• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 191
  • Tagged with
  • 191
  • 191
  • 47
  • 41
  • 27
  • 26
  • 20
  • 17
  • 14
  • 12
  • 12
  • 12
  • 12
  • 10
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Modularity and Structure in Matroids

Kapadia, Rohan January 2013 (has links)
This thesis concerns sufficient conditions for a matroid to admit one of two types of structural characterization: a representation over a finite field or a description as a frame matroid. We call a restriction N of a matroid M modular if, for every flat F of M, r_M(F) + r(N) = r_M(F ∩ E(N)) + r_M(F ∪ E(N)). A consequence of a theorem of Seymour is that any 3-connected matroid with a modular U_{2,3}-restriction is binary. We extend this fact to arbitrary finite fields, showing that if N is a modular rank-3 restriction of a vertically 4-connected matroid M, then any representation of N over a finite field extends to a representation of M. We also look at a more general notion of modularity that applies to minors of a matroid, and use it to present conditions for a matroid with a large projective geometry minor to be representable over a finite field. In particular, we show that a 3-connected, representable matroid with a sufficiently large projective geometry over a finite field GF(q) as a minor is either representable over GF(q) or has a U_{2,q^2+1}-minor. A second result of Seymour is that any vertically 4-connected matroid with a modular M(K_4)-restriction is graphic. Geelen, Gerards, and Whittle partially generalized this from M(K_4) to larger frame matroids, showing that any vertically 5-connected, representable matroid with a rank-4 Dowling geometry as a modular restriction is a frame matroid. As with projective geometries, we prove a version of this result for matroids with large Dowling geometries as minors, providing conditions which imply that they are frame matroids.
32

On Excluded Minors for Even Cut Matroids

Pivotto, Irene January 2006 (has links)
In this thesis we will present two main theorems that can be used to study minor minimal non even cut matroids. Given any signed graph we can associate an even cut matroid. However, given an even cut matroid, there are in general, several signed graphs which represent that matroid. This is in contrast to, for instance graphic (or cographic) matroids, where all graphs corresponding to a particular graphic matroid are essentially equivalent. To tackle the multiple non equivalent representations of even cut matroids we use the concept of Stabilizer first introduced by Wittle. Namely, we show the following: given a "substantial" signed graph, which represents a matroid N that is a minor of a matroid M, then if the signed graph extends to a signed graph which represents M then it does so uniquely. Thus the representations of the small matroid determine the representations of the larger matroid containing it. This allows us to consider each representation of an even cut matroid essentially independently. Consider a small even cut matroid N that is a minor of a matroid M that is not an even cut matroid. We would like to prove that there exists a matroid N' which contains N and is contained in M such that the size of N' is small and such that N' is not an even cut matroid (this would imply in particular that there are only finitely many minimally non even cut matroids containing N). Clearly, none of the representations of N extends to M. We will show that (under certain technical conditions) starting from a fixed representation of N, there exists a matroid N' which contains N and is contained in M such that the size of N' is small and such that the representation of N does not extend to N'.
33

Welch Bounds and Quantum State Tomography

Belovs, Aleksandrs January 2008 (has links)
In this thesis we investigate complete systems of MUBs and SIC-POVMs. These are highly symmetric sets of vectors in Hilbert space, interesting because of their applications in quantum tomography, quantum cryptography and other areas. It is known that these objects form complex projective 2-designs, that is, they satisfy Welch bounds for k = 2 with equality. Using this fact, we derive a necessary and sufficient condition for a set of vectors to be a complete system of MUBs or a SIC-POVM. This condition uses the orthonormality of a specific set of vectors. Then we define homogeneous systems, as a special case of systems of vectors for which the condition takes an especially elegant form. We show how known results and some new results naturally follow from this construction.
34

Classical Authenticated Key Exchange and Quantum Cryptography

Stebila, Douglas January 2009 (has links)
Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Yet security problems abound in electronic communication: spyware, phishing, denial of service, and side-channel attacks are still major concerns. The main goal in this thesis is to consider how cryptographic techniques can be extended to offer greater defence against these non-traditional security threats. In the first part of this thesis, we consider problems in classical cryptography. We introduce multi-factor password-authenticated key exchange which allows secure authentication and key agreement based on multiple short secrets, such as a long-term password and a one-time response; it can provide an enhanced level of assurance in higher security scenarios because a multi-factor protocol is designed to remain secure even if all but one of the factors has been compromised due to attacks such as phishing or spyware. Next, we consider the integration of denial of service countermeasures with key exchange protocols: by introducing a formal model for denial of service resilience that complements the extended Canetti-Krawczyk model for secure key agreement, we cover a wide range of existing denial of service attacks and prevent them by carefully using client puzzles. Additionally, we look at how side-channel attacks affect certain types of formulae used in elliptic curve cryptography, and demonstrate that information leaked during field operations such as addition, subtraction, and multiplication can be exploited by an attacker. In the second part of this thesis, we examine cryptography in the quantum setting. We argue that quantum key distribution will have an important role to play in future information security infrastructures and will operate best when integrated with the powerful public key infrastructures that are used today. Finally, we present a new look at quantum money and describe a quantum coin scheme where the coins are not easily counterfeited, are locally verifiable, and can be transferred to another party.
35

The Linkage Problem for Group-labelled Graphs

Huynh, Tony January 2009 (has links)
This thesis aims to extend some of the results of the Graph Minors Project of Robertson and Seymour to "group-labelled graphs". Let $\Gamma$ be a group. A $\Gamma$-labelled graph is an oriented graph with its edges labelled from $\Gamma$, and is thus a generalization of a signed graph. Our primary result is a generalization of the main result from Graph Minors XIII. For any finite abelian group $\Gamma$, and any fixed $\Gamma$-labelled graph $H$, we present a polynomial-time algorithm that determines if an input $\Gamma$-labelled graph $G$ has an $H$-minor. The correctness of our algorithm relies on much of the machinery developed throughout the graph minors papers. We therefore hope it can serve as a reasonable introduction to the subject. Remarkably, Robertson and Seymour also prove that for any sequence $G_1, G_2, \dots$ of graphs, there exist indices $i<j$ such that $G_i$ is isomorphic to a minor of $G_j$. Geelen, Gerards and Whittle recently announced a proof of the analogous result for $\Gamma$-labelled graphs, for $\Gamma$ finite abelian. Together with the main result of this thesis, this implies that membership in any minor closed class of $\Gamma$-labelled graphs can be decided in polynomial-time. This also has some implications for well-quasi-ordering certain classes of matroids, which we discuss.
36

Path Tableaux and the Combinatorics of the Immanant Function

Tessier, Rebecca January 2013 (has links)
Immanants are a generalization of the well-studied determinant and permanent. Although the combinatorial interpretations for the determinant and permanent have been studied in excess, there remain few combinatorial interpretations for the immanant. The main objective of this thesis is to consider the immanant, and its possible combinatorial interpretations, in terms of recursive structures on the character. This thesis presents a comprehensive view of previous interpretations of immanants. Furthermore, it discusses algebraic techniques that may be used to investigate further into the combinatorial aspects of the immanant. We consider the Temperley-Lieb algebra and the class of immanants over the elements of this algebra. Combinatorial tools including the Temperley-Lieb algebra and Kauffman diagrams will be used in a number of interpretations. In particular, we extend some results for the permanent and determinant based on the $R$-weighted planar network construction, where $R$ is a convenient ring, by Clearman, Shelton, and Skandera. This thesis also presents some cases in which this construction cannot be extended. Finally, we present some extensions to combinatorial interpretations on certain classes of tableaux, as well as certain classes of matrices.
37

On Excluded Minors for Even Cut Matroids

Pivotto, Irene January 2006 (has links)
In this thesis we will present two main theorems that can be used to study minor minimal non even cut matroids. Given any signed graph we can associate an even cut matroid. However, given an even cut matroid, there are in general, several signed graphs which represent that matroid. This is in contrast to, for instance graphic (or cographic) matroids, where all graphs corresponding to a particular graphic matroid are essentially equivalent. To tackle the multiple non equivalent representations of even cut matroids we use the concept of Stabilizer first introduced by Wittle. Namely, we show the following: given a "substantial" signed graph, which represents a matroid N that is a minor of a matroid M, then if the signed graph extends to a signed graph which represents M then it does so uniquely. Thus the representations of the small matroid determine the representations of the larger matroid containing it. This allows us to consider each representation of an even cut matroid essentially independently. Consider a small even cut matroid N that is a minor of a matroid M that is not an even cut matroid. We would like to prove that there exists a matroid N' which contains N and is contained in M such that the size of N' is small and such that N' is not an even cut matroid (this would imply in particular that there are only finitely many minimally non even cut matroids containing N). Clearly, none of the representations of N extends to M. We will show that (under certain technical conditions) starting from a fixed representation of N, there exists a matroid N' which contains N and is contained in M such that the size of N' is small and such that the representation of N does not extend to N'.
38

Welch Bounds and Quantum State Tomography

Belovs, Aleksandrs January 2008 (has links)
In this thesis we investigate complete systems of MUBs and SIC-POVMs. These are highly symmetric sets of vectors in Hilbert space, interesting because of their applications in quantum tomography, quantum cryptography and other areas. It is known that these objects form complex projective 2-designs, that is, they satisfy Welch bounds for k = 2 with equality. Using this fact, we derive a necessary and sufficient condition for a set of vectors to be a complete system of MUBs or a SIC-POVM. This condition uses the orthonormality of a specific set of vectors. Then we define homogeneous systems, as a special case of systems of vectors for which the condition takes an especially elegant form. We show how known results and some new results naturally follow from this construction.
39

Classical Authenticated Key Exchange and Quantum Cryptography

Stebila, Douglas January 2009 (has links)
Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Yet security problems abound in electronic communication: spyware, phishing, denial of service, and side-channel attacks are still major concerns. The main goal in this thesis is to consider how cryptographic techniques can be extended to offer greater defence against these non-traditional security threats. In the first part of this thesis, we consider problems in classical cryptography. We introduce multi-factor password-authenticated key exchange which allows secure authentication and key agreement based on multiple short secrets, such as a long-term password and a one-time response; it can provide an enhanced level of assurance in higher security scenarios because a multi-factor protocol is designed to remain secure even if all but one of the factors has been compromised due to attacks such as phishing or spyware. Next, we consider the integration of denial of service countermeasures with key exchange protocols: by introducing a formal model for denial of service resilience that complements the extended Canetti-Krawczyk model for secure key agreement, we cover a wide range of existing denial of service attacks and prevent them by carefully using client puzzles. Additionally, we look at how side-channel attacks affect certain types of formulae used in elliptic curve cryptography, and demonstrate that information leaked during field operations such as addition, subtraction, and multiplication can be exploited by an attacker. In the second part of this thesis, we examine cryptography in the quantum setting. We argue that quantum key distribution will have an important role to play in future information security infrastructures and will operate best when integrated with the powerful public key infrastructures that are used today. Finally, we present a new look at quantum money and describe a quantum coin scheme where the coins are not easily counterfeited, are locally verifiable, and can be transferred to another party.
40

The Linkage Problem for Group-labelled Graphs

Huynh, Tony January 2009 (has links)
This thesis aims to extend some of the results of the Graph Minors Project of Robertson and Seymour to "group-labelled graphs". Let $\Gamma$ be a group. A $\Gamma$-labelled graph is an oriented graph with its edges labelled from $\Gamma$, and is thus a generalization of a signed graph. Our primary result is a generalization of the main result from Graph Minors XIII. For any finite abelian group $\Gamma$, and any fixed $\Gamma$-labelled graph $H$, we present a polynomial-time algorithm that determines if an input $\Gamma$-labelled graph $G$ has an $H$-minor. The correctness of our algorithm relies on much of the machinery developed throughout the graph minors papers. We therefore hope it can serve as a reasonable introduction to the subject. Remarkably, Robertson and Seymour also prove that for any sequence $G_1, G_2, \dots$ of graphs, there exist indices $i<j$ such that $G_i$ is isomorphic to a minor of $G_j$. Geelen, Gerards and Whittle recently announced a proof of the analogous result for $\Gamma$-labelled graphs, for $\Gamma$ finite abelian. Together with the main result of this thesis, this implies that membership in any minor closed class of $\Gamma$-labelled graphs can be decided in polynomial-time. This also has some implications for well-quasi-ordering certain classes of matroids, which we discuss.

Page generated in 0.1724 seconds