UNCONDITIONAL CLASS GROUP TABULATION TO Anton Mosunov (University of Waterloo) Michael J. Jacobson, Jr. (University of Calgary) June 11th, 2015
|
|
- Marylou Leonard
- 5 years ago
- Views:
Transcription
1 UNCONDITIONAL CLASS GROUP TABULATION TO 2 40 Anton Mosunov (University of Waterloo) Michael J. Jacobson, Jr. (University of Calgary) June 11th, 2015
2 AGENDA Background Motivation Previous work Class number tabulation Out-of-core multiplication Class group tabulation Performance Future work
3 BACKGROUND Consider a binary quadratic form of discriminant = b 2 4ac < 0, Denote it by. ax 2 + bxy + cy 2 The substitution, yields another (a 0,b 0,c 0 ) (a, b, c) a, b, c, x, y 2 Z. x = x 0 + y 0 y = x 0 + y 0 form. If =1, then the backward substitution exists. In that case, we call these two forms equivalent. we can define an operation of composition under which the set of all equivalence classes forms a finite abelian group, i.e. (a, b, c) (a 0,b 0,c 0 )=(a 00,b 00,c 00 )
4 GOAL This finite abelian group for a fixed discriminant is called the class group, and is denoted by Cl( ). The cardinality of Cl( ) is called the class number, and is denoted by h( ). Goal. Tabulate class groups for every fundamental discriminant < 2 40.
5 MOTIVATION Not much known about class groups. It is hard to compute them, in a sense that there is no polynomial time algorithm for the class group computation. Want to provide an extensive computational evidence in support of the Cohen-Lenstra heuristics and the Littlewood s bounds. Certain cryptosystems, such as the Buchmann-Williams key exchange protocol, rely on them. Want to have enough evidence that they hold.
6 PREVIOUS WORK In late 90s, Buell tabulated to , using algorithm for enumerating reduced forms. After computing all h( ), he produced Cl( ) by resolving structures of each p-group. In 2006, Ramachandran tabulated to using Buchmann- Jacobson-Teske algorithm. The algorithm computes right away. However, it is conditional, and requires verification. We follow Buell s approach. In order to compute all h( ), we use the algorithm due to Hart, Tornaria and Watkins, who used an outof-core polynomial multiplication technique to tabulate all congruent numbers to Cl( )
7 CLASS NUMBER TABULATION Why do class numbers help us to resolve the group structure faster? Consider the factorization of h( ): h( )=p e 1 1 pe pe k k If e i =1, then the -group is cyclic, so we can ignore it. p i Up to 2 40, 85.13% of h( ) have non-square factors. p For more than 57% of them this factor exceeds h( ).
8 CLASS NUMBER TABULATION Let r(q) = For the Hurwitz class number relations hold: (a) (b) (c) 1X n=0 # 3 (q) =1+2 1X n=0 1X n=0 q n(n+1) 2 =1+q + q 3 + q 6 + q X n=0 q n2 =1+2q +2q 4 +2q 9 +2q H( ) H( 16n 8)q n = r 2 (q 2 )# 3 (q) H( 16n 4)q n = 1 2 r(q2 )# 2 3(q) 1X H( 8n 3)q n = 1 3 r3 (q) n=0 the following
9 CLASS NUMBER TABULATION Compute (a) and (b) to 2 36, and (c) to This allows us to produce all, except 1(mod 8). For the Hurwitz class number H( ) the following relations hold: (a) (b) (c) 1X H( 16n 8)q n = r 2 (q 2 )# 3 (q) 1X H( 16n 4)q n = 1 2 r(q2 )# 2 3(q) n=0 n=0 1X H( 8n 3)q n = 1 3 r3 (q) n=0
10 OUT-OF-CORE MULTIPLICATION We want to compute the product of two polynomials, h(x) =f(x) g(x) each of length Each coefficient is of size 4 bytes, so in total we require at least bytes = 768 Gb of memory. Need to store intermediate results on hard disk. Need multithreaded environment. For our computations, we utilize an out-of-core Fast Fourier Transform with Chinese Remainder Theorem (non-trivial).
11 CLASS GROUP TABULATION We used the Buchmann-Jacobson-Teske algorithm to compute the structure of a group. The algorithm requires h( ), or the lower bound h : h apple h( ) apple 2h For 1(mod 8), we computed with the Bach s averaging method (conditional). To unconditionally verify our results, we used the Eichler-Selberg trace formula (previously used by Ramachandran). h
12 PERFORMANCE We were using Westgrid s Hungabee supercomputer. For each multiplication, we requested 64 Intel Xeon 2.67GHz processors with 8Gb of memory per core. (a) to 2 36 terminated in 8 h 48 min (859 Gb) (b) to 2 36 terminated in 11 h 13 min (893.4 Gb) (c) to 2 37 terminated in 25 h 35 min (1855 Gb)
13 PERFORMANCE For class group tabulation, we requested 1008 processors for and 64 processors for : 1(mod 8) 6 1(mod 8) 6 1(mod 8) 1(mod 8) CPU time Real time # of processors 265d 4h 31m 4d 3h 27m h 22h 12m 39h 29m 1008 got computed over 6.25 times faster; 6 1(mod 8) With class number tabulation and verification, 6 1(mod 8) got computed over 4.72 times faster.
14 SOME EXOTIC GROUPS DISCOVERED 3-rank = 4: = ,Cl ( ) = C(3 3 ) C(3 3 ) C(3) C(3) 4-rank = 5: = ,Cl( ) = C( ) C(2 4 ) C(2 2 ) C(2 2 ) C(2 2 ) Doubly non-cyclic (19-rank = 2, 29-rank = 2): = ,Cl( ) = C(19 29) C(19 29) Trebly non-cyclic (5-rank = 2, 7-rank = 2, 17-rank = 2): = ,Cl ( ) = C(5 7 17) C(5 7 17) Quadruply non-cyclic (4-rank = 2, 3-rank = 2, 5-rank = 2, 13-rank = 2) = ,Cl( ) = C( ) C( )
15 CONCLUSION Ramachandran s approach allows to compute class groups right away. However, for 64 processors it would take at least 4 months (vs. 1 month). Moreover, the result is dependent on Extended Riemann Hypothesis, and requires an additional verification step. Out-of-core multiplication approach is unconditional, and with 64 processors allows to produce 2/3 of all class numbers to 2 40 in less than 2 days! We gathered an unconditional numerical evidence in support of Littlewood s bounds and the Cohen-Lenstra heuristics.
16 FUTURE WORK Find a better way of tabulating class numbers for discriminants 1(mod 8) unconditionally. We believe that Sutherland s p-group resolution algorithms can also speed up our computations. The tabulation of class groups with positive discriminant is currently work in progress.
17 SOURCES The data is available at lmfdb.org. The source code is available at github.com/amosunov. The paper is soon to appear in Mathematics of Computation. Also available at arxiv.org:
18 THANK YOU VERY MUCH FOR YOUR ATTENTION
UNIVERSITY OF CALGARY. Unconditional Class Group Tabulation to Anton S. Mosunov A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES
UNIVERSITY OF CALGARY Unconditional Class Group Tabulation to 2 40 by Anton S. Mosunov A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF
More informationClass Field Theory. Steven Charlton. 29th February 2012
Class Theory 29th February 2012 Introduction Motivating examples Definition of a binary quadratic form Fermat and the sum of two squares The Hilbert class field form x 2 + 23y 2 Motivating Examples p =
More informationExperience in Factoring Large Integers Using Quadratic Sieve
Experience in Factoring Large Integers Using Quadratic Sieve D. J. Guan Department of Computer Science, National Sun Yat-Sen University, Kaohsiung, Taiwan 80424 guan@cse.nsysu.edu.tw April 19, 2005 Abstract
More informationPart II. Number Theory. Year
Part II Year 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2017 Paper 3, Section I 1G 70 Explain what is meant by an Euler pseudoprime and a strong pseudoprime. Show that 65 is an Euler
More informationDiscrete Logarithm Computation in Hyperelliptic Function Fields
Discrete Logarithm Computation in Hyperelliptic Function Fields Michael J. Jacobson, Jr. jacobs@cpsc.ucalgary.ca UNCG Summer School in Computational Number Theory 2016: Function Fields Mike Jacobson (University
More informationComputing modular polynomials with the Chinese Remainder Theorem
Computing modular polynomials with the Chinese Remainder Theorem Andrew V. Sutherland Massachusetts Institute of Technology ECC 009 Reinier Bröker Kristin Lauter Andrew V. Sutherland (MIT) Computing modular
More informationModular polynomials and isogeny volcanoes
Modular polynomials and isogeny volcanoes Andrew V. Sutherland February 3, 010 Reinier Bröker Kristin Lauter Andrew V. Sutherland (MIT) Modular polynomials and isogeny volcanoes 1 of 9 Isogenies An isogeny
More informationLECTURE NOTES IN CRYPTOGRAPHY
1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic
More informationBachet s equation and groups formed from solutions in Z p
Bachet s equation and groups formed from solutions in Z p Boise State University April 30, 2015 Elliptic Curves and Bachet s Equation Elliptic curves are of the form y 2 = x 3 + ax + b Bachet equations
More informationArithmetic Statistics Lecture 3
Arithmetic Statistics Lecture 3 Álvaro Lozano-Robledo Department of Mathematics University of Connecticut May 28 th CTNT 2018 Connecticut Summer School in Number Theory PREVIOUSLY... We can define an action
More informationERIC LARSON AND LARRY ROLEN
PROGRESS TOWARDS COUNTING D 5 QUINTIC FIELDS ERIC LARSON AND LARRY ROLEN Abstract. Let N5, D 5, X) be the number of quintic number fields whose Galois closure has Galois group D 5 and whose discriminant
More informationMathematics for Cryptography
Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1
More informationAMBIGUOUS FORMS AND IDEALS IN QUADRATIC ORDERS. Copyright 2009 Please direct comments, corrections, or questions to
AMBIGUOUS FORMS AND IDEALS IN QUADRATIC ORDERS JOHN ROBERTSON Copyright 2009 Please direct comments, corrections, or questions to jpr2718@gmail.com This note discusses the possible numbers of ambiguous
More informationFinite Fields. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay
1 / 25 Finite Fields Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay September 25, 2014 2 / 25 Fields Definition A set F together
More informationInstructor: Bobby Kleinberg Lecture Notes, 25 April The Miller-Rabin Randomized Primality Test
Introduction to Algorithms (CS 482) Cornell University Instructor: Bobby Kleinberg Lecture Notes, 25 April 2008 The Miller-Rabin Randomized Primality Test 1 Introduction Primality testing is an important
More information2-4 Zeros of Polynomial Functions
Write a polynomial function of least degree with real coefficients in standard form that has the given zeros. 33. 2, 4, 3, 5 Using the Linear Factorization Theorem and the zeros 2, 4, 3, and 5, write f
More informationShortest Lattice Vector Enumeration on Graphics Cards
Shortest Lattice Vector Enumeration on Graphics Cards Jens Hermans 1 Michael Schneider 2 Fréderik Vercauteren 1 Johannes Buchmann 2 Bart Preneel 1 1 K.U.Leuven 2 TU Darmstadt SHARCS - 10 September 2009
More informationComputing the modular equation
Computing the modular equation Andrew V. Sutherland (MIT) Barcelona-Boston-Tokyo Number Theory Seminar in Memory of Fumiyuki Momose Andrew V. Sutherland (MIT) Computing the modular equation 1 of 8 The
More informationAlgorithms for ray class groups and Hilbert class fields
(Quantum) Algorithms for ray class groups and Hilbert class fields Sean Hallgren joint with Kirsten Eisentraeger Penn State 1 Quantum Algorithms Quantum algorithms for number theoretic problems: Factoring
More informationNEW QUADRATIC POLYNOMIALS WITH HIGH DENSITIES OF PRIME VALUES
MATHEMATICS OF COMPUTATION Volume 72, Number 241, Pages 499 519 S 0025-57180201418-7 Article electronically published on May 2, 2002 NEW QUADRATIC POLYNOMIALS WITH HIGH DENSITIES OF PRIME VALUES MICHAEL
More informationMath Circles: Number Theory III
Math Circles: Number Theory III Centre for Education in Mathematics and Computing University of Waterloo March 9, 2011 A prime-generating polynomial The polynomial f (n) = n 2 n + 41 generates a lot of
More informationParallel Polynomial Evaluation
Parallel Polynomial Evaluation Jan Verschelde joint work with Genady Yoffe University of Illinois at Chicago Department of Mathematics, Statistics, and Computer Science http://www.math.uic.edu/ jan jan@math.uic.edu
More informationComputing the image of Galois
Computing the image of Galois Andrew V. Sutherland Massachusetts Institute of Technology October 9, 2014 Andrew Sutherland (MIT) Computing the image of Galois 1 of 25 Elliptic curves Let E be an elliptic
More informationEFFICIENT COMPUTATION OF GALOIS GROUPS OF EVEN SEXTIC POLYNOMIALS
EFFICIENT COMPUTATION OF GALOIS GROUPS OF EVEN SEXTIC POLYNOMIALS CHAD AWTREY AND PETER JAKES Abstract. Let f(x) =x 6 + ax 4 + bx 2 + c be an irreducible sextic polynomial with coe cients from a field
More informationGurgen Khachatrian Martun Karapetyan
34 International Journal Information Theories and Applications, Vol. 23, Number 1, (c) 2016 On a public key encryption algorithm based on Permutation Polynomials and performance analyses Gurgen Khachatrian
More informationENHANCING THE PERFORMANCE OF FACTORING ALGORITHMS
ENHANCING THE PERFORMANCE OF FACTORING ALGORITHMS GIVEN n FIND p 1,p 2,..,p k SUCH THAT n = p 1 d 1 p 2 d 2.. p k d k WHERE p i ARE PRIMES FACTORING IS CONSIDERED TO BE A VERY HARD. THE BEST KNOWN ALGORITHM
More informationAlgorithms (II) Yu Yu. Shanghai Jiaotong University
Algorithms (II) Yu Yu Shanghai Jiaotong University Chapter 1. Algorithms with Numbers Two seemingly similar problems Factoring: Given a number N, express it as a product of its prime factors. Primality:
More informationApplied Cryptography and Computer Security CSE 664 Spring 2018
Applied Cryptography and Computer Security Lecture 12: Introduction to Number Theory II Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline This time we ll finish the
More informationArithmetic Statistics Lecture 1
Arithmetic Statistics Lecture 1 Álvaro Lozano-Robledo Department of Mathematics University of Connecticut May 28 th CTNT 2018 Connecticut Summer School in Number Theory Question What is Arithmetic Statistics?
More informationChapter 8: Taylor s theorem and L Hospital s rule
Chapter 8: Taylor s theorem and L Hospital s rule Theorem: [Inverse Mapping Theorem] Suppose that a < b and f : [a, b] R. Given that f (x) > 0 for all x (a, b) then f 1 is differentiable on (f(a), f(b))
More informationLarge strings of consecutive smooth integers
Large strings of consecutive smooth integers Filip Najman Abstract In this note we improve an algorithm from a recent paper by Bauer and Bennett for computing a function of Erdös that measures the minimal
More information1) The line has a slope of ) The line passes through (2, 11) and. 6) r(x) = x + 4. From memory match each equation with its graph.
Review Test 2 Math 1314 Name Write an equation of the line satisfying the given conditions. Write the answer in standard form. 1) The line has a slope of - 2 7 and contains the point (3, 1). Use the point-slope
More informationSimultaneous Linear, and Non-linear Congruences
Simultaneous Linear, and Non-linear Congruences CIS002-2 Computational Alegrba and Number Theory David Goodwin david.goodwin@perisic.com 09:00, Friday 18 th November 2011 Outline 1 Polynomials 2 Linear
More informationALGORITHMS FOR COMPUTING QUARTIC GALOIS GROUPS OVER FIELDS OF CHARACTERISTIC 0
ALGORITHMS FOR COMPUTING QUARTIC GALOIS GROUPS OVER FIELDS OF CHARACTERISTIC 0 CHAD AWTREY, JAMES BEUERLE, AND MICHAEL KEENAN Abstract. Let f(x) beanirreducibledegreefourpolynomialdefinedover afieldf and
More informationMathematics of Cryptography
UNIT - III Mathematics of Cryptography Part III: Primes and Related Congruence Equations 1 Objectives To introduce prime numbers and their applications in cryptography. To discuss some primality test algorithms
More informationOn the Complexity of Computing Units in a Number Field
On the Complexity of Computing Units in a Number Field V. Arvind and Piyush P Kurur Institute of Mathematical Sciences C.I.T Campus,Chennai, India 600 113 {arvind,ppk}@imsc.res.in August 2, 2008 Abstract
More informationECM at Work. Joppe W. Bos 1 and Thorsten Kleinjung 2. 1 Microsoft Research, Redmond, USA
ECM at Work Joppe W. Bos 1 and Thorsten Kleinjung 2 1 Microsoft Research, Redmond, USA 2 Laboratory for Cryptologic Algorithms, EPFL, Lausanne, Switzerland 1 / 18 Security assessment of public-key cryptography
More informationMod 2 linear algebra and tabulation of rational eigenforms
Mod 2 linear algebra and tabulation of rational eigenforms Kiran S. Kedlaya Department of Mathematics, University of California, San Diego kedlaya@ucsd.edu http://kskedlaya.org/slides/ (see also this SageMathCloud
More informationx mv = 1, v v M K IxI v = 1,
18.785 Number Theory I Fall 2017 Problem Set #7 Description These problems are related to the material covered in Lectures 13 15. Your solutions are to be written up in latex (you can use the latex source
More informationAddition sequences and numerical evaluation of modular forms
Addition sequences and numerical evaluation of modular forms Fredrik Johansson (INRIA Bordeaux) Joint work with Andreas Enge (INRIA Bordeaux) William Hart (TU Kaiserslautern) DK Statusseminar in Strobl,
More informationSEVENTH EDITION and EXPANDED SEVENTH EDITION
SEVENTH EDITION and EXPANDED SEVENTH EDITION Slide 10-1 Chapter 10 Mathematical Systems 10.1 Groups Definitions A mathematical system consists of a set of elements and at least one binary operation. A
More informationAn Analysis of Affine Coordinates for Pairing Computation
An Analysis of Affine Coordinates for Pairing Computation Michael Naehrig Microsoft Research mnaehrig@microsoft.com joint work with Kristin Lauter and Peter Montgomery Microsoft Research Pairing 2010,
More informationHASSE-MINKOWSKI THEOREM
HASSE-MINKOWSKI THEOREM KIM, SUNGJIN 1. Introduction In rough terms, a local-global principle is a statement that asserts that a certain property is true globally if and only if it is true everywhere locally.
More informationComputers and Mathematics with Applications
Computers and Mathematics with Applications 61 (2011) 1261 1265 Contents lists available at ScienceDirect Computers and Mathematics with Applications journal homepage: wwwelseviercom/locate/camwa Cryptanalysis
More informationECM at Work. Joppe W. Bos and Thorsten Kleinjung. Laboratory for Cryptologic Algorithms EPFL, Station 14, CH-1015 Lausanne, Switzerland 1 / 14
ECM at Work Joppe W. Bos and Thorsten Kleinjung Laboratory for Cryptologic Algorithms EPFL, Station 14, CH-1015 Lausanne, Switzerland 1 / 14 Motivation The elliptic curve method for integer factorization
More informationHigher Portfolio Quadratics and Polynomials
Higher Portfolio Quadratics and Polynomials Higher 5. Quadratics and Polynomials Section A - Revision Section This section will help you revise previous learning which is required in this topic R1 I have
More informationELG 5372 Error Control Coding. Lecture 12: Ideals in Rings and Algebraic Description of Cyclic Codes
ELG 5372 Error Control Coding Lecture 12: Ideals in Rings and Algebraic Description of Cyclic Codes Quotient Ring Example + Quotient Ring Example Quotient Ring Recall the quotient ring R={,,, }, where
More informationCHAPTER 4: Polynomial and Rational Functions
MAT 171 Precalculus Algebra Dr. Claude Moore Cape Fear Community College CHAPTER 4: Polynomial and Rational Functions 4.1 Polynomial Functions and Models 4.2 Graphing Polynomial Functions 4.3 Polynomial
More informationIntroduction to Cryptology. Lecture 19
Introduction to Cryptology Lecture 19 Announcements HW6 due today HW7 due Thursday 4/20 Remember to sign up for Extra Credit Agenda Last time More details on AES/DES (K/L 6.2) Practical Constructions of
More informationAlgorithms for Solving Linear Differential Equations with Rational Function Coefficients
Algorithms for Solving Linear Differential Equations with Rational Function Coefficients Erdal Imamoglu Department of Mathematics Florida State University May 25, 2017 1 / 37 1 Introduction 2 Formal Solutions,
More informationA Course in Computational Algebraic Number Theory
Henri Cohen 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. A Course in Computational Algebraic Number Theory Springer
More informationComputing L-series of geometrically hyperelliptic curves of genus three. David Harvey, Maike Massierer, Andrew V. Sutherland
Computing L-series of geometrically hyperelliptic curves of genus three David Harvey, Maike Massierer, Andrew V. Sutherland The zeta function Let C/Q be a smooth projective curve of genus 3 p be a prime
More informationEvidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs
Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Jonah Brown-Cohen 1 Introduction The Diffie-Hellman protocol was one of the first methods discovered for two people, say Alice
More informationCongruences between Modular forms of level 1
Congruences between Modular forms of level 1 Dino Destefano University of Copenhagen 23 Juin 2017 Slope We will consider modular forms for the full modular group SL 2 ( Z), that is, modular forms of level
More informationComplex numbers, the exponential function, and factorization over C
Complex numbers, the exponential function, and factorization over C 1 Complex Numbers Recall that for every non-zero real number x, its square x 2 = x x is always positive. Consequently, R does not contain
More informationSongklanakarin Journal of Science and Technology SJST R1 KANYAMEE. Numerical methods for finding multiplicative inverses of a modulo N
Songklanakarin Journal of Science and Technology SJST-0-0.R KANYAMEE Numerical methods for finding multiplicative inverses of a modulo N Journal: Songklanakarin Journal of Science and Technology Manuscript
More informationChapter 7 Polynomial Functions. Factoring Review. We will talk about 3 Types: ALWAYS FACTOR OUT FIRST! Ex 2: Factor x x + 64
Chapter 7 Polynomial Functions Factoring Review We will talk about 3 Types: 1. 2. 3. ALWAYS FACTOR OUT FIRST! Ex 1: Factor x 2 + 5x + 6 Ex 2: Factor x 2 + 16x + 64 Ex 3: Factor 4x 2 + 6x 18 Ex 4: Factor
More information1 What are Physical Attacks. 2 Physical Attacks on RSA. Today:
Today: Introduction to the class. Examples of concrete physical attacks on RSA A computational approach to cryptography Pseudorandomness 1 What are Physical Attacks Tampering/Leakage attacks Issue of how
More informationb = 10 a, is the logarithm of b to the base 10. Changing the base to e we obtain natural logarithms, so a = ln b means that b = e a.
INTRODUCTION TO CRYPTOGRAPHY 5. Discrete Logarithms Recall the classical logarithm for real numbers: If we write b = 10 a, then a = log 10 b is the logarithm of b to the base 10. Changing the base to e
More informationhexadecimal-to-decimal conversion
OTHER NUMBER SYSTEMS: octal (digits 0 to 7) group three binary numbers together and represent as base 8 3564 10 = 110 111 101 100 2 = (6X8 3 ) + (7X8 2 ) + (5X8 1 ) + (4X8 0 ) = 6754 8 hexadecimal (digits
More informationCHAPTER 4: Polynomial and Rational Functions
MAT 171 Precalculus Algebra Dr. Claude Moore Cape Fear Community College CHAPTER 4: Polynomial and Rational Functions 4.1 Polynomial Functions and Models 4.2 Graphing Polynomial Functions 4.3 Polynomial
More informationTWO CLASSES OF NUMBER FIELDS WITH A NON-PRINCIPAL EUCLIDEAN IDEAL
TWO CLASSES OF NUMBER FIELDS WITH A NON-PRINCIPAL EUCLIDEAN IDEAL CATHERINE HSU Abstract. This paper introduces two classes of totally real quartic number fields, one of biquadratic extensions and one
More informationUSING SHANKS BABY-STEP GIANT-STEP METHOD TO SOLVE THE GENERALIZED PELL EQUATION x 2 Dy 2 = N. Copyright 2009 by John P. Robertson. 1.
USING SHANKS BABY-STEP GIANT-STEP METHOD TO SOLVE THE GENERALIZED PELL EQUATION x 2 Dy 2 = N Abstract. For D > 0 not a square, and N 0, the continued fraction algorithm can be used to solve the generalized
More informationA CLASS GROUP HEURISTIC BASED ON THE DISTRIBUTION OF 1-EIGENSPACES IN MATRIX GROUPS
A CLASS GROUP HEURISTIC BASED ON THE DISTRIBUTION OF -EIGENSPACES IN MATRIX GROUPS MICHAEL ADAM AND GUNTER MALLE Abstract. We propose a modification to the Cohen Lenstra prediction for the distribution
More informationMath 261 Exercise sheet 5
Math 261 Exercise sheet 5 http://staff.aub.edu.lb/~nm116/teaching/2018/math261/index.html Version: October 24, 2018 Answers are due for Wednesday 24 October, 11AM. The use of calculators is allowed. Exercise
More informationPell Equation x 2 Dy 2 = 2, II
Irish Math Soc Bulletin 54 2004 73 89 73 Pell Equation x 2 Dy 2 2 II AHMET TEKCAN Abstract In this paper solutions of the Pell equation x 2 Dy 2 2 are formulated for a positive non-square integer D using
More informationOn Extremal Codes With Automorphisms
On Extremal Codes With Automorphisms Anton Malevich Magdeburg, 20 April 2010 joint work with S. Bouyuklieva and W. Willems 1/ 33 1. Linear codes 2. Self-dual and extremal codes 3. Quadratic residue codes
More informationClass polynomials for abelian surfaces
Class polynomials for abelian surfaces Andreas Enge LFANT project-team INRIA Bordeaux Sud-Ouest andreas.enge@inria.fr http://www.math.u-bordeaux.fr/~aenge LFANT seminar 27 January 2015 (joint work with
More informationLecture 1: Introduction to Public key cryptography
Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means
More informationFive peculiar theorems on simultaneous representation of primes by quadratic forms
Five peculiar theorems on simultaneous representation of primes by quadratic forms David Brink January 2008 Abstract It is a theorem of Kaplansky that a prime p 1 (mod 16) is representable by both or none
More informationMath 110 Midterm 1 Study Guide October 14, 2013
Name: For more practice exercises, do the study set problems in sections: 3.4 3.7, 4.1, and 4.2. 1. Find the domain of f, and express the solution in interval notation. (a) f(x) = x 6 D = (, ) or D = R
More informationTheoretical Cryptography, Lecture 13
Theoretical Cryptography, Lecture 13 Instructor: Manuel Blum Scribe: Ryan Williams March 1, 2006 1 Today Proof that Z p has a generator Overview of Integer Factoring Discrete Logarithm and Quadratic Residues
More informationSecurity Level of Cryptography Integer Factoring Problem (Factoring N = p 2 q) December Summary 2
Security Level of Cryptography Integer Factoring Problem (Factoring N = p 2 ) December 2001 Contents Summary 2 Detailed Evaluation 3 1 The Elliptic Curve Method 3 1.1 The ECM applied to N = p d............................
More informationA variant of the F4 algorithm
A variant of the F4 algorithm Vanessa VITSE - Antoine JOUX Université de Versailles Saint-Quentin, Laboratoire PRISM CT-RSA, February 18, 2011 Motivation Motivation An example of algebraic cryptanalysis
More informationPOLYNOMIALS. x + 1 x x 4 + x 3. x x 3 x 2. x x 2 + x. x + 1 x 1
POLYNOMIALS A polynomial in x is an expression of the form p(x) = a 0 + a 1 x + a x +. + a n x n Where a 0, a 1, a. a n are real numbers and n is a non-negative integer and a n 0. A polynomial having only
More informationTables of elliptic curves over number fields
Tables of elliptic curves over number fields John Cremona University of Warwick 10 March 2014 Overview 1 Why make tables? What is a table? 2 Simple enumeration 3 Using modularity 4 Curves with prescribed
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 9 September 30, 2015 CPSC 467, Lecture 9 1/47 Fast Exponentiation Algorithms Number Theory Needed for RSA Elementary Number Theory
More informationFinite Fields. Mike Reiter
1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements
More informationIntroduction to Arithmetic Geometry
Introduction to Arithmetic Geometry 18.782 Andrew V. Sutherland September 5, 2013 What is arithmetic geometry? Arithmetic geometry applies the techniques of algebraic geometry to problems in number theory
More informationPRIMES is in P. Manindra Agrawal. NUS Singapore / IIT Kanpur
PRIMES is in P Manindra Agrawal NUS Singapore / IIT Kanpur The Problem Given number n, test if it is prime efficiently. Efficiently = in time a polynomial in number of digits = (log n) c for some constant
More information3 UNIT 4: QUADRATIC FUNCTIONS -- NO CALCULATOR
Name: Algebra Final Exam Review, Part 3 UNIT 4: QUADRATIC FUNCTIONS -- NO CALCULATOR. Solve each of the following equations. Show your steps and find all solutions. a. 3x + 5x = 0 b. x + 5x - 9 = x + c.
More informationIsogenies in a quantum world
Isogenies in a quantum world David Jao University of Waterloo September 19, 2011 Summary of main results A. Childs, D. Jao, and V. Soukharev, arxiv:1012.4019 For ordinary isogenous elliptic curves of equal
More informationMay 6, Be sure to write your name on your bluebook. Use a separate page (or pages) for each problem. Show all of your work.
Math 236H May 6, 2008 Be sure to write your name on your bluebook. Use a separate page (or pages) for each problem. Show all of your work. 1. (15 points) Prove that the symmetric group S 4 is generated
More informationGenerating Elliptic Curves of Prime Order,
Generating Elliptic Curves of Prime Order, Erkay Savaş 1, Thomas A. Schmidt 2, and Çetin K. Koç 1 1 Department of Electrical & Computer Engineering Oregon State University, Corvallis, Oregon 97331, USA
More informationCryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt 95
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt 95 Jean-Sébastien Coron and David Naccache Gemplus Card International 34 rue Guynemer, 92447 Issy-les-Moulineaux, France {jean-sebastien.coron,
More informationCONSTRUCTING Boolean functions on odd number of variables n having nonlinearity greater than the bent
Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound Selçuk Kavut and Subhamoy Maitra 1 Abstract Nonlinearity is one of the most challenging combinatorial
More informationCOMPUTING QUADRATIC FUNCTION FIELDS WITH HIGH 3-RANK VIA CUBIC FIELD TABULATION
ROCKY MOUNTAIN JOURNAL OF MATHEMATICS Volume 45, Number 6, 2015 COMPUTING QUADRATIC FUNCTION FIELDS WITH HIGH 3-RANK VIA CUBIC FIELD TABULATION P. ROZENHART, M.J. JACOBSON, JR. AND R. SCHEIDLER ABSTRACT.
More informationUniqueness of Factorization in Quadratic Fields
Uniqueness of Factorization in Quadratic Fields Pritam Majumder Supervisors: (i Prof. G. Santhanam, (ii Prof. Nitin Saxena A project presented for the degree of Master of Science Department of Mathematics
More informationCumulative Review. Name. 13) 2x = -4 13) SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question.
Cumulative Review Name SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question. Evaluate the algebraic expression for the given value or values of the variable(s).
More informationEE512: Error Control Coding
EE512: Error Control Coding Solution for Assignment on Cyclic Codes March 22, 2007 1. A cyclic code, C, is an ideal genarated by its minimal degree polynomial, g(x). C = < g(x) >, = {m(x)g(x) : m(x) is
More informationECEN 5022 Cryptography
Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,
More information4.1, 4.2: Analysis of Algorithms
Overview 4.1, 4.2: Analysis of Algorithms Analysis of algorithms: framework for comparing algorithms and predicting performance. Scientific method.! Observe some feature of the universe.! Hypothesize a
More informationAbstract Algebra, Second Edition, by John A. Beachy and William D. Blair. Corrections and clarifications
1 Abstract Algebra, Second Edition, by John A. Beachy and William D. Blair Corrections and clarifications Note: Some corrections were made after the first printing of the text. page 9, line 8 For of the
More informationGrade 11/12 Math Circles Rational Points on an Elliptic Curves Dr. Carmen Bruni November 11, Lest We Forget
Faculty of Mathematics Waterloo, Ontario N2L 3G1 Centre for Education in Mathematics and Computing Grade 11/12 Math Circles Rational Points on an Elliptic Curves Dr. Carmen Bruni November 11, 2015 - Lest
More informationAbstracts of papers. Amod Agashe
Abstracts of papers Amod Agashe In this document, I have assembled the abstracts of my work so far. All of the papers mentioned below are available at http://www.math.fsu.edu/~agashe/math.html 1) On invisible
More informationA field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties:
Byte multiplication 1 Field arithmetic A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: F is an abelian group under addition, meaning - F is closed under
More informationOutline. policies for the first part. with some potential answers... MCS 260 Lecture 10.0 Introduction to Computer Science Jan Verschelde, 9 July 2014
Outline 1 midterm exam on Friday 11 July 2014 policies for the first part 2 questions with some potential answers... MCS 260 Lecture 10.0 Introduction to Computer Science Jan Verschelde, 9 July 2014 Intro
More informationFinite Fields. SOLUTIONS Network Coding - Prof. Frank H.P. Fitzek
Finite Fields In practice most finite field applications e.g. cryptography and error correcting codes utilizes a specific type of finite fields, namely the binary extension fields. The following exercises
More informationThe Number of Fields Generated by the Square Root of Values of a Given Polynomial
Canad. Math. Bull. Vol. 46 (1), 2003 pp. 71 79 The Number o Fields Generated by the Square Root o Values o a Given Polynomial Pamela Cutter, Andrew Granville, and Thomas J. Tucker Abstract. The abc-conjecture
More informationA Blackbox Polynomial System Solver on Parallel Shared Memory Computers
A Blackbox Polynomial System Solver on Parallel Shared Memory Computers Jan Verschelde University of Illinois at Chicago Department of Mathematics, Statistics, and Computer Science The 20th Workshop on
More information