GENERALIZED ARYABHATA REMAINDER THEOREM
|
|
- April Hancock
- 5 years ago
- Views:
Transcription
1 International Journal of Innovative Computing, Information and Control ICIC International c 2010 ISSN Volume 6, Number 4, April 2010 pp GENERALIZED ARYABHATA REMAINDER THEOREM Chin-Chen Chang 1, Jieh-Shan Yeh 2 and Jen-Ho Yang 3 1 Department of Information Engineering and Computer Science Feng Chia University Taichung 40724, Taiwan ccc@cs.ccu.edu.tw 2 Department of Computer Science and Information Management Providence University 200 ChungChi Rd., Taichung 43301, Taiwan jsyeh@pu.edu.tw 3 Department of Computer Science and Information Engineering National Chung Cheng University Chiayi 621, Taiwan jenho@cs.ccu.edu.tw Received October 2008; revised March 2009 Abstract. The Chinese Remainder Theorem (CRT) and the Generalized Chinese Remainder Theorem (GCRT) are widely employed in signal processing, information coding, and cryptography. However, CRT and GCRT must compute the modular operation with a large number in the final step, which is a time-consuming operation. Instead, the Aryabhata Remainder Theorem (ART) reduces the computation time without computing such large modular operation. However, to the best of our knowledge, no previously published works discuss any variation of ART. Therefore, this study proposes the Generalized Aryabhata Remainder Theorem (GART) which is the first work that discusses the generalized version of ART. Unlike the time complexities of the GCRT, which is O(n 2 t 2 ), GART is just O(n t 2 ), where n is the number of moduli and t is the number of bits in each modulus. Therefore, the proposed GART is more efficient than GCRT. Keywords: Aryabhata remainder theorem, Chinese remainder theorem, Residue number system 1. Introduction. In recent years, Residue Number System (RNS) is a popular research in computing large number arithmetic because of its properties of parallel, carry-free and high-speed arithmetic [9]. In RNS, a number is moduloed by the selected moduli, and the number is represented by a vector of several residues. Therefore, the computations in RNS are performed on each residue independently. That is, a large number is separated into several small residues for parallel computing on a multi-processor computer. To apply RNS for large number arithmetic, the conversion between RNS and the binary number system is an important issue. Thus, the literature discloses many conversion algorithms with specific moduli in RNS [1,4,5,7,12]. The common method for the conversion with general moduli in RNS uses the Chinese Remainder Theorem (CRT). An integer is easily reconstructed from its residues which are moduloed by the moduli in RNS. Moreover, CRT can be applied to many applications, such as signal processing, information coding, cryptography, etc. Besides, many generalized version of CRT also have been proposed [2,3,6,11]. The Generalized CRT (GCRT) [1] is a variation of the conventional CRT. In some applications, such as image coding [10,13], GCRT is more practical and flexible than CRT because GCRT additionally provides an 1865
2 1866 C.-C. CHANG, J.-S. YEH AND J.-H. YANG extra modulus. However, both CRT and GCRT need to compute the modular arithmetic with a large number, which is the product of all moduli. This disadvantage increases their computation time. On the other hand, Rao and Yang proposed the Aryabhata Remainder Theorem (ART) [8], which solves the conversion problem with two moduli in RNS. They also introduced an extension of ART to any number of moduli, which solves the conversion problem with n congruencies in RNS. Comparing with CRT and GCRT, ART does not compute the large modular arithmetic. Consequently, ART greatly reduces the conversion time. However, to the best of our knowledge, no previously published works discuss any variation of ART. Therefore, this study proposes the Generalized Aryabhata Remainder Theorem (GART). Research s Contributions. The main contributions of the proposed GART are as follows: 1. Practicality: Like GCRT [2], the proposed GART possesses an additional modulus so that it can be applied to many applications, such as access control, database, and cryptosystems. 2. Efficiency: With n moduli, the time complexity of the GCRT is O(n 2 t 2 ), where t is the number of bits in each modulus. The proposed GART only requires O(n t 2 ). Thus, the proposed GART has less computation time and is more efficient than the GCRT. The above description explains that the proposed GART is more practical and efficient than the previous works. The rest of this paper is organized as follows. First, Section 2 reviews the related works. Then, Section 3 offers the proposed generalized Aryabhata Remainder Theorem. Section 4 provides the performance analysis. Finally, Section 5 presents the study s conclusions. 2. Related Works. This section reviews the Chinese Remainder Theorem (CRT), the Generalized Chinese Remainder Theorem (GCRT), and the Aryabhata Remainder Theorem (ART) Chinese remainder theorem (CRT). In RNS, a number is represented by the residues using a set of relatively prime moduli {m 1, m 2,, m n } satisfying GCD(m i, m j ) = 1 for i j, where GCD(m i, m j ) denotes the greatest common divisor of m i and m j. For an integer X, its RNS-representation is denoted as (r 1, r 2,, r n ), where r i = X mi = X mod m i for i = 1, 2,, n. According to CRT [9], the RNS-representation number r i = X mi = X mod m i is converted into its decimal representation X by the equation: X M = n i=1 m i r i m 1 i mi M, (1) where M = n i=1 m i, m i = M/m i, and m 1 i mi is the multiplicative inverse of m i modulo m i. Example 2.1 illustrates CRT as follows. Example 2.1. Convert the RNS-representation number (2, 4, 1) with the moduli set {3, 5, 7} into its decimal representation X. According to CRT, M = = 105, m 1 = 5 7 = 35, m 2 = 3 7 = 21, m 2 = 3 5 = 15, m 1 1 m1 = 2, m 2 1 m2 = 1, and m 3 1 m3 = 1. Then, the decimal representation of the RNS-representation number (2, 4, 1) is X 30 = = = 29.
3 GENERALIZED ARYABHATA REMAINDER THEOREM Generalized Chinese remainder theorem (GCRT). GCRT is a variation of CRT. Compared with CRT, an additional modulus k is provided during the computations in GCRT. GCRT is introduced as follows. Given a set of relatively prime moduli {m 1, m 2,, m n } and an additional modulus k, where k < Min{m i } for i = 1, 2,, n. In GCRT, an integer X can be represented as (x 1, x 2,, x n ) satisfying Max{x i } < k < Min{m i }, where x i = X/m i mod k for i = 1, 2,, n. According to GCRT [6], the number X can be computed from n-tuple (x 1, x 2,, x n ) by the equation X km = n i=1 m i a i b i km, where M = n i=1 m i, m i = k n j=1,j i m j, m i a i = k mod (k m i ), and b i = x i m i /k. Example 2.2 illustrates GCRT. Example 2.2. Given a set of moduli {11, 13, 17} and a general modulus k = 8 find the number X = (x 1, x 2, x 3 ) = (6, 2, 6) using GCRT. According to GCRT, M = = 2431, m 1 = = 1768, M 2 = = 1768, m 3 = = 1144, a 1 = 1, a 2 = 8, a 3 = 5, b 1 = 6 11/8 = 9, b 2 = 2 13/8 = 4, and b 3 = 6 17/8 = 13. Then, X = = = The solution is verified as follows: x 1 = 2008/11 mod 8 = 182 mod 8 = 6, x 2 = 2008/13 mod 8 = 154 mod 8 = 2, x 3 = 2008/17 mod 8 = 118 mod 8 = Aryabhata remainder theorem (ART). Assume that there are two relatively prime moduli m 1 and m 2. Let r 1 = X mod m 1, r 2 = X mod m 2, and M = m 1 m 2. According to ART [7], X has a unique solution in Z M, and the solution is computed by the equation X = m 1 (r 2 r 1 ) m 1 1 m2 + r 1. The proof of ART is shown in [8]. Example 2.3 demonstrates an example of ART. Example 2.3. Given two relatively prime moduli m 1 = 13 and m 2 = 17. Let r 1 = X mod 13 = 11 and r 2 = X mod 17 = 8, find X using ART. According to ART, X can be computed by the equation X = m 1 (r 2 r 1 ) m 1 1 m2 + r 1 = 13 (8 11) = 76. The solution is verified as follows: 76 mod 13 = 11 = r 1 and 76 mod 17 = 8 = r 2. Both above-mentioned CRT and GCRT have to compute modular operations with a large number, which is the product of all moduli. This time-consuming operation greatly increases the computation time. However, ART does not have to compute such time-consuming operation. Thus, this research investigates the Generalized Aryabhata Remainder Theorem (GCRT) to avoid large modular arithmetic in GCRT. 3. Generalized Aryabhata Remainder Theorem (GART). This section first presents the proposed GART with two moduli and further extends the proposed GART to n moduli for the general case GART with two moduli. The following Lemma 3.1 and Theorem 3.1 are necessary for establishing the proposed GART. Lemma 3.1. Let m 1 and m 2 be two relatively prime moduli, and k be a positive integer. Given q 1 = X mod (k m 1 ) and q 2 = X mod (k m 2 ) satisfying q 2 q 1 = 0 mod k, then X has a unique solution in Z km1 m 2 computed by X = k m 1 (q 2 q 1 )/k m 1 1 m2 + q 1. Theorem 3.1. Let m 1 and m 2 be two relatively prime moduli, and k be a positive integer. Given two equations x/m 1 = x 1 mod k and x/m 2 = x 2 mod k, where Max{x 1, x 2 } < k < Min{m 1, m 2 }. For any pair (r 1, r 2 ) satisfying 0 r 1 < m 1, 0 r 2 < m 2, and x 2 m 2 x 1 m 1 + r 2 r 1 = 0 mod k, X has a solution in Z km1 m 2 given by X = k m 1 (x 2 m 2 x 1 m 1 + r 2 r 1 )/k m 1 1 m2 + x 1 m 1 + r 1.
4 1868 C.-C. CHANG, J.-S. YEH AND J.-H. YANG To increase the readablility of the section, the detailed proofs of Lemma 3.1 and Theorem 3.1 are offered in Appendixes. Corollary 3.1 states the proposed GART as follows. Corollary 3.1. Generalized Aryabhata Remainder Theorem (GART): Let m 1 and m 2 be two relatively prime moduli, and k be a positive integer. Given two equations x/m 1 = x 1 mod k and x/m 2 = x 2 mod k, where Max{x 1, x 2 } < k < Min{m 1, m 2 }, X = k m 1 ( x 2 m 2 x 1 m 1 )/k m 1 1 m2 + x 1 m 1 is one solution in Z km1 m 2. Proof: By Theorem 3.1, one solution is obtained from the equation X = k m 1 (x 2 m 2 x 1 m 1 + r 2 r 1 )/k m 1 1 m2 + x 1 m 1 + r 1 if r 1 and r 2 are properly assigned. Thus, simply let r 1 = 0 and r 2 be the smallest integer such that the equation (x 2 m 2 x 1 m 1 +r 2 ) can be a multiple of k, the equation X = k m 1 ( x 2 m 2 x 1 m 1 )/k m 1 1 m2 + x 1 m 1 (2) derives one solution in Z km1 m 2. An example of the proposed GART is illustrated as follows. Example 3.1. Given a set of two relatively prime moduli {m 1, m 2 } = {11, 13} and a general modulus k = 8, find X satisfying X/11 = 0 mod 8 and X/13 = 7 mod 8 using the proposed GART. The proposed GART ensures the following equation. X = k m 1 ( x 2 m 2 x 1 m 1 )/k m 1 1 m2 + x 1 m 1 = 8 11 ( )/ = = 616. The solution is verified as 616/11 mod 8 = 0 and 616/13 mod 8 = GART with n moduli. To extend the 2-modulus GART introduced in Subsection 3.1, this subsection presents an iterative GART algorithm with n moduli in this Subsection. Given a set of relatively prime moduli {m 1, m 2,, m i } and an additional modulus k satisfying k < Min{m i } for i = 1, 2,, n. Assume that an integer X is represented by n-tuple {x 1, x 2,, x i } satisfying Max{x i } < k < Min{m i }, where x i = X/m i mod k for i = 1, 2,, n. Then, X is computed by the proposed iterative GART algorithm shown as follows. Input: ({x 1, x 2,, x i }, {m 1, m 2,, m i }, k) Output: X 1. M 1 m 1, X 1 = x 1 m for i = 2 to n do 3. M i M i 1 m i. 4. X i k M i 1 ( X i m i X i 1 )/k (M i 1 ) 1 mi + X i 1 5. end for. 6. Return X n. In this algorithm M i, k M i 1 and (M i 1 ) 1 mi are precomputed to reduce the processing time. The proposed algorithm is illustrated in Example 3.2 as follows. Example 3.2. Given a set of relatively prime moduli {m 1, m 2, m 3, m 4 } = {11, 13, 17, 19} and a general modulus k = 8, find X satisfying X/11 = 7 mod 8, X/13 = 6 mod 8, X/17 = 5 mod 8, and X/19 = 4 mod 8. According to the proposed algorithm, X is obtained by three rounds shown as follows. Round 1 (i = 2): 1. M 2 = M 1 m 2 = m 1 m 2 = 143, X 1 = x 1 m 1 = 7 11 = X 2 =k M 1 ( x 2 m 2 X 1 )/k (M 1 ) 1 m2 + X 1
5 GENERALIZED ARYABHATA REMAINDER THEOREM 1869 =8 11 ( )/8 (11) = =605. Round 2 (i = 3): 1. M 3 = M 2 m 3 = m 1 m 2 m 3 = X 3 =k M 2 ( x 3 m 3 X 2 )/k (M 2 ) 1 m3 + X 2 =8 143 ( )/8 (143) = = Round 3 (i = 4): 1. M 4 = M 3 m 4 = m 1 m 2 m 3 m 4 = X 4 =k M 3 ( x 4 m 4 X 3 )/k (M 3 ) 1 m4 + X 3 = ( )/8 (2431) = = /11 mod 8 = 7, /13 mod 8 = 6, /17 mod 8 = 5, and /19 mod 8 = 4 verify the correctness of the solution. 4. Performance Analysis. This section analyzes the time complexities of GCRT and GART. Suppose that the number of moduli is n. According to Subsection 2.2, GART computes the equation X km = n i=0 m i a i b i km, where M = n i=1 m i, m i = k n j=1,j i m j, m i a i = k kmi, and b i = x i m i /k. Here, k M and m i a i can be precomputed. Therefore, it requires 2n multiplications, n divisions, (n 1) additions, and one modular operation. To analyze the computation complexity, each modulus m i is assumed to be about t digits. For simplicity, k is also assigned to be t digits. Therefore, the addition and multiplication of two moduli need t and t 2 bit operations, respectively. Then, the computation cost of division is the same with that of multiplication. In addition, performing a modular operation with t-bit modulus costs t 2 bit operations. Thus, the total computation cost of GCRT is about 3n t 2 + (n 1) t + ((n + 1) t) 2 bit operations, where (n + 1) t is the number of digits in k M. Finally, the time complexity of CRT is O(n 2 t 2 ). According to the proposed GART with n moduli, X i = k M i 1 ( x i m i X i 1 /k ) M i 1 1 mi + X i 1 (3) is computed in each round, where M 1 = m 1, X 1 = x 1 m 1, i = 2, 3,, n, and M i = M i 1 m i. Thus, it requires two multiplications, one subtraction, one division, and one modular operation in each round. Here, k M i 1 (M i 1 ) 1 mi can be precomputed. Therefore, the total computation cost is (n 1) (2t 2 + t 2 + 2t), where (n 1) is the number of execution rounds. Finally, the time complexity of the proposed GART is O(n t 2 ). Compared with GCRT, the proposed GART greatly reduces the computation time. 5. Conclusions. This research proposes an efficient GART without large modular arithmetic and further extends the proposed GART to the n-modulus system. According to the performance analysis in Section 4, the proposed GART significantly reduces the computational complexity in O(n t 2 ). In the future, research needs to offer and investigate the parallel algorithm for the proposed GART on a multi-processor architecture to make the method more efficient in practice. REFERENCES [1] N. B. Chakraborti, J. S. Soundararajan and A. L. Reddy, An implementation of mixed-radix conversion for residue number applications, IEEE Transactions on Computers, vol.35, no.8, pp , 1986.
6 1870 C.-C. CHANG, J.-S. YEH AND J.-H. YANG [2] C. C. Chang and C. H. Lin, A reciprocal confluence tree unit and its applications, BIT, vol.30, no.1, pp.27-33, [3] R. Conway and J. Nelson, Fast converter for 3 moduli RNS using new property of CRT, IEEE Transactions on Computers, vol.48, no.8, pp , [4] A. A. Hiasat and H. S. Abdel-Aty-Zohdy, Residue-to-binary arithmetic converter for the moduli set (2 k, 2 k 1, 2 k 1 1), IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol.45, no.2, pp , [5] A. A. Hiasat, Efficient residue to binary converter, IEE Proc. on Computers and Digital Techniques, vol.150, no.1, pp.11-16, [6] Y. P. Lai and C. C. Chang, A parallel computational algorithms for generalized Chinese remainder theorem, Computers and Electrical Engineering, vol.29, no.8, pp , [7] A. Premkumar, An RNS to binary converter in 2n+1, 2n, 2n-1 moduli set, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol.39, no.7, pp , [8] T. R. N. Rao and C. H. Yang, Aryabhata remainder theorem: Relevance to public-key cryptoalgorithms, Circuits, Systems, and Signal Processing, vol.25, no.1, pp.1-15, [9] N. Szabo and R. Tanaka, Residue Arithmetic and Its Applications to Computer Technology, McGraw Hill, New York, [10] Q. She, H. Su, L. Dong and J. Chu, Support vector machine with adaptive parameters in image coding, International Journal of Innovative Computing, Information and Control, vol.4, no.2, pp , [11] Y. Wang, Residue-to-binary converters based on new Chinese remainder theorem, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol.47, no.3, pp , [12] W. Wang, M. N. S. Swamy, M. O. Ahmad and Y. Wang, A study of the residue-to-binary converters for the three-moduli sets, IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol.50, no.2, pp , [13] Z. Zhang and Y. Zhao, Multiple description image coding based on fractal, International Journal of Innovative Computing, Information and Control, vol.3, no.6(b), pp , Appendixes. Lemma 5.1. Let m 1 and m 2 be two relatively prime moduli, and k be a positive integer. Given q 1 = X mod (k m 1 ) and q 2 = X mod (k m 2 ) satisfying q 2 q 1 = 0 mod k, then X has a unique solution in Z km1 m 2 computed by X = k m 1 (q 2 q 1 )/k m 1 1 m2 + q 1. Proof: First we show that X Z km1 m 2. Since q 1 = X mod (k m 1 ), we have q 1 < k m 1. Thus, X = k m 1 (q 2 q 1 )/k m 1 1 m2 + q 1 < k m 1 ( (q 2 q 1 )/k m 1 1 m2 + 1). Besides, (q 2 q 1 )/k m 1 1 m2 Z m2, it implies 0 (q 2 q 1 )/k m 1 1 m2 m 2 1. Therefore, we have 0 X < k m 1 m 2, so that X Z km1 m 2. Second, we show that q i = X mod (k m i ) for i = 1 and 2. Clearly, q 1 = X mod (k m 1 ) holds because k m 1 (q 2 q 1 )/k m 1 1 m2 is a multiple of k m 1. On the other hand, since q 2 q 1 = 0 mod k, so (q 2 q 1 )/k is an integer. It is clear to have m 1 (q 2 q 1 )/k m 1 1 m2 = (q 2 q 1 )/k mod m 2. By multiplying k to the equation, we have k m 1 (q 2 q 1 )/k m 1 1 m2 = k (q 2 q 1 )/k = (q 2 q 1 ) mod (k m 2 ). Therefore, X = k m 1 (q 2 q 1 )/k m 1 1 m2 + q 1 = q 2 mod (k m 2 ). Third, we show that X has a unique solution in Z km1 m 2. If Y Z km1 m 2 is another solution, then X Y = 0 mod (k m 1 ) and X Y = 0 mod (k m 2 ). Because m 1 and m 2 are two relatively prime moduli, X Y = 0 mod (k m 1 m 2 ). Therefore, we have X = Y. Theorem 5.1. Let m 1 and m 2 be two relatively prime moduli, and k be a positive integer. Given two equations X/m 1 = x 1 mod k and X/m 2 = x 2 mod k, where Max{x 1, x 2 } < k < Min{m 1, m 2 }. For any pair (r 1, r 2 ) satisfying 0 r 1 < m 1, 0 r 2 < m 2, and x 2 m 2 x 1 m 1 + r 2 r 1 = 0 mod k, X has a solution in Z km1 m 2 given by X = k m 1 (x 2 m 2 x 1 m 1 + r 2 r 1 )/k m 1 1 m2 + x 1 m 1 + r 1.
7 GENERALIZED ARYABHATA REMAINDER THEOREM 1871 Proof: Since X/m 1 = x 1 mod k and X/m 2 = x 2 mod k, we assume X/m 1 = a 1 k + x 1 and X/m 2 = a 2 k + x 2, for some integers a 1 and a 2. Moreover, X = (a 1 k + x 1 ) m 1 + r 1 and X = (a 2 k + x 2 ) m 2 + r 2, where 0 r 1 < m 1 and 0 r 2 < m 2. That is, X = x i m i + r i mod (k m i ) for i = 1 and 2. By Lemma 5.1, X = k m 1 (x 2 m 2 x 1 m 1 + r 2 r 1 )/k m 1 1 m2 + x 1 m 1 + r 1 is a unique solution in Z km1 m 2 if x 2 m 2 x 1 m 1 + r 2 r 1 = 0 mod k. The theorem is asserted.
An Effective New CRT Based Reverse Converter for a Novel Moduli Set { 2 2n+1 1, 2 2n+1, 2 2n 1 }
An Effective New CRT Based Reverse Converter for a Novel Moduli Set +1 1, +1, 1 } Edem Kwedzo Bankas, Kazeem Alagbe Gbolagade Department of Computer Science, Faculty of Mathematical Sciences, University
More informationComputer Architecture 10. Residue Number Systems
Computer Architecture 10 Residue Number Systems Ma d e wi t h Op e n Of f i c e. o r g 1 A Puzzle What number has the reminders 2, 3 and 2 when divided by the numbers 7, 5 and 3? x mod 7 = 2 x mod 5 =
More informationA High-Speed Realization of Chinese Remainder Theorem
Proceedings of the 2007 WSEAS Int. Conference on Circuits, Systems, Signal and Telecommunications, Gold Coast, Australia, January 17-19, 2007 97 A High-Speed Realization of Chinese Remainder Theorem Shuangching
More informationA fast modular multiplication algorithm for calculating the product AB modulo N
Information Processing Letters 72 (1999) 77 81 A fast modular multiplication algorithm for calculating the product AB modulo N Chien-Yuan Chen a,, Chin-Chen Chang b,1 a Department of Information Engineering,
More informationOn Equivalences and Fair Comparisons Among Residue Number Systems with Special Moduli
On Equivalences and Fair Comparisons Among Residue Number Systems with Special Moduli Behrooz Parhami Department of Electrical and Computer Engineering University of California Santa Barbara, CA 93106-9560,
More informationVolume 3, No. 1, January 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at
Volume 3, No 1, January 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at wwwjgrcsinfo A NOVEL HIGH DYNAMIC RANGE 5-MODULUS SET WHIT EFFICIENT REVERSE CONVERTER AND
More informationInternational Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
More informationResidue Number Systems Ivor Page 1
Residue Number Systems 1 Residue Number Systems Ivor Page 1 7.1 Arithmetic in a modulus system The great speed of arithmetic in Residue Number Systems (RNS) comes from a simple theorem from number theory:
More informationChapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 9.1 Chapter 9 Objectives
More informationPerformance Evaluation of Signed-Digit Architecture for Weighted-to-Residue and Residue-to-Weighted Number Converters with Moduli Set (2 n 1, 2 n,
Regular Paper Performance Evaluation of Signed-Digit Architecture for Weighted-to-Residue and Residue-to-Weighted Number Converters with Moduli Set (2 n 1, 2 n, 2 n +1) Shuangching Chen and Shugang Wei
More informationARYABHATA REMAINDER THEOREM: RELEVANCE TO PUBLIC-KEY CRYPTO-ALGORITHMS*
CIRCUITS SYSTEMS SIGNAL PROCESSING c Birkhäuser Boston (2006) VOL. 25, NO. 1, 2006, PP. 1 15 DOI: 10.1007/s00034-005-1123-6 ARYABHATA REMAINDER THEOREM: RELEVANCE TO PUBLIC-KEY CRYPTO-ALGORITHMS* T. R.
More informationNotes on Systems of Linear Congruences
MATH 324 Summer 2012 Elementary Number Theory Notes on Systems of Linear Congruences In this note we will discuss systems of linear congruences where the moduli are all different. Definition. Given the
More informationassume that the message itself is considered the RNS representation of a number, thus mapping in and out of the RNS system is not necessary. This is p
Montgomery Modular Multiplication in Residue Arithmetic Jean-Claude Bajard LIRMM Montpellier, France bajardlirmm.fr Laurent-Stephane Didier Universite de Bretagne Occidentale Brest, France laurent-stephane.didieruniv-brest.fr
More informationA Division Algorithm Using Bisection Method in Residue Number System
International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 59 A Division Algorith Using Bisection Method in Residue Nuber Syste * Chin-Chen Chang and Jen-Ho Yang Abstract. Introduction
More informationNumbers. Çetin Kaya Koç Winter / 18
Çetin Kaya Koç http://koclab.cs.ucsb.edu Winter 2016 1 / 18 Number Systems and Sets We represent the set of integers as Z = {..., 3, 2, 1,0,1,2,3,...} We denote the set of positive integers modulo n as
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 8, August 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Efficient
More informationAryabhata Remainder Theorem: Relevance to public-key crypto algorithms
All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript have been printed and distributed without reviewing and editing as received from the authors: posting the
More informationCHAPTER 3. Congruences. Congruence: definitions and properties
CHAPTER 3 Congruences Part V of PJE Congruence: definitions and properties Definition. (PJE definition 19.1.1) Let m > 0 be an integer. Integers a and b are congruent modulo m if m divides a b. We write
More information3 The fundamentals: Algorithms, the integers, and matrices
3 The fundamentals: Algorithms, the integers, and matrices 3.4 The integers and division This section introduces the basics of number theory number theory is the part of mathematics involving integers
More informationKEYWORDS: Multiple Valued Logic (MVL), Residue Number System (RNS), Quinary Logic (Q uin), Quinary Full Adder, QFA, Quinary Half Adder, QHA.
GLOBAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGIES AND SCIENCES DESIGN OF A QUINARY TO RESIDUE NUMBER SYSTEM CONVERTER USING MULTI-LEVELS OF CONVERSION Hassan Amin Osseily Electrical and Electronics Department,
More informationICS141: Discrete Mathematics for Computer Science I
ICS141: Discrete Mathematics for Computer Science I Dept. Information & Computer Sci., Jan Stelovsky based on slides by Dr. Baek and Dr. Still Originals by Dr. M. P. Frank and Dr. J.L. Gross Provided by
More informationBasic elements of number theory
Cryptography Basic elements of number theory Marius Zimand 1 Divisibility, prime numbers By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a
More informationBasic elements of number theory
Cryptography Basic elements of number theory Marius Zimand By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a k for some integer k. Notation
More informationMTH 346: The Chinese Remainder Theorem
MTH 346: The Chinese Remainder Theorem March 3, 2014 1 Introduction In this lab we are studying the Chinese Remainder Theorem. We are going to study how to solve two congruences, find what conditions are
More informationOptimization of new Chinese Remainder theorems using special moduli sets
Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2010 Optimization of new Chinese Remainder theorems using special moduli sets Narendran Narayanaswamy Louisiana State
More information4 Number Theory and Cryptography
4 Number Theory and Cryptography 4.1 Divisibility and Modular Arithmetic This section introduces the basics of number theory number theory is the part of mathematics involving integers and their properties.
More informationNumber Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory.
CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L06, Steve/Courses/2011/S2/CSS322/Lectures/number.tex,
More informationLECTURE 4: CHINESE REMAINDER THEOREM AND MULTIPLICATIVE FUNCTIONS
LECTURE 4: CHINESE REMAINDER THEOREM AND MULTIPLICATIVE FUNCTIONS 1. The Chinese Remainder Theorem We now seek to analyse the solubility of congruences by reinterpreting their solutions modulo a composite
More informationCarmen s Core Concepts (Math 135)
Carmen s Core Concepts (Math 135) Carmen Bruni University of Waterloo Week 8 1 The following are equivalent (TFAE) 2 Inverses 3 More on Multiplicative Inverses 4 Linear Congruence Theorem 2 [LCT2] 5 Fermat
More informationCOMP239: Mathematics for Computer Science II. Prof. Chadi Assi EV7.635
COMP239: Mathematics for Computer Science II Prof. Chadi Assi assi@ciise.concordia.ca EV7.635 The Euclidean Algorithm The Euclidean Algorithm Finding the GCD of two numbers using prime factorization is
More informationImplementation Of Digital Fir Filter Using Improved Table Look Up Scheme For Residue Number System
Implementation Of Digital Fir Filter Using Improved Table Look Up Scheme For Residue Number System G.Suresh, G.Indira Devi, P.Pavankumar Abstract The use of the improved table look up Residue Number System
More informationMathematics of Cryptography
UNIT - III Mathematics of Cryptography Part III: Primes and Related Congruence Equations 1 Objectives To introduce prime numbers and their applications in cryptography. To discuss some primality test algorithms
More informationNumber Theory Proof Portfolio
Number Theory Proof Portfolio Jordan Rock May 12, 2015 This portfolio is a collection of Number Theory proofs and problems done by Jordan Rock in the Spring of 2014. The problems are organized first by
More informationThe Chinese Remainder Theorem
The Chinese Remainder Theorem R. C. Daileda February 19, 2018 1 The Chinese Remainder Theorem We begin with an example. Example 1. Consider the system of simultaneous congruences x 3 (mod 5), x 2 (mod
More informationCS 5319 Advanced Discrete Structure. Lecture 9: Introduction to Number Theory II
CS 5319 Advanced Discrete Structure Lecture 9: Introduction to Number Theory II Divisibility Outline Greatest Common Divisor Fundamental Theorem of Arithmetic Modular Arithmetic Euler Phi Function RSA
More informationA Suggestion for a Fast Residue Multiplier for a Family of Moduli of the Form (2 n (2 p ± 1))
The Computer Journal, 47(1), The British Computer Society; all rights reserved A Suggestion for a Fast Residue Multiplier for a Family of Moduli of the Form ( n ( p ± 1)) Ahmad A. Hiasat Electronics Engineering
More informationTHE CUBIC PUBLIC-KEY TRANSFORMATION*
CIRCUITS SYSTEMS SIGNAL PROCESSING c Birkhäuser Boston (2007) VOL. 26, NO. 3, 2007, PP. 353 359 DOI: 10.1007/s00034-006-0309-x THE CUBIC PUBLIC-KEY TRANSFORMATION* Subhash Kak 1 Abstract. This note proposes
More informationChapter 2 (Part 3): The Fundamentals: Algorithms, the Integers & Matrices. Integers & Algorithms (2.5)
CSE 54 Discrete Mathematics & Chapter 2 (Part 3): The Fundamentals: Algorithms, the Integers & Matrices Integers & Algorithms (Section 2.5) by Kenneth H. Rosen, Discrete Mathematics & its Applications,
More informationMathematics for Cryptography
Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1
More informationApplied Cryptography and Computer Security CSE 664 Spring 2018
Applied Cryptography and Computer Security Lecture 12: Introduction to Number Theory II Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline This time we ll finish the
More informationResidue Number Systems. Alternative number representations. TSTE 8 Digital Arithmetic Seminar 2. Residue Number Systems.
TSTE8 Digital Arithmetic Seminar Oscar Gustafsson The idea is to use the residues of the numbers and perform operations on the residues Also called modular arithmetic since the residues are computed using
More informationFrequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography
Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography Selçuk Baktır, Berk Sunar {selcuk,sunar}@wpi.edu Department of Electrical & Computer Engineering Worcester Polytechnic Institute
More informationOn the Complexity of Error Detection Functions for Redundant Residue Number Systems
On the Complexity of Error Detection Functions for Redundant Residue Number Systems Tsutomu Sasao 1 and Yukihiro Iguchi 2 1 Dept. of Computer Science and Electronics, Kyushu Institute of Technology, Iizuka
More informationThis is a recursive algorithm. The procedure is guaranteed to terminate, since the second argument decreases each time.
8 Modular Arithmetic We introduce an operator mod. Let d be a positive integer. For c a nonnegative integer, the value c mod d is the remainder when c is divided by d. For example, c mod d = 0 if and only
More information2WF15 - Discrete Mathematics 2 - Part 1. Algorithmic Number Theory
1 2WF15 - Discrete Mathematics 2 - Part 1 Algorithmic Number Theory Benne de Weger version 0.54, March 6, 2012 version 0.54, March 6, 2012 2WF15 - Discrete Mathematics 2 - Part 1 2 2WF15 - Discrete Mathematics
More information2.3 In modular arithmetic, all arithmetic operations are performed modulo some integer.
CHAPTER 2 INTRODUCTION TO NUMBER THEORY ANSWERS TO QUESTIONS 2.1 A nonzero b is a divisor of a if a = mb for some m, where a, b, and m are integers. That is, b is a divisor of a if there is no remainder
More informationCIS 6930/4930 Computer and Network Security. Topic 5.1 Basic Number Theory -- Foundation of Public Key Cryptography
CIS 6930/4930 Computer and Network Security Topic 5.1 Basic Number Theory -- Foundation of Public Key Cryptography 1 Review of Modular Arithmetic 2 Remainders and Congruency For any integer a and any positive
More informationAREA EFFICIENT MODULAR ADDER/SUBTRACTOR FOR RESIDUE MODULI
AREA EFFICIENT MODULAR ADDER/SUBTRACTOR FOR RESIDUE MODULI G.CHANDANA 1 (M.TECH),chandana.g89@gmail.com P.RAJINI 2 (M.TECH),paddam.rajani@gmail.com Abstract Efficient modular adders and subtractors for
More informationElementary Number Theory. Franz Luef
Elementary Number Theory Congruences Modular Arithmetic Congruence The notion of congruence allows one to treat remainders in a systematic manner. For each positive integer greater than 1 there is an arithmetic
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 8 February 1, 2012 CPSC 467b, Lecture 8 1/42 Number Theory Needed for RSA Z n : The integers mod n Modular arithmetic GCD Relatively
More informationCourse MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography
Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups
More information[Part 2] Asymmetric-Key Encipherment. Chapter 9. Mathematics of Cryptography. Objectives. Contents. Objectives
[Part 2] Asymmetric-Key Encipherment Mathematics of Cryptography Forouzan, B.A. Cryptography and Network Security (International Edition). United States: McGraw Hill, 2008. Objectives To introduce prime
More informationCSE 20: Discrete Mathematics
Spring 2018 Summary So far: Today: Logic and proofs Divisibility, modular arithmetics Number Systems More logic definitions and proofs Reading: All of Chap. 1 + Chap 4.1, 4.2. Divisibility P = 5 divides
More informationLecture notes: Algorithms for integers, polynomials (Thorsten Theobald)
Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) 1 Euclid s Algorithm Euclid s Algorithm for computing the greatest common divisor belongs to the oldest known computing procedures
More informationAlgebra for error control codes
Algebra for error control codes EE 387, Notes 5, Handout #7 EE 387 concentrates on block codes that are linear: Codewords components are linear combinations of message symbols. g 11 g 12 g 1n g 21 g 22
More informationFast Fraction-Integer Method for Computing Multiplicative Inverse
Fast Fraction-Integer Method for Computing Multiplicative Inverse Hani M AL-Matari 1 and Sattar J Aboud 2 and Nidal F Shilbayeh 1 1 Middle East University for Graduate Studies, Faculty of IT, Jordan-Amman
More information4. Congruence Classes
4 Congruence Classes Definition (p21) The congruence class mod m of a Z is Example With m = 3 we have Theorem For a b Z Proof p22 = {b Z : b a mod m} [0] 3 = { 6 3 0 3 6 } [1] 3 = { 2 1 4 7 } [2] 3 = {
More informationCRC Press has granted the following specific permissions for the electronic version of this book:
This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has
More informationThe Chinese Remainder Theorem
Chapter 5 The Chinese Remainder Theorem 5.1 Coprime moduli Theorem 5.1. Suppose m, n N, and gcd(m, n) = 1. Given any remainders r mod m and s mod n we can find N such that N r mod m and N s mod n. Moreover,
More informationIntegers and Division
Integers and Division Notations Z: set of integers N : set of natural numbers R: set of real numbers Z + : set of positive integers Some elements of number theory are needed in: Data structures, Random
More informationChapter 4 Finite Fields
Chapter 4 Finite Fields Introduction will now introduce finite fields of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public Key concern operations on numbers what constitutes a number
More informationKnow the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element.
The first exam will be on Monday, June 8, 202. The syllabus will be sections. and.2 in Lax, and the number theory handout found on the class web site, plus the handout on the method of successive squaring
More informationMATH Dr. Halimah Alshehri Dr. Halimah Alshehri
MATH 1101 haalshehri@ksu.edu.sa 1 Introduction To Number Systems First Section: Binary System Second Section: Octal Number System Third Section: Hexadecimal System 2 Binary System 3 Binary System The binary
More informationMathematics of Cryptography
Modulo arithmetic Fermat's Little Theorem If p is prime and 0 < a < p, then a p 1 = 1 mod p Ex: 3 (5 1) = 81 = 1 mod 5 36 (29 1) = 37711171281396032013366321198900157303750656 = 1 mod 29 (see http://gauss.ececs.uc.edu/courses/c472/java/fermat/fermat.html)
More informationCourse 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography
Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups
More informationChapter 4 Mathematics of Cryptography
Chapter 4 Mathematics of Cryptography Part II: Algebraic Structures Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 4.1 Chapter 4 Objectives To review the concept
More informationPower Consumption Analysis. Arithmetic Level Countermeasures for ECC Coprocessor. Arithmetic Operators for Cryptography.
Power Consumption Analysis General principle: measure the current I in the circuit Arithmetic Level Countermeasures for ECC Coprocessor Arnaud Tisserand, Thomas Chabrier, Danuta Pamula I V DD circuit traces
More informationModular Arithmetic Instructor: Marizza Bailey Name:
Modular Arithmetic Instructor: Marizza Bailey Name: 1. Introduction to Modular Arithmetic If someone asks you what day it is 145 days from now, what would you answer? Would you count 145 days, or find
More informationMATH 2112/CSCI 2112, Discrete Structures I Winter 2007 Toby Kenney Homework Sheet 5 Hints & Model Solutions
MATH 11/CSCI 11, Discrete Structures I Winter 007 Toby Kenney Homework Sheet 5 Hints & Model Solutions Sheet 4 5 Define the repeat of a positive integer as the number obtained by writing it twice in a
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 9 September 30, 2015 CPSC 467, Lecture 9 1/47 Fast Exponentiation Algorithms Number Theory Needed for RSA Elementary Number Theory
More informationTopics in Cryptography. Lecture 5: Basic Number Theory
Topics in Cryptography Lecture 5: Basic Number Theory Benny Pinkas page 1 1 Classical symmetric ciphers Alice and Bob share a private key k. System is secure as long as k is secret. Major problem: generating
More informationPerfect Power Riesel Numbers
Perfect Power Riesel Numbers Carrie Finch a, Lenny Jones b a Mathematics Department, Washington and Lee University, Lexington, VA 24450 b Department of Mathematics, Shippensburg University, Shippensburg,
More informationNumber Theory. Modular Arithmetic
Number Theory The branch of mathematics that is important in IT security especially in cryptography. Deals only in integer numbers and the process can be done in a very fast manner. Modular Arithmetic
More informationIntroduction to Cryptography. Lecture 6
Introduction to Cryptography Lecture 6 Benny Pinkas page 1 Public Key Encryption page 2 Classical symmetric ciphers Alice and Bob share a private key k. System is secure as long as k is secret. Major problem:
More informationModular Reduction without Pre-Computation for Special Moduli
Modular Reduction without Pre-Computation for Special Moduli Tolga Acar and Dan Shumow Extreme Computing Group, Microsoft Research, Microsoft One Microsoft Way, Redmond, WA 98052, USA {tolga,danshu}@microsoft.com
More informationAlgorithms CMSC Basic algorithms in Number Theory: Euclid s algorithm and multiplicative inverse
Algorithms CMSC-27200 Basic algorithms in Number Theory: Euclid s algorithm and multiplicative inverse Instructor: László Babai Last updated 02-14-2015. Z denotes the set of integers. All variables in
More informationRSA Implementation. Oregon State University
RSA Implementation Çetin Kaya Koç Oregon State University 1 Contents: Exponentiation heuristics Multiplication algorithms Computation of GCD and Inverse Chinese remainder algorithm Primality testing 2
More informationThe Fundamental Theorem of Arithmetic
Chapter 1 The Fundamental Theorem of Arithmetic 1.1 Primes Definition 1.1. We say that p N is prime if it has just two factors in N, 1 and p itself. Number theory might be described as the study of the
More information2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer?
Chapter 3: Theory of Modular Arithmetic 25 SECTION C Solving Linear Congruences By the end of this section you will be able to solve congruence equations determine the number of solutions find the multiplicative
More informationLecture 7 Number Theory Euiseong Seo
Lecture 7 Number Theory Euiseong Seo (euiseong@skku.edu) 1 Number Theory God created the integers. All else is the work of man Leopold Kronecker Study of the property of the integers Specifically, integer
More informationIntroduction to Information Security
Introduction to Information Security Lecture 5: Number Theory 007. 6. Prof. Byoungcheon Lee sultan (at) joongbu. ac. kr Information and Communications University Contents 1. Number Theory Divisibility
More informationChinese Remainder Theorem
Chinese Remainder Theorem Theorem Let R be a Euclidean domain with m 1, m 2,..., m k R. If gcd(m i, m j ) = 1 for 1 i < j k then m = m 1 m 2 m k = lcm(m 1, m 2,..., m k ) and R/m = R/m 1 R/m 2 R/m k ;
More informationSolutions to Problem Set 3 - Fall 2008 Due Tuesday, Sep. 30 at 1:00
Solutions to 18.781 Problem Set 3 - Fall 2008 Due Tuesday, Sep. 30 at 1:00 1. (Niven 2.3.3) Solve the congruences x 1 (mod 4), x 0 (mod 3), x 5 (mod 7). First we note that 4, 3, and 7 are pairwise relatively
More informationCOMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162
COMPUTER ARITHMETIC 13/05/2010 cryptography - math background pp. 1 / 162 RECALL OF COMPUTER ARITHMETIC computers implement some types of arithmetic for instance, addition, subtratction, multiplication
More informationChapter 1: Solutions to Exercises
1 DIGITAL ARITHMETIC Miloš D. Ercegovac and Tomás Lang Morgan Kaufmann Publishers, an imprint of Elsevier, c 2004 Exercise 1.1 (a) 1. 9 bits since 2 8 297 2 9 2. 3 radix-8 digits since 8 2 297 8 3 3. 3
More informationForward and Reverse Converters and Moduli Set Selection in Signed-Digit Residue Number Systems
J Sign Process Syst DOI 10.1007/s11265-008-0249-8 Forward and Reverse Converters and Moduli Set Selection in Signed-Digit Residue Number Systems Andreas Persson Lars Bengtsson Received: 8 March 2007 /
More information7.2 Applications of Euler s and Fermat s Theorem.
7.2 Applications of Euler s and Fermat s Theorem. i) Finding and using inverses. From Fermat s Little Theorem we see that if p is prime and p a then a p 1 1 mod p, or equivalently a p 2 a 1 mod p. This
More informationFinite Fields. Mike Reiter
1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements
More informationECE596C: Handout #11
ECE596C: Handout #11 Public Key Cryptosystems Electrical and Computer Engineering, University of Arizona, Loukas Lazos Abstract In this lecture we introduce necessary mathematical background for studying
More informationInformation encoding and decoding using Residue Number System for {2 2n -1, 2 2n, 2 2n +1} moduli sets
Information encoding and decoding using Residue Number System for {2-1, 2, 2 +1} moduli sets Idris Abiodun Aremu Kazeem Alagbe Gbolagade Abstract- This paper presents the design methods of information
More informationAn integer p is prime if p > 1 and p has exactly two positive divisors, 1 and p.
Chapter 6 Prime Numbers Part VI of PJE. Definition and Fundamental Results Definition. (PJE definition 23.1.1) An integer p is prime if p > 1 and p has exactly two positive divisors, 1 and p. If n > 1
More informationThe security of RSA (part 1) The security of RSA (part 1)
The modulus n and its totient value φ(n) are known φ(n) = p q (p + q) + 1 = n (p + q) + 1 The modulus n and its totient value φ(n) are known φ(n) = p q (p + q) + 1 = n (p + q) + 1 i.e. q = (n φ(n) + 1)
More information2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer?
Chapter 3: Theory of Modular Arithmetic 25 SECTION C Solving Linear Congruences By the end of this section you will be able to solve congruence equations determine the number of solutions find the multiplicative
More informationWilson s Theorem and Fermat s Little Theorem
Wilson s Theorem and Fermat s Little Theorem Wilson stheorem THEOREM 1 (Wilson s Theorem): (p 1)! 1 (mod p) if and only if p is prime. EXAMPLE: We have (2 1)!+1 = 2 (3 1)!+1 = 3 (4 1)!+1 = 7 (5 1)!+1 =
More informationFinite Fields. SOLUTIONS Network Coding - Prof. Frank H.P. Fitzek
Finite Fields In practice most finite field applications e.g. cryptography and error correcting codes utilizes a specific type of finite fields, namely the binary extension fields. The following exercises
More informationMath 131 notes. Jason Riedy. 6 October, Linear Diophantine equations : Likely delayed 6
Math 131 notes Jason Riedy 6 October, 2008 Contents 1 Modular arithmetic 2 2 Divisibility rules 3 3 Greatest common divisor 4 4 Least common multiple 4 5 Euclidean GCD algorithm 5 6 Linear Diophantine
More informationHow does the computer generate observations from various distributions specified after input analysis?
1 How does the computer generate observations from various distributions specified after input analysis? There are two main components to the generation of observations from probability distributions.
More informationFaster arithmetic for number-theoretic transforms
University of New South Wales 7th October 2011, Macquarie University Plan for talk 1. Review number-theoretic transform (NTT) 2. Discuss typical butterfly algorithm 3. Improvements to butterfly algorithm
More informationCSE 20 DISCRETE MATH. Winter
CSE 20 DISCRETE MATH Winter 2017 http://cseweb.ucsd.edu/classes/wi17/cse20-ab/ Today's learning goals Determine whether a relation is an equivalence relation by determining whether it is Reflexive Symmetric
More informationFor your quiz in recitation this week, refer to these exercise generators:
Monday, Oct 29 Today we will talk about inverses in modular arithmetic, and the use of inverses to solve linear congruences. For your quiz in recitation this week, refer to these exercise generators: GCD
More information