On the distribution of irreducible trinomials over F 3
|
|
- Amanda Richards
- 5 years ago
- Views:
Transcription
1 Finite Fields and Their Applications 13 (2007) On the distribution of irreducible trinomials over F 3 Omran Ahmadi Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario, Canada N2L 3G1 Received 28 June 2005; revised 8 October 2005 Available online 15 December 2005 Communicated by Gary L. Mullen Abstract We present some results about irreducible polynomials over finite fields and use them to prove a conjecture of von zur Gathen concerning the distribution of irreducible trinomials over F Elsevier Inc. All rights reserved. Keywords: Finite fields; Irreducible polynomials 1. Introduction Let F q n be the degree n extension of F q. Then we have F q n = F q [x]/(f (x)) where f(x)is an irreducible polynomial of degree n over F q. The weight of f(x)is the number of its coefficients that are non-zero. If the weight of f(x) is three, then f(x) is called a trinomial. It is well known that multiplication in F q n can be sped up considerably if f(x) is a trinomial (e.g. see [7]). Fast arithmetic in finite fields is important for the efficient implementation of errorcorrecting codes and discrete logarithm cryptosystems. Finite fields of characteristic two have received special attention because their arithmetic can be efficiently implemented in both hardware and software, and there has been a significant amount of work done on the distribution of irreducible trinomials over F 2 (e.g. see [2,3,14,15]). More recently, there has been increased interest in fast arithmetic for finite fields of characteristic 3 (e.g. see address: oahmadid@math.uwaterloo.ca /$ see front matter 2005 Elsevier Inc. All rights reserved. doi: /j.ffa
2 660 O. Ahmadi / Finite Fields and Their Applications 13 (2007) [8 10,13]) because there are two supersingular elliptic curves over F 3 with embedding degree six that are very well suited to the implementation of pairing-based cryptographic protocols [1,5]. Von zur Gathen [6] (see also Loidreau [11]) proved some interesting results about irreducible trinomials over F 3, and made some conjectures about their distribution. The conjectures were supported by extensive experiments. In Section 2 of this paper we present some results about the irreducibility of trinomials that are related to each other. Our results can be used to speed up the search and enumeration of irreducible polynomials over finite fields. We then use these results in Section 3 to prove one of von zur Gathen s conjectures. 2. Main result The order of an irreducible polynomial f(x) over F q is the smallest positive integer e such that f(x) x e 1inF q [x]. Theorem 1. (See [12, Theorem 3.9].) Let f(x) F q [x] be an irreducible polynomial over F q of degree n and order e and let t be a positive integer. Then f(x t ) is irreducible over F q if and only if (i) gcd(t, qn 1 e ) = 1; (ii) each prime factor of t divides e; and (iii) if 4 t, then 4 q n 1. An immediate corollary is the following: Corollary 2. Let q be a prime power where q 3 (mod 4), and let f(x) F q [x] be a polynomial of odd degree. Then f(x 2r ) where r 2 is always reducible over F q. It is well known that if f(x) F q [x] is an irreducible polynomial over F q and α F q, then f(αx) F q [x] is also irreducible over F q. In the following we generalize this fact. Theorem 3. Let f(x) be an irreducible polynomial of degree n over F q. Let θ F q n be such that f(θx) F q [x]. Then f(θx) is the product of irreducible polynomials over F q whose degrees divide n. Proof. Let f(θx)= f 1 (x)... f l (x) where f i (x) is an irreducible polynomial of degree n i over F q.letα i F q n i be a root of f i, and let β i = θα i. Then f(β i ) = 0. Now β i F q n since f(x) is an irreducible polynomial of degree n over F q. On the other hand we have θ 1 F q n. Thus θ 1 β i = α i F q n and hence n i divides n. It is easy to see that if f(x) and θ are as above and β is a root of f(x) in F q n, then f(θx) is irreducible over F q if and only if θ 1 β is not in any proper subfield of F q n. Notice that this latter condition is always satisfied if θ F q. Because if θ F q and β F q n
3 O. Ahmadi / Finite Fields and Their Applications 13 (2007) is not in any proper subfield of F q n, then since (θ 1 ) qc 1 = 1 for every c 1, we have (θ 1 β) qc 1 = β qc 1 = 1 if and only if n divides c. Thus θ 1 β is in F q n and not in any proper subfield of F q n. In the following we use the ideas presented above to obtain the main result of this paper. First we need the following elementary lemmas. Lemma 4. Let q be an odd prime power and let n = 2 r n where n is an odd number and r 1. Then 2 r+2 q n 1 and 2 r qn 1 q 1. Proof. The case r = 1 is easy. For r 2wehave q n 1 = (q 2 1) ( r 1 ( q 2 i + 1 ))( n 1 (q 2r ) ). i i=1 i=0 The result now follows because q 2 1 (mod 8). Lemma 5. Let q be an odd prime power and n = 2 r n where n is an odd number, and let r s 0. Then for any α F q there exists θ F q n such that θ 2s = α. Proof. The statement is trivial when r = 0, so let us suppose that r 1. Let γ be a generator of F q n and α F q. Then there exists a unique integer d such that γ d = α and 0 d q n 2. Thus (γ d ) q 1 = α q 1 = 1. Now since γ is a generator of F q n,wehave q n 1 d(q 1) and hence qn 1 q 1 d. ByLemma4weget2r d, and since r s, ifwe take θ = γ d/2s, then θ 2s = α. Theorem 6. Let n = 2 r n and k = 2 s k where n and k are odd numbers and r>s 0, and let q be an odd prime power and α F q. Then xn + ax k + b F q [x] is irreducible over F q if and only if is irreducible over F q. α 2r s n x n + aα k x k + b F q [x] Proof. Suppose that f(x)= x n + ax k + b F q [x] is irreducible over F q. By Lemma 5, there exists θ F q n such that θ 2s = α. We claim that g(x) = f(θx)= α 2r s n x n +aα k x k + b F q [x] is irreducible over F q. Using the comments made after Theorem 3, it suffices to show that μ = θ 1 β is not in any proper subfield of F q n where β is a root of f(x)in F q n. Suppose by the way of contradiction that μ ql 1 = 1 where l is a proper divisor of n, and let l = 2 v l, where v r and l n. From Lemma 4, we know 2 v ql 1 q 1.Nowifv s, then β ql 1 = θ ql 1 = θ 2s (q 1)t = 1
4 662 O. Ahmadi / Finite Fields and Their Applications 13 (2007) for some t, and this is a contradiction since β is not in any proper subfield of F q n. Thus suppose v<sand let w = s v.now,q l 1 q 2wl 1. Since β ql 1 = θ ql 1,wehave β q2wl 1 = θ q2wl 1 = θ q2s l 1 = θ 2s (q 1)t = 1 for some t, and hence we must have n 2 w l. But this cannot hold since the largest power of 2 which divides 2 w l and n are s and r, respectively, and we have r>s. The converse is similarly true since f(x)= g(θ 1 x) and θ 2s = α 1 F q. By taking α = 1 in Theorem 6, we obtain the following. Corollary 7. Let n, k, r, s be as in Theorem 6. Then x n + ax k + b is irreducible over F q if and only if x n ax k + b is irreducible over F q. Specializing Theorem 6 to some finite fields yields interesting results. The following results are of this flavor. Corollary 8. Let n be a positive integer divisible by 4. Then the degree n trinomial f(x)= x n x k + 1 is always reducible over F 3. Proof. If the power of 2 which divides k is not less than that of n, then it follows from Corollary 2 that f(x)is reducible. Otherwise if the power of 2 which divides n is greater than that of k, then using Corollary 7 since x n + x k + 1 is reducible over F 3, f(x)is also reducible. Corollary 9. Let n, k, r, s be as in Theorem 6, and, furthermore, let r>s+ 1 and c be a non-zero element of F 5. Then x n + ax k + b is irreducible over F 5 if and only if x n + cax k + b is irreducible over F 5. Theorem 6 can easily be generalized to polynomials of any weight. The proof of Theorem 10 is similar to the proof of Theorem 6 and is omitted. Theorem 10. Let f(x)= t i=0 a i x n i F q [x] where q is an odd prime power, n = n t > n t 1 > >n 1 >n 0 = 0, a t = 1 and a i 0 for every 0 i t 1. Let s be the largest power of 2 which divides d = gcd(n 0,n 1,...,n t ),letr i be the largest power of 2 dividing n i, and suppose that r t >s. Furthermore let α F q. Then f(x) is irreducible over F q if and only if is irreducible over F q. g(x) = t α 2 s n i a i x n i i=0
5 O. Ahmadi / Finite Fields and Their Applications 13 (2007) Applying our results to trinomials over F 3 J. von zur Gathen studied the distribution of irreducible trinomials over F 3 and made two conjectures based on some experimental data. The first conjecture was proven by S.D. Cohen [4]. We provide a proof for the sake of completeness. Theorem 11. If n 0 (mod 4), k 2 (mod 6), and x n + ax k + b F 3 [x] is irreducible over F 3, then the largest power of 2 which divides n is greater than the largest power of 2 which divides k. Proof. Let x n + ax k + b F 3 [x] where n = 2 r n, k = 2 s k, n and k are odd numbers, and s r 2. Then if we let f(x)= x n + ax 2s r k + b, wehavex n + ax k + b = f(x 2r ) and from Corollary 2 it follows that x n + ax k + b is reducible over F 3. The second conjecture that we proved is the following. Recall that the reciprocal of a polynomial f(x)whose constant term is non-zero is defined to be f (x) = x n f(1/x), and if f(x)is irreducible over F q, then so is f (x). Theorem 12. Let m be a fixed positive integer. For given a,b F 3, p {0, 4, 8} and 0 c 5, the number of irreducible trinomials x n + ax k + b F 3 [x] where n p(mod 12), k c(mod 6), and n m is equal to the number of irreducible trinomials x n + ax k + b F 3 [x] where n p(mod 12), k p c(mod 6) and n m. Proof. The case where a = b = 1 is trivial since there is no irreducible trinomial x n +x k + 1 over F 3. Now we assume a = 1, b = 1. The other cases can be dealt with similarly. Let x n + x k 1 be an irreducible trinomial over F 3 where n p(mod 12), k c(mod 6) for given p {0, 4, 8} and 0 c 5. Then from Theorem 11 the largest power of 2 which divides n is greater than the largest power of 2 which divides k. Thus by Corollary 7, x n x k 1 is irreducible over F 3. Now the reciprocal of x n x k 1, namely x n x n k + 1, is also irreducible over F 3, so it follows that x n + x n k 1 is irreducible over F 3.Butin this case we have n p(mod 12) and n k c(mod 6). This establishes a bijection and hence proves the theorem. References [1] P. Barreto, H.Y. Kim, B. Lynn, M. Scott, Efficient algorithms for pairing-based cryptosystems, in: Proceedings of CRYPTO 2002, in: Lecture Notes in Comput. Sci., vol. 2442, Springer, 2002, pp [2] I. Blake, S. Gao, R. Lambert, Constructive problems for irreducible polynomials over finite fields, in: Information Theory and Applications, in: Lecture Notes in Comput. Sci., vol. 793, Springer, 1994, pp [3] I. Blake, S. Gao, R. Lambert, Construction and distribution problems for irreducible polynomials over finite fields, in: D. Gollmann (Ed.), Applications of Finite Field, Clarendon, 1996, pp [4] S.D. Cohen, MR (2004c:11229), Mathematical Reviews (2004). [5] S. Galbraith, K. Harrison, D. Soldera, Implementing the Tate pairing, in: C. Fieker, D. Kohl (Eds.), ANTS-V, in: Lecture Notes in Comput. Sci., vol. 2369, Springer, 2002, pp [6] J. von zur Gathen, Irreducible trinomials over finite fields, Math. Comput. 72 (2003)
6 664 O. Ahmadi / Finite Fields and Their Applications 13 (2007) [7] J. von zur Gathen, M. Nöcker, Polynomial and normal bases for finite fields, J. Cryptology 18 (2005) [8] P. Grabher, D. Page, Hardware acceleration of the Tate pairing in characteristic three, in: Proceedings of CHES 2005, in: Lecture Notes in Comput. Sci., vol. 3569, Springer, 2005, pp [9] K. Harrison, D. Page, N.P. Smart, Software implementation of finite fields of characteristic three, LMS J. Comput. Math. 5 (2002) [10] T. Kerins, W. Marnane, E. Popovici, P. Barreto, Efficient hardware for the Tate pairint calculation in characteristic three, in: Proceedings of CHES 2005, in: Lecture Notes in Comput. Sci., vol. 3569, Springer, 2005, pp [11] P. Loidreau, On the factorization of trinomials over F 3, Technical Report 3918, Institut National de Recherche en Informatique et en Automatique (INRIA), [12] A.J. Menezes, I.F. Blake, X. Gao, R.C. Mullin, S.A. Vanstone, T. Yaghoobian, Applications of Finite Fields, Kluwer, [13] D. Page, N.P. Smart, Hardware implementation of finite fields of characteristic three, in: Proceedings of CHES 2002, in: Lecture Notes in Comput. Sci., vol. 2523, Springer, 2002, pp [14] G. Seroussi, Table of low-weight binary irreducible polynomials, Hewlett-Packard Technical Report HPL , [15] R. Swan, Factorization of polynomials over finite fields, Pacific J. Math. 12 (1962)
Formulas for cube roots in F 3 m
Discrete Applied Mathematics 155 (2007) 260 270 www.elsevier.com/locate/dam Formulas for cube roots in F 3 m Omran Ahmadi a, Darrel Hankerson b, Alfred Menezes a a Department of Combinatorics and Optimization,
More informationOn the Number of Trace-One Elements in Polynomial Bases for F 2
On the Number of Trace-One Elements in Polynomial Bases for F 2 n Omran Ahmadi and Alfred Menezes Department of Combinatorics & Optimization University of Waterloo, Canada {oahmadid,ajmeneze}@uwaterloo.ca
More informationMultiplicative Order of Gauss Periods
Multiplicative Order of Gauss Periods Omran Ahmadi Department of Electrical and Computer Engineering University of Toronto Toronto, Ontario, M5S 3G4, Canada oahmadid@comm.utoronto.ca Igor E. Shparlinski
More informationParity of the Number of Irreducible Factors for Composite Polynomials
Parity of the Number of Irreducible Factors for Composite Polynomials Ryul Kim Wolfram Koepf Abstract Various results on parity of the number of irreducible factors of given polynomials over finite fields
More informationDivisibility of Trinomials by Irreducible Polynomials over F 2
Divisibility of Trinomials by Irreducible Polynomials over F 2 Ryul Kim Faculty of Mathematics and Mechanics Kim Il Sung University, Pyongyang, D.P.R.Korea Wolfram Koepf Department of Mathematics University
More informationELEMENTS OF PROVABLE HIGH ORDERS IN FINITE FIELDS
ELEMENTS OF PROVABLE HIGH ORDERS IN FINITE FIELDS SHUHONG GAO Abstract. A method is given for constructing elements in Fq n whose orders are larger than any polynomial in n when n becomes large. As a by-product
More informationSome Efficient Algorithms for the Final Exponentiation of η T Pairing
Some Efficient Algorithms for the Final Exponentiation of η T Pairing Masaaki Shirase 1, Tsuyoshi Takagi 1, and Eiji Okamoto 2 1 Future University-Hakodate, Japan 2 University of Tsukuba, Japan Abstract.
More informationConstructing Families of Pairing-Friendly Elliptic Curves
Constructing Families of Pairing-Friendly Elliptic Curves David Freeman Information Theory Research HP Laboratories Palo Alto HPL-2005-155 August 24, 2005* cryptography, pairings, elliptic curves, embedding
More informationOn the Primitivity of some Trinomials over Finite Fields
On the Primitivity of some Trinomials over Finite Fields LI Yujuan & WANG Huaifu & ZHAO Jinhua Science and Technology on Information Assurance Laboratory, Beijing, 100072, P.R. China email: liyj@amss.ac.cn,
More informationA Remark on Implementing the Weil Pairing
A Remark on Implementing the Weil Pairing Cheol Min Park 1, Myung Hwan Kim 1 and Moti Yung 2 1 ISaC and Department of Mathematical Sciences, Seoul National University, Korea {mpcm,mhkim}@math.snu.ac.kr
More informationReducing the Complexity of Normal Basis Multiplication
Reducing the Complexity of Normal Basis Multiplication Ömer Eǧecioǧlu and Çetin Kaya Koç Department of Computer Science University of California Santa Barbara {omer,koc}@cs.ucsb.edu Abstract In this paper
More informationA note on López-Dahab coordinates
A note on López-Dahab coordinates Tanja Lange Faculty of Mathematics, Matematiktorvet - Building 303, Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark tanja@hyperelliptic.org Abstract López-Dahab
More informationNew Minimal Weight Representations for Left-to-Right Window Methods
New Minimal Weight Representations for Left-to-Right Window Methods James A. Muir 1 and Douglas R. Stinson 2 1 Department of Combinatorics and Optimization 2 School of Computer Science University of Waterloo
More informationEfficient Computation of Roots in Finite Fields
Efficient Computation of Roots in Finite Fields PAULO S. L. M. BARRETO (pbarreto@larc.usp.br) Laboratório de Arquitetura e Redes de Computadores (LARC), Escola Politécnica, Universidade de São Paulo, Brazil.
More informationModular Multiplication in GF (p k ) using Lagrange Representation
Modular Multiplication in GF (p k ) using Lagrange Representation Jean-Claude Bajard, Laurent Imbert, and Christophe Nègre Laboratoire d Informatique, de Robotique et de Microélectronique de Montpellier
More informationOn the Complexity of the Dual Bases of the Gaussian Normal Bases
Algebra Colloquium 22 (Spec ) (205) 909 922 DOI: 0.42/S00538675000760 Algebra Colloquium c 205 AMSS CAS & SUZHOU UNIV On the Complexity of the Dual Bases of the Gaussian Normal Bases Algebra Colloq. 205.22:909-922.
More informationOptimised versions of the Ate and Twisted Ate Pairings
Optimised versions of the Ate and Twisted Ate Pairings Seiichi Matsuda 1, Naoki Kanayama 1, Florian Hess 2, and Eiji Okamoto 1 1 University of Tsukuba, Japan 2 Technische Universität Berlin, Germany Abstract.
More informationDivision of Trinomials by Pentanomials and Orthogonal Arrays
Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang
More informationFPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials
FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials C. Shu, S. Kwon and K. Gaj Abstract: The efficient design of digit-serial multipliers
More informationImplementing Pairing-Based Cryptosystems
Implementing Pairing-Based Cryptosystems Zhaohui Cheng and Manos Nistazakis School of Computing Science, Middlesex University White Hart Lane, London N17 8HR, UK. {m.z.cheng, e.nistazakis}@mdx.ac.uk Abstract:
More informationGeneralized hyper-bent functions over GF(p)
Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G
More informationEfficient Computation of Tate Pairing in Projective Coordinate Over General Characteristic Fields
Efficient Computation of Tate Pairing in Projective Coordinate Over General Characteristic Fields Sanjit Chatterjee, Palash Sarkar and Rana Barua Cryptology Research Group Applied Statistics Unit Indian
More informationLow complexity bit-parallel GF (2 m ) multiplier for all-one polynomials
Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials Yin Li 1, Gong-liang Chen 2, and Xiao-ning Xie 1 Xinyang local taxation bureau, Henan, China. Email:yunfeiyangli@gmail.com, 2 School
More informationON CERTAIN COMBINATORIAL DIOPHANTINE EQUATIONS AND THEIR CONNECTION TO PYTHAGOREAN NUMBERS
ON CERTAIN COMBINATORIAL DIOPHANTINE EQUATIONS AND THEIR CONNECTION TO PYTHAGOREAN NUMBERS ROBERT S. COULTER, MARIE HENDERSON, AND FELIX LAZEBNIK 1. Introduction The binomial knapsack problem is easily
More informationEfficient Algorithms for Pairing-Based Cryptosystems
Efficient Algorithms for Pairing-Based Cryptosystems Paulo S. L. M. Barreto 1, Hae Y. Kim 1, Ben Lynn 2, and Michael Scott 3 1 Universidade de São Paulo, Escola Politécnica. Av. Prof. Luciano Gualberto,
More informationAll variables a, b, n, etc are integers unless otherwise stated. Each part of a problem is worth 5 points.
Math 152, Problem Set 2 solutions (2018-01-24) All variables a, b, n, etc are integers unless otherwise stated. Each part of a problem is worth 5 points. 1. Let us look at the following equation: x 5 1
More informationFour classes of permutation polynomials of F 2 m
Finite Fields and Their Applications 1 2007) 869 876 http://www.elsevier.com/locate/ffa Four classes of permutation polynomials of F 2 m Jin Yuan,1, Cunsheng Ding 1 Department of Computer Science, The
More informationFINDING COMPOSITE ORDER ORDINARY ELLIPTIC CURVES USING THE COCKS-PINCH METHOD
FINDING COMPOSITE ORDER ORDINARY ELLIPTIC CURVES USING THE COCKS-PINCH METHOD D. BONEH, K. RUBIN, AND A. SILVERBERG Abstract. We apply the Cocks-Pinch method to obtain pairing-friendly composite order
More informationElliptic Curve Cryptosystems and Scalar Multiplication
Annals of the University of Craiova, Mathematics and Computer Science Series Volume 37(1), 2010, Pages 27 34 ISSN: 1223-6934 Elliptic Curve Cryptosystems and Scalar Multiplication Nicolae Constantinescu
More informationA Note on Scalar Multiplication Using Division Polynomials
1 A Note on Scalar Multiplication Using Division Polynomials Binglong Chen, Chuangqiang Hu and Chang-An Zhao Abstract Scalar multiplication is the most important and expensive operation in elliptic curve
More informationMathematics for Cryptography
Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1
More informationGAUSS PERIODS: ORDERS AND CRYPTOGRAPHICAL APPLICATIONS
MATHEMATICS OF COMPUTATION Volume 67, Number 221, January 1998, Pages 343 352 S 0025-5718(98)00935-1 GAUSS PERIODS: ORDERS AND CRYPTOGRAPHICAL APPLICATIONS SHUHONG GAO, JOACHIM VON ZUR GATHEN, AND DANIEL
More informationArithmetic Operators for Pairing-Based Cryptography
Arithmetic Operators for Pairing-Based Cryptography Jean-Luc Beuchat 1, Nicolas Brisebarre 2,3, Jérémie Detrey 3, and Eiji Okamoto 1 1 Laboratory of Cryptography and Information Security, University of
More informationClassification of Finite Fields
Classification of Finite Fields In these notes we use the properties of the polynomial x pd x to classify finite fields. The importance of this polynomial is explained by the following basic proposition.
More informationFast hashing to G2 on pairing friendly curves
Fast hashing to G2 on pairing friendly curves Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, and Ezekiel J. Kachisa School of Computing Dublin City University Ballymun, Dublin
More informationRedundant Trinomials for Finite Fields of Characteristic 2
122 Redundant Trinomials for Finite Fields of Characteristic 2 Christophe Doche Division of ICS, Department of Computing Macquarie University, NSW 2109 Australia doche@ics.mq.edu.au Abstract. In this article
More informationEfficient Tate Pairing Computation Using Double-Base Chains
Efficient Tate Pairing Computation Using Double-Base Chains Chang an Zhao, Fangguo Zhang and Jiwu Huang 1 Department of Electronics and Communication Engineering, Sun Yat-Sen University, Guangzhou 510275,
More informationA new class of irreducible pentanomials for polynomial based multipliers in binary fields
Noname manuscript No. (will be inserted by the editor) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas Ricardo Custódio Daniel Panario the date
More informationAn Approach to Hensel s Lemma
Irish Math. Soc. Bulletin 47 (2001), 15 21 15 An Approach to Hensel s Lemma gary mcguire Abstract. Hensel s Lemma is an important tool in many ways. One application is in factoring polynomials over Z.
More informationNumber Theory in Cryptology
Number Theory in Cryptology Abhijit Das Department of Computer Science and Engineering Indian Institute of Technology Kharagpur October 15, 2011 What is Number Theory? Theory of natural numbers N = {1,
More informationFaster Point Multiplication on Elliptic Curves with Efficient Endomorphisms
Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms Robert P. Gallant 1, Robert J. Lambert 1, and Scott A. Vanstone 1,2 1 Certicom Research, Canada {rgallant,rlambert,svanstone}@certicom.com
More informationTwo Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map
Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map Jung Hee Cheon, Sungmo Park, Sangwoo Park, and Daeho Kim Electronics and Telecommunications Research Institute, 161 Kajong-Dong,Yusong-Gu,
More informationNormal and Self-dual Normal Bases from Factorization of cx q+1 + dx q ax b
Normal and Self-dual Normal Bases from Factorization of cx q+ + dx q ax b Ian F. Blake Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario, N2L 3G, Canada E-mail:
More informationNotes on Systems of Linear Congruences
MATH 324 Summer 2012 Elementary Number Theory Notes on Systems of Linear Congruences In this note we will discuss systems of linear congruences where the moduli are all different. Definition. Given the
More informationOn the Primitivity of Trinomials over Small Finite Fields
On the Primitivity of Trinomials over Small Finite Fields Li Yujuan 1, Zhao Jinhua 2, Wang Huaifu, Ma Jing 4. Science and Technology on Information Assurance Laboratory, Beijing, 100072, P.R. China Abstract:
More informationPARITY OF THE COEFFICIENTS OF KLEIN S j-function
PARITY OF THE COEFFICIENTS OF KLEIN S j-function CLAUDIA ALFES Abstract. Klein s j-function is one of the most fundamental modular functions in number theory. However, not much is known about the parity
More informationA New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases
A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases Arash Reyhani-Masoleh Department of Electrical and Computer Engineering The University of Western Ontario London, Ontario,
More informationConstructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography
Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography Naomi Benger and Michael Scott, 1 School of Computing, Dublin City University, Ireland nbenger@computing.dcu.ie
More informationA Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. X, MONTH 2007 1 A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations James A. Muir Abstract We present a simple algorithm
More informationNo.6 Selection of Secure HC of g = divisors D 1, D 2 defined on J(C; F q n) over F q n, to determine the integer m such that D 2 = md 1 (if such
Vol.17 No.6 J. Comput. Sci. & Technol. Nov. 2002 Selection of Secure Hyperelliptic Curves of g = 2 Based on a Subfield ZHANG Fangguo ( ) 1, ZHANG Futai ( Ξ) 1;2 and WANG Yumin(Π±Λ) 1 1 P.O.Box 119 Key
More informationON VALUES OF CYCLOTOMIC POLYNOMIALS. V
Math. J. Okayama Univ. 45 (2003), 29 36 ON VALUES OF CYCLOTOMIC POLYNOMIALS. V Dedicated to emeritus professor Kazuo Kishimoto on his seventieth birthday Kaoru MOTOSE In this paper, using properties of
More informationSubquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation
Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation M A Hasan and C Negre Abstract We study Dickson bases for binary field representation Such representation
More informationPolynomials over finite fields. Algorithms and Randomness
Polynomials over Finite Fields: Algorithms and Randomness School of Mathematics and Statistics Carleton University daniel@math.carleton.ca AofA 10, July 2010 Introduction Let q be a prime power. In this
More informationGenerating more MNT elliptic curves
Generating more MNT elliptic curves Michael Scott 1 and Paulo S. L. M. Barreto 2 1 School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike@computing.dcu.ie 2 Universidade
More informationWeil pairing. Algant: Regensburg and Leiden Elliptic curves and Weil conjectures seminar, Regensburg. Wednesday 22 nd June, 2016.
Weil pairing Jana Sotáková Algant: Regensburg and Leiden Elliptic curves and Weil conjectures seminar, Regensburg Wednesday 22 nd June, 2016 Abstract In this talk we are mainly invested in constructing
More informationCONSTRUCTING SUPERSINGULAR ELLIPTIC CURVES. Reinier Bröker
CONSTRUCTING SUPERSINGULAR ELLIPTIC CURVES Reinier Bröker Abstract. We give an algorithm that constructs, on input of a prime power q and an integer t, a supersingular elliptic curve over F q with trace
More informationMath 341: Probability Eighth Lecture (10/6/09)
Math 341: Probability Eighth Lecture (10/6/09) Steven J Miller Williams College Steven.J.Miller@williams.edu http://www.williams.edu/go/math/sjmiller/ public html/341/ Bronfman Science Center Williams
More informationA New Algorithm to Compute Terms in Special Types of Characteristic Sequences
A New Algorithm to Compute Terms in Special Types of Characteristic Sequences Kenneth J. Giuliani 1 and Guang Gong 2 1 Dept. of Mathematical and Computational Sciences University of Toronto at Mississauga
More informationOn the Optimal Pre-Computation of Window τ NAF for Koblitz Curves
On the Optimal Pre-Computation of Window τ NAF for Koblitz Curves William R. Trost and Guangwu Xu Abstract Koblitz curves have been a nice subject of consideration for both theoretical and practical interests.
More informationMathematical analysis of the computational complexity of integer sub-decomposition algorithm
Journal of Physics: Conference Series PAPER OPEN ACCESS Mathematical analysis of the computational complexity of integer sub-decomposition algorithm To cite this article: Ruma Kareem K Ajeena and Hailiza
More informationMontgomery Multiplier and Squarer in GF(2 m )
Montgomery Multiplier and Squarer in GF( m ) Huapeng Wu The Centre for Applied Cryptographic Research Department of Combinatorics and Optimization University of Waterloo, Waterloo, Canada h3wu@cacrmathuwaterlooca
More informationEfficient Key Agreement and Signature Schemes Using Compact Representations in GF (p 10 )
Efficient Key Agreement and Signature Schemes Using Compact Representations in GF (p 10 ) Kenneth J. Giuliani 1 and Guang Gong 2 1 Dept. of Combinatorics and Optimization University of Waterloo Waterloo,
More informationSummation polynomials and the discrete logarithm problem on elliptic curves
Summation polynomials and the discrete logarithm problem on elliptic curves Igor Semaev Department of Mathematics University of Leuven,Celestijnenlaan 200B 3001 Heverlee,Belgium Igor.Semaev@wis.kuleuven.ac.be
More informationEfficient Algorithms for Pairing-Based Cryptosystems
Efficient Algorithms for Pairing-Based Cryptosystems Paulo S.L.M. Barreto 1, Hae Y. Kim 1, Ben Lynn 2, and Michael Scott 3 1 Universidade de São Paulo, Escola Politécnica Av. Prof. Luciano Gualberto, tr.
More informationThe Eta Pairing Revisited
The Eta Pairing Revisited F. Hess 1, N. Smart 2, and Frederik Vercauteren 3 1 Technische Universität Berlin, Fakultät II, Institut für Mathematik, MA 8-1, Strasse des 17. Juni 136, D-10623 Berlin, Germany.
More informationTAMAGAWA NUMBERS OF ELLIPTIC CURVES WITH C 13 TORSION OVER QUADRATIC FIELDS
TAMAGAWA NUMBERS OF ELLIPTIC CURVES WITH C 13 TORSION OVER QUADRATIC FIELDS FILIP NAJMAN Abstract. Let E be an elliptic curve over a number field K c v the Tamagawa number of E at v and let c E = v cv.
More informationPermutation Polynomials over Finite Fields
Permutation Polynomials over Finite Fields Omar Kihel Brock University 1 Finite Fields 2 How to Construct a Finite Field 3 Permutation Polynomials 4 Characterization of PP Finite Fields Let p be a prime.
More informationGauss periods as low complexity normal bases
With M. Christopoulou, T. Garefalakis (Crete) and D. Panario (Carleton) July 16, 2009 Outline 1 Gauss periods as normal bases Normal bases Gauss periods 2 Traces of normal bases The trace of Gauss periods
More informationFundamental Theorem of Algebra
EE 387, Notes 13, Handout #20 Fundamental Theorem of Algebra Lemma: If f(x) is a polynomial over GF(q) GF(Q), then β is a zero of f(x) if and only if x β is a divisor of f(x). Proof: By the division algorithm,
More informationSome results on the existence of t-all-or-nothing transforms over arbitrary alphabets
Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg and Douglas R. Stinson David R. Cheriton School of Computer Science University of
More informationJournal of Number Theory
Journal of Number Theory 130 (2010) 1737 1749 Contents lists available at ScienceDirect Journal of Number Theory www.elsevier.com/locate/jnt A binary linear recurrence sequence of composite numbers Artūras
More informationArithmetic operators for pairing-based cryptography
7. Kryptotag November 9 th, 2007 Arithmetic operators for pairing-based cryptography Jérémie Detrey Cosec, B-IT, Bonn, Germany jdetrey@bit.uni-bonn.de Joint work with: Jean-Luc Beuchat Nicolas Brisebarre
More informationHomework 8 Solutions to Selected Problems
Homework 8 Solutions to Selected Problems June 7, 01 1 Chapter 17, Problem Let f(x D[x] and suppose f(x is reducible in D[x]. That is, there exist polynomials g(x and h(x in D[x] such that g(x and h(x
More informationHyperbent functions, Kloosterman sums and Dickson polynomials
Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department
More informationThe Eta Pairing Revisited
1 The Eta Pairing Revisited F. Hess, N.P. Smart and F. Vercauteren Abstract In this paper we simplify and extend the Eta pairing, originally discovered in the setting of supersingular curves by Baretto
More informationInstructor: Bobby Kleinberg Lecture Notes, 25 April The Miller-Rabin Randomized Primality Test
Introduction to Algorithms (CS 482) Cornell University Instructor: Bobby Kleinberg Lecture Notes, 25 April 2008 The Miller-Rabin Randomized Primality Test 1 Introduction Primality testing is an important
More informationProof 1: Using only ch. 6 results. Since gcd(a, b) = 1, we have
Exercise 13. Consider positive integers a, b, and c. (a) Suppose gcd(a, b) = 1. (i) Show that if a divides the product bc, then a must divide c. I give two proofs here, to illustrate the different methods.
More informationOn the existence of primitive completely normal bases of finite fields
On the existence of primitive completely normal bases of finite fields Theodoulos Garefalakis a, Giorgos Kapetanakis b, a Department of Mathematics and Applied Mathematics, University of Crete, Voutes
More informationA New Characterization of Semi-bent and Bent Functions on Finite Fields
A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department
More informationMATH FINAL EXAM REVIEW HINTS
MATH 109 - FINAL EXAM REVIEW HINTS Answer: Answer: 1. Cardinality (1) Let a < b be two real numbers and define f : (0, 1) (a, b) by f(t) = (1 t)a + tb. (a) Prove that f is a bijection. (b) Prove that any
More informationConstructions of Quadratic Bent Functions in Polynomial Forms
1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence
More informationFURTHER REFINEMENT OF PAIRING COMPUTATION BASED ON MILLER S ALGORITHM
Unspecified Journal Volume 00, Number 0, Pages 000 000 S????-????(XX)0000-0 FURTHER REFINEMENT OF PAIRING COMPUTATION BASED ON MILLER S ALGORITHM CHAO-LIANG LIU, GWOBOA HORNG, AND TE-YU CHEN Abstract.
More informationFinite Fields. [Parts from Chapter 16. Also applications of FTGT]
Finite Fields [Parts from Chapter 16. Also applications of FTGT] Lemma [Ch 16, 4.6] Assume F is a finite field. Then the multiplicative group F := F \ {0} is cyclic. Proof Recall from basic group theory
More informationON THE ASYMPTOTIC EFFECTIVENESS OF WEIL DESCENT ATTACKS
ON THE ASYMPTOTIC EFFECTIVENESS OF WEIL DESCENT ATTACKS KORAY KARABINA, ALFRED MENEZES, CARL POMERANCE, AND IGOR E. SHPARLINSKI Abstract. In this paper we investigate the asymptotic effectiveness of the
More informationA PASCAL-LIKE BOUND FOR THE NUMBER OF NECKLACES WITH FIXED DENSITY
A PASCAL-LIKE BOUND FOR THE NUMBER OF NECKLACES WITH FIXED DENSITY I. HECKENBERGER AND J. SAWADA Abstract. A bound resembling Pascal s identity is presented for binary necklaces with fixed density using
More informationEfficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields
Efficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields ARASH REYHANI-MASOLEH and M. ANWAR HASAN University of Waterloo In this article, two digit-serial architectures for normal basis
More informationSection X.55. Cyclotomic Extensions
X.55 Cyclotomic Extensions 1 Section X.55. Cyclotomic Extensions Note. In this section we return to a consideration of roots of unity and consider again the cyclic group of roots of unity as encountered
More informationLecture Notes Math 371: Algebra (Fall 2006) by Nathanael Leedom Ackerman
Lecture Notes Math 371: Algebra (Fall 2006) by Nathanael Leedom Ackerman October 31, 2006 TALK SLOWLY AND WRITE NEATLY!! 1 0.1 Symbolic Adjunction of Roots When dealing with subfields of C it is easy to
More informationCS 5319 Advanced Discrete Structure. Lecture 9: Introduction to Number Theory II
CS 5319 Advanced Discrete Structure Lecture 9: Introduction to Number Theory II Divisibility Outline Greatest Common Divisor Fundamental Theorem of Arithmetic Modular Arithmetic Euler Phi Function RSA
More informationDiscrete Mathematics CS October 17, 2006
Discrete Mathematics CS 2610 October 17, 2006 Uncountable sets Theorem: The set of real numbers is uncountable. If a subset of a set is uncountable, then the set is uncountable. The cardinality of a subset
More informationNon-generic attacks on elliptic curve DLPs
Non-generic attacks on elliptic curve DLPs Benjamin Smith Team GRACE INRIA Saclay Île-de-France Laboratoire d Informatique de l École polytechnique (LIX) ECC Summer School Leuven, September 13 2013 Smith
More informationInteger Decomposition for Fast Scalar Multiplication on Elliptic Curves
Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves Dongryeol Kim and Seongan Lim KISA (Korea Information Security Agency), 78, Garak-Dong, Songpa-Gu, Seoul 138-803, Korea {drkim, seongan}@kisa.or.kr
More informationMath 118: Advanced Number Theory. Samit Dasgupta and Gary Kirby
Math 8: Advanced Number Theory Samit Dasgupta and Gary Kirby April, 05 Contents Basics of Number Theory. The Fundamental Theorem of Arithmetic......................... The Euclidean Algorithm and Unique
More informationUNDERSTANDING RULER AND COMPASS CONSTRUCTIONS WITH FIELD THEORY
UNDERSTANDING RULER AND COMPASS CONSTRUCTIONS WITH FIELD THEORY ISAAC M. DAVIS Abstract. By associating a subfield of R to a set of points P 0 R 2, geometric properties of ruler and compass constructions
More informationFinite Fields. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay
1 / 25 Finite Fields Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay September 25, 2014 2 / 25 Fields Definition A set F together
More informationThe Final Exponentiation in Pairing-Based Cryptography
The Final Exponentiation in Pairing-Based Cryptography Barış Bülent Kırlar Department of Mathematics, Süleyman Demirel University, 3220, Isparta, Turkey Institute of Applied Mathematics, Middle East Technical
More informationOptimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves
CT-RSA 2012 February 29th, 2012 Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves Joint work with: Nicolas Estibals CARAMEL project-team, LORIA, Université de Lorraine / CNRS / INRIA,
More informationJosé Felipe Voloch. Abstract: We discuss the problem of constructing elements of multiplicative high
On the order of points on curves over finite fields José Felipe Voloch Abstract: We discuss the problem of constructing elements of multiplicative high order in finite fields of large degree over their
More informationOn squares in Lucas sequences
On squares in Lucas sequences A. Bremner N. Tzanakis July, 2006 Abstract Let P and Q be non-zero integers. The Lucas sequence {U n (P, Q)} is defined by U 0 = 0, U 1 = 1, U n = P U n 1 QU n 2 (n 2). The
More information