# Alumni Dissertations and Theses

#### Filter Dissertations and Theses By:

### Length spectrum metric and modified length spectrum metric on Teichmüller spaces

Author:Francisco Jimenez LopezYear of Dissertation:2013Program:MathematicsAdvisor:Jun HuAbstract:The length spectrum function defines a metric on the reduced Teichmüller space of a Riemann surface which is topologically equivalent, but not metrically equivalent to the Teichmüller metric if the Riemann surface is of finite topological type. As the first part of this work, in the reduced Teichmüller space of a Riemann surface of finite topological type, we find two points moving towards the boundary of the space along two continuous curves, such that the Teichmüller distance between them approaches infinity while their length spectrum distance approaches zero. Unfortunately, the length spectrum function does not define a metric on the (unreduced) Teichmüller space of a Riemann surface with boundary. In the second part of this work, we introduce a modified length spectrum function that does define a metric on this space. We show that if two points are close with respect to the Teichmüller metric, then they are also close in the modified length spectrum metric. We also show that the converse is not true. Finally, we prove that the (unreduced) Teichmüller space of a Riemann surface of finite topological type with non-empty boundary is not complete under the modified length spectrum metric.

### On the rank of 2-primary part of Selmer group of certain elliptic curves

Author:KWANG HYUN KIMYear of Dissertation:2012Program:MathematicsAdvisor:Victor KolyvaginAbstract:Kolyvagin proved very remarkable results on Mordell-Weil groups and Shafarevich-Tate groups of certain elliptic curves when a given Heegner point P

_{K}has infinite order in his series of papers. He also extended his result to odd prime l-primary part of Selmer group of higher rank with the assumption of existence of non-trivial Kolyvagin system. In this thesis, we will follow his Euler system method and verify that his method also works to prove the result on the rank of 2-primary part of Selmer group of higher rank with Strong non-zero conjecture.### The Admissible Dual of SL(2) of the Dyadic Numbers

Author:Terence Kivran-SwaineYear of Dissertation:2011Program:MathematicsAdvisor:Carlos MorenoAbstract:The admissible dual of SL

_{2}(Q _{2}) is constructed uniformly, based on a method adapted from the the theory of cuspidal types of GL_{2}(F).### On critical poins for Gaussian vectors with infinitely divisible squares

Author:Hana KoganYear of Dissertation:2009Program:MathematicsAdvisor:Michael MarcusAbstract:This paper is concerned with necessary conditions for infinite divisibility of the Gaussian squares with non-zero means. A Gaussian vector G with zero mean is said to have a critical point α, such that 0≤α≤∞ if the square of (G+α) is infinitely divisible for all |β| ≤ α and is not infinitely divisible for all |β|≥ α. We derive upper bound for the critical point of a Gaussian n-dimentional vector via the asymptotic analysis of its Laplace Transform.

### Non-commutative cryptography: Diffie-Hellman and CCA secure cryptosystems using matrices over group rings and digital signatures

Author:Charalambos KoupparisYear of Dissertation:2012Program:MathematicsAdvisor:Delaram KahrobaeiAbstract:As computing speed has been following Moore's law without any inclination of tapering out, the need for ever more secure cryptographic protocols is becoming more and more relevant. During the past one and a half decades the field of non-commutative (or on-abelian) group based cryptography has seen a surge in interest. Through this work we will present the classical Diffie-Hellman public key exchange protocol (DH PKE) and discuss two important notions related to it, the Computational Diffie-Hellman assumption and the Decision Diffie-Hellman assumption. We then proceed to look at a new platform group based on matrices over group srings and present work done by myself in collaboration with Delaram Kahrobaei and Vladimir Shpilrain. We discuss the viability of the new platform group and point out its benefits. Additionally, I in collaboration with Delaram Kahrobaei and Vladimir Shpilrain propose to use the new platform group in the Cramer-Shoup cryptosystem. We demonstrate how one can implement the system using our platform and prove that the system is still CCA-2 secure. Finally, we discuss the notion of classical digital signatures following the work of Goldwasser and Bellare and Schnorr. We then discuss some non-commutative digital signatures including those proposed by Ko, Choi, Cho and Lee, Wang and Hu Anjaneyulu, Reddy and Reddy and Chaum and van Antwerpen. We conclude by presenting work done my myself in conjunction with Delaram Kahrobaei which discusses a new non-commutative digital signature. We propose using groups for which the Conjugacy Search Problem is hard, or any group which is secure against length based attacks, such as polycyclic groups, as the platform for this signature.

### Smooth Convergence Away From Singular Sets and Intrinsic Flat Continuity of Ricci Flow

Author:Sajjad LakzianYear of Dissertation:2013Program:MathematicsAdvisor:Chrisitina SormaniAbstract:In this thesis we provide a framework for studying the smooth limits of Riemannian metrics away from singular sets. We also provide applications to the non-degenrate neckpinch singularities in Ricci flow. We prove that if a family of metrics, $g_i$, on a compact Riemannian manifold, $M^n$, have a uniform lower Ricci curvature bound and converge to $g_\infty$ smoothly away from a singular set, $S$, with Hausdorff measure, $H^{n-1}(S) = 0$, and if there exists connected precompact exhaustion, $W_j$, of $M^n \setminus S$ satisfying $\diam_{g_i}(M^n) \le D_0 $, $\vol_{g_i}(\partial W_j) \le A_0 $ and $\vol_{g_i}(M^n \setminus W_j) \le V_j where \lim_{j\to\infty}V_j=0 $ then the Gromov-Hausdorff limit exists and agrees with the metric completion of $(M^n \setminus S, g_\infty)$. This is a strong improvement over prior work of the author with Sormani that had the additional assumption that the singular set had to be a smooth submanifold of codimension two. We have a second main theorem in which the Hausdorff measure condition on $S$ is replaced by diameter estimates on the connected components of the boundary of the exhaustion, $\partial W_j$. This second theorem allows for singular sets which are open subregions of the manifold. In addition, we show that the uniform lower Ricci curvature bounds in these theorems can be replaced by the existence of a uniform linear contractibility function. If this condition is removed altogether, then we prove that $\lim_{j\to \infty} d_{\mathcal{F}}(M_j', N')=0$, in which $M_j'$ and $N'$ are the settled completions of $(M, g_j)$ and $(M_\infty\setminus S, g_\infty)$ respectively and $d_{\mathcal{F}}$ is the Sormani-Wenger Intrinsic Flat distance. We present examples demonstrating the necessity of many of the hypotheses in our theorems. In the second part of this thesis, we study the Angenent-Caputo-Knopf's Ricci Flow through neckpinch singularities. We will explain how one can see the A-C-K's Ricci flow through a neckpinch singularity as a flow of integral current spaces. We then prove the continuity of this weak flow with respect to the Sormani-Wenger Intrinsic Flat (SWIF) distance.

### Exploring platform (semi)groups for non-commutative key-exchange protocols

Author:Ha LamYear of Dissertation:2014Program:MathematicsAdvisor:Delaram KahrobaeiAbstract:In this work, my advisor Delaram Kahrobaei, our collaborator David Garber, and I explore polycyclic groups generated from number fields as platform for the AAG key-exchange protocol. This is done by implementing four different variations of the length-based attack, one of the major attacks for AAG, and submitting polycyclic groups to all four variations with a variety of tests. We note that this is the first time all four variations of the length-based attack are compared side by side. We conclude that high Hirsch length polycyclic groups generated from number fields are suitable for the AAG key-exchange protocol. Delaram Kahrobaei and I also carry out a similar strategy with the Heisenberg groups, testing them as platform for AAG with the length-based attack. We conclude that the Heisenberg groups, with the right parameters are resistant against the length-based attack. Another work in collaboration with Delaram Kahrobaei and Vladimir Shpilrain is to propose a new platform semigroup for the HKKS key-exchange protocol, that of matrices over a Galois field. We discuss the security of HKKS under this platform and advantages in computation cost. Our implementation of the HKKS key-exchange protocol with matrices over a Galois field yields fast run time.

### Combinatorial Properties of Polyiamonds

Author:Christopher LarsonYear of Dissertation:2014Program:MathematicsAdvisor:Joseph MalkevitchAbstract:Polyiamonds are plane geometric figures constructed by pasting together equilateral triangles edge-to-edge. It is shown that a diophantine equation involving vertices of degrees 2, 3, 5 and 6 holds for all polyiamonds; then an Eberhard-type theorem is proved, showing that any four-tuple of non-negative integers that satisfies the diophantine equation can be realized geometrically by a polyiamond. Further combinatorial and graph-theoretic aspects of polyiamonds are discussed, including a characterization of those polyiamonds that are three-connected and so three-polytopal, a result on Hamiltonicity, and constructions that use minimal numbers of triangles in realizing four-vectors.

### The Geometry of Lattice-Gauge-Orbit Space

Author:Michael LauferYear of Dissertation:2011Program:MathematicsAdvisor:Peter OrlandAbstract:In this paper, the Riemannian geometry of gauge-orbit space on the lattice with open boundary conditions is explored. It is shown how the metric and inverse metric tensors can be calculated, and further how the Ricci curvature might be calculated. The metric tensor and the inverse metric tensor are calculated for special cases, and some conjectures about the curvature of the space are made, which, if true, would move towards implying a mass gap in the theory.

### Resplendent models generated by indiscernibles

Author:Whanki LeeYear of Dissertation:2013Program:MathematicsAdvisor:Roman KossakAbstract:In this thesis I study the question: Which first-order structures are generated by indiscernibles? J. Schmerl showed that if

L<\italic> is a finite language, every countable recursively saturated L<\italic>-structure in which a form of coding of finite functions is available is generated by indiscernibles. Further, he showed that such a structure has arbitrarily large extensions which are generated by a set of indiscernibles, resplendent, and L<\italic>_{&infin,&omega}-equivalent to the original structure. Proofs of these theorems are complex and use a combinatorial lemma whose proof in Schmerl's paper has an acknowledged gap. I offer a complete proof of a more direct combinatorial lemma from which Schmerl's theorems follow. The other subject of this thesis is cofinal extensions of linearly ordered structures. It is related to the work of R. Kaye who used a weak notion of saturation to give a sufficient condition under which a countable model of PA -<\super> has a proper elementary cofinal extension. I give two different proofs of the fact that every countable recursively saturated linearly ordered structure with no last element has a proper cofinal elementary extension.