arxiv: v1 [math.nt] 12 Nov 2018
|
|
- Lisa Edwards
- 5 years ago
- Views:
Transcription
1 THE DIOPHANTINE EXPONENT OF THE Z/qZ POINTS OF S d S d arxiv: v1 [math.nt] 1 Nov 018 M. W. HASSAN, Y. MAO, N. T. SARDARI, R. SMITH, X. ZHU Abstract. Assume a polynomial-time algorithm for factoring integers, Conjecture 1.1, d 3, and q and p are prime numbers, where p q A for some A > 0. We develop a polynomial-time algorithm in log(q) that lifts every Z/qZ point of S d S d to a Z[1/p] point of S d with the minimum height. We implement our algorithm for d = 3 and 4. Based on our numerical results, we formulate a conjecture which can be checked in polynomial-time and gives the optimal bound on the diophantine exponent of the Z/qZ points of S d S d Motivation. Let 1. Introduction S d (R) := {(x 0,..., x d ) : x x d = 1, where x i R for 0 i d}, where R is any commutative ring. Let S d (R) S d (R), be the subset of the points with the coordinates (x 0,..., x d, 0, 0) S d (R). Suppose that q is a prime number, and a S d (Z/qZ). Let p be an odd prime number, we say that s S d (Z[1/p]) is an integral lift of a if s a mod q. Let H : S d (Z[1/p]) Z + be the natural height function defined by H(( n 0 p,..., n d h0 p h )) := max. d 0 i d phi where gcd(n i, p) = 1 for 0 i d. We define the diophantine exponent of a S d (Z/qZ) with respect to p to be w p (a) := d 1 min log d q (H(s)) : s S d (Z[1/p]) lifts a. Assume that d 3. By the circle method (Hardy-Littlewood circle method for d 4 and its refinement by Kloosterman [Klo7] for d = 3), it follows that w p (a) < for every a S d (Z/qZ). Moreover, it follows from the circle method that the number of the integral points s S d (Z[1/p]) with H(s) p h is less than O ɛ (p h(d 1+ɛ) ) for any ɛ > 0. It is elementary to check that #S d (Z/qZ) q d. Hence, by a Pigeonhole argument, it follows that w p (a) 1 + o q (1) for all but a tiny fractions of a S d (Z/qZ). It follows from the work of the third author [Sar15a, Theorem 1.] that w p (a) /d + o q,ɛ (1) for every a S d (Z/qZ), d 4, and p q ɛ, where o q,ɛ (1) 0 as q and ɛ 0. Moreover, this bound is essentially optimal. The third author also conjectured [Sar15a, Conjecture 1.3] that w p (a) 4/3+o q,ɛ (1) for d = 3. This is the non-archimedian version of Sarnak s conjecture on the covering exponent of integral points on the sphere; see [Sar15b], [Sar15a], and [BKS17]. The main motivation for studying w p (a) for a S d (Z/qZ) S d (Z/qZ) comes from the navigation algorithms for the LPS Ramanujan graphs X p,q, and Date: November 19,
2 M. W. HASSAN, Y. MAO, N. T. SARDARI, R. SMITH, X. ZHU its archimedean analogue which is the Ross and Selinger algorithm for navigating P SU() with the golden quantum gates; see [LPS88], [Mar88], [PLQ08], [Sar17a], and also [RS16] and [PS18]. More precisely, the vertices of the LPS Ramanujan graph X p,q are labeled with ±a S 3 (Z/qZ)/±, if p is a quadratic residue mod q. It follows from [LPS88] and [Sar17a, Theorem 1.7] that the shortest path between ±a and ±(1, 0,..., 0) with even number of edges is log p (q 3 )w p (a). In [Sar17a, Theorem 1.], the third author developed and implemented a conditional polynomial-time algorithm that gives the shortest possible path between any ±a S 1 (Z/qZ) S 3 (Z/qZ) and ±(1, 0,..., 0). He also proved that finding the shortest possible path between a generic point ±a S 3 (Z/qZ) and ±(1, 0,..., 0) is essentially NP complete [Sar17a, Corollary 1.9]. The archimedean analogue of this NP-completeness result is in the work of Sarnak and Parzanchevski [PS18]. Therefore, the diophantine exponent w p (a) for a S 1 (Z/qZ) S 3 (Z/qZ) and its archimedean analogue is proportional to the size of the output of these navigation algorithms. Understanding the size of the output of these algorithms is a fundamental problem in quantum computing. Since it helps us to optimize the cost of the implementation of an algorithm on a quantum computer if one is ever build. The only known upper bound is w p (a) +o(1) [LPS88] which implies diamx p,q ( + o(1)) log p (q 3 ), where diamx p,q is the diameter of the LPS Ramanujan graph X p,q. The third author also proved that diam(x p,q ) (4/3) log p (q 3 ) for some integral values of q [Sar18]. The third author conjectured that diam(x p,q ) = 4/3 log p (q 3 ) + o q (1). The numerical results of Ross and Selinger [RS16] and the third author [Sar17a, Sar18] suggests that for all but tiny fractions of a S 1 (Z/qZ) S 3 (Z/qZ), we have w p (a) = 1 + o q (1). It is also observed that max a (w p (a)) = 4/3 + o q (1). The main goal of this paper is to give a theoretical explanation to these observation. 1.. Main results. In this paper, we develop a conditional polynomial-time algorithm for lifting every a S d (Z/qZ) S d (Z/qZ) to an integral point s S d (Z[1/p]) with the minimal height. In particular, we have a conditional polynomial time algorithm in log(q) that computes w p (a) for every a S d (Z/qZ) S d (Z/qZ). We prove that our algorithm terminates in polynomial-time by assuming a polynomial-time algorithm for factoring integers and an arithmetic conjecture, which we formulate next. Let t := (t 0,..., t d ) and Q(t) := N q (t 0 + b0 q ) (t d + b d q ), where N, b 0,..., b d are integers, N b b d mod q, and gcd(n, q) = 1. Define (1.1) A Q,r := { t Z d 1 : Q(t) Z, t < r, and Q(t) 0 }, where r > 0 is some positive real number. Conjecture 1.1. Let Q and A Q,r be as above. There exists constants γ > 0 and C γ > 0, independent of Q and r, such that if A Q,r > C γ (log N) γ for some r > 0, then Q expresses a sum of two squares inside A Q,r. We denote the following assumptions by ( ): (1) There exists a polynomial-time algorithm for factoring integers, () Conjecture 1.1 holds. This is a version of our main theorem.
3 THE DIOPHANTINE EXPONENT OF THE Z/qZ POINTS OF S d S d 3 Theorem 1.. Assume ( ), d 3 is fixed, p q and p q A for some fixed A > 0. We develop a deterministic polynomial-time algorithm in log(q), that on input a S d (Z/qZ) S d (Z/qZ) returns a minimal lift s S d (Z[1/p]) of a. We prove Theorem 1. in Section. Remark 1.3. By [Sar17a, Corollary 1.9], finding a minimal lift of a generic point a S d (Z/qZ) is essentially NP-complete. Moreover, Theorem 1. generalizes the lifting algorithm for the Z/qZ points of S 1 S 3 [Sar17a, Theorem 1.10] to S d S d for any d 3. The main observation of this paper links w p (a) to another invariant associated to a S d (Z/qZ) S d (Z/qZ), which we describe next. Suppose that a = (a 0,..., a d, 0, 0). Let L(a) be the following sub-lattice of Z d 1 with co-volume q: (1.) L(a) := { (x 0,..., x d ) Z d 1 : x 0 a x d a d 0 mod q }. For any Z basis B = {v 1,..., v d 1 } of L(a), let (1.3) M(B) = max{ v 1,..., v d 1 }, where v is the Euclidean norm of v. Define the height function η(a) := log q min M(B), B where B varies among all Z basis of L(a). We prove that η(a) is computable in polynomial-time in log(q) up to an error term of size O d (1/ log(q)). Theorem 1.4. Fix d 3. We develop a deterministic polynomial-time algorithm in log(q), that on input a S d (Z/qZ) S d (Z/qZ) returns η(a) + O d (1/ log(q)). We implemented the algorithms in Theorem 1. and Theorem 1.4 for d = 4 [HMS + 18]. Figure 1 illustrates our main observation, which links the diophantine exponent w p (a) to the height function η(a). Figure 1. Random Coordinates We graph w p (a) against η(a) for a chosen randomly on a logarithmic scale and eight 130-digit values of q, as described in Section 3. Figure 1 suggests the following
4 4 M. W. HASSAN, Y. MAO, N. T. SARDARI, R. SMITH, X. ZHU linear relation between w p (a) and η(a) (1.4) w p (a) = 3 4 (1 + η(a)) + o q(1). We give further numerical evidences that supports the above relation in Section 3. Moreover, we prove the following theorem in Section. Theorem 1.5. Assume d 3, Conjecture 1.1, and p log(q). We have w p (a) d 1 (1 + η(a)) + O(log log(q)/ log(q)), d where the implicit constant in O(log log(q)/ log(q)) only depends on γ and C γ defined in Conjecture 1.1 and it is independent of p, q, and a. Based on our numerical results and Theorem 1.5, we conjecture the following optimal upper bound on w p (a) for every a S d (Z/qZ) S d (Z/qZ). Conjecture 1.6. Let a S d (Z/qZ) S d (Z/qZ), p log(q) be a prime number and d 3. We have (1.5) w p (a) d 1 (1 + η(a)) + O(log log(q)/ log(q)), d where the implicit constant in O(log log(q)/ log(q)) only depends on d and it is independent of p, q, and a. Remark 1.7. By Theorem 1. and Theorem 1.4, w p (a) and η(a) are computable in polynomial-time in log(q). Our algorithm for d = 4 [HMS + 18] has been implemented and it runs and terminates quickly for q We verify Conjecture 1.6 for various values of q and a in Section 3. We expect that the upper bound (1.5) to be sharp for a generic a S d (Z/qZ) S d (Z/qZ) and prime p log(q). More precisely, we expect that (1.6) w p (a) = d 1 (1 + η(a)) + O(log log(q)/ log(q)) d for fixed a S d (Z/qZ) S d (Z/qZ), and all but tiny fractions of primes 1 p 1 log(q). Moreover, by the equidistribution of covolume-1 lattices L(a) in the q 1/(d 1) space of the unimodular lattices, for all but a tiny fractions of a S (Z/qZ) S 4 (Z/qZ), we have η(a) = 1/(d 1) + O(log log(q)/ log(q)). It is also conjectured for d 3 that w p (a) = 1 + O(log log(q)/ log(q)) for all but a tiny fractions of a S d (Z/qZ) S d (Z/qZ). Hence, the identity (1.6) holds for a generic choice 1 of parameters. Note that d 1 η(a) 1. Hence, we expect that the diophantine exponent w p (a) to be dense in the interval [1, /d] as q. We give strong numerical evidence for this in Section Outline of the proofs. We give an outline of the proof of Theorem 1.. The proof is based on induction on d. The base case d = 3 was essentially proved in the previous work of the third author [Sar17a, Theorem 1.10]. Our algorithm starts with searching for the lattice points of L(a) inside a convex region defined by the intersection of two balls. There is a similar step in the work of Ross and Selinger [RS16]. Sarnak and Ori [PS18] explained this step in terms of Lenstra s work [Len83]. If the convex region is defined by a system of linear inequalities in a fixed dimension then the general result of Lenstra [Len83] implies this search is polynomially solvable. We use a variant of Lenstra s argument that is developed
5 THE DIOPHANTINE EXPONENT OF THE Z/qZ POINTS OF S d S d 5 in [Sar17a, Theorem 1.10] and Conjecure 1.1 to reduce the problem to dimension d 1. At the final stage of our algorithm, we need to represent a given integers m as a sum of two squares if it is possible. We apply Pollard s rho algorithm to factor m into primes, and check if all the prime factors with the odd exponent are congruent to 1 mod 4. Finally, we use Schoof s algorithm [Sch85] to express each prime divisor p 1 mod 4 as a sum of two squares. An important feature of our algorithm is that it has been implemented for d = 4 [HMS + 18] and d = 3 [Sar17b], and it runs and terminates quickly. Acknowledgements. We thank Brandon Boggess for his help for implementing the code of Theorem 1.. We also thank Professor Peter Selinger for publicly providing a very useful Haskell package (newsynth) which was used in our code.. Proof of Theorem 1. and δ-lll reduced basis. In this section we define a δ-lll reduced basis of R d, and give a proof of Theorem 1.4. We cite a theorem due to Babai on the shape of the LLL-reduced basis. We refer the reader to [LLL8, Section 1] for a detailed discussion of the LLL-algorithm. We first recall the Gram-Schmidt process. Definition.1. Let v 1,..., v k be k linearly independent vectors in R n. The Gram- Schmidt orthogonalization of v 1,..., v k is defined inductively by ṽ i = v i i 1 j=1 µ i,jṽ j, where µ i,j := vi,ṽj ṽ j,ṽ j. Next, we define a δ-lll reduced basis of R d for any 1/4 < δ < 1. Definition.. A basis {v 1,..., v d } R d is a δ-lll reduced basis if the following holds: (1) µ i,j 1/, for every 1 i n, and j < i, () δ ṽ i µ i+1,i ṽ i + ṽ i+1 for for every 1 i < n. Remark.3. By [LLL8, Proposition 1.6], the LLL-algorithm transforms a given basis B of a lattice L Z d in O(d 4 log(m(b))) operatins into a δ-lll reduced basis of R d, where M(B) is defined in (1.3). We cite the following theorem from [Bab86, Theorem 5.1]. Theorem.4 (Babai). Let {v 1,..., v d } be a δ LLL reduced basis with δ = 3/4. Let θ k denote the angle between v k and the linear subspace U k = j k Rv j. Then, for every 1 k d, sin θ k ( 3 )d. We give a proof of Theorem 1.4. Proof. We give an LLL-reduced basis for the lattice L(a). Assume the a 0 0 mod q. Let ã 0 q 1 be the integer such that ã 0 (a 0 ) 1 mod q. Let v 0 := (q, 0,..., 0) L(a), and v i := ( ã 0 a i, δ 1,i,..., δ d,i ) for 1 i d, where δ i,j = 1 if i = j, and δ i,j = 0 otherwise. Since the covolume of L(a) is q, it follows that {v 0,..., v d } is a Z basis for L(a). We apply the LLL basis reduction algorithm on {v 0,..., v d } for δ = 3/4 and obtain a 3/4-LLL
6 6 M. W. HASSAN, Y. MAO, N. T. SARDARI, R. SMITH, X. ZHU reduced basis B L := {u 0,..., u d } for L(a) in O(log(q)) steps; see Remark.3. By [LLL8, Proposition 1.1], we have Hence, min B M(B) M(B L) (d )/ min M(B). B 0 log q (M(B L )) η(a) d log q = O d(1/ log q). This concludes the proof of Theorem Proof of Theorem 1.. Recall the notations while formulating Theorem 1.. Let a = (a 0,..., a d ), where a d 1 a d 0 mod q. Assume that s := ( n0,..., n p h d ) p h S d (Z[1/p]) is a minimal lift of a, where n i Z. Hence, we have n n d = p h, n i p h a i mod q for 0 i d. More generally, let N q A for some fixed A > 0 be an integer, and b i Z for 0 i d, where d i=0 b i N mod q. Theorem 1. follows from the following Proposition. Proposition.5. Assume ( ) and d 3, we develop a polynomial-time algorithm in log(q) that finds a solution (t 0,..., t d ) Z d+1, if it exists, to (.1) (qt 0 + b 0 ) + + (qt d + b d ) + (qt d 1 ) + (qt d ) = N. If there is no integral solution, it terminates in polynomial-time in log(q). Proof of Theorem 1.. For 0 h 4 log p q, let N = p h and b i a i p h mod q for 0 i d. By theorem [Sar15a, Theorem 1.] the diophantine equation (.1) has a solution for every (3 + o q (1)) log p q h 4 log p q. Our goal is to find the smallest h such that the equation (.1) has a solution, and then find a solution to the equation (.1). For 0 h 4 log p q, apply the algorithm in Proposition.5, in order to find an integral solution to the equation.1. If there exits such a solution (t h,0,..., t h,d ), then s h := ( qt h,0 + b 0 p h,..., qt h,d + b d p h, qt h,d 1 p h, qt h,d p h ) is a lift for a S d (Z[1/p]). Otherwise the algorithm in Proposition.5 terminates in polynomial-time in log(q) with no solutions, and a does not have any integral lift s S d (Z[1/p]) with H(s) = p h. We have a lift s h for every (3 + o q (1)) log p q h 4 log p q, let h min be the smallest exponent 0 h 4 log p q such that the lift s h exists. Then s hmin is a minimal lift and this concludes the proof of Theorem 1.. Next, we prove two auxiliary lemmas and finally give a proof of Proposition.5. By rearranging (.1), we have (.) t d 1 + t d = N/q (t 0 + b 0 /q) (t d + b d /q). Let Q(t) := N/q t + 1 q b, where t = (t 0,..., t d ), b = (b 0,..., b d ) and. is the Euclidean norm. Recall the definition of A Q,r from (1.1), where r > 0 is some real number. By Conjecture 1.1, if A Q,r > C γ (log N) γ then the equation (.) has a solution, where
7 THE DIOPHANTINE EXPONENT OF THE Z/qZ POINTS OF S d S d 7 t A Q,r. Let k := (N b )/q. Since b N mod q, k Z. We can further rearrange (.): t d 1 + t d = (k b, t )/q t. Note that t A Q,r iff the following two conditions are satisfied: Condition 1: t + 1 q b N/q, and t < r. Condition : b, t k mod q. We first focus on Condition. Without loss of generality, we assume that a 0 0 mod q. Then b 0 p h a 0 0 mod q and b 0 has an inverse mod q. Let b 0 q 1 be the integer such that b 0 (b 0 ) 1 mod q. Then t 0 := (k b 0, 0,..., 0) is a solution for the congruence equation in Condition (). Since p h a b mod q, the integral solutions of Condition () are the translation of the lattice points of L(a) by t 0. Let {u 0,..., u d } be the 3/4-LLL reduced basis for L(a) that is defined in the proof of Theorem 1.4. We write t d q b = c i u i, for sum c i 1 q Z. Let t 0 = d i=0 r iu i, where r i 1/ and c i r i Z for every 0 i d. Assume that t Z d 1 satisfies Condition (). Then, there exists a one to one correspondence between t and x := (x 0,..., x d ) Z d 1, such that: Let i=0 d t 0 + x i u i = t + 1 q b. i=0 d F (x) := N/q t 0 + x i u i. Note that F (x) = Q(t) by the above correspondence, and F (x) Z for every x Z d 1. Clearly Condition (1) is satisfied if and only if F 0. We prove two general lemmas for listing the positive values of F (x). Assume that {w 1,..., w m } is a 3/4-LLL basis for R m. Let w 0 = m i=1 s iw i, where s i < 1/. Define m H(x 1,..., x m ) := M w 0 + x i w i, where M is some real number. Lemma.6. Assume that α w k > M for some α > 0, and H(x 1,..., x m ) > 0, then x k α( 3 ) m + 1. Proof. Since H(x 1,..., x m ) > 0, we have i=0 i=1 0 < H(x 1,..., x m ) M ( sin θ k (x k + s k ) w k ). By Theroem.4 and α w k > M, we have Hence, sin θk (x k + s k ) w k ( 3 )m ( x k 1/) M α. x k α( 3 ) m + 1/.
8 8 M. W. HASSAN, Y. MAO, N. T. SARDARI, R. SMITH, X. ZHU This concludes the lemma. Lemma.7. Assume that m w i < M for 1 i m. Let A i := M m w i 1/ and C := m i=1 [ A i, A i ]. Then H(x) is positive for every x C and negative outside m( 3 ) m C. Proof. Recall that H(x 1,..., x m ) = M w 0 + m i=1 x iw i, and w 0 = m i=1 s iw i, where s i < 1/. Assume that x C. By the triangle inequality H(x) M ( m ( x i + 1/) w i ) M ( m (A i + 1/) w i ) i=1 i=1 M M = 0. Next, we show that H is negative outside m( 3 ) m C. Assume that y := (y 1,..., y m ) m( 3 ) m C. Hence, there exits 1 k m such that y k m( 3 ) m A k. By Theorem.4 and the assumption m w k < M, we obtain F (y) M ( sin θ k (y k + r k ) w k ) ( M ( 3 )m( m( 3 ) m M ) ( m w k 1/) 1/) w k < 0 This concludes our lemma. Finally, we give a proof of Proposition.5. Proof of Proposition.5. Recall the notations and the assumptions while formulating Proposition.5. We develop an algorithm that finds a solution to the equation (.) in polynomial-time in log(q), and if it does not have a solution, it terminates in polynomial-time in log(q). First, assume that (d 1) u i < N q for every 1 i d 1. By Lemma.7, there exists a box C such that F (x) is positive inside C and it is negative outside (d 1)( 3 ) d 1 C. We consider two cases. Case 1: if C C γ log(n) γ, Case : if C > C γ log(n) γ. where C = d i=0 A i, C γ and γ are defined in Conjecture 1.1. For Case 1, we check if any point x (d 1)( 3 ) d 1 C gives a solution to the equation. as follows. We factor F (x) in polynomial-time in log(q) into its prime powers, by our assumed polynomial-time factoring algorithm. We check if all the prime factors with the odd exponent are congruent to 1 mod 4. Finally, we use Schoof s algorithm [Sch85] to express each prime divisor p 1 mod 4 as a sum of two squares. Since C C γ log(n) γ, this conduces the proof of Proposition.5. For Case, by Conjecture 1.1, there exists x C such that F (x) = t d 1 + t d for some t d 1, t d Z, where x C γ log(n) γ. Similarly, we find such x C γ log(n) γ in polynomial time. This conduces the proof of Proposition.5 if (d 1) u i < N q for every 1 i d 1. Otherwise, there exists 0 k d such that (d 1) u k > N q. By Lemma.6, x k (d 1)( 3 ) d
9 THE DIOPHANTINE EXPONENT OF THE Z/qZ POINTS OF S d S d 9 Since d is fixed, there are only a bounded number of choices for x k Z. Let x k = l for some l Z, where l (d 1)( 3 ) d Hence, d F (x) := N/q t 0 + lu k + x i u i. We write uniquely t 0 + lu k = u k,1 + u k,, where u k,1 = i k α iu i and u k, is orthogonal to i k Ru i. Hence, i k d F (x) = M w 0 + y i u i where M := (N/q u k, ), w 0 := i k s iu i, where s i 1/ and s i α i Z, and y i = x i + α i s i. Let i k d G l,k (y) := M w 0 + y i u i. Next, we use a similar argument as in the beginning of our proof. We assume that (d 1) u i < M for all i k, and proceed with the same argument on G l,k (y) as F (x). We either find a solution for the equation (.), or find another variable with bounded value. Since the dimension d is bounded this algorithm terminates in polynomial time in log(q). This completes the proof of Proposition.5. Finally, we give a proof of Theorem 1.5 Proof. Assume that ( h (log p q) i k 1 + η(a) + d + log C γ + γ log 5 log q log (q) Let B L := {u 0,..., u d } be the LLL-reduced basis that is introduced in the proof of Theorem 1.4. It follows from the proof of Theorem 1.4 that η(a) + Hence, for every 0 i d, we have ( h (log p q) Let N := p h, we have Assume that N q 5, then d log (q) log q(m(b L )). 1 + log q ( u i ) + d + log C γ + γ log 5 log q log (q) N q N q d u i C γ (log q 5 ) γ. d u i C γ (log N) γ. By the proof of Proposition.5, if follows that there exists an integral lift s S d (Z[1/p]) with H(s) = p h. Therefore, w p (a) d 1 d (1 + η(a)) + O d(log log(q)/ log(q)). This concludes the proof of Theorem 1.5. ). ).
10 10 M. W. HASSAN, Y. MAO, N. T. SARDARI, R. SMITH, X. ZHU 3. Numerical results We now give numerical evidence for Conjecture 1.1 by testing identity 1.4 for d = 4. Figure 1, shown in the introduction, was produced by choosing the three non-zero coordinates in S 4 (Z/qZ) randomly on a logarithmic scale. This was done specifically by first choosing an integer r randomly from 60 to 15 for each coordinate, then choosing an integral representative of the coordinate randomly from 0 to 10 r q. This was done 100 times for each of eight 130-digit primes listed below, and all points were included in the figure: q 1 = q = q 3 = q 4 = q 5 = q 6 = q 7 = q 8 = Generic Coordinates. There are several cases which are worthy of special consideration. The generic element of S (Z/qZ) has coordinates of size q, so we expect η(a) = 1/3 and w p (a) = 1 for most lattices. Figure shows that this is indeed the case, using the same primes and number of points as Figure 1. The coordinates are chosen between 0 and q on a linear, rather than logarithmic scale.
11 THE DIOPHANTINE EXPONENT OF THE Z/qZ POINTS OF S d S d 11 The horizontal lines observed on the small-scale are a result of H(a), and therefore w p (a), taking much more discrete values than η(a). Figure. Generic Coordinates 3.. Small Coordinates. When all coordinates are small, the lattice is quite high in the cusp, and therefore one expects η(a) = 1 and w p (a) = 3/, which is observed in Figure 3. Here all coordinates are chosen between 0 and q. Figure 3. Small Coordinates 3.3. Other Cusp Regions. One can explore additional cusp cases by fixing one or two coordinates and varying the rest on a logarithmic scale. Figures 4 and 5 show that identity 1.4 still holds in these two cases. The fixed coordinate is set to 1, and the other coordinates are chosen as in Figure 1. Note that in Figure 5, where only one coordinate is large, the lattices are relatively high in the cusp, but the corresponding points still adhere to the theoretical line.
12 1 M. W. HASSAN, Y. MAO, N. T. SARDARI, R. SMITH, X. ZHU Figure 4. One Coordinate Fixed Figure 5. Two Coordinates Fixed References [Bab86] L. Babai. On Lovász lattice reduction and the nearest lattice point problem. Combinatorica, 6(1):1 13, [BKS17] T.D. Browning, V. Vinay Kumaraswamy, and R.S. Steiner. Twisted linnik implies optimal covering exponent for s 3. International Mathematics Research Notices, page rnx116, 017. [HMS + 18] M. W. Hassan, Y. Mao, N. T. Sardari, R. Smith, and X. Zhu. 5 Squares Algorithm, August [Klo7] H. D. Kloosterman. On the representation of numbers in the form ax +by +cz +dt. Acta Math., 49(3-4): , 197. [Len83] H. W. Lenstra, Jr. Integer programming with a fixed number of variables. Math. Oper. Res., 8(4): , [LLL8] A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovász. Factoring polynomials with rational coefficients. Math. Ann., 61(4): , 198.
13 THE DIOPHANTINE EXPONENT OF THE Z/qZ POINTS OF S d S d 13 [LPS88] A. Lubotzky, R. Phillips, and P. Sarnak. Ramanujan graphs. Combinatorica, 8(3):61 77, [Mar88] G. A. Margulis. Explicit group-theoretic constructions of combinatorial schemes and their applications in the construction of expanders and concentrators. Problemy Peredachi Informatsii, 4(1):51 60, [PLQ08] Christophe Petit, Kristin Lauter, and Jean-Jacques Quisquater. Full Cryptanalysis of LPS and Morgenstern Hash Functions, pages Springer Berlin Heidelberg, Berlin, Heidelberg, 008. [PS18] Ori Parzanchevski and Peter Sarnak. Super-golden-gates for P U(). Adv. Math., 37: , 018. [RS16] Neil J. Ross and Peter Selinger. Optimal ancilla-free Clifford + T approximation of z-rotations. Quantum Inf. Comput., 16(11-1): , 016. [Sar15a] N. T Sardari. Optimal strong approximation for quadratic forms. ArXiv e-prints, October 015. [Sar15b] Peter Sarnak. Letter to Scott Aaronson and Andy Pollington on the Solovay- Kitaev Theorem, February https://publications.ias.edu/sarnak/paper/637. [Sar17a] N. T Sardari. Complexity of strong approximation on the sphere. ArXiv e-prints, March 017. [Sar17b] N. T. Sardari. Navigating LPS Ramanujan Graphs, March com/ntalebiz/navigating-lps-ramanujan-graphs. [Sar18] Naser T. Sardari. Diameter of ramanujan graphs and random cayley graphs. Combinatorica, Aug 018. [Sch85] René Schoof. Elliptic curves over finite fields and the computation of square roots mod p. Math. Comp., 44(170): , Department of Mathematics, UW-Madison, Madison, WI address: mwhassan@wisc.edu Department of Mathematics, UW-Madison, Madison, WI address: mao36@wisc.edu Department of Mathematics, UW-Madison, Madison, WI address: ntalebiz@math.wisc.edu Department of Mathematics, UW-Madison, Madison, WI address: rlsmithjr134@gmail.com Department of Mathematics, UW-Madison, Madison, WI address: xzhu74@wisc.edu
arxiv: v2 [math.nt] 5 Sep 2018
COMPLEXITY OF STRONG APPROXIMATION ON THE SPHERE arxiv:1703.02709v2 [math.nt] 5 Sep 2018 NASER T. SARDARI Abstract. By assuming some widely-believed arithmetic conjectures, we show that the task of accepting
More informationDIAMETER OF RAMANUJAN GRAPHS AND RANDOM CAYLEY GRAPHS
Bolyai Society Springer-Verlag Combinatorica 1 20 DIAMETER OF RAMANUJAN GRAPHS AND RANDOM CAYLEY GRAPHS NASER T. SARDARI Received March 2, 2016 Revised September 2, 2017 We study the diameter of LPS Ramanujan
More informationHash functions and Cayley graphs: The end of the story?
Hash functions and Cayley graphs: The end of the story? Christophe Petit Microelectronics Laboratory Ch. Petit - Montréal WCSC - April 2010 1 Hash functions H : {0, 1} {0, 1} n Microelectronics Laboratory
More informationJean Bourgain Institute for Advanced Study Princeton, NJ 08540
Jean Bourgain Institute for Advanced Study Princeton, NJ 08540 1 ADDITIVE COMBINATORICS SUM-PRODUCT PHENOMENA Applications to: Exponential sums Expanders and spectral gaps Invariant measures Pseudo-randomness
More informationHow to Factor N 1 and N 2 When p 1 = p 2 mod 2 t
How to Factor N 1 and N 2 When p 1 = p 2 mod 2 t Kaoru Kurosawa and Takuma Ueda Ibaraki University, Japan Abstract. Let N 1 = p 1q 1 and N 2 = p 2q 2 be two different RSA moduli. Suppose that p 1 = p 2
More informationThe primitive root theorem
The primitive root theorem Mar Steinberger First recall that if R is a ring, then a R is a unit if there exists b R with ab = ba = 1. The collection of all units in R is denoted R and forms a group under
More informationMA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES
MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES 2018 57 5. p-adic Numbers 5.1. Motivating examples. We all know that 2 is irrational, so that 2 is not a square in the rational field Q, but that we can
More information1: Introduction to Lattices
CSE 206A: Lattice Algorithms and Applications Winter 2012 Instructor: Daniele Micciancio 1: Introduction to Lattices UCSD CSE Lattices are regular arrangements of points in Euclidean space. The simplest
More informationThe Shortest Vector Problem (Lattice Reduction Algorithms)
The Shortest Vector Problem (Lattice Reduction Algorithms) Approximation Algorithms by V. Vazirani, Chapter 27 - Problem statement, general discussion - Lattices: brief introduction - The Gauss algorithm
More informationCycle lengths in sparse graphs
Cycle lengths in sparse graphs Benny Sudakov Jacques Verstraëte Abstract Let C(G) denote the set of lengths of cycles in a graph G. In the first part of this paper, we study the minimum possible value
More informationShortest Vector Problem (1982; Lenstra, Lenstra, Lovasz)
Shortest Vector Problem (1982; Lenstra, Lenstra, Lovasz) Daniele Micciancio, University of California at San Diego, www.cs.ucsd.edu/ daniele entry editor: Sanjeev Khanna INDEX TERMS: Point lattices. Algorithmic
More informationPractical Analysis of Key Recovery Attack against Search-LWE Problem
Practical Analysis of Key Recovery Attack against Search-LWE Problem The 11 th International Workshop on Security, Sep. 13 th 2016 Momonari Kudo, Junpei Yamaguchi, Yang Guo and Masaya Yasuda 1 Graduate
More informationJeong-Hyun Kang Department of Mathematics, University of West Georgia, Carrollton, GA
#A33 INTEGERS 10 (2010), 379-392 DISTANCE GRAPHS FROM P -ADIC NORMS Jeong-Hyun Kang Department of Mathematics, University of West Georgia, Carrollton, GA 30118 jkang@westga.edu Hiren Maharaj Department
More informationApplication of the LLL Algorithm in Sphere Decoding
Application of the LLL Algorithm in Sphere Decoding Sanzheng Qiao Department of Computing and Software McMaster University August 20, 2008 Outline 1 Introduction Application Integer Least Squares 2 Sphere
More informationDIVISIBILITY AND DISTRIBUTION OF PARTITIONS INTO DISTINCT PARTS
DIVISIBILITY AND DISTRIBUTION OF PARTITIONS INTO DISTINCT PARTS JEREMY LOVEJOY Abstract. We study the generating function for (n), the number of partitions of a natural number n into distinct parts. Using
More informationLATTICE POINT COVERINGS
LATTICE POINT COVERINGS MARTIN HENK AND GEORGE A. TSINTSIFAS Abstract. We give a simple proof of a necessary and sufficient condition under which any congruent copy of a given ellipsoid contains an integral
More informationOn Siegel s lemma outside of a union of varieties. Lenny Fukshansky Claremont McKenna College & IHES
On Siegel s lemma outside of a union of varieties Lenny Fukshansky Claremont McKenna College & IHES Universität Magdeburg November 9, 2010 1 Thue and Siegel Let Ax = 0 (1) be an M N linear system of rank
More informationReduction of Smith Normal Form Transformation Matrices
Reduction of Smith Normal Form Transformation Matrices G. Jäger, Kiel Abstract Smith normal form computations are important in group theory, module theory and number theory. We consider the transformation
More informationNUMBER FIELDS WITHOUT SMALL GENERATORS
NUMBER FIELDS WITHOUT SMALL GENERATORS JEFFREY D. VAALER AND MARTIN WIDMER Abstract. Let D > be an integer, and let b = b(d) > be its smallest divisor. We show that there are infinitely many number fields
More informationFactoring univariate polynomials over the rationals
Factoring univariate polynomials over the rationals Tommy Hofmann TU Kaiserslautern November 21, 2017 Tommy Hofmann Factoring polynomials over the rationals November 21, 2017 1 / 31 Factoring univariate
More informationMaterial covered: Class numbers of quadratic fields, Valuations, Completions of fields.
ALGEBRAIC NUMBER THEORY LECTURE 6 NOTES Material covered: Class numbers of quadratic fields, Valuations, Completions of fields. 1. Ideal class groups of quadratic fields These are the ideal class groups
More information#A5 INTEGERS 18A (2018) EXPLICIT EXAMPLES OF p-adic NUMBERS WITH PRESCRIBED IRRATIONALITY EXPONENT
#A5 INTEGERS 8A (208) EXPLICIT EXAMPLES OF p-adic NUMBERS WITH PRESCRIBED IRRATIONALITY EXPONENT Yann Bugeaud IRMA, UMR 750, Université de Strasbourg et CNRS, Strasbourg, France bugeaud@math.unistra.fr
More informationHOMEWORK 11 MATH 4753
HOMEWORK 11 MATH 4753 Recall that R = Z[x]/(x N 1) where N > 1. For p > 1 any modulus (not necessarily prime), R p = (Z/pZ)[x]/(x N 1). We do not assume p, q are prime below unless otherwise stated. Question
More informationInteger Factorization using lattices
Integer Factorization using lattices Antonio Vera INRIA Nancy/CARAMEL team/anr CADO/ANR LAREDA Workshop Lattice Algorithmics - CIRM - February 2010 Plan Introduction Plan Introduction Outline of the algorithm
More informationGRAPHS WITH LARGE GIRTH AND LARGE CHROMATIC NUMBER
GRAPHS WITH LARGE GIRTH AND LARGE CHROMATIC NUMBER CHEUK TO TSUI Abstract. This paper investigates graphs that have large girth and large chromatic number. We first give a construction of a family of graphs
More informationCSE 206A: Lattice Algorithms and Applications Spring Basis Reduction. Instructor: Daniele Micciancio
CSE 206A: Lattice Algorithms and Applications Spring 2014 Basis Reduction Instructor: Daniele Micciancio UCSD CSE No efficient algorithm is known to find the shortest vector in a lattice (in arbitrary
More informationEigenvalues, random walks and Ramanujan graphs
Eigenvalues, random walks and Ramanujan graphs David Ellis 1 The Expander Mixing lemma We have seen that a bounded-degree graph is a good edge-expander if and only if if has large spectral gap If G = (V,
More informationThe Problem of Constructing Efficient Universal Sets of Quantum Gates
The Problem of Constructing Efficient Universal Sets of Quantum Gates Qingzhong Liang and Jessica Thompson Abstract The purpose of this report is threefold. First, we study the paper [Letter] in detail
More informationHard Instances of Lattice Problems
Hard Instances of Lattice Problems Average Case - Worst Case Connections Christos Litsas 28 June 2012 Outline Abstract Lattices The Random Class Worst-Case - Average-Case Connection Abstract Christos Litsas
More informationShort multipliers for the extended gcd problem
Short multipliers for the extended gcd problem Keith Matthews Abstract For given non zero integers s 1,, s m, the problem of finding integers a 1,, a m satisfying s = gcd (s 1,, s m ) = a 1 s 1 + + a m
More informationPolynomial analogues of Ramanujan congruences for Han s hooklength formula
Polynomial analogues of Ramanujan congruences for Han s hooklength formula William J. Keith CELC, University of Lisbon Email: william.keith@gmail.com Detailed arxiv preprint: 1109.1236 Context Partition
More informationRoth s Theorem on Arithmetic Progressions
September 25, 2014 The Theorema of Szemerédi and Roth For Λ N the (upper asymptotic) density of Λ is the number σ(λ) := lim sup N Λ [1, N] N [0, 1] The Theorema of Szemerédi and Roth For Λ N the (upper
More informationCourse 2316 Sample Paper 1
Course 2316 Sample Paper 1 Timothy Murphy April 19, 2015 Attempt 5 questions. All carry the same mark. 1. State and prove the Fundamental Theorem of Arithmetic (for N). Prove that there are an infinity
More informationSolutions 2016 AB Exam
Solutions 206 AB Exam Texas A&M High School Math Contest October 22, 206. If (x, y) is a point on the circle x 2 + y 2 = and the distance from (x, y) to (0, ) is 6 5, what is the value of y? ANSWER: 7
More informationLattices. A Lattice is a discrete subgroup of the additive group of n-dimensional space R n.
Lattices A Lattice is a discrete subgroup of the additive group of n-dimensional space R n. Lattices have many uses in cryptography. They may be used to define cryptosystems and to break other ciphers.
More informationDiophantine equations via weighted LLL algorithm
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL algorithm Momonari Kudo Graduate School of Mathematics, Kyushu University, JAPAN Kyushu University Number Theory
More informationHECKE OPERATORS ON CERTAIN SUBSPACES OF INTEGRAL WEIGHT MODULAR FORMS.
HECKE OPERATORS ON CERTAIN SUBSPACES OF INTEGRAL WEIGHT MODULAR FORMS. MATTHEW BOYLAN AND KENNY BROWN Abstract. Recent works of Garvan [2] and Y. Yang [7], [8] concern a certain family of half-integral
More informationTHE HEIGHT OF ALGEBRAIC UNITS IN LOCAL FIELDS*
THE HEIGHT OF ALGEBRAIC UNITS IN LOCAL FIELDS* CLAYTON PETSCHE Abstract. Given a number field k and a non-archimedean place v of k, we give a quantitative lower bound on the height of non-torsion algebraic
More informationPrime Numbers and Irrational Numbers
Chapter 4 Prime Numbers and Irrational Numbers Abstract The question of the existence of prime numbers in intervals is treated using the approximation of cardinal of the primes π(x) given by Lagrange.
More informationDiscrete Math, Second Problem Set (June 24)
Discrete Math, Second Problem Set (June 24) REU 2003 Instructor: Laszlo Babai Scribe: D Jeremy Copeland 1 Number Theory Remark 11 For an arithmetic progression, a 0, a 1 = a 0 +d, a 2 = a 0 +2d, to have
More information1 Shortest Vector Problem
Lattices in Cryptography University of Michigan, Fall 25 Lecture 2 SVP, Gram-Schmidt, LLL Instructor: Chris Peikert Scribe: Hank Carter Shortest Vector Problem Last time we defined the minimum distance
More informationCountable subgroups of Euclidean space
Countable subgroups of Euclidean space Arnold W. Miller April 2013 revised May 21, 2013 In his paper [1], Konstantinos Beros proved a number of results about compactly generated subgroups of Polish groups.
More informationOn the expansion rate of Margulis expanders
On the expansion rate of Margulis expanders Nathan Linial Eran London Institute of Computer Science Department of Computer Science Hebrew University Hadassah Academic College Jerusalem 9904 Jerusalem 900
More informationarxiv: v3 [math.nt] 25 May 2016
ON REDUED ARAKELOV DIVISORS OF REAL QUADRATI FIELDS HA THANH NGUYEN TRAN arxiv:4.5043v3 [math.nt] 5 May 06 Abstract. We generalize the concept of reduced Arakelov divisors and define - reduced divisors
More informationCONTINUED FRACTIONS, PELL S EQUATION, AND TRANSCENDENTAL NUMBERS
CONTINUED FRACTIONS, PELL S EQUATION, AND TRANSCENDENTAL NUMBERS JEREMY BOOHER Continued fractions usually get short-changed at PROMYS, but they are interesting in their own right and useful in other areas
More informationFINITE GROUPS AND EQUATIONS OVER FINITE FIELDS A PROBLEM SET FOR ARIZONA WINTER SCHOOL 2016
FINITE GROUPS AND EQUATIONS OVER FINITE FIELDS A PROBLEM SET FOR ARIZONA WINTER SCHOOL 2016 PREPARED BY SHABNAM AKHTARI Introduction and Notations The problems in Part I are related to Andrew Sutherland
More informationFull Cryptanalysis of LPS and Morgenstern Hash Functions
Full Cryptanalysis of LPS and Morgenstern Hash Functions Christophe Petit 1, Kristin Lauter 2 and Jean-Jacques Quisquater 1 1 UCL Crypto Group, 2 Microsoft Research. e-mails: christophe.petit@uclouvain.be,klauter@microsoft.com,jjq@uclouvain.be
More informationAlgebraic Constructions of Graphs
Spectral Graph Theory Lecture 15 Algebraic Constructions of Graphs Daniel A. Spielman October 17, 2012 15.1 Overview In this lecture, I will explain how to make graphs from linear error-correcting codes.
More informationMath 350 Fall 2011 Notes about inner product spaces. In this notes we state and prove some important properties of inner product spaces.
Math 350 Fall 2011 Notes about inner product spaces In this notes we state and prove some important properties of inner product spaces. First, recall the dot product on R n : if x, y R n, say x = (x 1,...,
More informationKähler configurations of points
Kähler configurations of points Simon Salamon Oxford, 22 May 2017 The Hesse configuration 1/24 Let ω = e 2πi/3. Consider the nine points [0, 1, 1] [0, 1, ω] [0, 1, ω 2 ] [1, 0, 1] [1, 0, ω] [1, 0, ω 2
More informationSUM-PRODUCT ESTIMATES APPLIED TO WARING S PROBLEM MOD P
SUM-PRODUCT ESTIMATES APPLIED TO WARING S PROBLEM MOD P TODD COCHRANE AND CHRISTOPHER PINNER Abstract. Let γ(k, p) denote Waring s number (mod p) and δ(k, p) denote the ± Waring s number (mod p). We use
More informationLecture 5: CVP and Babai s Algorithm
NYU, Fall 2016 Lattices Mini Course Lecture 5: CVP and Babai s Algorithm Lecturer: Noah Stephens-Davidowitz 51 The Closest Vector Problem 511 Inhomogeneous linear equations Recall that, in our first lecture,
More informationTHE LEAST PRIME IDEAL IN A GIVEN IDEAL CLASS
THE LEAST PRIME IDEAL IN A GIVEN IDEAL CLASS NASER T. SARDARI Abstract. Let K be a number field with the discriminant D K and the class number, which has bounded degree over Q. By assuming GRH, we prove
More informationAffine extractors over large fields with exponential error
Affine extractors over large fields with exponential error Jean Bourgain Zeev Dvir Ethan Leeman Abstract We describe a construction of explicit affine extractors over large finite fields with exponentially
More informationExtend Fermats Small Theorem to r p 1 mod p 3 for divisors r of p ± 1
Extend Fermats Small Theorem to r p 1 mod p 3 for divisors r of p ± 1 Nico F. Benschop AmSpade Research, The Netherlands Abstract By (p ± 1) p p 2 ± 1 mod p 3 and by the lattice structure of Z(.) mod q
More informationDefinitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations
Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of
More informationERIC LARSON AND LARRY ROLEN
PROGRESS TOWARDS COUNTING D 5 QUINTIC FIELDS ERIC LARSON AND LARRY ROLEN Abstract. Let N5, D 5, X) be the number of quintic number fields whose Galois closure has Galois group D 5 and whose discriminant
More informationOn Systems of Diagonal Forms II
On Systems of Diagonal Forms II Michael P Knapp 1 Introduction In a recent paper [8], we considered the system F of homogeneous additive forms F 1 (x) = a 11 x k 1 1 + + a 1s x k 1 s F R (x) = a R1 x k
More informationBasic Algorithms in Number Theory
Basic Algorithms in Number Theory Algorithmic Complexity... 1 Basic Algorithms in Number Theory Francesco Pappalardi Discrete Logs, Modular Square Roots & Euclidean Algorithm. July 20 th 2010 Basic Algorithms
More informationDIVISIBILITY PROPERTIES OF THE 5-REGULAR AND 13-REGULAR PARTITION FUNCTIONS
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 8 (008), #A60 DIVISIBILITY PROPERTIES OF THE 5-REGULAR AND 13-REGULAR PARTITION FUNCTIONS Neil Calkin Department of Mathematical Sciences, Clemson
More informationCSE 206A: Lattice Algorithms and Applications Spring Minkowski s theorem. Instructor: Daniele Micciancio
CSE 206A: Lattice Algorithms and Applications Spring 2014 Minkowski s theorem Instructor: Daniele Micciancio UCSD CSE There are many important quantities associated to a lattice. Some of them, like the
More informationTewodros Amdeberhan, Dante Manna and Victor H. Moll Department of Mathematics, Tulane University New Orleans, LA 70118
The -adic valuation of Stirling numbers Tewodros Amdeberhan, Dante Manna and Victor H. Moll Department of Mathematics, Tulane University New Orleans, LA 7011 Abstract We analyze properties of the -adic
More informationarxiv: v1 [math.nt] 20 Nov 2017
REDUCED IDEALS FROM THE REDUCTION ALGORITHM HA THANH NGUYEN TRAN arxiv:171107573v1 [mathnt] 20 Nov 2017 Abstract The reduction algorithm is used to compute reduced ideals of a number field However, there
More informationDeciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point
Deciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point Gérard Cornuéjols 1 and Yanjun Li 2 1 Tepper School of Business, Carnegie Mellon
More informationTHE FUNDAMENTAL GROUP OF THE DOUBLE OF THE FIGURE-EIGHT KNOT EXTERIOR IS GFERF
THE FUNDAMENTAL GROUP OF THE DOUBLE OF THE FIGURE-EIGHT KNOT EXTERIOR IS GFERF D. D. LONG and A. W. REID Abstract We prove that the fundamental group of the double of the figure-eight knot exterior admits
More informationA proof of Freiman s Theorem, continued. An analogue of Freiman s Theorem in a bounded torsion group
A proof of Freiman s Theorem, continued Brad Hannigan-Daley University of Waterloo Freiman s Theorem Recall that a d-dimensional generalized arithmetic progression (GAP) in an abelian group G is a subset
More information1 i<j k (g ih j g j h i ) 0.
CONSECUTIVE PRIMES IN TUPLES WILLIAM D. BANKS, TRISTAN FREIBERG, AND CAROLINE L. TURNAGE-BUTTERBAUGH Abstract. In a stunning new advance towards the Prime k-tuple Conjecture, Maynard and Tao have shown
More informationCluster Heading Standard MVP. Analyze proportional relationships and use them to solve real- world and mathematical problems.
Quarter 1 Review of 7 th and 8 th grade Standards: Review Total Days 45 REVIEW OF 7 th and 8 th grade standards: Ratios and Proportional Relationships Analyze proportional relationships and use them to
More informationHypersurfaces and the Weil conjectures
Hypersurfaces and the Weil conjectures Anthony J Scholl University of Cambridge 13 January 2010 1 / 21 Number theory What do number theorists most like to do? (try to) solve Diophantine equations x n +
More information47-831: Advanced Integer Programming Lecturer: Amitabh Basu Lecture 2 Date: 03/18/2010
47-831: Advanced Integer Programming Lecturer: Amitabh Basu Lecture Date: 03/18/010 We saw in the previous lecture that a lattice Λ can have many bases. In fact, if Λ is a lattice of a subspace L with
More informationA LOWER BOUND FOR THE SIZE OF A MINKOWSKI SUM OF DILATES. 1. Introduction
A LOWER BOUND FOR THE SIZE OF A MINKOWSKI SUM OF DILATES Y. O. HAMIDOUNE AND J. RUÉ Abstract. Let A be a finite nonempty set of integers. An asymptotic estimate of several dilates sum size was obtained
More informationNecessary and Sufficient Conditions for the Central Norm to Equal 2 h in the Simple Continued Fraction Expansion of 2 h c for Any Odd Non-Square c > 1
Necessary and Sufficient Conditions for the Central Norm to Equal 2 h in the Simple Continued Fraction Expansion of 2 h c for Any Odd Non-Square c > 1 R.A. Mollin Abstract We look at the simple continued
More informationsatisfying ( i ; j ) = ij Here ij = if i = j and 0 otherwise The idea to use lattices is the following Suppose we are given a lattice L and a point ~x
Dual Vectors and Lower Bounds for the Nearest Lattice Point Problem Johan Hastad* MIT Abstract: We prove that given a point ~z outside a given lattice L then there is a dual vector which gives a fairly
More information2-Distance Problems. Combinatorics, 2016 Fall, USTC Week 16, Dec 20&22. Theorem 1. (Frankl-Wilson, 1981) If F is an L-intersecting family in 2 [n],
Combinatorics, 206 Fall, USTC Week 6, Dec 20&22 2-Distance Problems Theorem (Frankl-Wilson, 98 If F is an L-intersecting family in 2 [n], then F L k=0 ( n k Proof Let F = {A, A 2,, A m } where A A 2 A
More informationLattice-Based Cryptography: Mathematical and Computational Background. Chris Peikert Georgia Institute of Technology.
Lattice-Based Cryptography: Mathematical and Computational Background Chris Peikert Georgia Institute of Technology crypt@b-it 2013 1 / 18 Lattice-Based Cryptography y = g x mod p m e mod N e(g a, g b
More informationA characterization of regular tetrahedra in Z3
Columbus State University CSU epress Faculty Bibliography 2009 A characterization of regular tetrahedra in Z3 Eugen J. Ionascu Follow this and additional works at: http://csuepress.columbusstate.edu/bibliography_faculty
More informationNAVIGATING IN THE CAYLEY GRAPH OF SL 2 (F p ) AND APPLICATIONS TO HASHING
NAVIGATING IN THE CAYLEY GRAPH OF SL F p AND APPLICATIONS TO HASHING LISA BROMBERG, VLADIMIR SHPILRAIN, AND ALINA VDOVINA ABSTRACT. Cayley hash functions are based on a simple idea of using a pair of semigroup
More informationChapter 5: The Integers
c Dr Oksana Shatalov, Fall 2014 1 Chapter 5: The Integers 5.1: Axioms and Basic Properties Operations on the set of integers, Z: addition and multiplication with the following properties: A1. Addition
More informationDeterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring
Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring Jean-Sébastien Coron and Alexander May Gemplus Card International 34 rue Guynemer, 92447 Issy-les-Moulineaux, France
More informationHorocycle Flow at Prime Times
Horocycle Flow at Prime Times Peter Sarnak Mahler Lectures 2011 Rotation of the Circle A very simple (but by no means trivial) dynamical system is the rotation (or more generally translation in a compact
More informationCOMPUTING MODULAR POLYNOMIALS
COMPUTING MODULAR POLYNOMIALS DENIS CHARLES AND KRISTIN LAUTER 1. Introduction The l th modular polynomial, φ l (x, y), parameterizes pairs of elliptic curves with an isogeny of degree l between them.
More informationRings With Topologies Induced by Spaces of Functions
Rings With Topologies Induced by Spaces of Functions Răzvan Gelca April 7, 2006 Abstract: By considering topologies on Noetherian rings that carry the properties of those induced by spaces of functions,
More informationAuthor copy. for some integers a i, b i. b i
Cent. Eur. J. Math. 6(3) 008 48-487 DOI: 10.478/s11533-008-0038-4 Central European Journal of Mathematics Rational points on the unit sphere Research Article Eric Schmutz Mathematics Department, Drexel
More informationPILLAI S CONJECTURE REVISITED
PILLAI S COJECTURE REVISITED MICHAEL A. BEETT Abstract. We prove a generalization of an old conjecture of Pillai now a theorem of Stroeker and Tijdeman) to the effect that the Diophantine equation 3 x
More informationCSC 2414 Lattices in Computer Science September 27, Lecture 4. An Efficient Algorithm for Integer Programming in constant dimensions
CSC 2414 Lattices in Computer Science September 27, 2011 Lecture 4 Lecturer: Vinod Vaikuntanathan Scribe: Wesley George Topics covered this lecture: SV P CV P Approximating CVP: Babai s Nearest Plane Algorithm
More informationChapter 8. P-adic numbers. 8.1 Absolute values
Chapter 8 P-adic numbers Literature: N. Koblitz, p-adic Numbers, p-adic Analysis, and Zeta-Functions, 2nd edition, Graduate Texts in Mathematics 58, Springer Verlag 1984, corrected 2nd printing 1996, Chap.
More informationKnow the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element.
The first exam will be on Monday, June 8, 202. The syllabus will be sections. and.2 in Lax, and the number theory handout found on the class web site, plus the handout on the method of successive squaring
More informationSome Sieving Algorithms for Lattice Problems
Foundations of Software Technology and Theoretical Computer Science (Bangalore) 2008. Editors: R. Hariharan, M. Mukund, V. Vinay; pp - Some Sieving Algorithms for Lattice Problems V. Arvind and Pushkar
More informationObservations Homework Checkpoint quizzes Chapter assessments (Possibly Projects) Blocks of Algebra
September The Building Blocks of Algebra Rates, Patterns and Problem Solving Variables and Expressions The Commutative and Associative Properties The Distributive Property Equivalent Expressions Seeing
More informationSzemerédi-Trotter theorem and applications
Szemerédi-Trotter theorem and applications M. Rudnev December 6, 2004 The theorem Abstract These notes cover the material of two Applied post-graduate lectures in Bristol, 2004. Szemerédi-Trotter theorem
More informationSome zero-sum constants with weights
Proc. Indian Acad. Sci. (Math. Sci.) Vol. 118, No. 2, May 2008, pp. 183 188. Printed in India Some zero-sum constants with weights S D ADHIKARI 1, R BALASUBRAMANIAN 2, F PAPPALARDI 3 andprath 2 1 Harish-Chandra
More informationExplicit estimates in inter-universal Teichmüller theory (in progress) (joint work w/ I. Fesenko, Y. Hoshi, S. Mochizuki, and W.
Explicit estimates in inter-universal Teichmüller theory (in progress) (joint work w/ I Fesenko, Y Hoshi, S Mochizuki, and W Porowski) Arata Minamide RIMS, Kyoto University November 2, 2018 Arata Minamide
More informationCullen Numbers in Binary Recurrent Sequences
Cullen Numbers in Binary Recurrent Sequences Florian Luca 1 and Pantelimon Stănică 2 1 IMATE-UNAM, Ap. Postal 61-3 (Xangari), CP 58 089 Morelia, Michoacán, Mexico; e-mail: fluca@matmor.unam.mx 2 Auburn
More informationIntegral points of a modular curve of level 11. by René Schoof and Nikos Tzanakis
June 23, 2011 Integral points of a modular curve of level 11 by René Schoof and Nikos Tzanakis Abstract. Using lower bounds for linear forms in elliptic logarithms we determine the integral points of the
More information1 The Fundamental Theorem of Arithmetic. A positive integer N has a unique prime power decomposition. Primality Testing. and. Integer Factorisation
1 The Fundamental Theorem of Arithmetic A positive integer N has a unique prime power decomposition 2 Primality Testing Integer Factorisation (Gauss 1801, but probably known to Euclid) The Computational
More informationModular Arithmetic Instructor: Marizza Bailey Name:
Modular Arithmetic Instructor: Marizza Bailey Name: 1. Introduction to Modular Arithmetic If someone asks you what day it is 145 days from now, what would you answer? Would you count 145 days, or find
More informationTheoretical Cryptography, Lecture 13
Theoretical Cryptography, Lecture 13 Instructor: Manuel Blum Scribe: Ryan Williams March 1, 2006 1 Today Proof that Z p has a generator Overview of Integer Factoring Discrete Logarithm and Quadratic Residues
More informationIntroduction to Number Theory
INTRODUCTION Definition: Natural Numbers, Integers Natural numbers: N={0,1,, }. Integers: Z={0,±1,±, }. Definition: Divisor If a Z can be writeen as a=bc where b, c Z, then we say a is divisible by b or,
More informationPolygonal Numbers, Primes and Ternary Quadratic Forms
Polygonal Numbers, Primes and Ternary Quadratic Forms Zhi-Wei Sun Nanjing University Nanjing 210093, P. R. China zwsun@nju.edu.cn http://math.nju.edu.cn/ zwsun August 26, 2009 Modern number theory has
More informationIntroduction to Arithmetic Geometry Fall 2013 Lecture #7 09/26/2013
18.782 Introduction to Arithmetic Geometry Fall 2013 Lecture #7 09/26/2013 In Lecture 6 we proved (most of) Ostrowski s theorem for number fields, and we saw the product formula for absolute values on
More information