Running time predictions for square products, and large prime variations. Ernie Croot, Andrew Granville, Robin Pemantle, & Prasad Tetali
|
|
- Shavonne Mason
- 5 years ago
- Views:
Transcription
1 Running time predictions for square products, and large prime variations by Ernie Croot, Andrew Granville, Robin Pemantle, & Prasad Tetali
2 Factoring algorithms Dixon s random squares algorithm The quadratic sieve Multiple polynomial quadratic sieve The number field sieve. All have a common central idea
3 Factoring algorithms Dixon s random squares algorithm The quadratic sieve Multiple polynomial quadratic sieve The number field sieve Idea: Generate a pseudo-random sequence of integers a 1, a 2,..., with each a i b 2 i (mod n), until the product of a subseq of the a i s is a square, say Y 2 = a i1 a ik.
4 Factoring algorithms Dixon s random squares algorithm The quadratic sieve Multiple polynomial quadratic sieve The number field sieve Idea: Generate a pseudo-random sequence of integers a 1, a 2,..., with each a i b 2 i (mod n), until the product of a subseq of the a i s is a square, say Y 2 = a i1 a ik. Now, set X 2 = (b i1 b ik ) 2 and then n Y 2 X 2 = (Y X)(Y + X).
5 Factoring algorithms Dixon s random squares algorithm The quadratic sieve Multiple polynomial quadratic sieve The number field sieve Idea: Generate a pseudo-random sequence of integers a 1, a 2,..., with each a i b 2 i (mod n), until the product of a subseq of the a i s is a square, say Y 2 = a i1 a ik. Now, set X 2 = (b i1 b ik ) 2 and then n Y 2 X 2 = (Y X)(Y + X). 50% chance gcd(n, Y X) is a non-trivial factor of n.
6 Analysis of running times 1994 ICM, Pomerance: In the (heuristic) running time analysis of such factoring algorithms one assumes that the pseudo-random sequence a 1, a 2,... is close enough to random, to make predictions based on this assumption.. Why not study this as an abstract problem?
7 Analysis of running times 1994 ICM, Pomerance: In the (heuristic) running time analysis of such factoring algorithms one assumes that the pseudo-random sequence a 1, a 2,... is close enough to random, to make predictions based on this assumption. Pomerance s problem Select integers a 1, a 2, x independently at random; i.e. Prob(a j = m) = 1 x 1 m x; Stop at a T as soon as there exists a i1 a ik = Y 2 What is expected stopping time?
8 Pomerance s problem Select integers a 1, a 2, x independently at random; i.e. Prob(a j = m) = 1 x 1 m x; Stop at a T as soon as there exists a i1 a ik = Expected stopping time?. Is there any point to this?
9 Pomerance s problem Select integers a 1, a 2, x independently at random; i.e. Prob(a j = m) = 1 x 1 m x; Stop at a T as soon as there exists a i1 a ik = Expected stopping time? Interesting because... If this expected stopping time is far less than what is obtained by the algorithms currently used, maybe we can speeding up factoring algorithms.
10 Pomerance s problem Select integers a 1, a 2, x independently at random; i.e. Prob(a j = m) = 1 x 1 m x; Stop at a T as soon as there exists a i1 a ik = Expected stopping time? Interesting because... If this expected stopping time is far less than what is obtained by the algorithms currently used, maybe we can speeding up factoring algorithms. Even if not, a good understanding might lead to better choice of parameters for most factoring algorithms.
11 Pomerance s problem Select integers a 1, a 2, x independently at random; i.e. Prob(a j = m) = 1 x 1 m x; Stop at a T as soon as there exists a i1 a ik = Expected stopping time? Interesting because... If this expected stopping time is far less than what is obtained by the algorithms currently used, maybe we can speeding up factoring algorithms. Even if not, a good understanding might lead to better choice of parameters for most factoring algorithms. Possibility of proving something without assumption.
12 Previous best results π(y) = number of primes up to y. n is y-smooth if p n p y Ψ(x, y) = #y-smooths up to x.
13 Previous best results π(y) = number of primes up to y. n is y-smooth if p n p y Ψ(x, y) = #y-smooths up to x. Choose y 0 = y 0 (x) to maximize Ψ(x, y)/y, and let J 0 (x) := π(y 0) Ψ(x, y 0 ) x. ( J0 (x) e 2 log x log log x )
14 Previous best results π(y) = number of primes up to y. n is y-smooth if p n p y Ψ(x, y) = #y-smooths up to x. Choose y 0 = y 0 (x) to maximize Ψ(x, y)/y, and let J 0 (x) := π(y 0) Ψ(x, y 0 ) x Schroeppel: As x, Prob(T < (1 + ɛ)j 0 (x)) 1. ( J0 (x) e 2 log x log log x )
15 Previous best results π(y) = number of primes up to y. n is y-smooth if p n p y Ψ(x, y) = #y-smooths up to x. Choose y 0 = y 0 (x) to maximize Ψ(x, y)/y, and let J 0 (x) := π(y 0) Ψ(x, y 0 ) x Schroeppel: As x, Prob(T < (1 + ɛ)j 0 (x)) Pomerance: As x, Prob(T > J 0 (x) 1 ɛ ) 1. ( J0 (x) e 2 log x log log x )
16 Pomerance s problem Select integers a 1, a 2, x independently at random; i.e. Prob(a j = m) = 1 x 1 m x; Stop at a T as soon as there exists a i1 a ik = Expected stopping time, T? Schroeppel-Pomerance: With probability going to 1, we have J 0 (x) 1 ɛ < T < (1 + ɛ)j 0 (x). What should we be aiming to prove?
17 Pomerance s problem Select integers a 1, a 2, x independently at random; i.e. Prob(a j = m) = 1 x 1 m x; Stop at a T as soon as there exists a i1 a ik = Expected stopping time, T? Schroeppel-Pomerance: With probability going to 1, we have J 0 (x) 1 ɛ < T < (1 + ɛ)j 0 (x) Recently, in probability theory, results showing sharp transitions ; i.e. random algorithms tend to stop at a certain precise time with probability going to 1.
18 Pomerance s problem Expected stopping time, T? From Schroeppel and Pomerance: J 0 (x) 1 ɛ < T < (1 + ɛ)j 0 (x). with probability going to 1.
19 Pomerance s problem Expected stopping time, T? From Schroeppel and Pomerance: J 0 (x) 1 ɛ < T < (1 + ɛ)j 0 (x). with probability going to 1. Guess: There exists f(x), s.t. (1 ɛ)f(x) < T < (1 + ɛ)f(x), with probability going to 1.
20 Pomerance s problem Expected stopping time, T? From Schroeppel and Pomerance: J 0 (x) 1 ɛ < T < (1 + ɛ)j 0 (x). with probability going to 1. Guess: There exists f(x), s.t. (1 ɛ)f(x) < T < (1 + ɛ)f(x), with probability going to 1. Conjecture: f(x) = e γ J 0 (x), i.e. (1 ɛ)e γ J 0 (x) < T < (1+ɛ)e γ J 0 (x), with probability going to 1.
21 Pomerance s problem Expected stopping time, T? From Schroeppel and Pomerance: J 0 (x) 1 ɛ < T < (1 + ɛ)j 0 (x). with probability going to 1. Guess: There exists f(x), s.t. (1 ɛ)f(x) < T < (1 + ɛ)f(x), with probability going to 1. Conjecture: f(x) = e γ J 0 (x), i.e. (1 ɛ)e γ J 0 (x) < T < (1+ɛ)e γ J 0 (x), with probability going to 1. Theorem: Almost proved it! ( π 4 ɛ ) e γ J 0 (x) < T < (1+ɛ)e γ J 0 (x), with probability going to 1.
22 Pomerance s problem Theorems: With prob going to 1: π 4 ( e γ ɛ ) J 0 (x) < T < (e γ +ɛ)j 0 (x).
23 Pomerance s problem Theorems: With prob going to 1: π 4 ( e γ ɛ ) J 0 (x) < T < (e γ +ɛ)j 0 (x). All numbers in the square product a i1 a ik are y 2+ɛ 0 -smooth. There are k = y 1+o(1) 0 different a i s in the square product
24 Pomerance s problem Theorems: With prob going to 1: π 4 ( e γ ɛ ) J 0 (x) < T < (e γ +ɛ)j 0 (x). All numbers in the square product a i1 a ik are y 2+ɛ 0 -smooth. There are k = y 1+o(1) 0 different a i s in the square product If T < ( π 4 ɛ ) e γ J 0 (x) then the square product is just one a i, a square.
25 Schroeppel s 1985 approach Study only the y-smooth a i s. Factor each as a i = 2 e i,13 e i,2... p e i,k k
26 Schroeppel s 1985 approach Study only the y-smooth a i s. Factor each as a i = 2 e i,13 e i,2... p e i,k k Form the matrix with rows (e i,1, e i,2,..., e i,k )
27 Schroeppel s 1985 approach Study only the y-smooth a i s. Factor each as a i = 2 e i,13 e i,2... p e i,k k Form the matrix with rows (e i,1, e i,2,..., e i,k ) A subset of the y-smooth a i s forms a square product if and only if the sum of those rows is 0 (mod 2).
28 Schroeppel s 1985 approach Study only the y-smooth a i s. Factor each as a i = 2 e i,13 e i,2... p e i,k k Form the matrix with rows (e i,1, e i,2,..., e i,k ) A subset of the y-smooth a i s forms a square product if and only if the sum of those rows is 0 (mod 2). So a square product if > k rows.. How soon would we expect this?
29 Schroeppel s 1985 approach Study only the y-smooth a i s. Factor each as a i = 2 e i,13 e i,2... p e i,k k Form the matrix with rows (e i,1, e i,2,..., e i,k ) A subset of the y-smooth a i s forms a square product if and only if the sum of those rows is 0 (mod 2). So a square product if > k rows. Prob(a i is y smooth) = ψ(x, y)/x. E(# of rows) = T ψ(x, y)/x,
30 Schroeppel s 1985 approach Study only the y-smooth a i s. Factor each as a i = 2 e i,13 e i,2... p e i,k k Form the matrix with rows (e i,1, e i,2,..., e i,k ) A subset of the y-smooth a i s forms a square product if and only if the sum of those rows is 0 (mod 2). So a square product if > k rows. Prob(a i is y smooth) = ψ(x, y)/x. E(# of rows) = T ψ(x, y)/x, This is > k = π(y) for T > xπ(y)/ψ(x, y). Minimized at y = y 0, so T > J 0 (x).
31 Schroeppel s 1985 approach Study only the y-smooth a i s. Factor each as a i = 2 e i,13 e i,2... p e i,k k Form the matrix with rows (e i,1, e i,2,..., e i,k ) A subset of the y-smooth a i s forms a square product if and only if the sum of those rows is 0 (mod 2). So a square product if > k rows. Prob(a i is y smooth) = ψ(x, y)/x. E(# of rows) = T ψ(x, y)/x, This is > k = π(y) for T > xπ(y)/ψ(x, y). Minimized at y = y 0, so T > J 0 (x). Technique works, with prob 1, for T > (1 + ɛ)j 0 (x)
32 Schroeppel s 1985 approach Factor base: Primes up to y Keep only y-smooth a i s Square product after k such a i s
33 Schroeppel s 1985 approach Factor base: Primes up to y Keep only y-smooth a i s Square product after k such a i s Practical to implement
34 Schroeppel s 1985 approach Factor base: Primes up to y Keep only y-smooth a i s Square product after k such a i s Practical to implement New result: By time (1+ɛ)J 0 (x) one has not one square product, but many, about ɛπ(y 0 ), with prob 1.
35 Schroeppel s 1985 approach Factor base: Primes up to y Keep only y-smooth a i s Square product after k such a i s Practical to implement New result: By time (1+ɛ)J 0 (x) one has not one square product, but many, about ɛπ(y 0 ), with prob 1. Key Variant: Large Prime Variation Also keep a i = pb i where b i is y- smooth and p is a prime > y.
36 Schroeppel s 1985 approach Factor base: Primes up to y Keep only y-smooth a i s Square product after k such a i s Practical to implement New result: By time (1+ɛ)J 0 (x) one has not one square product, but many, about ɛπ(y 0 ), with prob 1. Key Variant: Large Prime Variation Also keep a i = pb i where b i is y- smooth and p is a prime > y. With two, pb i and pb j, their product p 2 b i b j is a y-pseudosmooth and can be used as a row in our matrix.
37 Schroeppel s 1985 approach Factor base: Primes up to y Keep only y-smooth a i s Square product after k such a i s Practical to implement New result: By time (1+ɛ)J 0 (x) one has not one square product, but many, about ɛπ(y 0 ), with prob 1. Key Variant: Large Prime Variation Also keep a i = pb i where b i is y- smooth and p is a prime > y. With two, pb i and pb j, their product p 2 b i b j is a y-pseudosmooth and can be used as a row in our matrix. Theorem: Speed up by factor Will prove this later
38 Multiple large prime variations Can try two large primes: a i = pqb i, b i is y-smooth, p, q primes > y.
39 Multiple large prime variations Can try two large primes: a i = pqb i, b i is y-smooth, p, q primes > y. And three large primes, etc.
40 Multiple large prime variations Can try two large primes: a i = pqb i, b i is y-smooth, p, q primes > y. And three large primes, etc. Practical issues: Upper bound on extra primes, say y < p < My.
41 Multiple large prime variations Can try two large primes: a i = pqb i, b i is y-smooth, p, q primes > y. And three large primes, etc. Practical issues: Upper bound on extra primes, say y < p < My. How to find pseudosmooths?. More on that later
42 Multiple large prime variations Can try two large primes: a i = pqb i, b i is y-smooth, p, q primes > y. And three large primes, etc. Practical issues: Upper bound on extra primes, say y < p < My. How to find pseudosmooths? PROVED SPEED-UPS l M = M = 100 M = For l-large primes variation, each large prime in (y, M y).. Speed-up for # of a i s searched, not for factoring algorithm
43 Speed-ups l M = M = 100 M = For l-large primes variation, each large prime in (y, M y).
44 Speed-ups l M = M = 100 M = For l-large primes variation, each large prime in (y, M y). As l, M (M slowly), our speed up factor e γ =
45 Speed-ups l M = M = 100 M = For l-large primes variation, each large prime in (y, M y). As l, M (M slowly), our speed up factor e γ = How big are y 0 and J 0?
46 Speed-ups l M = M = 100 M = For l-large primes variation, each large prime in (y, M y). As l, M (M slowly), our speed up factor e γ = How big are y 0 and J 0? For L(x) =e 12 log x log log x, y 0 (x) = L(x) 1+o(1) and J 0 (x) = L(x) 2+o(1). These estimates can be made more precise but not to asymptotics
47 Such precise estimates? If we cannot be precise about the value of J 0, how can we determine these speed-up constants?
48 Such precise estimates? If we cannot be precise about the value of J 0, how can we determine these speed-up constants? 1986 Hildebrand and Tenenbaum: Even if we cannot give an asymptotic formula for Ψ(x, y), we can do so for Ψ(2x, y) Ψ(x, y) and similar qns where the variables involved are close in size. Our results here make full use of their estimates,
49 Such precise estimates? If we cannot be precise about the value of J 0, how can we determine these speed-up constants? 1986 Hildebrand and Tenenbaum: Even if we cannot give an asymptotic formula for Ψ(x, y), we can do so for Ψ(2x, y) Ψ(x, y) and similar qns where the variables involved are close in size. Our results here make full use of their estimates, But still cannot estimate J 0 accurately maybe value can be computed (Bernstein) in any example.
50 Analysis; one large prime, I Prob(a = pb x : b is y smooth) = Ψ(x/p, y) x
51 Analysis; one large prime, I Ψ(x/p, y) Prob(a = pb x : b is y smooth) = x = Ψ(x/p, y) Ψ(x, y) for y < p < y log y. Ψ(x, y) x log y p Ψ(x, y) x
52 Analysis; one large prime, I Ψ(x/p, y) Prob(a = pb x : b is y smooth) = x = Ψ(x/p, y) Ψ(x, y) Ψ(x, y) x log y p for y < p < y log y. Expected # of k-tuples, from the T = ηj 0 values of a i, that are p times a y-smooth: ( ) ( ) T log y Ψ(x, y) k k p x Ψ(x, y) x
53 Analysis; one large prime, I Ψ(x/p, y) Prob(a = pb x : b is y smooth) = x = Ψ(x/p, y) Ψ(x, y) Ψ(x, y) x log y p for y < p < y log y. Expected # of k-tuples, from the T = ηj 0 values of a i, that are p times a y-smooth: ( T k ) ( log y p Ψ(x, y) x as J 0 log yψ(x, y)/x y. ) k 1 k! ( ηy p Ψ(x, y) x ) k
54 Analysis; one large prime, I Ψ(x/p, y) Prob(a = pb x : b is y smooth) = x = Ψ(x/p, y) Ψ(x, y) Ψ(x, y) x log y p for y < p < y log y. Expected # of k-tuples, from the T = ηj 0 values of a i, that are p times a y-smooth: ( T k ) ( log y p Ψ(x, y) x ) k 1 k! ( ηy as J 0 log yψ(x, y)/x y. Expected number of k-tuples, including all p > y, is (ηy)k k! p>y 1 p k p Ψ(x, y) x ) k
55 Analysis; one large prime, I Ψ(x/p, y) Prob(a = pb x : b is y smooth) = x = Ψ(x/p, y) Ψ(x, y) Ψ(x, y) x log y p for y < p < y log y. Expected # of k-tuples, from the T = ηj 0 values of a i, that are p times a y-smooth: ( T k ) ( log y p Ψ(x, y) x ) k 1 k! ( ηy as J 0 log yψ(x, y)/x y. Expected number of k-tuples, including all p > y, is (ηy)k k! p>y p Ψ(x, y) x ) k 1 p k (ηy)k 1 k! (k 1)y k 1 log y
56 Analysis; one large prime, I Ψ(x/p, y) Prob(a = pb x : b is y smooth) = x Ψ(x/p, y) Ψ(x, y) = log y Ψ(x, y) x p for y < p < y log y. Expected # of k-tuples, from the T = ηj 0 values of a i, that are p times a y-smooth: ( ) ( ) T log y k 1 ( ηy Ψ(x, y) k p x k! p as J 0 log yψ(x, y)/x y. Expected number of k-tuples, including all p > y, is (ηy)k 1 k! p k (ηy)k 1 k! p>y η k (k 1)k! π(y) Ψ(x, y) x ) k (k 1)y k 1 log y
57 Analysis; one large prime, II Sps pb 1, pb 2,..., pb r amongst a i s, each b j is y-smooth.
58 Analysis; one large prime, II Sps pb 1, pb 2,..., pb r amongst a i s, each b j is y-smooth. These yield exactly r 1 mult indep pseudosmooths, (pb 1 )(pb 2 ), (pb 1 )(pb 3 ),..., (pb 1 )(pb r ).
59 Analysis; one large prime, II Sps pb 1, pb 2,..., pb r amongst a i s, each b j is y-smooth. These yield exactly r 1 mult indep pseudosmooths, (pb 1 )(pb 2 ), (pb 1 )(pb 3 ),..., (pb 1 )(pb r ). Use identity r 1 = I {1,...,r} I 2 ( 1) I ;
60 Analysis; one large prime, II Sps pb 1, pb 2,..., pb r amongst a i s, each b j is y-smooth. These yield exactly r 1 mult indep pseudosmooths, (pb 1 )(pb 2 ), (pb 1 )(pb 3 ),..., (pb 1 )(pb r ). Use identity r 1 = I {1,...,r} I 2 ( 1) I ; so total # smooths and pseudo-smooths: η k η + ( 1) k π(y) (k 1)k! k 2
61 Analysis; one large prime, II Sps pb 1, pb 2,..., pb r amongst a i s, each b j is y-smooth. These yield exactly r 1 mult indep pseudosmooths, (pb 1 )(pb 2 ), (pb 1 )(pb 3 ),..., (pb 1 )(pb r ). Use identity r 1 = I {1,...,r} I 2 ( 1) I ; so total # smooths and pseudo-smooths: η k η + ( 1) k π(y) (k 1)k! k 2 Constant = 1 for η = And for two large primes?
62 Two large primes, I Expected # pairs pqb 1 & pqb 2, and Expected # triples pqb 1, prb 2, qrb 3, bounded, so not useful!
63 Two large primes, I Expected # pairs pqb 1 & pqb 2, and Expected # triples pqb 1, prb 2, qrb 3, bounded, so not useful! Expected # triples pb 1, pqb 2, qb 3, is η 3 π(y).
64 Two large primes, I Expected # pairs pqb 1 & pqb 2, and Expected # triples pqb 1, prb 2, qrb 3, bounded, so not useful! Expected # triples pb 1, pqb 2, qb 3, is η 3 π(y). How do you tell the difference?
65 Two large primes, I Expected # pairs pqb 1 & pqb 2, and Expected # triples pqb 1, prb 2, qrb 3, bounded, so not useful! Expected # triples pb 1, pqb 2, qb 3, is η 3 π(y). How do you tell the difference? Construct matrix M for p, pq, p, with 2 ones in each col:
66 Two large primes, I Expected # pairs pqb 1 & pqb 2, and Expected # triples pqb 1, prb 2, qrb 3, bounded, so not useful! Expected # triples pb 1, pqb 2, qb 3, is η 3 π(y). How do you tell the difference? Construct matrix M for p, pq, p, with 2 ones in each col: Expect cπ(y) such triples iff #ones = #rows + #columns 1.
67 Two large primes, I Expected # pairs pqb 1 & pqb 2, and Expected # triples pqb 1, prb 2, qrb 3, bounded, so not useful! Expected # triples pb 1, pqb 2, qb 3, is η 3 π(y). How do you tell the difference? Construct matrix M for p, pq, p, with 2 ones in each col: Expect cπ(y) such triples iff #ones = #rows + #columns 1. Yields exactly #rows rank(m) mult indep pseudosmooths. Combinatorial identity like in one large prime case?
68 Many large primes, II Before used r 1 = I {1,...,r} I 2 ( 1) I.
69 Many large primes, II Before used r 1 = I {1,...,r} I 2 ( 1) I. Generalization: M := matrices s.t. #ones = #rows + #columns 1. M R has rows R.
70 Many large primes, II Before used r 1 = I {1,...,r} I 2 ( 1) I. Generalization: M := matrices s.t. #ones = #rows + #columns 1. M R has rows R. If M R M then #rows rank(m R ) = S R M S M ( 1) #ones(s)
71 Many large primes, II Before used r 1 = I {1,...,r} I 2 ( 1) I. Generalization: M := matrices s.t. #ones = #rows + #columns 1. M R has rows R. If M R M then #rows rank(m R ) = S R M S M ( 1) #ones(s) How do we count the different type of matrices that arise?
72 A graph theory approach Construct graph G = G(M): For each a i a vertex v i G, With v i v I of colour p j if p j (n i, n I ) M i,j = M I,j = 1.
73 A graph theory approach Construct graph G = G(M): For each a i a vertex v i G, With v i v I of colour p j if p j (n i, n I ) M i,j = M I,j = 1. If M M, G(M) is simple, & only cycles in G(M) are monochromatic
74 A graph theory approach Construct graph G = G(M): For each a i a vertex v i G, With v i v I of colour p j if p j (n i, n I ) M i,j = M I,j = 1. If M M, G(M) is simple, & only cycles in G(M) are monochromatic So cycles are subsets of the complete graph of edges of that colour.
75 A graph theory approach Construct graph G = G(M): For each a i a vertex v i G, With v i v I of colour p j if p j (n i, n I ) M i,j = M I,j = 1. If M M, G(M) is simple, & only cycles in G(M) are monochromatic So cycles are subsets of the complete graph of edges of that colour. Hence any two-connected subgraph of G(M) is a complete graph: This is known as a Husimi graph:
76 A graph theory approach Construct graph G = G(M): For each a i a vertex v i G, With v i v I of colour p j if p j (n i, n I ) M i,j = M I,j = 1. If M M, G(M) is simple, & only cycles in G(M) are monochromatic So cycles are subsets of the complete graph of edges of that colour. Hence any two-connected subgraph of G(M) is a complete graph: This is known as a Husimi graph: Inspired combinatorics of species, Central to gas thermodynamics
77 The theory of species Generating functions known for counting Husimi graphs with different parameters.
78 The theory of species Generating functions known for counting Husimi graphs with different parameters. Leads to:for T = ηj 0, the number of pseudosmooths is f(η)π(y 0 ) where f(η) satisfies ηf (η) = log(1 f(η)).
79 The theory of species Generating functions known for counting Husimi graphs with different parameters. Leads to:for T = ηj 0, the number of pseudosmooths is f(η)π(y 0 ) where f(η) satisfies ηf (η) = log(1 f(η)). This implies f(η) is monotone increasing, f(e γ ) = 1, but f(η) diverges for η > e γ.
80 The theory of species Generating functions known for counting Husimi graphs with different parameters. Leads to:for T = ηj 0, the number of pseudosmooths is f(η)π(y 0 ) where f(η) satisfies ηf (η) = log(1 f(η)). This implies f(η) is monotone increasing, f(e γ ) = 1, but f(η) diverges for η > e γ. Sadly we re-organized a non-abs cvgent series in our proof, and we have been unable to fix this proof! In fact we swapped order of summation in applying #rows rank(m R ) = S R M S M ( 1) #ones(s)
81 Lower bound on T Suppose T < ( π 4 ɛ ) e γ J 0 (x).
82 Lower bound on T Suppose T < ( π 4 ɛ ) e γ J 0 (x). Write each a i = b i d i where for each p a i we have p y p b i p > y p d i. If i I a i = then i I d i =.
83 Lower bound on T Suppose T < ( π 4 ɛ ) e γ J 0 (x). Write each a i = b i d i where for each p a i we have p y p b i p > y p d i. If i I a i = then i I d i =. Idea: For each k, Expected # of I with I = k & i I a i = Expected # of I with I = k & i I d i =.
84 Lower bound on T Suppose T < ( π 4 ɛ ) e γ J 0 (x). Write each a i = b i d i where for each p a i we have p y p b i p > y p d i. If i I a i = then i I d i =. Idea: For each k, Expected # of I with I = k & i I a i = Expected # of I with I = k & i I d i =. Bound this using Rankin s trick.
85 Lower bound on T Suppose T < ( π 4 ɛ ) e γ J 0 (x). Write each a i = b i d i where for each p a i we have p y p b i p > y p d i. If i I a i = then i I d i =. Idea: For each k, Expected # of I with I = k & i I a i = Expected # of I with I = k & i I d i =. Bound this using Rankin s trick. Picking y = y(k) carefully we show the prob is T 2 (log x)/x over all k 2
86 Lower bound on T Suppose T < ( π 4 ɛ ) e γ J 0 (x). Write each a i = b i d i where for each p a i we have p y p b i p > y p d i. If i I a i = then i I d i =. Idea: For each k, Expected # of I with I = k & i I a i = Expected # of I with I = k & i I d i =. Bound this using Rankin s trick. Picking y = y(k) carefully we show the prob is T 2 (log x)/x over all k 2, so most likely is I = 1 (which has probability T/ x).
87 Hypergraphs to the rescue Vertices correspond to primes in (y, My), and hyperedges to the odd power prime factors of each a i.
88 Hypergraphs to the rescue Vertices correspond to primes in (y, My), and hyperedges to the odd power prime factors of each a i. Viewpoint: Construction of a random hypergraph, using only a i that are helpful.
89 Hypergraphs to the rescue Vertices correspond to primes in (y, My), and hyperedges to the odd power prime factors of each a i. Viewpoint: Construction of a random hypergraph, using only a i that are helpful. Use Poisson point processes. Translate our discrete problem to continuous setting megatechnical!
90 Hypergraphs to the rescue Vertices correspond to primes in (y, My), and hyperedges to the odd power prime factors of each a i. Viewpoint: Construction of a random hypergraph, using only a i that are helpful. Use Poisson point processes. Translate our discrete problem to continuous setting megatechnical! This very different approach yields the same answer e γ J 0 (x).
91 Hypergraphs to the rescue Vertices correspond to primes in (y, My), and hyperedges to the odd power prime factors of each a i. Viewpoint: Construction of a random hypergraph, using only a i that are helpful. Use Poisson point processes. Translate our discrete problem to continuous setting megatechnical! This very different approach yields the same answer e γ J 0 (x). And the same divergence now implies one gets many square products soon after getting the first!
92 Pomerance s application If one optimizes parameters in Pomerance s problem, then the running time of the factoring algorithm is dominated by finding the square product (i.e. the matrix step). Matrix step: Wiedemann or Lanczos take time y 2 C log y log log y
93 Pomerance s application If one optimizes parameters in Pomerance s problem, then the running time of the factoring algorithm is dominated by finding the square product (i.e. the matrix step). Matrix step: Wiedemann or Lanczos take time y 2 C log y log log y To optimize random squares need y = y 1 = y 1 (1+o(1))/ log log x 0, much smaller than y 0, so Pomerance s problem not so useful as had appeared!
94 Pomerance s application If one optimizes parameters in Pomerance s problem, then the running time of the factoring algorithm is dominated by finding the square product (i.e. the matrix step). Matrix step: Wiedemann or Lanczos take time y 2 C log y log log y To optimize random squares need 1 (1+o(1))/ log log x y = y 1 = y0, much smaller than y 0, so Pomerance s problem not so useful as had appeared! Expected running time is: J 1 := J 0 y (1+o(1))/(log log x)2 0
95 Practical speed-ups for random squares algorithm from large prime variations Reduction in T obtained: l M = M = 100 M = For l-large primes variation, each large prime in (y, M y).
96 Practical speed-ups for random squares algorithm from large prime variations Reduction in T obtained: l M = M = 100 M = For l-large primes variation, each large prime in (y, M y). If reduction in T here is a factor η, then the random squares algorithm is sped up by a factor 1 (log x) log(1/η).
97 What practical people say Practical considerations (not theory): Design of the computer, Language & implementation, Memory issues (large arrays), swaps How reports handled Programmer s prejudices and prior experiences.
98 What practical people say Practical considerations (not theory): Design of the computer, Language & implementation, Memory issues (large arrays), swaps How reports handled Programmer s prejudices and prior experiences. Recognizing y-smooths: Quadratic sieve (& MPQS) Early abort strategies (for a i s with small y 2 -smooth part)
99 What practical people say Practical considerations (not theory): Design of the computer, Language & implementation, Memory issues (large arrays), swaps How reports handled Programmer s prejudices and prior experiences. Recognizing y-smooths: Quadratic sieve (& MPQS) Early abort strategies (for a i s with small y 2 -smooth part) Keep a i = b i p 1... p j, where b i is y- smooth for j k and p l (y, My): If M is large, then more a j s, more pseudosmooths, but slows down sieving (as there are more primes to test).
100 What practical people say, II Keep a i = b i p 1... p j, where b i is y- smooth for j k and p l (y, My): If k is large, then more a j s, but smaller proportion actually useful (lots of effort on useless a j ).
101 What practical people say, II Keep a i = b i p 1... p j, where b i is y- smooth for j k and p l (y, My): If k is large, then more a j s, but smaller proportion actually useful (lots of effort on useless a j ). Fix: Discard if two larger prime factors
102 What practical people say, II Keep a i = b i p 1... p j, where b i is y- smooth for j k and p l (y, My): If k is large, then more a j s, but smaller proportion actually useful (lots of effort on useless a j ). Fix: Discard if two larger prime factors Speed-ups in practice (Lenstra et al):.4 to.5 for k = 1;.15 to.25 for k = 2;.1 and.14 for k = 3.
103 What practical people say, II Keep a i = b i p 1... p j, where b i is y- smooth for j k and p l (y, My): If k is large, then more a j s, but smaller proportion actually useful (lots of effort on useless a j ). Fix: Discard if two larger prime factors Speed-ups in practice (Lenstra et al):.4 to.5 for k = 1;.15 to.25 for k = 2;.1 and.14 for k = 3. For more: Willemien Ekkelkamp s talk
104 What practical people say, II Keep a i = b i p 1... p j, where b i is y- smooth for j k and p l (y, My): If k is large, then more a j s, but smaller proportion actually useful (lots of effort on useless a j ). Fix: Discard if two larger prime factors Speed-ups in practice (Lenstra et al):.4 to.5 for k = 1;.15 to.25 for k = 2;.1 and.14 for k = 3. For more: Willemien Ekkelkamp s talk For x our predictions: Speedups of.41, 0.25, 0.20 resp not bad! Run experiments on Pomerance s problem directly?
105 Methods used First and second moment methods from probabilistic combinatorics. Husimi graphs from statistical physics. Lagrange inversion from algebraic combinatorics. Analytic continuation of solutions to functional equations. Comparative estimates on smooth numbers, via comparative estimates on saddle points. Random graph theory, Poisson processes and conversion from continuous to discrete.
Industrial Strength Factorization. Lawren Smithline Cornell University
Industrial Strength Factorization Lawren Smithline Cornell University lawren@math.cornell.edu http://www.math.cornell.edu/~lawren Industrial Strength Factorization Given an integer N, determine the prime
More informationSharp Transitions in Making Squares
Sharp Transitions in Making Squares Ernie Croot School of Mathematics Georgia Tech Atlanta, GA 3332-6 ecroot@math.gatech.edu Andrew Granville 2 Départment de mathématiques et de statistique Université
More informationOn sharp transitions in making squares
Annals of Mathematics (0), http://dx.doi.org/0.00/annals.0... 0 0 0 0 On sharp transitions in making squares By Ernie Croot, Andrew Granville, Robin Pemantle, and Prasad Tetali Abstract In the fastest-performing
More informationTHE 2-CORE OF A RANDOM INHOMOGENEOUS HYPERGRAPH. Omar Abuzzahab A DISSERTATION. Mathematics
THE 2-CORE OF A RANDOM INHOMOGENEOUS HYPERGRAPH Omar Abuzzahab A DISSERTATION in Mathematics Presented to the Faculties of the University of Pennsylvania in Partial Fulfillment of the Requirements for
More informationFactoring. there exists some 1 i < j l such that x i x j (mod p). (1) p gcd(x i x j, n).
18.310 lecture notes April 22, 2015 Factoring Lecturer: Michel Goemans We ve seen that it s possible to efficiently check whether an integer n is prime or not. What about factoring a number? If this could
More informationAnalyzing the Quadratic Sieve: An Undergraduate Research Case-history
Analyzing the Quadratic Sieve: An Undergraduate Research Case-history 1/59 Analyzing the Quadratic Sieve: An Undergraduate Research Case-history 1/59 or The Tails of Two Sieves Neil J. Calkin Clemson University
More informationOn the efficient approximability of constraint satisfaction problems
On the efficient approximability of constraint satisfaction problems July 13, 2007 My world Max-CSP Efficient computation. P Polynomial time BPP Probabilistic Polynomial time (still efficient) NP Non-deterministic
More informationDixon s Factorization method
Dixon s Factorization method Nikithkumarreddy yellu December 2015 1 Contents 1 Introduction 3 2 History 3 3 Method 4 3.1 Factor-base.............................. 4 3.2 B-smooth...............................
More informationarxiv: v1 [math.nt] 12 Aug 2016
THE SHARP THRESHOLD FOR MAKING SQUARES PAUL BALISTER, BÉLA BOLLOBÁS, AND ROBERT MORRIS arxiv:1608.03857v1 [math.nt] 12 Aug 2016 Abstract. Consider a random sequence of N integers, each chosen uniformly
More informationOut-colourings of Digraphs
Out-colourings of Digraphs N. Alon J. Bang-Jensen S. Bessy July 13, 2017 Abstract We study vertex colourings of digraphs so that no out-neighbourhood is monochromatic and call such a colouring an out-colouring.
More informationINTEGERS DIVISIBLE BY THE SUM OF THEIR PRIME FACTORS
INTEGERS DIVISIBLE BY THE SUM OF THEIR PRIME FACTORS JEAN-MARIE DE KONINCK and FLORIAN LUCA Abstract. For each integer n 2, let β(n) be the sum of the distinct prime divisors of n and let B(x) stand for
More informationPigeonhole Principle and Ramsey Theory
Pigeonhole Principle and Ramsey Theory The Pigeonhole Principle (PP) has often been termed as one of the most fundamental principles in combinatorics. The familiar statement is that if we have n pigeonholes
More informationVertex colorings of graphs without short odd cycles
Vertex colorings of graphs without short odd cycles Andrzej Dudek and Reshma Ramadurai Department of Mathematical Sciences Carnegie Mellon University Pittsburgh, PA 1513, USA {adudek,rramadur}@andrew.cmu.edu
More informationExperience in Factoring Large Integers Using Quadratic Sieve
Experience in Factoring Large Integers Using Quadratic Sieve D. J. Guan Department of Computer Science, National Sun Yat-Sen University, Kaohsiung, Taiwan 80424 guan@cse.nsysu.edu.tw April 19, 2005 Abstract
More informationAlgorithms. Shanks square forms algorithm Williams p+1 Quadratic Sieve Dixon s Random Squares Algorithm
Alex Sundling Algorithms Shanks square forms algorithm Williams p+1 Quadratic Sieve Dixon s Random Squares Algorithm Shanks Square Forms Created by Daniel Shanks as an improvement on Fermat s factorization
More informationSPECIAL POINTS AND LINES OF ALGEBRAIC SURFACES
SPECIAL POINTS AND LINES OF ALGEBRAIC SURFACES 1. Introduction As we have seen many times in this class we can encode combinatorial information about points and lines in terms of algebraic surfaces. Looking
More information6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch
6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch Today Probabilistic Turing Machines and Probabilistic Time Complexity Classes Now add a new capability to standard TMs: random
More information1 The Fundamental Theorem of Arithmetic. A positive integer N has a unique prime power decomposition. Primality Testing. and. Integer Factorisation
1 The Fundamental Theorem of Arithmetic A positive integer N has a unique prime power decomposition 2 Primality Testing Integer Factorisation (Gauss 1801, but probably known to Euclid) The Computational
More informationAlgebraic Methods in Combinatorics
Algebraic Methods in Combinatorics Po-Shen Loh 27 June 2008 1 Warm-up 1. (A result of Bourbaki on finite geometries, from Răzvan) Let X be a finite set, and let F be a family of distinct proper subsets
More informationDense Admissible Sets
Dense Admissible Sets Daniel M. Gordon and Gene Rodemich Center for Communications Research 4320 Westerra Court San Diego, CA 92121 {gordon,gene}@ccrwest.org Abstract. Call a set of integers {b 1, b 2,...,
More informationChapter 8 ~ Quadratic Functions and Equations In this chapter you will study... You can use these skills...
Chapter 8 ~ Quadratic Functions and Equations In this chapter you will study... identifying and graphing quadratic functions transforming quadratic equations solving quadratic equations using factoring
More informationDiscrete Math, Fourteenth Problem Set (July 18)
Discrete Math, Fourteenth Problem Set (July 18) REU 2003 Instructor: László Babai Scribe: Ivona Bezakova 0.1 Repeated Squaring For the primality test we need to compute a X 1 (mod X). There are two problems
More informationRegular and synchronizing transformation monoids
Regular and synchronizing transformation monoids Peter J. Cameron NBSAN, York 23 November 2011 Mathematics may be defined as the subject in which we never know what we are talking about, nor whether what
More information< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1
List of Problems jacques@ucsd.edu Those question with a star next to them are considered slightly more challenging. Problems 9, 11, and 19 from the book The probabilistic method, by Alon and Spencer. Question
More informationKim Bowman and Zach Cochran Clemson University and University of Georgia
Clemson University, Conference October 2004 1/31 Linear Dependency and the Quadratic Sieve Kim Bowman and Zach Cochran Clemson University and University of Georgia and Neil Calkin, Tim Flowers, Kevin James
More informationInteger factorization, part 1: the Q sieve. part 2: detecting smoothness. D. J. Bernstein
Integer factorization, part 1: the Q sieve Integer factorization, part 2: detecting smoothness D. J. Bernstein The Q sieve factors by combining enough -smooth congruences ( + ). Enough log. Plausible conjecture:
More informationLecture 16: Communication Complexity
CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity
More informationFantastic Factoring. Difference of Cubes. Difference of Squares. Sum of Cubes. Binomial Squares. Factor the following expressions
Fantastic Factoring Following are some factoring patterns that you might already recognize. x and y can both represent variables in the expressions, or y might be a constant. These rules work for all real
More informationInteger factorization, part 1: the Q sieve. D. J. Bernstein
Integer factorization, part 1: the Q sieve D. J. Bernstein Sieving small integers 0 using primes 3 5 7: 1 3 3 4 5 5 6 3 7 7 8 9 3 3 10 5 11 1 3 13 14 7 15 3 5 16 17 18 3 3 19 0 5 etc. Sieving and 611 +
More informationComputing the modular equation
Computing the modular equation Andrew V. Sutherland (MIT) Barcelona-Boston-Tokyo Number Theory Seminar in Memory of Fumiyuki Momose Andrew V. Sutherland (MIT) Computing the modular equation 1 of 8 The
More informationSMOOTH NUMBERS AND THE QUADRATIC SIEVE. Carl Pomerance
SMOOTH NUMBERS AND THE QUADRATIC SIEVE Carl Pomerance When faced with a large number n to factor, what do you do first? You might say Look at the last digit, with the idea of cheaply pulling out possible
More informationModule 2: Reflecting on One s Problems
MATH55 Module : Reflecting on One s Problems Main Math concepts: Translations, Reflections, Graphs of Equations, Symmetry Auxiliary ideas: Working with quadratics, Mobius maps, Calculus, Inverses I. Transformations
More informationEuclidean prime generators
Euclidean prime generators Andrew R. Booker, Bristol University Bristol, UK Carl Pomerance, Dartmouth College (emeritus) Hanover, New Hampshire, USA (U. Georgia, emeritus) Integers Conference, Carrollton,
More informationThe Probabilistic Method
The Probabilistic Method In Graph Theory Ehssan Khanmohammadi Department of Mathematics The Pennsylvania State University February 25, 2010 What do we mean by the probabilistic method? Why use this method?
More informationpart 2: detecting smoothness part 3: the number-field sieve
Integer factorization, part 1: the Q sieve Integer factorization, part 2: detecting smoothness Integer factorization, part 3: the number-field sieve D. J. Bernstein Problem: Factor 611. The Q sieve forms
More informationSieve-based factoring algorithms
Sieve-based factoring algorithms From bicycle chains to number fields Eran Tromer tromer@wisdom.weizmann.ac.il Weizmann Institute of Science Sieve-based factoring p.1/23 Factoring by square root extraction
More informationCluster varieties for tree-shaped quivers and their cohomology
Cluster varieties for tree-shaped quivers and their cohomology Frédéric Chapoton CNRS & Université de Strasbourg Octobre 2016 Cluster algebras and the associated varieties Cluster algebras are commutative
More informationPrimality Testing. 1 Introduction. 2 Brief Chronology of Primality Testing. CS265/CME309, Fall Instructor: Gregory Valiant
CS265/CME309, Fall 2018. Instructor: Gregory Valiant Primality Testing [These notes may not be distributed outside this class without the permission of Gregory Valiant.] 1 Introduction Prime numbers are
More informationTheoretical Cryptography, Lectures 18-20
Theoretical Cryptography, Lectures 18-20 Instructor: Manuel Blum Scribes: Ryan Williams and Yinmeng Zhang March 29, 2006 1 Content of the Lectures These lectures will cover how someone can prove in zero-knowledge
More informationRepeated Values of Euler s Function. a talk by Paul Kinlaw on joint work with Jonathan Bayless
Repeated Values of Euler s Function a talk by Paul Kinlaw on joint work with Jonathan Bayless Oct 4 205 Problem of Erdős: Consider solutions of the equations ϕ(n) = ϕ(n + k), σ(n) = σ(n + k) for fixed
More informationSecret Sharing: Four People, Need Three
Secret Sharing A secret is an n-bit string. Throughout this talk assume that Zelda has a secret s {0, 1} n. She will want to give shares of the secret to various people. Applications Rumor: Secret Sharing
More informationResearch Problems in Arithmetic Combinatorics
Research Problems in Arithmetic Combinatorics Ernie Croot July 13, 2006 1. (related to a quesiton of J. Bourgain) Classify all polynomials f(x, y) Z[x, y] which have the following property: There exists
More informationD. J. Bernstein University of Illinois at Chicago
Algorithms for primes D. J. Bernstein University of Illinois at Chicago Some literature: Recognizing primes: 1982 Atkin Larson On a primality test of Solovay and Strassen ; 1995 Atkin Intelligent primality
More informationChapter 7 Polynomial Functions. Factoring Review. We will talk about 3 Types: ALWAYS FACTOR OUT FIRST! Ex 2: Factor x x + 64
Chapter 7 Polynomial Functions Factoring Review We will talk about 3 Types: 1. 2. 3. ALWAYS FACTOR OUT FIRST! Ex 1: Factor x 2 + 5x + 6 Ex 2: Factor x 2 + 16x + 64 Ex 3: Factor 4x 2 + 6x 18 Ex 4: Factor
More informationThe ranges of some familiar arithmetic functions
The ranges of some familiar arithmetic functions Carl Pomerance Dartmouth College, emeritus University of Georgia, emeritus based on joint work with K. Ford, F. Luca, and P. Pollack and T. Freiburg, N.
More informationLecture 6: The Pigeonhole Principle and Probability Spaces
Lecture 6: The Pigeonhole Principle and Probability Spaces Anup Rao January 17, 2018 We discuss the pigeonhole principle and probability spaces. Pigeonhole Principle The pigeonhole principle is an extremely
More informationModular polynomials and isogeny volcanoes
Modular polynomials and isogeny volcanoes Andrew V. Sutherland February 3, 010 Reinier Bröker Kristin Lauter Andrew V. Sutherland (MIT) Modular polynomials and isogeny volcanoes 1 of 9 Isogenies An isogeny
More informationIrredundant Families of Subcubes
Irredundant Families of Subcubes David Ellis January 2010 Abstract We consider the problem of finding the maximum possible size of a family of -dimensional subcubes of the n-cube {0, 1} n, none of which
More informationAlgebraic Methods in Combinatorics
Algebraic Methods in Combinatorics Po-Shen Loh June 2009 1 Linear independence These problems both appeared in a course of Benny Sudakov at Princeton, but the links to Olympiad problems are due to Yufei
More informationHigh-speed cryptography, part 3: more cryptosystems. Daniel J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven
High-speed cryptography, part 3: more cryptosystems Daniel J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven Cryptographers Working systems Cryptanalytic algorithm designers
More informationGRAPHS CONTAINING TRIANGLES ARE NOT 3-COMMON
GRAPHS CONTAINING TRIANGLES ARE NOT 3-COMMON JAMES CUMMINGS AND MICHAEL YOUNG Abstract. A finite graph G is k-common if the minimum (over all k- colourings of the edges of K n) of the number of monochromatic
More informationIntroduction: Pythagorean Triplets
Introduction: Pythagorean Triplets On this first day I want to give you an idea of what sorts of things we talk about in number theory. In number theory we want to study the natural numbers, and in particular
More informationECEN 5022 Cryptography
Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,
More informationGROUPS AS GRAPHS. W. B. Vasantha Kandasamy Florentin Smarandache
GROUPS AS GRAPHS W. B. Vasantha Kandasamy Florentin Smarandache 009 GROUPS AS GRAPHS W. B. Vasantha Kandasamy e-mail: vasanthakandasamy@gmail.com web: http://mat.iitm.ac.in/~wbv www.vasantha.in Florentin
More informationCounting independent sets of a fixed size in graphs with a given minimum degree
Counting independent sets of a fixed size in graphs with a given minimum degree John Engbers David Galvin April 4, 01 Abstract Galvin showed that for all fixed δ and sufficiently large n, the n-vertex
More informationConstruction of latin squares of prime order
Construction of latin squares of prime order Theorem. If p is prime, then there exist p 1 MOLS of order p. Construction: The elements in the latin square will be the elements of Z p, the integers modulo
More informationI. Introduction. MPRI Cours Lecture IIb: Introduction to integer factorization. F. Morain. Input: an integer N; Output: N = k
F. Morain École polytechnique MPRI cours 2-12-2 2009-2010 3/26 F. Morain École polytechnique MPRI cours 2-12-2 2009-2010 4/26 MPRI Cours 2-12-2 I. Introduction ECOLE POLYTECHNIQUE F. Morain Lecture IIb:
More informationENHANCING THE PERFORMANCE OF FACTORING ALGORITHMS
ENHANCING THE PERFORMANCE OF FACTORING ALGORITHMS GIVEN n FIND p 1,p 2,..,p k SUCH THAT n = p 1 d 1 p 2 d 2.. p k d k WHERE p i ARE PRIMES FACTORING IS CONSIDERED TO BE A VERY HARD. THE BEST KNOWN ALGORITHM
More informationNotes for Lecture 25
U.C. Berkeley CS276: Cryptography Handout N25 Luca Trevisan April 23, 2009 Notes for Lecture 25 Scribed by Alexandra Constantin, posted May 4, 2009 Summary Today we show that the graph isomorphism protocol
More informationInt Math 3 Midterm Review Handout (Modules 5-7)
Int Math 3 Midterm Review Handout (Modules 5-7) 1 Graph f(x) = x and g(x) = 1 x 4. Then describe the transformation from the graph of f(x) = x to the graph 2 of g(x) = 1 2 x 4. The transformations are
More informationCourse Notes. Part IV. Probabilistic Combinatorics. Algorithms
Course Notes Part IV Probabilistic Combinatorics and Algorithms J. A. Verstraete Department of Mathematics University of California San Diego 9500 Gilman Drive La Jolla California 92037-0112 jacques@ucsd.edu
More informationcompare to comparison and pointer based sorting, binary trees
Admin Hashing Dictionaries Model Operations. makeset, insert, delete, find keys are integers in M = {1,..., m} (so assume machine word size, or unit time, is log m) can store in array of size M using power:
More informationProblems for Putnam Training
Problems for Putnam Training 1 Number theory Problem 1.1. Prove that for each positive integer n, the number is not prime. 10 1010n + 10 10n + 10 n 1 Problem 1.2. Show that for any positive integer n,
More informationPolynomial analogues of Ramanujan congruences for Han s hooklength formula
Polynomial analogues of Ramanujan congruences for Han s hooklength formula William J. Keith CELC, University of Lisbon Email: william.keith@gmail.com Detailed arxiv preprint: 1109.1236 Context Partition
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017
U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017 Scribed by Luowen Qian Lecture 8 In which we use spectral techniques to find certificates of unsatisfiability
More informationFactoring Algorithms Pollard s p 1 Method. This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors.
Factoring Algorithms Pollard s p 1 Method This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors. Input: n (to factor) and a limit B Output: a proper factor of
More informationTwitter: @Owen134866 www.mathsfreeresourcelibrary.com Prior Knowledge Check 1) Simplify: a) 3x 2 5x 5 b) 5x3 y 2 15x 7 2) Factorise: a) x 2 2x 24 b) 3x 2 17x + 20 15x 2 y 3 3) Use long division to calculate:
More informationP, NP, NP-Complete, and NPhard
P, NP, NP-Complete, and NPhard Problems Zhenjiang Li 21/09/2011 Outline Algorithm time complicity P and NP problems NP-Complete and NP-Hard problems Algorithm time complicity Outline What is this course
More informationGraph Theory. Thomas Bloom. February 6, 2015
Graph Theory Thomas Bloom February 6, 2015 1 Lecture 1 Introduction A graph (for the purposes of these lectures) is a finite set of vertices, some of which are connected by a single edge. Most importantly,
More informationComputing modular polynomials with the Chinese Remainder Theorem
Computing modular polynomials with the Chinese Remainder Theorem Andrew V. Sutherland Massachusetts Institute of Technology ECC 009 Reinier Bröker Kristin Lauter Andrew V. Sutherland (MIT) Computing modular
More informationLecture 5: Two-point Sampling
Randomized Algorithms Lecture 5: Two-point Sampling Sotiris Nikoletseas Professor CEID - ETY Course 2017-2018 Sotiris Nikoletseas, Professor Randomized Algorithms - Lecture 5 1 / 26 Overview A. Pairwise
More informationCombinatorial properties of transformation monoids
Combinatorial properties of transformation monoids Peter J. Cameron 35ACCMCC Melbourne, December 2011 A few combinatorial problems... Is there an analogue of Baranyai s Theorem over fields with more than
More informationContainment restrictions
Containment restrictions Tibor Szabó Extremal Combinatorics, FU Berlin, WiSe 207 8 In this chapter we switch from studying constraints on the set operation intersection, to constraints on the set relation
More informationRSA Cryptosystem and Factorization
RSA Cryptosystem and Factorization D. J. Guan Department of Computer Science National Sun Yat Sen University Kaoshiung, Taiwan 80424 R. O. C. guan@cse.nsysu.edu.tw August 25, 2003 RSA Cryptosystem was
More informationFactorization & Primality Testing
Factorization & Primality Testing C etin Kaya Koc http://cs.ucsb.edu/~koc koc@cs.ucsb.edu Koc (http://cs.ucsb.edu/~ koc) ucsb ccs 130h explore crypto fall 2014 1/1 Primes Natural (counting) numbers: N
More informationLogic: The Big Picture
Logic: The Big Picture A typical logic is described in terms of syntax: what are the legitimate formulas semantics: under what circumstances is a formula true proof theory/ axiomatization: rules for proving
More informationThe Interlace Polynomial of Graphs at 1
The Interlace Polynomial of Graphs at 1 PN Balister B Bollobás J Cutler L Pebody July 3, 2002 Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152 USA Abstract In this paper we
More informationGeorgia Department of Education Common Core Georgia Performance Standards Framework CCGPS Advanced Algebra Unit 2
Polynomials Patterns Task 1. To get an idea of what polynomial functions look like, we can graph the first through fifth degree polynomials with leading coefficients of 1. For each polynomial function,
More informationAmicable numbers. CRM Workshop on New approaches in probabilistic and multiplicative number theory December 8 12, 2014
Amicable numbers CRM Workshop on New approaches in probabilistic and multiplicative number theory December 8 12, 2014 Carl Pomerance, Dartmouth College (U. Georgia, emeritus) Recall that s(n) = σ(n) n,
More informationHOW OFTEN IS EULER S TOTIENT A PERFECT POWER? 1. Introduction
HOW OFTEN IS EULER S TOTIENT A PERFECT POWER? PAUL POLLACK Abstract. Fix an integer k 2. We investigate the number of n x for which ϕn) is a perfect kth power. If we assume plausible conjectures on the
More informationProduct Representations of Polynomials
Product Representations of Polynomials Jacques Verstraëte Abstract For a fixed polyomial f Z[X], let ρ k (N denote the maximum size of a set A {1, 2,..., N} such that no product of k distinct elements
More informationAlgorithm Design CS 515 Fall 2015 Sample Final Exam Solutions
Algorithm Design CS 515 Fall 2015 Sample Final Exam Solutions Copyright c 2015 Andrew Klapper. All rights reserved. 1. For the functions satisfying the following three recurrences, determine which is the
More informationSolving x 2 Dy 2 = N in integers, where D > 0 is not a perfect square. Keith Matthews
Solving x 2 Dy 2 = N in integers, where D > 0 is not a perfect square. Keith Matthews Abstract We describe a neglected algorithm, based on simple continued fractions, due to Lagrange, for deciding the
More informationNP-Completeness I. Lecture Overview Introduction: Reduction and Expressiveness
Lecture 19 NP-Completeness I 19.1 Overview In the past few lectures we have looked at increasingly more expressive problems that we were able to solve using efficient algorithms. In this lecture we introduce
More informationCombinatorial Designs: Balanced Incomplete Block Designs
Combinatorial Designs: Balanced Incomplete Block Designs Designs The theory of design of experiments came into being largely through the work of R.A.Fisher and F.Yates in the early 1930's. They were motivated
More informationA conjecture on the alphabet size needed to produce all correlation classes of pairs of words
A conjecture on the alphabet size needed to produce all correlation classes of pairs of words Paul Leopardi Thanks: Jörg Arndt, Michael Barnsley, Richard Brent, Sylvain Forêt, Judy-anne Osborn. Mathematical
More informationPolynomial Functions. x n 2 a n. x n a 1. f x = a o. x n 1 a 2. x 0, , a 1
Polynomial Functions A polynomial function is a sum of multiples of an independent variable raised to various integer powers. The general form of a polynomial function is f x = a o x n a 1 x n 1 a 2 x
More informationWinter 2011 Josh Benaloh Brian LaMacchia
Winter 2011 Josh Benaloh Brian LaMacchia Fun with Public-Key Tonight we ll Introduce some basic tools of public-key crypto Combine the tools to create more powerful tools Lay the ground work for substantial
More informationMathematics Masters Examination
Mathematics Masters Examination OPTION 4 Fall 2015 MATHEMATICAL COMPUTER SCIENCE NOTE: Any student whose answers require clarification may be required to submit to an oral examination. Each of the twelve
More informationPostmodern Primality Proving
Preda Mihăilescu (University of Göttingen) Postmodern Primality Proving June 28, 2013 1 / 29 Postmodern Primality Proving Preda Mihăilescu Mathematical Institute, University of Göttingen, Germany June
More informationEstimates for factoring 1024-bit integers. Thorsten Kleinjung, University of Bonn
Estimates for factoring 1024-bit integers Thorsten Kleinjung, University of Bonn Contents GNFS Overview Polynomial selection, matrix construction, square root computation Sieving and cofactoring Strategies
More informationSolutions to Assignment 4
1. Let G be a finite, abelian group written additively. Let x = g G g, and let G 2 be the subgroup of G defined by G 2 = {g G 2g = 0}. (a) Show that x = g G 2 g. (b) Show that x = 0 if G 2 = 2. If G 2
More information9 - The Combinatorial Nullstellensatz
9 - The Combinatorial Nullstellensatz Jacques Verstraëte jacques@ucsd.edu Hilbert s nullstellensatz says that if F is an algebraically closed field and f and g 1, g 2,..., g m are polynomials in F[x 1,
More informationNonnegative k-sums, fractional covers, and probability of small deviations
Nonnegative k-sums, fractional covers, and probability of small deviations Noga Alon Hao Huang Benny Sudakov Abstract More than twenty years ago, Manickam, Miklós, and Singhi conjectured that for any integers
More informationA New Algorithm to Compute Terms in Special Types of Characteristic Sequences
A New Algorithm to Compute Terms in Special Types of Characteristic Sequences Kenneth J. Giuliani 1 and Guang Gong 2 1 Dept. of Mathematical and Computational Sciences University of Toronto at Mississauga
More informationSums and products: What we still don t know about addition and multiplication
Sums and products: What we still don t know about addition and multiplication Carl Pomerance, Dartmouth College Hanover, New Hampshire, USA Based on joint work with R. P. Brent, P. Kurlberg, J. C. Lagarias,
More informationLoop Convergence. CS 536: Science of Programming, Fall 2018
Solved Loop Convergence CS 536: Science of Programming, Fall 2018 A. Why Diverging programs aren t useful, so it s useful to know how to show that loops terminate. B. Objectives At the end of this lecture
More informationANALYZING THE QUADRATIC SIEVE ALGORITHM
ANALYZING THE QUADRATIC SIEVE ALGORITHM KIM BOWMAN, NEIL CALKIN, ZACH COCHRAN, AND KEVIN JAMES Abstract. We will discuss random vector models related to the quadratic sieve. We will introduce a new model
More informationLinear, Quadratic, and Cubic Forms over the Binary Field
Linear, Quadratic, and Cubic Forms over the Binary Field Akihiro Munemasa 1 1 Graduate School of Information Sciences Tohoku University October 28, 2009 POSTECH Linear, Quadratic, and Cubic Forms over
More informationRecitation 8: Graphs and Adjacency Matrices
Math 1b TA: Padraic Bartlett Recitation 8: Graphs and Adjacency Matrices Week 8 Caltech 2011 1 Random Question Suppose you take a large triangle XY Z, and divide it up with straight line segments into
More information