Running time predictions for square products, and large prime variations. Ernie Croot, Andrew Granville, Robin Pemantle, & Prasad Tetali

Size: px
Start display at page:

Download "Running time predictions for square products, and large prime variations. Ernie Croot, Andrew Granville, Robin Pemantle, & Prasad Tetali"

Transcription

1 Running time predictions for square products, and large prime variations by Ernie Croot, Andrew Granville, Robin Pemantle, & Prasad Tetali

2 Factoring algorithms Dixon s random squares algorithm The quadratic sieve Multiple polynomial quadratic sieve The number field sieve. All have a common central idea

3 Factoring algorithms Dixon s random squares algorithm The quadratic sieve Multiple polynomial quadratic sieve The number field sieve Idea: Generate a pseudo-random sequence of integers a 1, a 2,..., with each a i b 2 i (mod n), until the product of a subseq of the a i s is a square, say Y 2 = a i1 a ik.

4 Factoring algorithms Dixon s random squares algorithm The quadratic sieve Multiple polynomial quadratic sieve The number field sieve Idea: Generate a pseudo-random sequence of integers a 1, a 2,..., with each a i b 2 i (mod n), until the product of a subseq of the a i s is a square, say Y 2 = a i1 a ik. Now, set X 2 = (b i1 b ik ) 2 and then n Y 2 X 2 = (Y X)(Y + X).

5 Factoring algorithms Dixon s random squares algorithm The quadratic sieve Multiple polynomial quadratic sieve The number field sieve Idea: Generate a pseudo-random sequence of integers a 1, a 2,..., with each a i b 2 i (mod n), until the product of a subseq of the a i s is a square, say Y 2 = a i1 a ik. Now, set X 2 = (b i1 b ik ) 2 and then n Y 2 X 2 = (Y X)(Y + X). 50% chance gcd(n, Y X) is a non-trivial factor of n.

6 Analysis of running times 1994 ICM, Pomerance: In the (heuristic) running time analysis of such factoring algorithms one assumes that the pseudo-random sequence a 1, a 2,... is close enough to random, to make predictions based on this assumption.. Why not study this as an abstract problem?

7 Analysis of running times 1994 ICM, Pomerance: In the (heuristic) running time analysis of such factoring algorithms one assumes that the pseudo-random sequence a 1, a 2,... is close enough to random, to make predictions based on this assumption. Pomerance s problem Select integers a 1, a 2, x independently at random; i.e. Prob(a j = m) = 1 x 1 m x; Stop at a T as soon as there exists a i1 a ik = Y 2 What is expected stopping time?

8 Pomerance s problem Select integers a 1, a 2, x independently at random; i.e. Prob(a j = m) = 1 x 1 m x; Stop at a T as soon as there exists a i1 a ik = Expected stopping time?. Is there any point to this?

9 Pomerance s problem Select integers a 1, a 2, x independently at random; i.e. Prob(a j = m) = 1 x 1 m x; Stop at a T as soon as there exists a i1 a ik = Expected stopping time? Interesting because... If this expected stopping time is far less than what is obtained by the algorithms currently used, maybe we can speeding up factoring algorithms.

10 Pomerance s problem Select integers a 1, a 2, x independently at random; i.e. Prob(a j = m) = 1 x 1 m x; Stop at a T as soon as there exists a i1 a ik = Expected stopping time? Interesting because... If this expected stopping time is far less than what is obtained by the algorithms currently used, maybe we can speeding up factoring algorithms. Even if not, a good understanding might lead to better choice of parameters for most factoring algorithms.

11 Pomerance s problem Select integers a 1, a 2, x independently at random; i.e. Prob(a j = m) = 1 x 1 m x; Stop at a T as soon as there exists a i1 a ik = Expected stopping time? Interesting because... If this expected stopping time is far less than what is obtained by the algorithms currently used, maybe we can speeding up factoring algorithms. Even if not, a good understanding might lead to better choice of parameters for most factoring algorithms. Possibility of proving something without assumption.

12 Previous best results π(y) = number of primes up to y. n is y-smooth if p n p y Ψ(x, y) = #y-smooths up to x.

13 Previous best results π(y) = number of primes up to y. n is y-smooth if p n p y Ψ(x, y) = #y-smooths up to x. Choose y 0 = y 0 (x) to maximize Ψ(x, y)/y, and let J 0 (x) := π(y 0) Ψ(x, y 0 ) x. ( J0 (x) e 2 log x log log x )

14 Previous best results π(y) = number of primes up to y. n is y-smooth if p n p y Ψ(x, y) = #y-smooths up to x. Choose y 0 = y 0 (x) to maximize Ψ(x, y)/y, and let J 0 (x) := π(y 0) Ψ(x, y 0 ) x Schroeppel: As x, Prob(T < (1 + ɛ)j 0 (x)) 1. ( J0 (x) e 2 log x log log x )

15 Previous best results π(y) = number of primes up to y. n is y-smooth if p n p y Ψ(x, y) = #y-smooths up to x. Choose y 0 = y 0 (x) to maximize Ψ(x, y)/y, and let J 0 (x) := π(y 0) Ψ(x, y 0 ) x Schroeppel: As x, Prob(T < (1 + ɛ)j 0 (x)) Pomerance: As x, Prob(T > J 0 (x) 1 ɛ ) 1. ( J0 (x) e 2 log x log log x )

16 Pomerance s problem Select integers a 1, a 2, x independently at random; i.e. Prob(a j = m) = 1 x 1 m x; Stop at a T as soon as there exists a i1 a ik = Expected stopping time, T? Schroeppel-Pomerance: With probability going to 1, we have J 0 (x) 1 ɛ < T < (1 + ɛ)j 0 (x). What should we be aiming to prove?

17 Pomerance s problem Select integers a 1, a 2, x independently at random; i.e. Prob(a j = m) = 1 x 1 m x; Stop at a T as soon as there exists a i1 a ik = Expected stopping time, T? Schroeppel-Pomerance: With probability going to 1, we have J 0 (x) 1 ɛ < T < (1 + ɛ)j 0 (x) Recently, in probability theory, results showing sharp transitions ; i.e. random algorithms tend to stop at a certain precise time with probability going to 1.

18 Pomerance s problem Expected stopping time, T? From Schroeppel and Pomerance: J 0 (x) 1 ɛ < T < (1 + ɛ)j 0 (x). with probability going to 1.

19 Pomerance s problem Expected stopping time, T? From Schroeppel and Pomerance: J 0 (x) 1 ɛ < T < (1 + ɛ)j 0 (x). with probability going to 1. Guess: There exists f(x), s.t. (1 ɛ)f(x) < T < (1 + ɛ)f(x), with probability going to 1.

20 Pomerance s problem Expected stopping time, T? From Schroeppel and Pomerance: J 0 (x) 1 ɛ < T < (1 + ɛ)j 0 (x). with probability going to 1. Guess: There exists f(x), s.t. (1 ɛ)f(x) < T < (1 + ɛ)f(x), with probability going to 1. Conjecture: f(x) = e γ J 0 (x), i.e. (1 ɛ)e γ J 0 (x) < T < (1+ɛ)e γ J 0 (x), with probability going to 1.

21 Pomerance s problem Expected stopping time, T? From Schroeppel and Pomerance: J 0 (x) 1 ɛ < T < (1 + ɛ)j 0 (x). with probability going to 1. Guess: There exists f(x), s.t. (1 ɛ)f(x) < T < (1 + ɛ)f(x), with probability going to 1. Conjecture: f(x) = e γ J 0 (x), i.e. (1 ɛ)e γ J 0 (x) < T < (1+ɛ)e γ J 0 (x), with probability going to 1. Theorem: Almost proved it! ( π 4 ɛ ) e γ J 0 (x) < T < (1+ɛ)e γ J 0 (x), with probability going to 1.

22 Pomerance s problem Theorems: With prob going to 1: π 4 ( e γ ɛ ) J 0 (x) < T < (e γ +ɛ)j 0 (x).

23 Pomerance s problem Theorems: With prob going to 1: π 4 ( e γ ɛ ) J 0 (x) < T < (e γ +ɛ)j 0 (x). All numbers in the square product a i1 a ik are y 2+ɛ 0 -smooth. There are k = y 1+o(1) 0 different a i s in the square product

24 Pomerance s problem Theorems: With prob going to 1: π 4 ( e γ ɛ ) J 0 (x) < T < (e γ +ɛ)j 0 (x). All numbers in the square product a i1 a ik are y 2+ɛ 0 -smooth. There are k = y 1+o(1) 0 different a i s in the square product If T < ( π 4 ɛ ) e γ J 0 (x) then the square product is just one a i, a square.

25 Schroeppel s 1985 approach Study only the y-smooth a i s. Factor each as a i = 2 e i,13 e i,2... p e i,k k

26 Schroeppel s 1985 approach Study only the y-smooth a i s. Factor each as a i = 2 e i,13 e i,2... p e i,k k Form the matrix with rows (e i,1, e i,2,..., e i,k )

27 Schroeppel s 1985 approach Study only the y-smooth a i s. Factor each as a i = 2 e i,13 e i,2... p e i,k k Form the matrix with rows (e i,1, e i,2,..., e i,k ) A subset of the y-smooth a i s forms a square product if and only if the sum of those rows is 0 (mod 2).

28 Schroeppel s 1985 approach Study only the y-smooth a i s. Factor each as a i = 2 e i,13 e i,2... p e i,k k Form the matrix with rows (e i,1, e i,2,..., e i,k ) A subset of the y-smooth a i s forms a square product if and only if the sum of those rows is 0 (mod 2). So a square product if > k rows.. How soon would we expect this?

29 Schroeppel s 1985 approach Study only the y-smooth a i s. Factor each as a i = 2 e i,13 e i,2... p e i,k k Form the matrix with rows (e i,1, e i,2,..., e i,k ) A subset of the y-smooth a i s forms a square product if and only if the sum of those rows is 0 (mod 2). So a square product if > k rows. Prob(a i is y smooth) = ψ(x, y)/x. E(# of rows) = T ψ(x, y)/x,

30 Schroeppel s 1985 approach Study only the y-smooth a i s. Factor each as a i = 2 e i,13 e i,2... p e i,k k Form the matrix with rows (e i,1, e i,2,..., e i,k ) A subset of the y-smooth a i s forms a square product if and only if the sum of those rows is 0 (mod 2). So a square product if > k rows. Prob(a i is y smooth) = ψ(x, y)/x. E(# of rows) = T ψ(x, y)/x, This is > k = π(y) for T > xπ(y)/ψ(x, y). Minimized at y = y 0, so T > J 0 (x).

31 Schroeppel s 1985 approach Study only the y-smooth a i s. Factor each as a i = 2 e i,13 e i,2... p e i,k k Form the matrix with rows (e i,1, e i,2,..., e i,k ) A subset of the y-smooth a i s forms a square product if and only if the sum of those rows is 0 (mod 2). So a square product if > k rows. Prob(a i is y smooth) = ψ(x, y)/x. E(# of rows) = T ψ(x, y)/x, This is > k = π(y) for T > xπ(y)/ψ(x, y). Minimized at y = y 0, so T > J 0 (x). Technique works, with prob 1, for T > (1 + ɛ)j 0 (x)

32 Schroeppel s 1985 approach Factor base: Primes up to y Keep only y-smooth a i s Square product after k such a i s

33 Schroeppel s 1985 approach Factor base: Primes up to y Keep only y-smooth a i s Square product after k such a i s Practical to implement

34 Schroeppel s 1985 approach Factor base: Primes up to y Keep only y-smooth a i s Square product after k such a i s Practical to implement New result: By time (1+ɛ)J 0 (x) one has not one square product, but many, about ɛπ(y 0 ), with prob 1.

35 Schroeppel s 1985 approach Factor base: Primes up to y Keep only y-smooth a i s Square product after k such a i s Practical to implement New result: By time (1+ɛ)J 0 (x) one has not one square product, but many, about ɛπ(y 0 ), with prob 1. Key Variant: Large Prime Variation Also keep a i = pb i where b i is y- smooth and p is a prime > y.

36 Schroeppel s 1985 approach Factor base: Primes up to y Keep only y-smooth a i s Square product after k such a i s Practical to implement New result: By time (1+ɛ)J 0 (x) one has not one square product, but many, about ɛπ(y 0 ), with prob 1. Key Variant: Large Prime Variation Also keep a i = pb i where b i is y- smooth and p is a prime > y. With two, pb i and pb j, their product p 2 b i b j is a y-pseudosmooth and can be used as a row in our matrix.

37 Schroeppel s 1985 approach Factor base: Primes up to y Keep only y-smooth a i s Square product after k such a i s Practical to implement New result: By time (1+ɛ)J 0 (x) one has not one square product, but many, about ɛπ(y 0 ), with prob 1. Key Variant: Large Prime Variation Also keep a i = pb i where b i is y- smooth and p is a prime > y. With two, pb i and pb j, their product p 2 b i b j is a y-pseudosmooth and can be used as a row in our matrix. Theorem: Speed up by factor Will prove this later

38 Multiple large prime variations Can try two large primes: a i = pqb i, b i is y-smooth, p, q primes > y.

39 Multiple large prime variations Can try two large primes: a i = pqb i, b i is y-smooth, p, q primes > y. And three large primes, etc.

40 Multiple large prime variations Can try two large primes: a i = pqb i, b i is y-smooth, p, q primes > y. And three large primes, etc. Practical issues: Upper bound on extra primes, say y < p < My.

41 Multiple large prime variations Can try two large primes: a i = pqb i, b i is y-smooth, p, q primes > y. And three large primes, etc. Practical issues: Upper bound on extra primes, say y < p < My. How to find pseudosmooths?. More on that later

42 Multiple large prime variations Can try two large primes: a i = pqb i, b i is y-smooth, p, q primes > y. And three large primes, etc. Practical issues: Upper bound on extra primes, say y < p < My. How to find pseudosmooths? PROVED SPEED-UPS l M = M = 100 M = For l-large primes variation, each large prime in (y, M y).. Speed-up for # of a i s searched, not for factoring algorithm

43 Speed-ups l M = M = 100 M = For l-large primes variation, each large prime in (y, M y).

44 Speed-ups l M = M = 100 M = For l-large primes variation, each large prime in (y, M y). As l, M (M slowly), our speed up factor e γ =

45 Speed-ups l M = M = 100 M = For l-large primes variation, each large prime in (y, M y). As l, M (M slowly), our speed up factor e γ = How big are y 0 and J 0?

46 Speed-ups l M = M = 100 M = For l-large primes variation, each large prime in (y, M y). As l, M (M slowly), our speed up factor e γ = How big are y 0 and J 0? For L(x) =e 12 log x log log x, y 0 (x) = L(x) 1+o(1) and J 0 (x) = L(x) 2+o(1). These estimates can be made more precise but not to asymptotics

47 Such precise estimates? If we cannot be precise about the value of J 0, how can we determine these speed-up constants?

48 Such precise estimates? If we cannot be precise about the value of J 0, how can we determine these speed-up constants? 1986 Hildebrand and Tenenbaum: Even if we cannot give an asymptotic formula for Ψ(x, y), we can do so for Ψ(2x, y) Ψ(x, y) and similar qns where the variables involved are close in size. Our results here make full use of their estimates,

49 Such precise estimates? If we cannot be precise about the value of J 0, how can we determine these speed-up constants? 1986 Hildebrand and Tenenbaum: Even if we cannot give an asymptotic formula for Ψ(x, y), we can do so for Ψ(2x, y) Ψ(x, y) and similar qns where the variables involved are close in size. Our results here make full use of their estimates, But still cannot estimate J 0 accurately maybe value can be computed (Bernstein) in any example.

50 Analysis; one large prime, I Prob(a = pb x : b is y smooth) = Ψ(x/p, y) x

51 Analysis; one large prime, I Ψ(x/p, y) Prob(a = pb x : b is y smooth) = x = Ψ(x/p, y) Ψ(x, y) for y < p < y log y. Ψ(x, y) x log y p Ψ(x, y) x

52 Analysis; one large prime, I Ψ(x/p, y) Prob(a = pb x : b is y smooth) = x = Ψ(x/p, y) Ψ(x, y) Ψ(x, y) x log y p for y < p < y log y. Expected # of k-tuples, from the T = ηj 0 values of a i, that are p times a y-smooth: ( ) ( ) T log y Ψ(x, y) k k p x Ψ(x, y) x

53 Analysis; one large prime, I Ψ(x/p, y) Prob(a = pb x : b is y smooth) = x = Ψ(x/p, y) Ψ(x, y) Ψ(x, y) x log y p for y < p < y log y. Expected # of k-tuples, from the T = ηj 0 values of a i, that are p times a y-smooth: ( T k ) ( log y p Ψ(x, y) x as J 0 log yψ(x, y)/x y. ) k 1 k! ( ηy p Ψ(x, y) x ) k

54 Analysis; one large prime, I Ψ(x/p, y) Prob(a = pb x : b is y smooth) = x = Ψ(x/p, y) Ψ(x, y) Ψ(x, y) x log y p for y < p < y log y. Expected # of k-tuples, from the T = ηj 0 values of a i, that are p times a y-smooth: ( T k ) ( log y p Ψ(x, y) x ) k 1 k! ( ηy as J 0 log yψ(x, y)/x y. Expected number of k-tuples, including all p > y, is (ηy)k k! p>y 1 p k p Ψ(x, y) x ) k

55 Analysis; one large prime, I Ψ(x/p, y) Prob(a = pb x : b is y smooth) = x = Ψ(x/p, y) Ψ(x, y) Ψ(x, y) x log y p for y < p < y log y. Expected # of k-tuples, from the T = ηj 0 values of a i, that are p times a y-smooth: ( T k ) ( log y p Ψ(x, y) x ) k 1 k! ( ηy as J 0 log yψ(x, y)/x y. Expected number of k-tuples, including all p > y, is (ηy)k k! p>y p Ψ(x, y) x ) k 1 p k (ηy)k 1 k! (k 1)y k 1 log y

56 Analysis; one large prime, I Ψ(x/p, y) Prob(a = pb x : b is y smooth) = x Ψ(x/p, y) Ψ(x, y) = log y Ψ(x, y) x p for y < p < y log y. Expected # of k-tuples, from the T = ηj 0 values of a i, that are p times a y-smooth: ( ) ( ) T log y k 1 ( ηy Ψ(x, y) k p x k! p as J 0 log yψ(x, y)/x y. Expected number of k-tuples, including all p > y, is (ηy)k 1 k! p k (ηy)k 1 k! p>y η k (k 1)k! π(y) Ψ(x, y) x ) k (k 1)y k 1 log y

57 Analysis; one large prime, II Sps pb 1, pb 2,..., pb r amongst a i s, each b j is y-smooth.

58 Analysis; one large prime, II Sps pb 1, pb 2,..., pb r amongst a i s, each b j is y-smooth. These yield exactly r 1 mult indep pseudosmooths, (pb 1 )(pb 2 ), (pb 1 )(pb 3 ),..., (pb 1 )(pb r ).

59 Analysis; one large prime, II Sps pb 1, pb 2,..., pb r amongst a i s, each b j is y-smooth. These yield exactly r 1 mult indep pseudosmooths, (pb 1 )(pb 2 ), (pb 1 )(pb 3 ),..., (pb 1 )(pb r ). Use identity r 1 = I {1,...,r} I 2 ( 1) I ;

60 Analysis; one large prime, II Sps pb 1, pb 2,..., pb r amongst a i s, each b j is y-smooth. These yield exactly r 1 mult indep pseudosmooths, (pb 1 )(pb 2 ), (pb 1 )(pb 3 ),..., (pb 1 )(pb r ). Use identity r 1 = I {1,...,r} I 2 ( 1) I ; so total # smooths and pseudo-smooths: η k η + ( 1) k π(y) (k 1)k! k 2

61 Analysis; one large prime, II Sps pb 1, pb 2,..., pb r amongst a i s, each b j is y-smooth. These yield exactly r 1 mult indep pseudosmooths, (pb 1 )(pb 2 ), (pb 1 )(pb 3 ),..., (pb 1 )(pb r ). Use identity r 1 = I {1,...,r} I 2 ( 1) I ; so total # smooths and pseudo-smooths: η k η + ( 1) k π(y) (k 1)k! k 2 Constant = 1 for η = And for two large primes?

62 Two large primes, I Expected # pairs pqb 1 & pqb 2, and Expected # triples pqb 1, prb 2, qrb 3, bounded, so not useful!

63 Two large primes, I Expected # pairs pqb 1 & pqb 2, and Expected # triples pqb 1, prb 2, qrb 3, bounded, so not useful! Expected # triples pb 1, pqb 2, qb 3, is η 3 π(y).

64 Two large primes, I Expected # pairs pqb 1 & pqb 2, and Expected # triples pqb 1, prb 2, qrb 3, bounded, so not useful! Expected # triples pb 1, pqb 2, qb 3, is η 3 π(y). How do you tell the difference?

65 Two large primes, I Expected # pairs pqb 1 & pqb 2, and Expected # triples pqb 1, prb 2, qrb 3, bounded, so not useful! Expected # triples pb 1, pqb 2, qb 3, is η 3 π(y). How do you tell the difference? Construct matrix M for p, pq, p, with 2 ones in each col:

66 Two large primes, I Expected # pairs pqb 1 & pqb 2, and Expected # triples pqb 1, prb 2, qrb 3, bounded, so not useful! Expected # triples pb 1, pqb 2, qb 3, is η 3 π(y). How do you tell the difference? Construct matrix M for p, pq, p, with 2 ones in each col: Expect cπ(y) such triples iff #ones = #rows + #columns 1.

67 Two large primes, I Expected # pairs pqb 1 & pqb 2, and Expected # triples pqb 1, prb 2, qrb 3, bounded, so not useful! Expected # triples pb 1, pqb 2, qb 3, is η 3 π(y). How do you tell the difference? Construct matrix M for p, pq, p, with 2 ones in each col: Expect cπ(y) such triples iff #ones = #rows + #columns 1. Yields exactly #rows rank(m) mult indep pseudosmooths. Combinatorial identity like in one large prime case?

68 Many large primes, II Before used r 1 = I {1,...,r} I 2 ( 1) I.

69 Many large primes, II Before used r 1 = I {1,...,r} I 2 ( 1) I. Generalization: M := matrices s.t. #ones = #rows + #columns 1. M R has rows R.

70 Many large primes, II Before used r 1 = I {1,...,r} I 2 ( 1) I. Generalization: M := matrices s.t. #ones = #rows + #columns 1. M R has rows R. If M R M then #rows rank(m R ) = S R M S M ( 1) #ones(s)

71 Many large primes, II Before used r 1 = I {1,...,r} I 2 ( 1) I. Generalization: M := matrices s.t. #ones = #rows + #columns 1. M R has rows R. If M R M then #rows rank(m R ) = S R M S M ( 1) #ones(s) How do we count the different type of matrices that arise?

72 A graph theory approach Construct graph G = G(M): For each a i a vertex v i G, With v i v I of colour p j if p j (n i, n I ) M i,j = M I,j = 1.

73 A graph theory approach Construct graph G = G(M): For each a i a vertex v i G, With v i v I of colour p j if p j (n i, n I ) M i,j = M I,j = 1. If M M, G(M) is simple, & only cycles in G(M) are monochromatic

74 A graph theory approach Construct graph G = G(M): For each a i a vertex v i G, With v i v I of colour p j if p j (n i, n I ) M i,j = M I,j = 1. If M M, G(M) is simple, & only cycles in G(M) are monochromatic So cycles are subsets of the complete graph of edges of that colour.

75 A graph theory approach Construct graph G = G(M): For each a i a vertex v i G, With v i v I of colour p j if p j (n i, n I ) M i,j = M I,j = 1. If M M, G(M) is simple, & only cycles in G(M) are monochromatic So cycles are subsets of the complete graph of edges of that colour. Hence any two-connected subgraph of G(M) is a complete graph: This is known as a Husimi graph:

76 A graph theory approach Construct graph G = G(M): For each a i a vertex v i G, With v i v I of colour p j if p j (n i, n I ) M i,j = M I,j = 1. If M M, G(M) is simple, & only cycles in G(M) are monochromatic So cycles are subsets of the complete graph of edges of that colour. Hence any two-connected subgraph of G(M) is a complete graph: This is known as a Husimi graph: Inspired combinatorics of species, Central to gas thermodynamics

77 The theory of species Generating functions known for counting Husimi graphs with different parameters.

78 The theory of species Generating functions known for counting Husimi graphs with different parameters. Leads to:for T = ηj 0, the number of pseudosmooths is f(η)π(y 0 ) where f(η) satisfies ηf (η) = log(1 f(η)).

79 The theory of species Generating functions known for counting Husimi graphs with different parameters. Leads to:for T = ηj 0, the number of pseudosmooths is f(η)π(y 0 ) where f(η) satisfies ηf (η) = log(1 f(η)). This implies f(η) is monotone increasing, f(e γ ) = 1, but f(η) diverges for η > e γ.

80 The theory of species Generating functions known for counting Husimi graphs with different parameters. Leads to:for T = ηj 0, the number of pseudosmooths is f(η)π(y 0 ) where f(η) satisfies ηf (η) = log(1 f(η)). This implies f(η) is monotone increasing, f(e γ ) = 1, but f(η) diverges for η > e γ. Sadly we re-organized a non-abs cvgent series in our proof, and we have been unable to fix this proof! In fact we swapped order of summation in applying #rows rank(m R ) = S R M S M ( 1) #ones(s)

81 Lower bound on T Suppose T < ( π 4 ɛ ) e γ J 0 (x).

82 Lower bound on T Suppose T < ( π 4 ɛ ) e γ J 0 (x). Write each a i = b i d i where for each p a i we have p y p b i p > y p d i. If i I a i = then i I d i =.

83 Lower bound on T Suppose T < ( π 4 ɛ ) e γ J 0 (x). Write each a i = b i d i where for each p a i we have p y p b i p > y p d i. If i I a i = then i I d i =. Idea: For each k, Expected # of I with I = k & i I a i = Expected # of I with I = k & i I d i =.

84 Lower bound on T Suppose T < ( π 4 ɛ ) e γ J 0 (x). Write each a i = b i d i where for each p a i we have p y p b i p > y p d i. If i I a i = then i I d i =. Idea: For each k, Expected # of I with I = k & i I a i = Expected # of I with I = k & i I d i =. Bound this using Rankin s trick.

85 Lower bound on T Suppose T < ( π 4 ɛ ) e γ J 0 (x). Write each a i = b i d i where for each p a i we have p y p b i p > y p d i. If i I a i = then i I d i =. Idea: For each k, Expected # of I with I = k & i I a i = Expected # of I with I = k & i I d i =. Bound this using Rankin s trick. Picking y = y(k) carefully we show the prob is T 2 (log x)/x over all k 2

86 Lower bound on T Suppose T < ( π 4 ɛ ) e γ J 0 (x). Write each a i = b i d i where for each p a i we have p y p b i p > y p d i. If i I a i = then i I d i =. Idea: For each k, Expected # of I with I = k & i I a i = Expected # of I with I = k & i I d i =. Bound this using Rankin s trick. Picking y = y(k) carefully we show the prob is T 2 (log x)/x over all k 2, so most likely is I = 1 (which has probability T/ x).

87 Hypergraphs to the rescue Vertices correspond to primes in (y, My), and hyperedges to the odd power prime factors of each a i.

88 Hypergraphs to the rescue Vertices correspond to primes in (y, My), and hyperedges to the odd power prime factors of each a i. Viewpoint: Construction of a random hypergraph, using only a i that are helpful.

89 Hypergraphs to the rescue Vertices correspond to primes in (y, My), and hyperedges to the odd power prime factors of each a i. Viewpoint: Construction of a random hypergraph, using only a i that are helpful. Use Poisson point processes. Translate our discrete problem to continuous setting megatechnical!

90 Hypergraphs to the rescue Vertices correspond to primes in (y, My), and hyperedges to the odd power prime factors of each a i. Viewpoint: Construction of a random hypergraph, using only a i that are helpful. Use Poisson point processes. Translate our discrete problem to continuous setting megatechnical! This very different approach yields the same answer e γ J 0 (x).

91 Hypergraphs to the rescue Vertices correspond to primes in (y, My), and hyperedges to the odd power prime factors of each a i. Viewpoint: Construction of a random hypergraph, using only a i that are helpful. Use Poisson point processes. Translate our discrete problem to continuous setting megatechnical! This very different approach yields the same answer e γ J 0 (x). And the same divergence now implies one gets many square products soon after getting the first!

92 Pomerance s application If one optimizes parameters in Pomerance s problem, then the running time of the factoring algorithm is dominated by finding the square product (i.e. the matrix step). Matrix step: Wiedemann or Lanczos take time y 2 C log y log log y

93 Pomerance s application If one optimizes parameters in Pomerance s problem, then the running time of the factoring algorithm is dominated by finding the square product (i.e. the matrix step). Matrix step: Wiedemann or Lanczos take time y 2 C log y log log y To optimize random squares need y = y 1 = y 1 (1+o(1))/ log log x 0, much smaller than y 0, so Pomerance s problem not so useful as had appeared!

94 Pomerance s application If one optimizes parameters in Pomerance s problem, then the running time of the factoring algorithm is dominated by finding the square product (i.e. the matrix step). Matrix step: Wiedemann or Lanczos take time y 2 C log y log log y To optimize random squares need 1 (1+o(1))/ log log x y = y 1 = y0, much smaller than y 0, so Pomerance s problem not so useful as had appeared! Expected running time is: J 1 := J 0 y (1+o(1))/(log log x)2 0

95 Practical speed-ups for random squares algorithm from large prime variations Reduction in T obtained: l M = M = 100 M = For l-large primes variation, each large prime in (y, M y).

96 Practical speed-ups for random squares algorithm from large prime variations Reduction in T obtained: l M = M = 100 M = For l-large primes variation, each large prime in (y, M y). If reduction in T here is a factor η, then the random squares algorithm is sped up by a factor 1 (log x) log(1/η).

97 What practical people say Practical considerations (not theory): Design of the computer, Language & implementation, Memory issues (large arrays), swaps How reports handled Programmer s prejudices and prior experiences.

98 What practical people say Practical considerations (not theory): Design of the computer, Language & implementation, Memory issues (large arrays), swaps How reports handled Programmer s prejudices and prior experiences. Recognizing y-smooths: Quadratic sieve (& MPQS) Early abort strategies (for a i s with small y 2 -smooth part)

99 What practical people say Practical considerations (not theory): Design of the computer, Language & implementation, Memory issues (large arrays), swaps How reports handled Programmer s prejudices and prior experiences. Recognizing y-smooths: Quadratic sieve (& MPQS) Early abort strategies (for a i s with small y 2 -smooth part) Keep a i = b i p 1... p j, where b i is y- smooth for j k and p l (y, My): If M is large, then more a j s, more pseudosmooths, but slows down sieving (as there are more primes to test).

100 What practical people say, II Keep a i = b i p 1... p j, where b i is y- smooth for j k and p l (y, My): If k is large, then more a j s, but smaller proportion actually useful (lots of effort on useless a j ).

101 What practical people say, II Keep a i = b i p 1... p j, where b i is y- smooth for j k and p l (y, My): If k is large, then more a j s, but smaller proportion actually useful (lots of effort on useless a j ). Fix: Discard if two larger prime factors

102 What practical people say, II Keep a i = b i p 1... p j, where b i is y- smooth for j k and p l (y, My): If k is large, then more a j s, but smaller proportion actually useful (lots of effort on useless a j ). Fix: Discard if two larger prime factors Speed-ups in practice (Lenstra et al):.4 to.5 for k = 1;.15 to.25 for k = 2;.1 and.14 for k = 3.

103 What practical people say, II Keep a i = b i p 1... p j, where b i is y- smooth for j k and p l (y, My): If k is large, then more a j s, but smaller proportion actually useful (lots of effort on useless a j ). Fix: Discard if two larger prime factors Speed-ups in practice (Lenstra et al):.4 to.5 for k = 1;.15 to.25 for k = 2;.1 and.14 for k = 3. For more: Willemien Ekkelkamp s talk

104 What practical people say, II Keep a i = b i p 1... p j, where b i is y- smooth for j k and p l (y, My): If k is large, then more a j s, but smaller proportion actually useful (lots of effort on useless a j ). Fix: Discard if two larger prime factors Speed-ups in practice (Lenstra et al):.4 to.5 for k = 1;.15 to.25 for k = 2;.1 and.14 for k = 3. For more: Willemien Ekkelkamp s talk For x our predictions: Speedups of.41, 0.25, 0.20 resp not bad! Run experiments on Pomerance s problem directly?

105 Methods used First and second moment methods from probabilistic combinatorics. Husimi graphs from statistical physics. Lagrange inversion from algebraic combinatorics. Analytic continuation of solutions to functional equations. Comparative estimates on smooth numbers, via comparative estimates on saddle points. Random graph theory, Poisson processes and conversion from continuous to discrete.

Industrial Strength Factorization. Lawren Smithline Cornell University

Industrial Strength Factorization. Lawren Smithline Cornell University Industrial Strength Factorization Lawren Smithline Cornell University lawren@math.cornell.edu http://www.math.cornell.edu/~lawren Industrial Strength Factorization Given an integer N, determine the prime

More information

Sharp Transitions in Making Squares

Sharp Transitions in Making Squares Sharp Transitions in Making Squares Ernie Croot School of Mathematics Georgia Tech Atlanta, GA 3332-6 ecroot@math.gatech.edu Andrew Granville 2 Départment de mathématiques et de statistique Université

More information

On sharp transitions in making squares

On sharp transitions in making squares Annals of Mathematics (0), http://dx.doi.org/0.00/annals.0... 0 0 0 0 On sharp transitions in making squares By Ernie Croot, Andrew Granville, Robin Pemantle, and Prasad Tetali Abstract In the fastest-performing

More information

THE 2-CORE OF A RANDOM INHOMOGENEOUS HYPERGRAPH. Omar Abuzzahab A DISSERTATION. Mathematics

THE 2-CORE OF A RANDOM INHOMOGENEOUS HYPERGRAPH. Omar Abuzzahab A DISSERTATION. Mathematics THE 2-CORE OF A RANDOM INHOMOGENEOUS HYPERGRAPH Omar Abuzzahab A DISSERTATION in Mathematics Presented to the Faculties of the University of Pennsylvania in Partial Fulfillment of the Requirements for

More information

Factoring. there exists some 1 i < j l such that x i x j (mod p). (1) p gcd(x i x j, n).

Factoring. there exists some 1 i < j l such that x i x j (mod p). (1) p gcd(x i x j, n). 18.310 lecture notes April 22, 2015 Factoring Lecturer: Michel Goemans We ve seen that it s possible to efficiently check whether an integer n is prime or not. What about factoring a number? If this could

More information

Analyzing the Quadratic Sieve: An Undergraduate Research Case-history

Analyzing the Quadratic Sieve: An Undergraduate Research Case-history Analyzing the Quadratic Sieve: An Undergraduate Research Case-history 1/59 Analyzing the Quadratic Sieve: An Undergraduate Research Case-history 1/59 or The Tails of Two Sieves Neil J. Calkin Clemson University

More information

On the efficient approximability of constraint satisfaction problems

On the efficient approximability of constraint satisfaction problems On the efficient approximability of constraint satisfaction problems July 13, 2007 My world Max-CSP Efficient computation. P Polynomial time BPP Probabilistic Polynomial time (still efficient) NP Non-deterministic

More information

Dixon s Factorization method

Dixon s Factorization method Dixon s Factorization method Nikithkumarreddy yellu December 2015 1 Contents 1 Introduction 3 2 History 3 3 Method 4 3.1 Factor-base.............................. 4 3.2 B-smooth...............................

More information

arxiv: v1 [math.nt] 12 Aug 2016

arxiv: v1 [math.nt] 12 Aug 2016 THE SHARP THRESHOLD FOR MAKING SQUARES PAUL BALISTER, BÉLA BOLLOBÁS, AND ROBERT MORRIS arxiv:1608.03857v1 [math.nt] 12 Aug 2016 Abstract. Consider a random sequence of N integers, each chosen uniformly

More information

Out-colourings of Digraphs

Out-colourings of Digraphs Out-colourings of Digraphs N. Alon J. Bang-Jensen S. Bessy July 13, 2017 Abstract We study vertex colourings of digraphs so that no out-neighbourhood is monochromatic and call such a colouring an out-colouring.

More information

INTEGERS DIVISIBLE BY THE SUM OF THEIR PRIME FACTORS

INTEGERS DIVISIBLE BY THE SUM OF THEIR PRIME FACTORS INTEGERS DIVISIBLE BY THE SUM OF THEIR PRIME FACTORS JEAN-MARIE DE KONINCK and FLORIAN LUCA Abstract. For each integer n 2, let β(n) be the sum of the distinct prime divisors of n and let B(x) stand for

More information

Pigeonhole Principle and Ramsey Theory

Pigeonhole Principle and Ramsey Theory Pigeonhole Principle and Ramsey Theory The Pigeonhole Principle (PP) has often been termed as one of the most fundamental principles in combinatorics. The familiar statement is that if we have n pigeonholes

More information

Vertex colorings of graphs without short odd cycles

Vertex colorings of graphs without short odd cycles Vertex colorings of graphs without short odd cycles Andrzej Dudek and Reshma Ramadurai Department of Mathematical Sciences Carnegie Mellon University Pittsburgh, PA 1513, USA {adudek,rramadur}@andrew.cmu.edu

More information

Experience in Factoring Large Integers Using Quadratic Sieve

Experience in Factoring Large Integers Using Quadratic Sieve Experience in Factoring Large Integers Using Quadratic Sieve D. J. Guan Department of Computer Science, National Sun Yat-Sen University, Kaohsiung, Taiwan 80424 guan@cse.nsysu.edu.tw April 19, 2005 Abstract

More information

Algorithms. Shanks square forms algorithm Williams p+1 Quadratic Sieve Dixon s Random Squares Algorithm

Algorithms. Shanks square forms algorithm Williams p+1 Quadratic Sieve Dixon s Random Squares Algorithm Alex Sundling Algorithms Shanks square forms algorithm Williams p+1 Quadratic Sieve Dixon s Random Squares Algorithm Shanks Square Forms Created by Daniel Shanks as an improvement on Fermat s factorization

More information

SPECIAL POINTS AND LINES OF ALGEBRAIC SURFACES

SPECIAL POINTS AND LINES OF ALGEBRAIC SURFACES SPECIAL POINTS AND LINES OF ALGEBRAIC SURFACES 1. Introduction As we have seen many times in this class we can encode combinatorial information about points and lines in terms of algebraic surfaces. Looking

More information

6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch

6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch 6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch Today Probabilistic Turing Machines and Probabilistic Time Complexity Classes Now add a new capability to standard TMs: random

More information

1 The Fundamental Theorem of Arithmetic. A positive integer N has a unique prime power decomposition. Primality Testing. and. Integer Factorisation

1 The Fundamental Theorem of Arithmetic. A positive integer N has a unique prime power decomposition. Primality Testing. and. Integer Factorisation 1 The Fundamental Theorem of Arithmetic A positive integer N has a unique prime power decomposition 2 Primality Testing Integer Factorisation (Gauss 1801, but probably known to Euclid) The Computational

More information

Algebraic Methods in Combinatorics

Algebraic Methods in Combinatorics Algebraic Methods in Combinatorics Po-Shen Loh 27 June 2008 1 Warm-up 1. (A result of Bourbaki on finite geometries, from Răzvan) Let X be a finite set, and let F be a family of distinct proper subsets

More information

Dense Admissible Sets

Dense Admissible Sets Dense Admissible Sets Daniel M. Gordon and Gene Rodemich Center for Communications Research 4320 Westerra Court San Diego, CA 92121 {gordon,gene}@ccrwest.org Abstract. Call a set of integers {b 1, b 2,...,

More information

Chapter 8 ~ Quadratic Functions and Equations In this chapter you will study... You can use these skills...

Chapter 8 ~ Quadratic Functions and Equations In this chapter you will study... You can use these skills... Chapter 8 ~ Quadratic Functions and Equations In this chapter you will study... identifying and graphing quadratic functions transforming quadratic equations solving quadratic equations using factoring

More information

Discrete Math, Fourteenth Problem Set (July 18)

Discrete Math, Fourteenth Problem Set (July 18) Discrete Math, Fourteenth Problem Set (July 18) REU 2003 Instructor: László Babai Scribe: Ivona Bezakova 0.1 Repeated Squaring For the primality test we need to compute a X 1 (mod X). There are two problems

More information

Regular and synchronizing transformation monoids

Regular and synchronizing transformation monoids Regular and synchronizing transformation monoids Peter J. Cameron NBSAN, York 23 November 2011 Mathematics may be defined as the subject in which we never know what we are talking about, nor whether what

More information

< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1

< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1 List of Problems jacques@ucsd.edu Those question with a star next to them are considered slightly more challenging. Problems 9, 11, and 19 from the book The probabilistic method, by Alon and Spencer. Question

More information

Kim Bowman and Zach Cochran Clemson University and University of Georgia

Kim Bowman and Zach Cochran Clemson University and University of Georgia Clemson University, Conference October 2004 1/31 Linear Dependency and the Quadratic Sieve Kim Bowman and Zach Cochran Clemson University and University of Georgia and Neil Calkin, Tim Flowers, Kevin James

More information

Integer factorization, part 1: the Q sieve. part 2: detecting smoothness. D. J. Bernstein

Integer factorization, part 1: the Q sieve. part 2: detecting smoothness. D. J. Bernstein Integer factorization, part 1: the Q sieve Integer factorization, part 2: detecting smoothness D. J. Bernstein The Q sieve factors by combining enough -smooth congruences ( + ). Enough log. Plausible conjecture:

More information

Lecture 16: Communication Complexity

Lecture 16: Communication Complexity CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity

More information

Fantastic Factoring. Difference of Cubes. Difference of Squares. Sum of Cubes. Binomial Squares. Factor the following expressions

Fantastic Factoring. Difference of Cubes. Difference of Squares. Sum of Cubes. Binomial Squares. Factor the following expressions Fantastic Factoring Following are some factoring patterns that you might already recognize. x and y can both represent variables in the expressions, or y might be a constant. These rules work for all real

More information

Integer factorization, part 1: the Q sieve. D. J. Bernstein

Integer factorization, part 1: the Q sieve. D. J. Bernstein Integer factorization, part 1: the Q sieve D. J. Bernstein Sieving small integers 0 using primes 3 5 7: 1 3 3 4 5 5 6 3 7 7 8 9 3 3 10 5 11 1 3 13 14 7 15 3 5 16 17 18 3 3 19 0 5 etc. Sieving and 611 +

More information

Computing the modular equation

Computing the modular equation Computing the modular equation Andrew V. Sutherland (MIT) Barcelona-Boston-Tokyo Number Theory Seminar in Memory of Fumiyuki Momose Andrew V. Sutherland (MIT) Computing the modular equation 1 of 8 The

More information

SMOOTH NUMBERS AND THE QUADRATIC SIEVE. Carl Pomerance

SMOOTH NUMBERS AND THE QUADRATIC SIEVE. Carl Pomerance SMOOTH NUMBERS AND THE QUADRATIC SIEVE Carl Pomerance When faced with a large number n to factor, what do you do first? You might say Look at the last digit, with the idea of cheaply pulling out possible

More information

Module 2: Reflecting on One s Problems

Module 2: Reflecting on One s Problems MATH55 Module : Reflecting on One s Problems Main Math concepts: Translations, Reflections, Graphs of Equations, Symmetry Auxiliary ideas: Working with quadratics, Mobius maps, Calculus, Inverses I. Transformations

More information

Euclidean prime generators

Euclidean prime generators Euclidean prime generators Andrew R. Booker, Bristol University Bristol, UK Carl Pomerance, Dartmouth College (emeritus) Hanover, New Hampshire, USA (U. Georgia, emeritus) Integers Conference, Carrollton,

More information

The Probabilistic Method

The Probabilistic Method The Probabilistic Method In Graph Theory Ehssan Khanmohammadi Department of Mathematics The Pennsylvania State University February 25, 2010 What do we mean by the probabilistic method? Why use this method?

More information

part 2: detecting smoothness part 3: the number-field sieve

part 2: detecting smoothness part 3: the number-field sieve Integer factorization, part 1: the Q sieve Integer factorization, part 2: detecting smoothness Integer factorization, part 3: the number-field sieve D. J. Bernstein Problem: Factor 611. The Q sieve forms

More information

Sieve-based factoring algorithms

Sieve-based factoring algorithms Sieve-based factoring algorithms From bicycle chains to number fields Eran Tromer tromer@wisdom.weizmann.ac.il Weizmann Institute of Science Sieve-based factoring p.1/23 Factoring by square root extraction

More information

Cluster varieties for tree-shaped quivers and their cohomology

Cluster varieties for tree-shaped quivers and their cohomology Cluster varieties for tree-shaped quivers and their cohomology Frédéric Chapoton CNRS & Université de Strasbourg Octobre 2016 Cluster algebras and the associated varieties Cluster algebras are commutative

More information

Primality Testing. 1 Introduction. 2 Brief Chronology of Primality Testing. CS265/CME309, Fall Instructor: Gregory Valiant

Primality Testing. 1 Introduction. 2 Brief Chronology of Primality Testing. CS265/CME309, Fall Instructor: Gregory Valiant CS265/CME309, Fall 2018. Instructor: Gregory Valiant Primality Testing [These notes may not be distributed outside this class without the permission of Gregory Valiant.] 1 Introduction Prime numbers are

More information

Theoretical Cryptography, Lectures 18-20

Theoretical Cryptography, Lectures 18-20 Theoretical Cryptography, Lectures 18-20 Instructor: Manuel Blum Scribes: Ryan Williams and Yinmeng Zhang March 29, 2006 1 Content of the Lectures These lectures will cover how someone can prove in zero-knowledge

More information

Repeated Values of Euler s Function. a talk by Paul Kinlaw on joint work with Jonathan Bayless

Repeated Values of Euler s Function. a talk by Paul Kinlaw on joint work with Jonathan Bayless Repeated Values of Euler s Function a talk by Paul Kinlaw on joint work with Jonathan Bayless Oct 4 205 Problem of Erdős: Consider solutions of the equations ϕ(n) = ϕ(n + k), σ(n) = σ(n + k) for fixed

More information

Secret Sharing: Four People, Need Three

Secret Sharing: Four People, Need Three Secret Sharing A secret is an n-bit string. Throughout this talk assume that Zelda has a secret s {0, 1} n. She will want to give shares of the secret to various people. Applications Rumor: Secret Sharing

More information

Research Problems in Arithmetic Combinatorics

Research Problems in Arithmetic Combinatorics Research Problems in Arithmetic Combinatorics Ernie Croot July 13, 2006 1. (related to a quesiton of J. Bourgain) Classify all polynomials f(x, y) Z[x, y] which have the following property: There exists

More information

D. J. Bernstein University of Illinois at Chicago

D. J. Bernstein University of Illinois at Chicago Algorithms for primes D. J. Bernstein University of Illinois at Chicago Some literature: Recognizing primes: 1982 Atkin Larson On a primality test of Solovay and Strassen ; 1995 Atkin Intelligent primality

More information

Chapter 7 Polynomial Functions. Factoring Review. We will talk about 3 Types: ALWAYS FACTOR OUT FIRST! Ex 2: Factor x x + 64

Chapter 7 Polynomial Functions. Factoring Review. We will talk about 3 Types: ALWAYS FACTOR OUT FIRST! Ex 2: Factor x x + 64 Chapter 7 Polynomial Functions Factoring Review We will talk about 3 Types: 1. 2. 3. ALWAYS FACTOR OUT FIRST! Ex 1: Factor x 2 + 5x + 6 Ex 2: Factor x 2 + 16x + 64 Ex 3: Factor 4x 2 + 6x 18 Ex 4: Factor

More information

The ranges of some familiar arithmetic functions

The ranges of some familiar arithmetic functions The ranges of some familiar arithmetic functions Carl Pomerance Dartmouth College, emeritus University of Georgia, emeritus based on joint work with K. Ford, F. Luca, and P. Pollack and T. Freiburg, N.

More information

Lecture 6: The Pigeonhole Principle and Probability Spaces

Lecture 6: The Pigeonhole Principle and Probability Spaces Lecture 6: The Pigeonhole Principle and Probability Spaces Anup Rao January 17, 2018 We discuss the pigeonhole principle and probability spaces. Pigeonhole Principle The pigeonhole principle is an extremely

More information

Modular polynomials and isogeny volcanoes

Modular polynomials and isogeny volcanoes Modular polynomials and isogeny volcanoes Andrew V. Sutherland February 3, 010 Reinier Bröker Kristin Lauter Andrew V. Sutherland (MIT) Modular polynomials and isogeny volcanoes 1 of 9 Isogenies An isogeny

More information

Irredundant Families of Subcubes

Irredundant Families of Subcubes Irredundant Families of Subcubes David Ellis January 2010 Abstract We consider the problem of finding the maximum possible size of a family of -dimensional subcubes of the n-cube {0, 1} n, none of which

More information

Algebraic Methods in Combinatorics

Algebraic Methods in Combinatorics Algebraic Methods in Combinatorics Po-Shen Loh June 2009 1 Linear independence These problems both appeared in a course of Benny Sudakov at Princeton, but the links to Olympiad problems are due to Yufei

More information

High-speed cryptography, part 3: more cryptosystems. Daniel J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven

High-speed cryptography, part 3: more cryptosystems. Daniel J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven High-speed cryptography, part 3: more cryptosystems Daniel J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven Cryptographers Working systems Cryptanalytic algorithm designers

More information

GRAPHS CONTAINING TRIANGLES ARE NOT 3-COMMON

GRAPHS CONTAINING TRIANGLES ARE NOT 3-COMMON GRAPHS CONTAINING TRIANGLES ARE NOT 3-COMMON JAMES CUMMINGS AND MICHAEL YOUNG Abstract. A finite graph G is k-common if the minimum (over all k- colourings of the edges of K n) of the number of monochromatic

More information

Introduction: Pythagorean Triplets

Introduction: Pythagorean Triplets Introduction: Pythagorean Triplets On this first day I want to give you an idea of what sorts of things we talk about in number theory. In number theory we want to study the natural numbers, and in particular

More information

ECEN 5022 Cryptography

ECEN 5022 Cryptography Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,

More information

GROUPS AS GRAPHS. W. B. Vasantha Kandasamy Florentin Smarandache

GROUPS AS GRAPHS. W. B. Vasantha Kandasamy Florentin Smarandache GROUPS AS GRAPHS W. B. Vasantha Kandasamy Florentin Smarandache 009 GROUPS AS GRAPHS W. B. Vasantha Kandasamy e-mail: vasanthakandasamy@gmail.com web: http://mat.iitm.ac.in/~wbv www.vasantha.in Florentin

More information

Counting independent sets of a fixed size in graphs with a given minimum degree

Counting independent sets of a fixed size in graphs with a given minimum degree Counting independent sets of a fixed size in graphs with a given minimum degree John Engbers David Galvin April 4, 01 Abstract Galvin showed that for all fixed δ and sufficiently large n, the n-vertex

More information

Construction of latin squares of prime order

Construction of latin squares of prime order Construction of latin squares of prime order Theorem. If p is prime, then there exist p 1 MOLS of order p. Construction: The elements in the latin square will be the elements of Z p, the integers modulo

More information

I. Introduction. MPRI Cours Lecture IIb: Introduction to integer factorization. F. Morain. Input: an integer N; Output: N = k

I. Introduction. MPRI Cours Lecture IIb: Introduction to integer factorization. F. Morain. Input: an integer N; Output: N = k F. Morain École polytechnique MPRI cours 2-12-2 2009-2010 3/26 F. Morain École polytechnique MPRI cours 2-12-2 2009-2010 4/26 MPRI Cours 2-12-2 I. Introduction ECOLE POLYTECHNIQUE F. Morain Lecture IIb:

More information

ENHANCING THE PERFORMANCE OF FACTORING ALGORITHMS

ENHANCING THE PERFORMANCE OF FACTORING ALGORITHMS ENHANCING THE PERFORMANCE OF FACTORING ALGORITHMS GIVEN n FIND p 1,p 2,..,p k SUCH THAT n = p 1 d 1 p 2 d 2.. p k d k WHERE p i ARE PRIMES FACTORING IS CONSIDERED TO BE A VERY HARD. THE BEST KNOWN ALGORITHM

More information

Notes for Lecture 25

Notes for Lecture 25 U.C. Berkeley CS276: Cryptography Handout N25 Luca Trevisan April 23, 2009 Notes for Lecture 25 Scribed by Alexandra Constantin, posted May 4, 2009 Summary Today we show that the graph isomorphism protocol

More information

Int Math 3 Midterm Review Handout (Modules 5-7)

Int Math 3 Midterm Review Handout (Modules 5-7) Int Math 3 Midterm Review Handout (Modules 5-7) 1 Graph f(x) = x and g(x) = 1 x 4. Then describe the transformation from the graph of f(x) = x to the graph 2 of g(x) = 1 2 x 4. The transformations are

More information

Course Notes. Part IV. Probabilistic Combinatorics. Algorithms

Course Notes. Part IV. Probabilistic Combinatorics. Algorithms Course Notes Part IV Probabilistic Combinatorics and Algorithms J. A. Verstraete Department of Mathematics University of California San Diego 9500 Gilman Drive La Jolla California 92037-0112 jacques@ucsd.edu

More information

compare to comparison and pointer based sorting, binary trees

compare to comparison and pointer based sorting, binary trees Admin Hashing Dictionaries Model Operations. makeset, insert, delete, find keys are integers in M = {1,..., m} (so assume machine word size, or unit time, is log m) can store in array of size M using power:

More information

Problems for Putnam Training

Problems for Putnam Training Problems for Putnam Training 1 Number theory Problem 1.1. Prove that for each positive integer n, the number is not prime. 10 1010n + 10 10n + 10 n 1 Problem 1.2. Show that for any positive integer n,

More information

Polynomial analogues of Ramanujan congruences for Han s hooklength formula

Polynomial analogues of Ramanujan congruences for Han s hooklength formula Polynomial analogues of Ramanujan congruences for Han s hooklength formula William J. Keith CELC, University of Lisbon Email: william.keith@gmail.com Detailed arxiv preprint: 1109.1236 Context Partition

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017 U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017 Scribed by Luowen Qian Lecture 8 In which we use spectral techniques to find certificates of unsatisfiability

More information

Factoring Algorithms Pollard s p 1 Method. This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors.

Factoring Algorithms Pollard s p 1 Method. This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors. Factoring Algorithms Pollard s p 1 Method This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors. Input: n (to factor) and a limit B Output: a proper factor of

More information

Twitter: @Owen134866 www.mathsfreeresourcelibrary.com Prior Knowledge Check 1) Simplify: a) 3x 2 5x 5 b) 5x3 y 2 15x 7 2) Factorise: a) x 2 2x 24 b) 3x 2 17x + 20 15x 2 y 3 3) Use long division to calculate:

More information

P, NP, NP-Complete, and NPhard

P, NP, NP-Complete, and NPhard P, NP, NP-Complete, and NPhard Problems Zhenjiang Li 21/09/2011 Outline Algorithm time complicity P and NP problems NP-Complete and NP-Hard problems Algorithm time complicity Outline What is this course

More information

Graph Theory. Thomas Bloom. February 6, 2015

Graph Theory. Thomas Bloom. February 6, 2015 Graph Theory Thomas Bloom February 6, 2015 1 Lecture 1 Introduction A graph (for the purposes of these lectures) is a finite set of vertices, some of which are connected by a single edge. Most importantly,

More information

Computing modular polynomials with the Chinese Remainder Theorem

Computing modular polynomials with the Chinese Remainder Theorem Computing modular polynomials with the Chinese Remainder Theorem Andrew V. Sutherland Massachusetts Institute of Technology ECC 009 Reinier Bröker Kristin Lauter Andrew V. Sutherland (MIT) Computing modular

More information

Lecture 5: Two-point Sampling

Lecture 5: Two-point Sampling Randomized Algorithms Lecture 5: Two-point Sampling Sotiris Nikoletseas Professor CEID - ETY Course 2017-2018 Sotiris Nikoletseas, Professor Randomized Algorithms - Lecture 5 1 / 26 Overview A. Pairwise

More information

Combinatorial properties of transformation monoids

Combinatorial properties of transformation monoids Combinatorial properties of transformation monoids Peter J. Cameron 35ACCMCC Melbourne, December 2011 A few combinatorial problems... Is there an analogue of Baranyai s Theorem over fields with more than

More information

Containment restrictions

Containment restrictions Containment restrictions Tibor Szabó Extremal Combinatorics, FU Berlin, WiSe 207 8 In this chapter we switch from studying constraints on the set operation intersection, to constraints on the set relation

More information

RSA Cryptosystem and Factorization

RSA Cryptosystem and Factorization RSA Cryptosystem and Factorization D. J. Guan Department of Computer Science National Sun Yat Sen University Kaoshiung, Taiwan 80424 R. O. C. guan@cse.nsysu.edu.tw August 25, 2003 RSA Cryptosystem was

More information

Factorization & Primality Testing

Factorization & Primality Testing Factorization & Primality Testing C etin Kaya Koc http://cs.ucsb.edu/~koc koc@cs.ucsb.edu Koc (http://cs.ucsb.edu/~ koc) ucsb ccs 130h explore crypto fall 2014 1/1 Primes Natural (counting) numbers: N

More information

Logic: The Big Picture

Logic: The Big Picture Logic: The Big Picture A typical logic is described in terms of syntax: what are the legitimate formulas semantics: under what circumstances is a formula true proof theory/ axiomatization: rules for proving

More information

The Interlace Polynomial of Graphs at 1

The Interlace Polynomial of Graphs at 1 The Interlace Polynomial of Graphs at 1 PN Balister B Bollobás J Cutler L Pebody July 3, 2002 Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152 USA Abstract In this paper we

More information

Georgia Department of Education Common Core Georgia Performance Standards Framework CCGPS Advanced Algebra Unit 2

Georgia Department of Education Common Core Georgia Performance Standards Framework CCGPS Advanced Algebra Unit 2 Polynomials Patterns Task 1. To get an idea of what polynomial functions look like, we can graph the first through fifth degree polynomials with leading coefficients of 1. For each polynomial function,

More information

Amicable numbers. CRM Workshop on New approaches in probabilistic and multiplicative number theory December 8 12, 2014

Amicable numbers. CRM Workshop on New approaches in probabilistic and multiplicative number theory December 8 12, 2014 Amicable numbers CRM Workshop on New approaches in probabilistic and multiplicative number theory December 8 12, 2014 Carl Pomerance, Dartmouth College (U. Georgia, emeritus) Recall that s(n) = σ(n) n,

More information

HOW OFTEN IS EULER S TOTIENT A PERFECT POWER? 1. Introduction

HOW OFTEN IS EULER S TOTIENT A PERFECT POWER? 1. Introduction HOW OFTEN IS EULER S TOTIENT A PERFECT POWER? PAUL POLLACK Abstract. Fix an integer k 2. We investigate the number of n x for which ϕn) is a perfect kth power. If we assume plausible conjectures on the

More information

Product Representations of Polynomials

Product Representations of Polynomials Product Representations of Polynomials Jacques Verstraëte Abstract For a fixed polyomial f Z[X], let ρ k (N denote the maximum size of a set A {1, 2,..., N} such that no product of k distinct elements

More information

Algorithm Design CS 515 Fall 2015 Sample Final Exam Solutions

Algorithm Design CS 515 Fall 2015 Sample Final Exam Solutions Algorithm Design CS 515 Fall 2015 Sample Final Exam Solutions Copyright c 2015 Andrew Klapper. All rights reserved. 1. For the functions satisfying the following three recurrences, determine which is the

More information

Solving x 2 Dy 2 = N in integers, where D > 0 is not a perfect square. Keith Matthews

Solving x 2 Dy 2 = N in integers, where D > 0 is not a perfect square. Keith Matthews Solving x 2 Dy 2 = N in integers, where D > 0 is not a perfect square. Keith Matthews Abstract We describe a neglected algorithm, based on simple continued fractions, due to Lagrange, for deciding the

More information

NP-Completeness I. Lecture Overview Introduction: Reduction and Expressiveness

NP-Completeness I. Lecture Overview Introduction: Reduction and Expressiveness Lecture 19 NP-Completeness I 19.1 Overview In the past few lectures we have looked at increasingly more expressive problems that we were able to solve using efficient algorithms. In this lecture we introduce

More information

Combinatorial Designs: Balanced Incomplete Block Designs

Combinatorial Designs: Balanced Incomplete Block Designs Combinatorial Designs: Balanced Incomplete Block Designs Designs The theory of design of experiments came into being largely through the work of R.A.Fisher and F.Yates in the early 1930's. They were motivated

More information

A conjecture on the alphabet size needed to produce all correlation classes of pairs of words

A conjecture on the alphabet size needed to produce all correlation classes of pairs of words A conjecture on the alphabet size needed to produce all correlation classes of pairs of words Paul Leopardi Thanks: Jörg Arndt, Michael Barnsley, Richard Brent, Sylvain Forêt, Judy-anne Osborn. Mathematical

More information

Polynomial Functions. x n 2 a n. x n a 1. f x = a o. x n 1 a 2. x 0, , a 1

Polynomial Functions. x n 2 a n. x n a 1. f x = a o. x n 1 a 2. x 0, , a 1 Polynomial Functions A polynomial function is a sum of multiples of an independent variable raised to various integer powers. The general form of a polynomial function is f x = a o x n a 1 x n 1 a 2 x

More information

Winter 2011 Josh Benaloh Brian LaMacchia

Winter 2011 Josh Benaloh Brian LaMacchia Winter 2011 Josh Benaloh Brian LaMacchia Fun with Public-Key Tonight we ll Introduce some basic tools of public-key crypto Combine the tools to create more powerful tools Lay the ground work for substantial

More information

Mathematics Masters Examination

Mathematics Masters Examination Mathematics Masters Examination OPTION 4 Fall 2015 MATHEMATICAL COMPUTER SCIENCE NOTE: Any student whose answers require clarification may be required to submit to an oral examination. Each of the twelve

More information

Postmodern Primality Proving

Postmodern Primality Proving Preda Mihăilescu (University of Göttingen) Postmodern Primality Proving June 28, 2013 1 / 29 Postmodern Primality Proving Preda Mihăilescu Mathematical Institute, University of Göttingen, Germany June

More information

Estimates for factoring 1024-bit integers. Thorsten Kleinjung, University of Bonn

Estimates for factoring 1024-bit integers. Thorsten Kleinjung, University of Bonn Estimates for factoring 1024-bit integers Thorsten Kleinjung, University of Bonn Contents GNFS Overview Polynomial selection, matrix construction, square root computation Sieving and cofactoring Strategies

More information

Solutions to Assignment 4

Solutions to Assignment 4 1. Let G be a finite, abelian group written additively. Let x = g G g, and let G 2 be the subgroup of G defined by G 2 = {g G 2g = 0}. (a) Show that x = g G 2 g. (b) Show that x = 0 if G 2 = 2. If G 2

More information

9 - The Combinatorial Nullstellensatz

9 - The Combinatorial Nullstellensatz 9 - The Combinatorial Nullstellensatz Jacques Verstraëte jacques@ucsd.edu Hilbert s nullstellensatz says that if F is an algebraically closed field and f and g 1, g 2,..., g m are polynomials in F[x 1,

More information

Nonnegative k-sums, fractional covers, and probability of small deviations

Nonnegative k-sums, fractional covers, and probability of small deviations Nonnegative k-sums, fractional covers, and probability of small deviations Noga Alon Hao Huang Benny Sudakov Abstract More than twenty years ago, Manickam, Miklós, and Singhi conjectured that for any integers

More information

A New Algorithm to Compute Terms in Special Types of Characteristic Sequences

A New Algorithm to Compute Terms in Special Types of Characteristic Sequences A New Algorithm to Compute Terms in Special Types of Characteristic Sequences Kenneth J. Giuliani 1 and Guang Gong 2 1 Dept. of Mathematical and Computational Sciences University of Toronto at Mississauga

More information

Sums and products: What we still don t know about addition and multiplication

Sums and products: What we still don t know about addition and multiplication Sums and products: What we still don t know about addition and multiplication Carl Pomerance, Dartmouth College Hanover, New Hampshire, USA Based on joint work with R. P. Brent, P. Kurlberg, J. C. Lagarias,

More information

Loop Convergence. CS 536: Science of Programming, Fall 2018

Loop Convergence. CS 536: Science of Programming, Fall 2018 Solved Loop Convergence CS 536: Science of Programming, Fall 2018 A. Why Diverging programs aren t useful, so it s useful to know how to show that loops terminate. B. Objectives At the end of this lecture

More information

ANALYZING THE QUADRATIC SIEVE ALGORITHM

ANALYZING THE QUADRATIC SIEVE ALGORITHM ANALYZING THE QUADRATIC SIEVE ALGORITHM KIM BOWMAN, NEIL CALKIN, ZACH COCHRAN, AND KEVIN JAMES Abstract. We will discuss random vector models related to the quadratic sieve. We will introduce a new model

More information

Linear, Quadratic, and Cubic Forms over the Binary Field

Linear, Quadratic, and Cubic Forms over the Binary Field Linear, Quadratic, and Cubic Forms over the Binary Field Akihiro Munemasa 1 1 Graduate School of Information Sciences Tohoku University October 28, 2009 POSTECH Linear, Quadratic, and Cubic Forms over

More information

Recitation 8: Graphs and Adjacency Matrices

Recitation 8: Graphs and Adjacency Matrices Math 1b TA: Padraic Bartlett Recitation 8: Graphs and Adjacency Matrices Week 8 Caltech 2011 1 Random Question Suppose you take a large triangle XY Z, and divide it up with straight line segments into

More information