  | 
            
            
               
                  | 
                 
                  Undergraduate Network Meeting
                   
                    March 5, 2011 
                      University of Toronto 
                      Koffler House Building KP 108 (map 
                      to site) 
                    
                    Organizers: Sergio Da Silva, Richard Cerezo 
                      (Toronto) 
                      For questions email Richard 
                      Cerezo 
                      Faculty Advisors: Matthias Neufang, James Colliander  
                       
                      The Fields Undergraduate Network (FUN) includes 
                      a series of mathematical talks aimed at undergraduates, 
                      and organized into a network involving the local universities. 
                      We will be stating with trial run of four events for next 
                      year with faculty members as consultants. 
                       
                   
                 | 
               
             
              
            The Fields Undergraduate 
            Network (FUN) organizes monthly meetings to explore different areas 
            of mathematical research. The theme, as well as the host university 
            will vary from month to month. All interested undergraduates are welcome 
            to attend. We especially encourage participation by members of student 
            math societies. 
             Schedule: 
              10:00am - Networking 
              10:30am - Interview of Hugh Williams 
              11:00am - What keeps our secrets safe? 
              12:00pm - Lunch 
              1:30pm - Role of L-functions in number theory 
              2:30pm - Panel Discussion 
              3:00pm - Ergodic approaches to number theory 
            Hosting Student Group: 
              Math Union at University of Toronto 
              Interviewer and Discussion Moderator: Richard Cerezo, Co-President 
              of Math Union and Co-Founder of FUN 
            Talks: 
              What keeps our secrets safe? 
              Hugh Williams, The Cryptologic Institute and University of Calgary 
               
             
              Control over who knows what about us, for what purposes, and 
                to whom it is disclosed, is of profound concern to anyone making 
                use of electronic communication devices. In the e-world, personal 
                information is in a very real sense the person. Thus, it is essential 
                that we have confidence in the capacity of the information collector 
                to secure our personal information. This can only be achieved 
                through the very technology that threatens our privacy. One important 
                ingredient in these privacy-enhancing technologies is cryptography. 
               
              Briefly put, cryptography is the study and development of techniques 
                for rendering information unintelligible to all but intended recipients 
                of that information. If a sender and receiver of a message wish 
                to communicate over an insecure channel (mobile phone, internet) 
                and want to ensure that no other unauthorized party can read their 
                transmission, they will make use of a particular cryptosystem. 
                A conventional cryptosystem can be thought of as a large collection 
                of transformations (ciphers), any one of which will render the 
                original message (plaintext) to unintelligible ciphertext, but 
                in order for the receiver to read the message, he must know which 
                particular transformation was used by the sender. The information 
                that identifies the transformation used by the sender is called 
                the key. It is important to point out that if an eavesdropper 
                acquires some message and its encrypted equivalent, he should 
                not be able to extract the key from this information. Nor should 
                the system be vulnerable to an adaptive attack; such attacks make 
                use of information previously acquired to obtain new information 
                from the sender and so on until the system is broken. This is 
                what makes cryptography fascinating. How can we protect our communications 
                against these kinds of attacks? Remember also that a good cryptosystem 
                must resist an attack even from the inventor of the system. 
              In this talk, which is intended for a non-specialist audience, 
                I will describe from a historical perspective several features 
                of modern encryption techniques.  
             
             
              Role of L-functions in number theory 
              Henry Kim, University of Toronto 
             
              L-functions are very special type of meromorphic functions of 
                one complex variable. On the surface it is not clear why the L-functions 
                play decisive roles. L-functions are associated to arithmetic-geometric 
                objects such as Galois groups, elliptic curves, and also modular 
                forms. Riemann zeta function is used in the study of the distribution 
                of prime numbers. It gives rise to Riemann hypothesis. L-functions 
                attached to elliptic curves give rise to Birch-Swinnerton-Dyer 
                conjecture. Those are two of the seven millennium prize problems 
                by Clay Mathematics Institute. I will try to survey very briefly 
                these and other roles L-functions play. 
             
            Ergodic approaches to number theory 
              Leo Goldmakher, University of Toronto 
             
              Ergodic theory is concerned with the long term statistical behaviour 
                of a dynamical system. Although the theory was originally motivated 
                by questions in statistical mechanics, in recent years it has 
                found spectacular applications to combinatorics, harmonic analysis, 
                number theory, and representation theory. In this talk I will 
                discuss some of the interactions between ergodic theory and number 
                theory, focusing on the pioneering work of Furstenberg on Szemeredi's 
                theorem. 
                
             
            List of Confirmed Participants as of March 
              1, 2011:
            
               
                | Full Name | 
                University Name | 
               
               
                | Carmichael, Keegan | 
                University of Western Ontario | 
               
               
                | Cerezo, Richard | 
                University of Toronto | 
               
               
                | Chung, Ha Yoon | 
                University of Toronto | 
               
               
                | da Silva, Sergio | 
                University of Toronto | 
               
               
                | Dias, Manisha | 
                University of Waterloo | 
               
               
                | Heidari Zadi, Amir Hossein | 
                University of Toronto | 
               
               
                | Hill, David | 
                University of Toronto | 
               
               
                | Hu, Samson | 
                University of Waterloo | 
               
               
                | Isufllari, Henrieta | 
                University of Toronto | 
               
               
                | Kang, Dongwoo | 
                University of Toronto | 
               
               
                | Kinross, Alison | 
                McMaster University | 
               
               
                | Lee, Seung-Jae | 
                University of Toronto | 
               
               
                | Milcak, Juraj | 
                University of Toronto | 
               
               
                | Moon, SeokHwan | 
                University of Toronto | 
               
               
                | Pashley, Bryanne | 
                University of Waterloo | 
               
               
                | Pistone, Jamie | 
                University of Toronto | 
               
               
                | Shoukat, Affan | 
                York University | 
               
               
                | Vlasova, Jelena | 
                University of Toronto at Mississauga | 
               
               
                | Yee, Yohan | 
                McMaster University | 
               
               
                | Zaidi, Ali-Kazim | 
                University of Toronto | 
               
             
            
             
              
             
              
 | 
  |