• Keine Ergebnisse gefunden

Martin Finn-Sell

N/A
N/A
Protected

Academic year: 2022

Aktie "Martin Finn-Sell"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Topics in Algebra: Cryptography - Blatt 8

11.30-12:15, Seminarraum 9, Oskar-Morgenstern-Platz 1, 2.Stock

http://www.mat.univie.ac.at/~gagt/crypto2018

Goulnara Arzhantseva

goulnara.arzhantseva@univie.ac.at

Martin Finn-Sell

martin.finn-sell@univie.ac.at

1 Test questions from the lecture to refresh:

Question 1. Is the Hamming distance indeed a distance?

Question 2. Given a linear codeC, is its generating matrix uniquely defined?

Question 3. Is the complete graphK3,3a bipartite expander?

Question 4. LetY be a non-bipartite expander with expansion parameterλ. What is the ex- pansion parameter of the bipartite expanderXconstructed fromY (constructed in the lecture notes )? What about the diameter and the girth ofX(supposing we know the diameter and the girth ofY)?

2 Exercises

Question 5. LetXbe a finited-regular graph with girthg≥3. Prove that

|X|≥d(d−1)b(g−3)/2c.

Question 6. Let{Xi}be ad-regular expander family. Show thatd > 2.

Question 7. What’s the difference between the interior and exterior boundaries of a subset of vertices? Can we measure one in terms of the other?

Question 8. Let X be a finite graph of cardinality n, and let A be the matrix with entries axy =number of edges betweenx, y∈V(X).

i) Show thatAkhas entries that count the number of walks of lengthkinX.

1

(2)

ii) Let D be the diagonal matrix with entries Dxx = deg(x) for each x ∈ V(X) and let

∆=D−A. Show thatXis connected if and only if the multiplicity of the eigenvalue0is 1. Can you generalise this to the situation whereXhaskconnected components?

The goal of question8is to show how graphs and their properties can be encoded in lin- ear algebra. The matrixAis called theadjacency matrix,Dthedegree matrix and∆thegraph laplacian. The operator∆encodes what happens to neighbours - if we feed into this the charac- teristic functions of subsets of vertices with size less than|V(X)/2|, we can connect this matrix to the boundary of a set defined in the class. In this way, we can link geometric expansion to the spectrum of eigenvalues of∆. We’ll talk more about this in the class.

2

Referenzen

ÄHNLICHE DOKUMENTE

What is the length (=number of intermediate hash values) of a verification path in the Merkle tree having n transations? What is it for a k-ary tree with n leaves?. Question 18. Why

Representation Theory of Groups - Blatt 6. 11:30-12:15, Seminarraum 9, Oskar-Morgenstern-Platz

This exists, and has the property that it is left invariant and unique up to a scalar function (we will not prove existence or uniqueness, but you can use them).

It is known that weak containment of the trivial representation in π is related to the spectrum of π(µ). We will consider an example that shows negative behaviour in

Show that every module over kG is projective if and only if char(k) does not divide the order of the group

Zeige mit Hilfe der Sylow-Sätze, dass eine Gruppe der Ordnung 40 nicht einfach sein kann.. Sei G eine Gruppe der

Sei eine endliche Gruppe G mit einer Wirkung auf einer

[r]