a hotel guest, the hotel operator can The New Orleans Convention Université Paris Nord, France connect you with the attendee’s room. and Visitors Bureau recommends Clara’s Sitting Service (http://www. Nicolas Broutin clarasittingservice.org/) or Dependable Inria Paris-Rocquencourt, France Hotel Check-in and Kid Care (http://dependablekidcare. Amalia Duch Check-out Times net/) for attendees interested in child Universitat Politècnica de Catalunya, care services. Attendees are responsible Spain Check-in time is 4:00 PM. for making their own child care Michael Fuchs Check-out time is 11:00 AM. arrangements. National Chiao Tung University, Taiwan Clemens Heuberger Alpen-Adria-Universität Klagenfurt, Austria 4 ACM-SIAM Symposium on Discrete Algorithms, ALENEX & ANALCO Corporate Members Sandia National Laboratories SIAM Customer Service: and Affiliates Schlumberger-Doll Research Telephone: +1-215-382-9800 (worldwide); United States Department of Energy or 800-447-7426 (U.S. and Canada only) SIAM corporate members provide U.S. Army Corps of Engineers, Engineer Fax: +1-215-386-7999 their employees with knowledge about, Research and Development Center E-mail: [email protected] access to, and contacts in the applied US Naval Research Labs mathematics and computational sciences Postal mail: Society for Industrial and community through their membership Applied Mathematics, 3600 Market Street, benefits. Corporate membership is more List current November 2017. 6th floor, Philadelphia, PA than just a bundle of tangible products 19104-2688 USA and services; it is an expression of support for SIAM and its programs. Join SIAM and save! SIAM is pleased to acknowledge its Changes to the Printed corporate members and sponsors. Program In recognition of their support, non- Leading the applied The printed program and abstracts were member attendees who are employed by mathematics community . current at the time of printing, however, the following organizations are entitled SIAM members save up to $140 on please review the online program
Recommended publications
  • Multiplicative Differentials
    Multiplicative Differentials Nikita Borisov, Monica Chew, Rob Johnson, and David Wagner University of California at Berkeley Abstract. We present a new type of differential that is particularly suited to an- alyzing ciphers that use modular multiplication as a primitive operation. These differentials are partially inspired by the differential used to break Nimbus, and we generalize that result. We use these differentials to break the MultiSwap ci- pher that is part of the Microsoft Digital Rights Management subsystem, to derive a complementation property in the xmx cipher using the recommended modulus, and to mount a weak key attack on the xmx cipher for many other moduli. We also present weak key attacks on several variants of IDEA. We conclude that cipher designers may have placed too much faith in multiplication as a mixing operator, and that it should be combined with at least two other incompatible group opera- ¡ tions. 1 Introduction Modular multiplication is a popular primitive for ciphers targeted at software because many CPUs have built-in multiply instructions. In memory-constrained environments, multiplication is an attractive alternative to S-boxes, which are often implemented us- ing large tables. Multiplication has also been quite successful at foiling traditional dif- ¢ ¥ ¦ § ferential cryptanalysis, which considers pairs of messages of the form £ ¤ £ or ¢ ¨ ¦ § £ ¤ £ . These differentials behave well in ciphers that use xors, additions, or bit permutations, but they fall apart in the face of modular multiplication. Thus, we con- ¢ sider differential pairs of the form £ ¤ © £ § , which clearly commute with multiplication. The task of the cryptanalyst applying multiplicative differentials is to find values for © that allow the differential to pass through the other operations in a cipher.
    [Show full text]
  • Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F
    Applications of search techniques to cryptanalysis and the construction of cipher components. James David McLaughlin Submitted for the degree of Doctor of Philosophy (PhD) University of York Department of Computer Science September 2012 2 Abstract In this dissertation, we investigate the ways in which search techniques, and in particular metaheuristic search techniques, can be used in cryptology. We address the design of simple cryptographic components (Boolean functions), before moving on to more complex entities (S-boxes). The emphasis then shifts from the construction of cryptographic arte- facts to the related area of cryptanalysis, in which we first derive non-linear approximations to S-boxes more powerful than the existing linear approximations, and then exploit these in cryptanalytic attacks against the ciphers DES and Serpent. Contents 1 Introduction. 11 1.1 The Structure of this Thesis . 12 2 A brief history of cryptography and cryptanalysis. 14 3 Literature review 20 3.1 Information on various types of block cipher, and a brief description of the Data Encryption Standard. 20 3.1.1 Feistel ciphers . 21 3.1.2 Other types of block cipher . 23 3.1.3 Confusion and diffusion . 24 3.2 Linear cryptanalysis. 26 3.2.1 The attack. 27 3.3 Differential cryptanalysis. 35 3.3.1 The attack. 39 3.3.2 Variants of the differential cryptanalytic attack . 44 3.4 Stream ciphers based on linear feedback shift registers . 48 3.5 A brief introduction to metaheuristics . 52 3.5.1 Hill-climbing . 55 3.5.2 Simulated annealing . 57 3.5.3 Memetic algorithms . 58 3.5.4 Ant algorithms .
    [Show full text]
  • Approximation Schemes for Clustering with Outliers
    Approximation Schemes for Clustering with Outliers Zachary Friggstad∗ Kamyar Khodamoradi Mohsen Rezapour Mohammad R. Salavatipoury Department of Computing Science University of Alberta Abstract Clustering problems are well-studied in a variety of fields such as data science, operations research, and computer science. Such problems include variants of centre location problems, k-median, and k-means to name a few. In some cases, not all data points need to be clustered; some may be discarded for various reasons. For instance, some points may arise from noise in a data set or one might be willing to discard a certain fraction of the points to avoid incurring unnecessary overhead in the cost of a clustering solution. We study clustering problems with outliers. More specifically, we look at uncapacitated facility location (UFL), k-median, and k-means. In these problems, we are given a set of data points in a metric space δ(:; :), a set of possible centres (each maybe with an openingX cost), maybe an integer parameter k, plus anC additional parameter z as the number of outliers. In uncapacitated facility location with outliers, we have to open some centres, discard up to z points of and assign every other point to the nearest open centre, minimizing the total assignment costX plus centre opening costs. In k-median and k-means, we have to open up to k centres but there are no opening costs. In k-means, the cost of assigning j to i is δ2(j; i). We present several results. Our main focus is on cases where δ is a doubling metric (this includes fixed dimensional Euclidean metrics as a special case) or is the shortest path metrics of graphs from a minor-closed family of graphs.
    [Show full text]
  • Approximation Algorithms for Resource Allocation Optimization
    Approximation Algorithms for Resource Allocation Optimization by Kewen Liao A thesis submitted for the degree of Doctor of Philosophy School of Computer Science, The University of Adelaide. March, 2014 Copyright c 2014 Kewen Liao All Rights Reserved To my parents and grandparents, for their endless support. Contents Contents i List of Figures iii List of Tables iv List of Acronyms v Abstract viii Declaration ix Preface x Acknowledgments xii 1 Introduction 1 1.1 Research problems ......................... 2 1.2 Thesis aims and impact ...................... 5 1.3 Thesis results ............................ 8 1.4 Thesis structure ........................... 9 2 Preliminaries 10 2.1 Computational complexity ..................... 11 2.1.1 Computational problems .................. 11 2.1.2 Languages,machinemodels,andalgorithms....... 12 2.1.3 P and NP ......................... 14 2.2LPandILP............................. 16 2.3Approximationalgorithms..................... 20 2.3.1 Greedyandlocalsearchalgorithms............ 22 2.3.2 LProundingalgorithms.................. 24 2.3.3 Primal-dual algorithms ................... 26 i 3 Discrete Facility Location 30 3.1 Uncapacitated Facility Location .................. 31 3.1.1 LPformulations....................... 31 3.1.2 Hardnessresults....................... 33 3.1.3 Approximationalgorithms................. 36 3.2 Other facility location problems .................. 49 3.2.1 Fault-Tolerant Facility Location .............. 51 3.2.2 Capacitated Facility Location ............... 53 3.2.3 K Uncapacitated
    [Show full text]
  • Download Pdf
    Knowledge Co-construction and Initiative in Peer Learning Interactions BY CYNTHIA KERSEY B.B.A., University of Wisconsin - Madison, 1985 M.S., Governors State University, 2001 THESIS Submitted as partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate College of the University of Illinois at Chicago, 2009 Chicago, Illinois Copyright by Cynthia Kersey 2009 To John P. Nurse, who told me girls can do anything that boys can. I wish you could see this. iii ACKNOWLEDGMENTS Many people have contributed to this research and it is a pleasure for me to acknowledge as many of them as I can. First, and most importantly, my advisor Barbara Di Eugenio supported me in too many ways to list. Secondly, Pam Jordan, who was like a co-advisor, helped run experiments and build systems and provided me with encouragement when I needed it the most. I'd also like to thank my other committee members | Martha Evens, Leilah Lyons, Tom Moher, and Robert Sloan | along with Sandy Katz for their thoughtful suggestions. I've been incredibly lucky to work with a great group of graduate students in the NLP lab | Davide Fossati and Joel Booth, who were always available and willing to discuss a research question with me, Lin Chen, Swati Tata and Alberto Tretti. To earn a PhD at this stage in my life required an incredible amount of juggling of responsibilities and I couldn't have done it without my family and friends. I would like to thank my mother, brother and sister-in-law for their unfailing support and encouragement, Shirley Kersey for being my role model, Dave Kersey, and my dear friend, Mary Rittgers, who never failed to step in when I needed an extra set of hands.
    [Show full text]
  • CRYPTREC Report 2008 暗号技術監視委員会報告書
    CRYPTREC Report 2008 平成21年3月 独立行政法人情報通信研究機構 独立行政法人情報処理推進機構 「暗号技術監視委員会報告」 目次 はじめに ······················································· 1 本報告書の利用にあたって ······································· 2 委員会構成 ····················································· 3 委員名簿 ······················································· 4 第 1 章 活動の目的 ··················································· 7 1.1 電子政府システムの安全性確保 ··································· 7 1.2 暗号技術監視委員会············································· 8 1.3 電子政府推奨暗号リスト········································· 9 1.4 活動の方針····················································· 9 第 2 章 電子政府推奨暗号リスト改訂について ·························· 11 2.1 改訂の背景 ··················································· 11 2.2 改訂の目的 ··················································· 11 2.3 電子政府推奨暗号リストの改訂に関する骨子······················ 11 2.3.1 現リストの構成の見直し ·································· 12 2.3.2 暗号技術公募の基本方針 ·································· 14 2.3.3 2009 年度公募カテゴリ ···································· 14 2.3.4 今後のスケジュール ······································ 15 2.4 電子政府推奨暗号リスト改訂のための暗号技術公募(2009 年度) ····· 15 2.4.1 公募の概要 ·············································· 16 2.4.2 2009 年度公募カテゴリ ···································· 16 2.4.3 提出書類 ················································ 17 2.4.4 評価スケジュール(予定) ·································· 17 2.4.5 評価項目 ················································ 18 2.4.6 応募暗号説明会の開催 ···································· 19 2.4.7 ワークショップの開催 ···································· 19 2.5
    [Show full text]
  • Lecture Notes in Computer Science 2365 Edited by G
    Lecture Notes in Computer Science 2365 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen 3 Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Tokyo Joan Daemen Vincent Rijmen (Eds.) Fast Software Encryption 9th International Workshop, FSE 2002 Leuven, Belgium, February 4-6, 2002 Revised Papers 13 Series Editors Gerhard Goos, Karlsruhe University, Germany Juris Hartmanis, Cornell University, NY, USA Jan van Leeuwen, Utrecht University, The Netherlands Volume Editors Joan Daemen Proton World Zweefvliegtuigstraat 10 1130 Brussel, Belgium E-mail: [email protected] Vincent Rijmen Cryptomathic Lei 8A 3000 Leuven, Belgium E-mail: [email protected] Cataloging-in-Publication Data applied for Die Deutsche Bibliothek - CIP-Einheitsaufnahme Fast software encryption : 9th international workshop ; revised papers / FSE 2002, Leuven, Belgium, February 2002. Joan Daemen ; Vincent Rijmen (ed.). - Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London ; Milan ; Paris ; Tokyo : Springer, 2002 (Lecture notes in computer science ; Vol. 2365) ISBN 3-540-44009-7 CR Subject Classication (1998): E.3, F.2.1, E.4, G.4 ISSN 0302-9743 ISBN 3-540-44009-7 Springer-Verlag Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microlms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag.
    [Show full text]
  • Warkah Berita Persama
    1 WARKAH BERITA PERSAMA Bil 20 (2), 2015/1436 H/1937 S (Untuk Ahli Sahaja) Terbitan Ogos 2016 PERSATUAN SAINS MATEMATIK MALAYSIA (PERSAMA) (Dimapankan pada 1970 sebagai “Malayisan Mathematical Society” , tetapi dinamai semula sebagai “Persatuan Matematik Malaysia (PERSAMA) ” pada 1995 dan diperluaskan kepada “Persatuan Sains Matematik Malaysia (PERSAMA)” mulai Ogos 1998) Terbitan “Newsletter” persatuan ini yang dahulunya tidak berkala mulai dijenamakan semula sebagai “Warkah Berita” mulai 1994/1995 (lalu dikira Bil. 1 (1&2) 1995) dan diterbitkan dalam bentuk cetakan liat tetapi sejak isu 2008 (terbitan 2010) dibuat dalam bentuk salinan lembut di laman PERSAMA. Warkah Berita PERSAMA 20(2): Julai.-Dis, 2015/1436 H/1937 S 2 KANDUNGAN WB 2015, 20(2) (Julai-Dis) BARISAN PENYELENGGARA WB PERSAMA 2 MANTAN PRESIDEN & SUA PERSAMA 3 BARISAN PIMPINAN PERSAMA LANI 5-7 MELENTUR BULUH (OMK, IMO DSBNYA) 2015 7-9 BULAT AIR KERANA PEMBETUNG 9-21 STATISTIK AHLI PERSAMA SPT PADA DIS 2015 9 MINIT MESYUARAT AGUNG PERSAMA 2013/14 10-12 LAPORAN TAHUNAN PERSAMA 2013/14 13-18 PENYATA KEWANGAN PERSAMA 2013/14 18-21 BERITA PERSATUAN SN MATEMA ASEAN 21-24 DI MENARA GADING 24 GELANGGANG AKADEMIAWAN 25-115 SEM & KOLOKUIUM UKM, UM, UPM, USM & UTM Julai-Dis 2015) 25-28 PENERBITAN UPM (INSPEM, FSMSK), USM (PPSM&PSK) & UTM (JM &FP’kom) 2012 28-115 SEM DSBNYA KELAK: DALAM & LUAR NEGARA 2016 -2017 115-150 ANUGERAH (NOBEL, PINGAT DAN SEBAGAINYA) 151-152 KEMBALINYA SARJANA KE ALAM BAQA 152 MAKALAH UMUM YANG MENARIK 152 BUKU PILIHAN 152-187 ANUGERAH BUKU NEGARA 2015 152-154
    [Show full text]
  • DA18 Abstracts 31
    DA18 Abstracts 31 IP1 and indicate some of the techniques and ideas used to tackle Differential Privacy: A Gateway Concept the uncertainty in these problems and get provable guar- antees on the performance of these algorithms. Differential privacy is a definition of privacy tailored to statistical analysis of very large large datasets. Invented Anupam Gupta just over one decade ago, the notion has become widely (if Carnegie Mellon University not deeply) deployed, and yet much remains to be done. [email protected] The theoretical investigation of privacy/accuracy tradeoffs that shaped the field by delineating the boundary between possible and impossible motivate the continued search for IP4 new algorithmic techniques, as well as still meaningful re- Title To Be Determined - Vassilevska Williams laxations of the basic definition. Differential privacy has also led to new approaches in other fields, most notably in Not available. algorithmic fairness and adaptive data analysis, in which the questions being asked of the data depend on the data Virginia Vassilevska Williams themselves. We will highlight some recent algorithmic and MIT definitional work, and focus on differential privacy as a [email protected] gateway concept to these new areas of study. Cynthia Dwork CP0 Harvard University, USA A Generic Framework for Engineering Graph Can- [email protected] onization Algorithms The state-of-the-art tools for practical graph canonization IP2 are all based on the individualization-refinement paradigm, ThePowerofTheoryinthePracticeofHashing and their difference is primarily in the choice of heuristics with Focus on Similarity Estimation they include and in the actual tool implementation. It is thus not possible to make a direct comparison of how Hash functions have become ubiquitous tools in modern individual algorithmic ideas affect the performance on dif- data analysis, e.g., the construction of small randomized ferent graph classes.
    [Show full text]
  • A Resource Estimation and Verification Workflow in Q
    A Resource Estimation and Verification Workflow in Q# Special session paper Mathias Soeken, Mariia Mykhailova, Vadym Kliuchnikov, Christopher Granade, Alexander Vaschillo Microsoft Quantum, Redmond, United States Abstract—An important branch in quantum computing in- Quantum algorithm volves accurate resource estimation to assess the cost of run- ning a quantum algorithm on future quantum hardware. A Implement Rewrite comprehensive and self-contained workflow with the quantum program in its center allows programmers to build comprehen- Q# program Optimized Q# program sible and reproducible resource estimation projects. We show how to systematically create such workflows using the quantum Test programming language Q#. Our approach uses simulators for verification, debugging, and resource estimation, as well as rewrite steps for optimization. Verification Visualization Resource estimation NTRODUCTION I. I Fig. 1. The proposed resource estimation and verification workflow starts from a quantum algorithm and returns verification, visualization, and resource Quantum computing has the potential to efficiently solve estimation results. The workflow consists of three stages: in the Implement some computational problems that are intractable to solve phase, the programmer expresses the algorithm as a Q# program. In the Rewrite phase, the compiler can optimize the program using automatic rewrite on classical computers [1], [2]. Quantum programming lan- steps. Finally, the Test phase addresses various tasks such as verification, guages [3] allow developers to formalize quantum algorithms visualization, and resource estimation. in terms of quantum programs that can be executed. While execution on a physical scalable fault-tolerant quantum com- Suchara et al. presented QuRE [17], a layout estimation tool puter is not yet possible, the execution of quantum programs targeting evaluation on physical quantum technologies.
    [Show full text]
  • On Bugs and Ciphers: New Techniques in Cryptanalysis
    On Bugs and Ciphers: New Techniques in Cryptanalysis Yaniv Carmeli Technion - Computer Science Department - Ph.D. Thesis PHD-2015-01 - 2015 Technion - Computer Science Department - Ph.D. Thesis PHD-2015-01 - 2015 On Bugs and Ciphers: New Techniques in Cryptanalysis Research Thesis Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy Yaniv Carmeli Submitted to the Senate of the Technion | Israel Institute of Technology Adar 5775 Haifa March 2015 Technion - Computer Science Department - Ph.D. Thesis PHD-2015-01 - 2015 Technion - Computer Science Department - Ph.D. Thesis PHD-2015-01 - 2015 The research thesis was done under the supervision of Prof. Eli Biham in the Computer Science Department. The generous financial support of the Technion is gratefully acknowledged. Technion - Computer Science Department - Ph.D. Thesis PHD-2015-01 - 2015 Technion - Computer Science Department - Ph.D. Thesis PHD-2015-01 - 2015 Contents Abstract 1 1 Introduction 3 2 Bug Attacks 9 2.1 Introduction . 9 2.1.1 Introduction to Side Channel Attacks (SCA) . 13 2.1.2 Fault Attacks . 14 2.2 Overview of Our Methods and Notations . 15 2.2.1 Multiplication of Big Numbers . 16 2.2.2 Notations . 16 2.2.3 Methods . 16 2.2.4 Complexity Analysis . 17 2.2.5 Exponentiation Algorithms . 17 2.2.6 Remarks . 18 2.3 Bug Attack on CRT-RSA with One Chosen Ciphertext . 19 2.4 Bug Attacks on LTOR Exponentiations . 20 2.4.1 Bug Attacks on Pohlig-Hellman . 21 2.4.2 Bug Attacks on RSA . 25 2.4.3 Bug Attacks on OAEP .
    [Show full text]
  • Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis
    Copyright by Gokhan Sayilar 2014 The Thesis Committee for Gokhan Sayilar Certifies that this is the approved version of the following thesis: Cryptoraptor: High Throughput Reconfigurable Cryptographic Processor for Symmetric Key Encryption and Cryptographic Hash Functions APPROVED BY SUPERVISING COMMITTEE: Derek Chiou, Supervisor Mohit Tiwari Cryptoraptor: High Throughput Reconfigurable Cryptographic Processor for Symmetric Key Encryption and Cryptographic Hash Functions by Gokhan Sayilar, B.S. THESIS Presented to the Faculty of the Graduate School of The University of Texas at Austin in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE IN ENGINEERING THE UNIVERSITY OF TEXAS AT AUSTIN December 2014 To my family and many friends... Acknowledgments A major research project like this is never the work of anyone alone. I would like to extend my appreciation especially to the following. First and foremost I offer my sincerest gratitude to my supervisor, Dr. Derek Chiou, for his excellent guidance, caring, and patience. I would also like to thank him for being an open person to ideas, encouraging and helping me to shape my interest and ideas, and giving me the freedom to work in my own way. He’s the funniest advisor and one of the smartest people I know. Besides my advisor, I would like to thank to my second reader, Dr. Mohit Tiwari, for his advises and insightful comments. I am also thankful to my friends in US, Turkey, and other parts of the World for being sources of laughter, joy, and support. Last but not least, I would like to thank my parents and my brother for their continuous love and unconditional support in any decision that I make.
    [Show full text]