On the distribution of irreducible trinomials over F 3

Size: px
Start display at page:

Download "On the distribution of irreducible trinomials over F 3"

Transcription

1 Finite Fields and Their Applications 13 (2007) On the distribution of irreducible trinomials over F 3 Omran Ahmadi Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario, Canada N2L 3G1 Received 28 June 2005; revised 8 October 2005 Available online 15 December 2005 Communicated by Gary L. Mullen Abstract We present some results about irreducible polynomials over finite fields and use them to prove a conjecture of von zur Gathen concerning the distribution of irreducible trinomials over F Elsevier Inc. All rights reserved. Keywords: Finite fields; Irreducible polynomials 1. Introduction Let F q n be the degree n extension of F q. Then we have F q n = F q [x]/(f (x)) where f(x)is an irreducible polynomial of degree n over F q. The weight of f(x)is the number of its coefficients that are non-zero. If the weight of f(x) is three, then f(x) is called a trinomial. It is well known that multiplication in F q n can be sped up considerably if f(x) is a trinomial (e.g. see [7]). Fast arithmetic in finite fields is important for the efficient implementation of errorcorrecting codes and discrete logarithm cryptosystems. Finite fields of characteristic two have received special attention because their arithmetic can be efficiently implemented in both hardware and software, and there has been a significant amount of work done on the distribution of irreducible trinomials over F 2 (e.g. see [2,3,14,15]). More recently, there has been increased interest in fast arithmetic for finite fields of characteristic 3 (e.g. see address: oahmadid@math.uwaterloo.ca /$ see front matter 2005 Elsevier Inc. All rights reserved. doi: /j.ffa

2 660 O. Ahmadi / Finite Fields and Their Applications 13 (2007) [8 10,13]) because there are two supersingular elliptic curves over F 3 with embedding degree six that are very well suited to the implementation of pairing-based cryptographic protocols [1,5]. Von zur Gathen [6] (see also Loidreau [11]) proved some interesting results about irreducible trinomials over F 3, and made some conjectures about their distribution. The conjectures were supported by extensive experiments. In Section 2 of this paper we present some results about the irreducibility of trinomials that are related to each other. Our results can be used to speed up the search and enumeration of irreducible polynomials over finite fields. We then use these results in Section 3 to prove one of von zur Gathen s conjectures. 2. Main result The order of an irreducible polynomial f(x) over F q is the smallest positive integer e such that f(x) x e 1inF q [x]. Theorem 1. (See [12, Theorem 3.9].) Let f(x) F q [x] be an irreducible polynomial over F q of degree n and order e and let t be a positive integer. Then f(x t ) is irreducible over F q if and only if (i) gcd(t, qn 1 e ) = 1; (ii) each prime factor of t divides e; and (iii) if 4 t, then 4 q n 1. An immediate corollary is the following: Corollary 2. Let q be a prime power where q 3 (mod 4), and let f(x) F q [x] be a polynomial of odd degree. Then f(x 2r ) where r 2 is always reducible over F q. It is well known that if f(x) F q [x] is an irreducible polynomial over F q and α F q, then f(αx) F q [x] is also irreducible over F q. In the following we generalize this fact. Theorem 3. Let f(x) be an irreducible polynomial of degree n over F q. Let θ F q n be such that f(θx) F q [x]. Then f(θx) is the product of irreducible polynomials over F q whose degrees divide n. Proof. Let f(θx)= f 1 (x)... f l (x) where f i (x) is an irreducible polynomial of degree n i over F q.letα i F q n i be a root of f i, and let β i = θα i. Then f(β i ) = 0. Now β i F q n since f(x) is an irreducible polynomial of degree n over F q. On the other hand we have θ 1 F q n. Thus θ 1 β i = α i F q n and hence n i divides n. It is easy to see that if f(x) and θ are as above and β is a root of f(x) in F q n, then f(θx) is irreducible over F q if and only if θ 1 β is not in any proper subfield of F q n. Notice that this latter condition is always satisfied if θ F q. Because if θ F q and β F q n

3 O. Ahmadi / Finite Fields and Their Applications 13 (2007) is not in any proper subfield of F q n, then since (θ 1 ) qc 1 = 1 for every c 1, we have (θ 1 β) qc 1 = β qc 1 = 1 if and only if n divides c. Thus θ 1 β is in F q n and not in any proper subfield of F q n. In the following we use the ideas presented above to obtain the main result of this paper. First we need the following elementary lemmas. Lemma 4. Let q be an odd prime power and let n = 2 r n where n is an odd number and r 1. Then 2 r+2 q n 1 and 2 r qn 1 q 1. Proof. The case r = 1 is easy. For r 2wehave q n 1 = (q 2 1) ( r 1 ( q 2 i + 1 ))( n 1 (q 2r ) ). i i=1 i=0 The result now follows because q 2 1 (mod 8). Lemma 5. Let q be an odd prime power and n = 2 r n where n is an odd number, and let r s 0. Then for any α F q there exists θ F q n such that θ 2s = α. Proof. The statement is trivial when r = 0, so let us suppose that r 1. Let γ be a generator of F q n and α F q. Then there exists a unique integer d such that γ d = α and 0 d q n 2. Thus (γ d ) q 1 = α q 1 = 1. Now since γ is a generator of F q n,wehave q n 1 d(q 1) and hence qn 1 q 1 d. ByLemma4weget2r d, and since r s, ifwe take θ = γ d/2s, then θ 2s = α. Theorem 6. Let n = 2 r n and k = 2 s k where n and k are odd numbers and r>s 0, and let q be an odd prime power and α F q. Then xn + ax k + b F q [x] is irreducible over F q if and only if is irreducible over F q. α 2r s n x n + aα k x k + b F q [x] Proof. Suppose that f(x)= x n + ax k + b F q [x] is irreducible over F q. By Lemma 5, there exists θ F q n such that θ 2s = α. We claim that g(x) = f(θx)= α 2r s n x n +aα k x k + b F q [x] is irreducible over F q. Using the comments made after Theorem 3, it suffices to show that μ = θ 1 β is not in any proper subfield of F q n where β is a root of f(x)in F q n. Suppose by the way of contradiction that μ ql 1 = 1 where l is a proper divisor of n, and let l = 2 v l, where v r and l n. From Lemma 4, we know 2 v ql 1 q 1.Nowifv s, then β ql 1 = θ ql 1 = θ 2s (q 1)t = 1

4 662 O. Ahmadi / Finite Fields and Their Applications 13 (2007) for some t, and this is a contradiction since β is not in any proper subfield of F q n. Thus suppose v<sand let w = s v.now,q l 1 q 2wl 1. Since β ql 1 = θ ql 1,wehave β q2wl 1 = θ q2wl 1 = θ q2s l 1 = θ 2s (q 1)t = 1 for some t, and hence we must have n 2 w l. But this cannot hold since the largest power of 2 which divides 2 w l and n are s and r, respectively, and we have r>s. The converse is similarly true since f(x)= g(θ 1 x) and θ 2s = α 1 F q. By taking α = 1 in Theorem 6, we obtain the following. Corollary 7. Let n, k, r, s be as in Theorem 6. Then x n + ax k + b is irreducible over F q if and only if x n ax k + b is irreducible over F q. Specializing Theorem 6 to some finite fields yields interesting results. The following results are of this flavor. Corollary 8. Let n be a positive integer divisible by 4. Then the degree n trinomial f(x)= x n x k + 1 is always reducible over F 3. Proof. If the power of 2 which divides k is not less than that of n, then it follows from Corollary 2 that f(x)is reducible. Otherwise if the power of 2 which divides n is greater than that of k, then using Corollary 7 since x n + x k + 1 is reducible over F 3, f(x)is also reducible. Corollary 9. Let n, k, r, s be as in Theorem 6, and, furthermore, let r>s+ 1 and c be a non-zero element of F 5. Then x n + ax k + b is irreducible over F 5 if and only if x n + cax k + b is irreducible over F 5. Theorem 6 can easily be generalized to polynomials of any weight. The proof of Theorem 10 is similar to the proof of Theorem 6 and is omitted. Theorem 10. Let f(x)= t i=0 a i x n i F q [x] where q is an odd prime power, n = n t > n t 1 > >n 1 >n 0 = 0, a t = 1 and a i 0 for every 0 i t 1. Let s be the largest power of 2 which divides d = gcd(n 0,n 1,...,n t ),letr i be the largest power of 2 dividing n i, and suppose that r t >s. Furthermore let α F q. Then f(x) is irreducible over F q if and only if is irreducible over F q. g(x) = t α 2 s n i a i x n i i=0

5 O. Ahmadi / Finite Fields and Their Applications 13 (2007) Applying our results to trinomials over F 3 J. von zur Gathen studied the distribution of irreducible trinomials over F 3 and made two conjectures based on some experimental data. The first conjecture was proven by S.D. Cohen [4]. We provide a proof for the sake of completeness. Theorem 11. If n 0 (mod 4), k 2 (mod 6), and x n + ax k + b F 3 [x] is irreducible over F 3, then the largest power of 2 which divides n is greater than the largest power of 2 which divides k. Proof. Let x n + ax k + b F 3 [x] where n = 2 r n, k = 2 s k, n and k are odd numbers, and s r 2. Then if we let f(x)= x n + ax 2s r k + b, wehavex n + ax k + b = f(x 2r ) and from Corollary 2 it follows that x n + ax k + b is reducible over F 3. The second conjecture that we proved is the following. Recall that the reciprocal of a polynomial f(x)whose constant term is non-zero is defined to be f (x) = x n f(1/x), and if f(x)is irreducible over F q, then so is f (x). Theorem 12. Let m be a fixed positive integer. For given a,b F 3, p {0, 4, 8} and 0 c 5, the number of irreducible trinomials x n + ax k + b F 3 [x] where n p(mod 12), k c(mod 6), and n m is equal to the number of irreducible trinomials x n + ax k + b F 3 [x] where n p(mod 12), k p c(mod 6) and n m. Proof. The case where a = b = 1 is trivial since there is no irreducible trinomial x n +x k + 1 over F 3. Now we assume a = 1, b = 1. The other cases can be dealt with similarly. Let x n + x k 1 be an irreducible trinomial over F 3 where n p(mod 12), k c(mod 6) for given p {0, 4, 8} and 0 c 5. Then from Theorem 11 the largest power of 2 which divides n is greater than the largest power of 2 which divides k. Thus by Corollary 7, x n x k 1 is irreducible over F 3. Now the reciprocal of x n x k 1, namely x n x n k + 1, is also irreducible over F 3, so it follows that x n + x n k 1 is irreducible over F 3.Butin this case we have n p(mod 12) and n k c(mod 6). This establishes a bijection and hence proves the theorem. References [1] P. Barreto, H.Y. Kim, B. Lynn, M. Scott, Efficient algorithms for pairing-based cryptosystems, in: Proceedings of CRYPTO 2002, in: Lecture Notes in Comput. Sci., vol. 2442, Springer, 2002, pp [2] I. Blake, S. Gao, R. Lambert, Constructive problems for irreducible polynomials over finite fields, in: Information Theory and Applications, in: Lecture Notes in Comput. Sci., vol. 793, Springer, 1994, pp [3] I. Blake, S. Gao, R. Lambert, Construction and distribution problems for irreducible polynomials over finite fields, in: D. Gollmann (Ed.), Applications of Finite Field, Clarendon, 1996, pp [4] S.D. Cohen, MR (2004c:11229), Mathematical Reviews (2004). [5] S. Galbraith, K. Harrison, D. Soldera, Implementing the Tate pairing, in: C. Fieker, D. Kohl (Eds.), ANTS-V, in: Lecture Notes in Comput. Sci., vol. 2369, Springer, 2002, pp [6] J. von zur Gathen, Irreducible trinomials over finite fields, Math. Comput. 72 (2003)

6 664 O. Ahmadi / Finite Fields and Their Applications 13 (2007) [7] J. von zur Gathen, M. Nöcker, Polynomial and normal bases for finite fields, J. Cryptology 18 (2005) [8] P. Grabher, D. Page, Hardware acceleration of the Tate pairing in characteristic three, in: Proceedings of CHES 2005, in: Lecture Notes in Comput. Sci., vol. 3569, Springer, 2005, pp [9] K. Harrison, D. Page, N.P. Smart, Software implementation of finite fields of characteristic three, LMS J. Comput. Math. 5 (2002) [10] T. Kerins, W. Marnane, E. Popovici, P. Barreto, Efficient hardware for the Tate pairint calculation in characteristic three, in: Proceedings of CHES 2005, in: Lecture Notes in Comput. Sci., vol. 3569, Springer, 2005, pp [11] P. Loidreau, On the factorization of trinomials over F 3, Technical Report 3918, Institut National de Recherche en Informatique et en Automatique (INRIA), [12] A.J. Menezes, I.F. Blake, X. Gao, R.C. Mullin, S.A. Vanstone, T. Yaghoobian, Applications of Finite Fields, Kluwer, [13] D. Page, N.P. Smart, Hardware implementation of finite fields of characteristic three, in: Proceedings of CHES 2002, in: Lecture Notes in Comput. Sci., vol. 2523, Springer, 2002, pp [14] G. Seroussi, Table of low-weight binary irreducible polynomials, Hewlett-Packard Technical Report HPL , [15] R. Swan, Factorization of polynomials over finite fields, Pacific J. Math. 12 (1962)

Formulas for cube roots in F 3 m

Formulas for cube roots in F 3 m Discrete Applied Mathematics 155 (2007) 260 270 www.elsevier.com/locate/dam Formulas for cube roots in F 3 m Omran Ahmadi a, Darrel Hankerson b, Alfred Menezes a a Department of Combinatorics and Optimization,

More information

On the Number of Trace-One Elements in Polynomial Bases for F 2

On the Number of Trace-One Elements in Polynomial Bases for F 2 On the Number of Trace-One Elements in Polynomial Bases for F 2 n Omran Ahmadi and Alfred Menezes Department of Combinatorics & Optimization University of Waterloo, Canada {oahmadid,ajmeneze}@uwaterloo.ca

More information

Multiplicative Order of Gauss Periods

Multiplicative Order of Gauss Periods Multiplicative Order of Gauss Periods Omran Ahmadi Department of Electrical and Computer Engineering University of Toronto Toronto, Ontario, M5S 3G4, Canada oahmadid@comm.utoronto.ca Igor E. Shparlinski

More information

Parity of the Number of Irreducible Factors for Composite Polynomials

Parity of the Number of Irreducible Factors for Composite Polynomials Parity of the Number of Irreducible Factors for Composite Polynomials Ryul Kim Wolfram Koepf Abstract Various results on parity of the number of irreducible factors of given polynomials over finite fields

More information

Divisibility of Trinomials by Irreducible Polynomials over F 2

Divisibility of Trinomials by Irreducible Polynomials over F 2 Divisibility of Trinomials by Irreducible Polynomials over F 2 Ryul Kim Faculty of Mathematics and Mechanics Kim Il Sung University, Pyongyang, D.P.R.Korea Wolfram Koepf Department of Mathematics University

More information

ELEMENTS OF PROVABLE HIGH ORDERS IN FINITE FIELDS

ELEMENTS OF PROVABLE HIGH ORDERS IN FINITE FIELDS ELEMENTS OF PROVABLE HIGH ORDERS IN FINITE FIELDS SHUHONG GAO Abstract. A method is given for constructing elements in Fq n whose orders are larger than any polynomial in n when n becomes large. As a by-product

More information

Some Efficient Algorithms for the Final Exponentiation of η T Pairing

Some Efficient Algorithms for the Final Exponentiation of η T Pairing Some Efficient Algorithms for the Final Exponentiation of η T Pairing Masaaki Shirase 1, Tsuyoshi Takagi 1, and Eiji Okamoto 2 1 Future University-Hakodate, Japan 2 University of Tsukuba, Japan Abstract.

More information

Constructing Families of Pairing-Friendly Elliptic Curves

Constructing Families of Pairing-Friendly Elliptic Curves Constructing Families of Pairing-Friendly Elliptic Curves David Freeman Information Theory Research HP Laboratories Palo Alto HPL-2005-155 August 24, 2005* cryptography, pairings, elliptic curves, embedding

More information

On the Primitivity of some Trinomials over Finite Fields

On the Primitivity of some Trinomials over Finite Fields On the Primitivity of some Trinomials over Finite Fields LI Yujuan & WANG Huaifu & ZHAO Jinhua Science and Technology on Information Assurance Laboratory, Beijing, 100072, P.R. China email: liyj@amss.ac.cn,

More information

A Remark on Implementing the Weil Pairing

A Remark on Implementing the Weil Pairing A Remark on Implementing the Weil Pairing Cheol Min Park 1, Myung Hwan Kim 1 and Moti Yung 2 1 ISaC and Department of Mathematical Sciences, Seoul National University, Korea {mpcm,mhkim}@math.snu.ac.kr

More information

Reducing the Complexity of Normal Basis Multiplication

Reducing the Complexity of Normal Basis Multiplication Reducing the Complexity of Normal Basis Multiplication Ömer Eǧecioǧlu and Çetin Kaya Koç Department of Computer Science University of California Santa Barbara {omer,koc}@cs.ucsb.edu Abstract In this paper

More information

A note on López-Dahab coordinates

A note on López-Dahab coordinates A note on López-Dahab coordinates Tanja Lange Faculty of Mathematics, Matematiktorvet - Building 303, Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark tanja@hyperelliptic.org Abstract López-Dahab

More information

New Minimal Weight Representations for Left-to-Right Window Methods

New Minimal Weight Representations for Left-to-Right Window Methods New Minimal Weight Representations for Left-to-Right Window Methods James A. Muir 1 and Douglas R. Stinson 2 1 Department of Combinatorics and Optimization 2 School of Computer Science University of Waterloo

More information

Efficient Computation of Roots in Finite Fields

Efficient Computation of Roots in Finite Fields Efficient Computation of Roots in Finite Fields PAULO S. L. M. BARRETO (pbarreto@larc.usp.br) Laboratório de Arquitetura e Redes de Computadores (LARC), Escola Politécnica, Universidade de São Paulo, Brazil.

More information

Modular Multiplication in GF (p k ) using Lagrange Representation

Modular Multiplication in GF (p k ) using Lagrange Representation Modular Multiplication in GF (p k ) using Lagrange Representation Jean-Claude Bajard, Laurent Imbert, and Christophe Nègre Laboratoire d Informatique, de Robotique et de Microélectronique de Montpellier

More information

On the Complexity of the Dual Bases of the Gaussian Normal Bases

On the Complexity of the Dual Bases of the Gaussian Normal Bases Algebra Colloquium 22 (Spec ) (205) 909 922 DOI: 0.42/S00538675000760 Algebra Colloquium c 205 AMSS CAS & SUZHOU UNIV On the Complexity of the Dual Bases of the Gaussian Normal Bases Algebra Colloq. 205.22:909-922.

More information

Optimised versions of the Ate and Twisted Ate Pairings

Optimised versions of the Ate and Twisted Ate Pairings Optimised versions of the Ate and Twisted Ate Pairings Seiichi Matsuda 1, Naoki Kanayama 1, Florian Hess 2, and Eiji Okamoto 1 1 University of Tsukuba, Japan 2 Technische Universität Berlin, Germany Abstract.

More information

Division of Trinomials by Pentanomials and Orthogonal Arrays

Division of Trinomials by Pentanomials and Orthogonal Arrays Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang

More information

FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials

FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials C. Shu, S. Kwon and K. Gaj Abstract: The efficient design of digit-serial multipliers

More information

Implementing Pairing-Based Cryptosystems

Implementing Pairing-Based Cryptosystems Implementing Pairing-Based Cryptosystems Zhaohui Cheng and Manos Nistazakis School of Computing Science, Middlesex University White Hart Lane, London N17 8HR, UK. {m.z.cheng, e.nistazakis}@mdx.ac.uk Abstract:

More information

Generalized hyper-bent functions over GF(p)

Generalized hyper-bent functions over GF(p) Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G

More information

Efficient Computation of Tate Pairing in Projective Coordinate Over General Characteristic Fields

Efficient Computation of Tate Pairing in Projective Coordinate Over General Characteristic Fields Efficient Computation of Tate Pairing in Projective Coordinate Over General Characteristic Fields Sanjit Chatterjee, Palash Sarkar and Rana Barua Cryptology Research Group Applied Statistics Unit Indian

More information

Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials

Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials Yin Li 1, Gong-liang Chen 2, and Xiao-ning Xie 1 Xinyang local taxation bureau, Henan, China. Email:yunfeiyangli@gmail.com, 2 School

More information

ON CERTAIN COMBINATORIAL DIOPHANTINE EQUATIONS AND THEIR CONNECTION TO PYTHAGOREAN NUMBERS

ON CERTAIN COMBINATORIAL DIOPHANTINE EQUATIONS AND THEIR CONNECTION TO PYTHAGOREAN NUMBERS ON CERTAIN COMBINATORIAL DIOPHANTINE EQUATIONS AND THEIR CONNECTION TO PYTHAGOREAN NUMBERS ROBERT S. COULTER, MARIE HENDERSON, AND FELIX LAZEBNIK 1. Introduction The binomial knapsack problem is easily

More information

Efficient Algorithms for Pairing-Based Cryptosystems

Efficient Algorithms for Pairing-Based Cryptosystems Efficient Algorithms for Pairing-Based Cryptosystems Paulo S. L. M. Barreto 1, Hae Y. Kim 1, Ben Lynn 2, and Michael Scott 3 1 Universidade de São Paulo, Escola Politécnica. Av. Prof. Luciano Gualberto,

More information

All variables a, b, n, etc are integers unless otherwise stated. Each part of a problem is worth 5 points.

All variables a, b, n, etc are integers unless otherwise stated. Each part of a problem is worth 5 points. Math 152, Problem Set 2 solutions (2018-01-24) All variables a, b, n, etc are integers unless otherwise stated. Each part of a problem is worth 5 points. 1. Let us look at the following equation: x 5 1

More information

Four classes of permutation polynomials of F 2 m

Four classes of permutation polynomials of F 2 m Finite Fields and Their Applications 1 2007) 869 876 http://www.elsevier.com/locate/ffa Four classes of permutation polynomials of F 2 m Jin Yuan,1, Cunsheng Ding 1 Department of Computer Science, The

More information

FINDING COMPOSITE ORDER ORDINARY ELLIPTIC CURVES USING THE COCKS-PINCH METHOD

FINDING COMPOSITE ORDER ORDINARY ELLIPTIC CURVES USING THE COCKS-PINCH METHOD FINDING COMPOSITE ORDER ORDINARY ELLIPTIC CURVES USING THE COCKS-PINCH METHOD D. BONEH, K. RUBIN, AND A. SILVERBERG Abstract. We apply the Cocks-Pinch method to obtain pairing-friendly composite order

More information

Elliptic Curve Cryptosystems and Scalar Multiplication

Elliptic Curve Cryptosystems and Scalar Multiplication Annals of the University of Craiova, Mathematics and Computer Science Series Volume 37(1), 2010, Pages 27 34 ISSN: 1223-6934 Elliptic Curve Cryptosystems and Scalar Multiplication Nicolae Constantinescu

More information

A Note on Scalar Multiplication Using Division Polynomials

A Note on Scalar Multiplication Using Division Polynomials 1 A Note on Scalar Multiplication Using Division Polynomials Binglong Chen, Chuangqiang Hu and Chang-An Zhao Abstract Scalar multiplication is the most important and expensive operation in elliptic curve

More information

Mathematics for Cryptography

Mathematics for Cryptography Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1

More information

GAUSS PERIODS: ORDERS AND CRYPTOGRAPHICAL APPLICATIONS

GAUSS PERIODS: ORDERS AND CRYPTOGRAPHICAL APPLICATIONS MATHEMATICS OF COMPUTATION Volume 67, Number 221, January 1998, Pages 343 352 S 0025-5718(98)00935-1 GAUSS PERIODS: ORDERS AND CRYPTOGRAPHICAL APPLICATIONS SHUHONG GAO, JOACHIM VON ZUR GATHEN, AND DANIEL

More information

Arithmetic Operators for Pairing-Based Cryptography

Arithmetic Operators for Pairing-Based Cryptography Arithmetic Operators for Pairing-Based Cryptography Jean-Luc Beuchat 1, Nicolas Brisebarre 2,3, Jérémie Detrey 3, and Eiji Okamoto 1 1 Laboratory of Cryptography and Information Security, University of

More information

Classification of Finite Fields

Classification of Finite Fields Classification of Finite Fields In these notes we use the properties of the polynomial x pd x to classify finite fields. The importance of this polynomial is explained by the following basic proposition.

More information

Fast hashing to G2 on pairing friendly curves

Fast hashing to G2 on pairing friendly curves Fast hashing to G2 on pairing friendly curves Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, and Ezekiel J. Kachisa School of Computing Dublin City University Ballymun, Dublin

More information

Redundant Trinomials for Finite Fields of Characteristic 2

Redundant Trinomials for Finite Fields of Characteristic 2 122 Redundant Trinomials for Finite Fields of Characteristic 2 Christophe Doche Division of ICS, Department of Computing Macquarie University, NSW 2109 Australia doche@ics.mq.edu.au Abstract. In this article

More information

Efficient Tate Pairing Computation Using Double-Base Chains

Efficient Tate Pairing Computation Using Double-Base Chains Efficient Tate Pairing Computation Using Double-Base Chains Chang an Zhao, Fangguo Zhang and Jiwu Huang 1 Department of Electronics and Communication Engineering, Sun Yat-Sen University, Guangzhou 510275,

More information

A new class of irreducible pentanomials for polynomial based multipliers in binary fields

A new class of irreducible pentanomials for polynomial based multipliers in binary fields Noname manuscript No. (will be inserted by the editor) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas Ricardo Custódio Daniel Panario the date

More information

An Approach to Hensel s Lemma

An Approach to Hensel s Lemma Irish Math. Soc. Bulletin 47 (2001), 15 21 15 An Approach to Hensel s Lemma gary mcguire Abstract. Hensel s Lemma is an important tool in many ways. One application is in factoring polynomials over Z.

More information

Number Theory in Cryptology

Number Theory in Cryptology Number Theory in Cryptology Abhijit Das Department of Computer Science and Engineering Indian Institute of Technology Kharagpur October 15, 2011 What is Number Theory? Theory of natural numbers N = {1,

More information

Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms

Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms Robert P. Gallant 1, Robert J. Lambert 1, and Scott A. Vanstone 1,2 1 Certicom Research, Canada {rgallant,rlambert,svanstone}@certicom.com

More information

Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map

Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map Jung Hee Cheon, Sungmo Park, Sangwoo Park, and Daeho Kim Electronics and Telecommunications Research Institute, 161 Kajong-Dong,Yusong-Gu,

More information

Normal and Self-dual Normal Bases from Factorization of cx q+1 + dx q ax b

Normal and Self-dual Normal Bases from Factorization of cx q+1 + dx q ax b Normal and Self-dual Normal Bases from Factorization of cx q+ + dx q ax b Ian F. Blake Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario, N2L 3G, Canada E-mail:

More information

Notes on Systems of Linear Congruences

Notes on Systems of Linear Congruences MATH 324 Summer 2012 Elementary Number Theory Notes on Systems of Linear Congruences In this note we will discuss systems of linear congruences where the moduli are all different. Definition. Given the

More information

On the Primitivity of Trinomials over Small Finite Fields

On the Primitivity of Trinomials over Small Finite Fields On the Primitivity of Trinomials over Small Finite Fields Li Yujuan 1, Zhao Jinhua 2, Wang Huaifu, Ma Jing 4. Science and Technology on Information Assurance Laboratory, Beijing, 100072, P.R. China Abstract:

More information

PARITY OF THE COEFFICIENTS OF KLEIN S j-function

PARITY OF THE COEFFICIENTS OF KLEIN S j-function PARITY OF THE COEFFICIENTS OF KLEIN S j-function CLAUDIA ALFES Abstract. Klein s j-function is one of the most fundamental modular functions in number theory. However, not much is known about the parity

More information

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases Arash Reyhani-Masoleh Department of Electrical and Computer Engineering The University of Western Ontario London, Ontario,

More information

Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography

Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography Naomi Benger and Michael Scott, 1 School of Computing, Dublin City University, Ireland nbenger@computing.dcu.ie

More information

A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations

A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. X, MONTH 2007 1 A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations James A. Muir Abstract We present a simple algorithm

More information

No.6 Selection of Secure HC of g = divisors D 1, D 2 defined on J(C; F q n) over F q n, to determine the integer m such that D 2 = md 1 (if such

No.6 Selection of Secure HC of g = divisors D 1, D 2 defined on J(C; F q n) over F q n, to determine the integer m such that D 2 = md 1 (if such Vol.17 No.6 J. Comput. Sci. & Technol. Nov. 2002 Selection of Secure Hyperelliptic Curves of g = 2 Based on a Subfield ZHANG Fangguo ( ) 1, ZHANG Futai ( Ξ) 1;2 and WANG Yumin(Π±Λ) 1 1 P.O.Box 119 Key

More information

ON VALUES OF CYCLOTOMIC POLYNOMIALS. V

ON VALUES OF CYCLOTOMIC POLYNOMIALS. V Math. J. Okayama Univ. 45 (2003), 29 36 ON VALUES OF CYCLOTOMIC POLYNOMIALS. V Dedicated to emeritus professor Kazuo Kishimoto on his seventieth birthday Kaoru MOTOSE In this paper, using properties of

More information

Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation

Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation M A Hasan and C Negre Abstract We study Dickson bases for binary field representation Such representation

More information

Polynomials over finite fields. Algorithms and Randomness

Polynomials over finite fields. Algorithms and Randomness Polynomials over Finite Fields: Algorithms and Randomness School of Mathematics and Statistics Carleton University daniel@math.carleton.ca AofA 10, July 2010 Introduction Let q be a prime power. In this

More information

Generating more MNT elliptic curves

Generating more MNT elliptic curves Generating more MNT elliptic curves Michael Scott 1 and Paulo S. L. M. Barreto 2 1 School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike@computing.dcu.ie 2 Universidade

More information

Weil pairing. Algant: Regensburg and Leiden Elliptic curves and Weil conjectures seminar, Regensburg. Wednesday 22 nd June, 2016.

Weil pairing. Algant: Regensburg and Leiden Elliptic curves and Weil conjectures seminar, Regensburg. Wednesday 22 nd June, 2016. Weil pairing Jana Sotáková Algant: Regensburg and Leiden Elliptic curves and Weil conjectures seminar, Regensburg Wednesday 22 nd June, 2016 Abstract In this talk we are mainly invested in constructing

More information

CONSTRUCTING SUPERSINGULAR ELLIPTIC CURVES. Reinier Bröker

CONSTRUCTING SUPERSINGULAR ELLIPTIC CURVES. Reinier Bröker CONSTRUCTING SUPERSINGULAR ELLIPTIC CURVES Reinier Bröker Abstract. We give an algorithm that constructs, on input of a prime power q and an integer t, a supersingular elliptic curve over F q with trace

More information

Math 341: Probability Eighth Lecture (10/6/09)

Math 341: Probability Eighth Lecture (10/6/09) Math 341: Probability Eighth Lecture (10/6/09) Steven J Miller Williams College Steven.J.Miller@williams.edu http://www.williams.edu/go/math/sjmiller/ public html/341/ Bronfman Science Center Williams

More information

A New Algorithm to Compute Terms in Special Types of Characteristic Sequences

A New Algorithm to Compute Terms in Special Types of Characteristic Sequences A New Algorithm to Compute Terms in Special Types of Characteristic Sequences Kenneth J. Giuliani 1 and Guang Gong 2 1 Dept. of Mathematical and Computational Sciences University of Toronto at Mississauga

More information

On the Optimal Pre-Computation of Window τ NAF for Koblitz Curves

On the Optimal Pre-Computation of Window τ NAF for Koblitz Curves On the Optimal Pre-Computation of Window τ NAF for Koblitz Curves William R. Trost and Guangwu Xu Abstract Koblitz curves have been a nice subject of consideration for both theoretical and practical interests.

More information

Mathematical analysis of the computational complexity of integer sub-decomposition algorithm

Mathematical analysis of the computational complexity of integer sub-decomposition algorithm Journal of Physics: Conference Series PAPER OPEN ACCESS Mathematical analysis of the computational complexity of integer sub-decomposition algorithm To cite this article: Ruma Kareem K Ajeena and Hailiza

More information

Montgomery Multiplier and Squarer in GF(2 m )

Montgomery Multiplier and Squarer in GF(2 m ) Montgomery Multiplier and Squarer in GF( m ) Huapeng Wu The Centre for Applied Cryptographic Research Department of Combinatorics and Optimization University of Waterloo, Waterloo, Canada h3wu@cacrmathuwaterlooca

More information

Efficient Key Agreement and Signature Schemes Using Compact Representations in GF (p 10 )

Efficient Key Agreement and Signature Schemes Using Compact Representations in GF (p 10 ) Efficient Key Agreement and Signature Schemes Using Compact Representations in GF (p 10 ) Kenneth J. Giuliani 1 and Guang Gong 2 1 Dept. of Combinatorics and Optimization University of Waterloo Waterloo,

More information

Summation polynomials and the discrete logarithm problem on elliptic curves

Summation polynomials and the discrete logarithm problem on elliptic curves Summation polynomials and the discrete logarithm problem on elliptic curves Igor Semaev Department of Mathematics University of Leuven,Celestijnenlaan 200B 3001 Heverlee,Belgium Igor.Semaev@wis.kuleuven.ac.be

More information

Efficient Algorithms for Pairing-Based Cryptosystems

Efficient Algorithms for Pairing-Based Cryptosystems Efficient Algorithms for Pairing-Based Cryptosystems Paulo S.L.M. Barreto 1, Hae Y. Kim 1, Ben Lynn 2, and Michael Scott 3 1 Universidade de São Paulo, Escola Politécnica Av. Prof. Luciano Gualberto, tr.

More information

The Eta Pairing Revisited

The Eta Pairing Revisited The Eta Pairing Revisited F. Hess 1, N. Smart 2, and Frederik Vercauteren 3 1 Technische Universität Berlin, Fakultät II, Institut für Mathematik, MA 8-1, Strasse des 17. Juni 136, D-10623 Berlin, Germany.

More information

TAMAGAWA NUMBERS OF ELLIPTIC CURVES WITH C 13 TORSION OVER QUADRATIC FIELDS

TAMAGAWA NUMBERS OF ELLIPTIC CURVES WITH C 13 TORSION OVER QUADRATIC FIELDS TAMAGAWA NUMBERS OF ELLIPTIC CURVES WITH C 13 TORSION OVER QUADRATIC FIELDS FILIP NAJMAN Abstract. Let E be an elliptic curve over a number field K c v the Tamagawa number of E at v and let c E = v cv.

More information

Permutation Polynomials over Finite Fields

Permutation Polynomials over Finite Fields Permutation Polynomials over Finite Fields Omar Kihel Brock University 1 Finite Fields 2 How to Construct a Finite Field 3 Permutation Polynomials 4 Characterization of PP Finite Fields Let p be a prime.

More information

Gauss periods as low complexity normal bases

Gauss periods as low complexity normal bases With M. Christopoulou, T. Garefalakis (Crete) and D. Panario (Carleton) July 16, 2009 Outline 1 Gauss periods as normal bases Normal bases Gauss periods 2 Traces of normal bases The trace of Gauss periods

More information

Fundamental Theorem of Algebra

Fundamental Theorem of Algebra EE 387, Notes 13, Handout #20 Fundamental Theorem of Algebra Lemma: If f(x) is a polynomial over GF(q) GF(Q), then β is a zero of f(x) if and only if x β is a divisor of f(x). Proof: By the division algorithm,

More information

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg and Douglas R. Stinson David R. Cheriton School of Computer Science University of

More information

Journal of Number Theory

Journal of Number Theory Journal of Number Theory 130 (2010) 1737 1749 Contents lists available at ScienceDirect Journal of Number Theory www.elsevier.com/locate/jnt A binary linear recurrence sequence of composite numbers Artūras

More information

Arithmetic operators for pairing-based cryptography

Arithmetic operators for pairing-based cryptography 7. Kryptotag November 9 th, 2007 Arithmetic operators for pairing-based cryptography Jérémie Detrey Cosec, B-IT, Bonn, Germany jdetrey@bit.uni-bonn.de Joint work with: Jean-Luc Beuchat Nicolas Brisebarre

More information

Homework 8 Solutions to Selected Problems

Homework 8 Solutions to Selected Problems Homework 8 Solutions to Selected Problems June 7, 01 1 Chapter 17, Problem Let f(x D[x] and suppose f(x is reducible in D[x]. That is, there exist polynomials g(x and h(x in D[x] such that g(x and h(x

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department

More information

The Eta Pairing Revisited

The Eta Pairing Revisited 1 The Eta Pairing Revisited F. Hess, N.P. Smart and F. Vercauteren Abstract In this paper we simplify and extend the Eta pairing, originally discovered in the setting of supersingular curves by Baretto

More information

Instructor: Bobby Kleinberg Lecture Notes, 25 April The Miller-Rabin Randomized Primality Test

Instructor: Bobby Kleinberg Lecture Notes, 25 April The Miller-Rabin Randomized Primality Test Introduction to Algorithms (CS 482) Cornell University Instructor: Bobby Kleinberg Lecture Notes, 25 April 2008 The Miller-Rabin Randomized Primality Test 1 Introduction Primality testing is an important

More information

Proof 1: Using only ch. 6 results. Since gcd(a, b) = 1, we have

Proof 1: Using only ch. 6 results. Since gcd(a, b) = 1, we have Exercise 13. Consider positive integers a, b, and c. (a) Suppose gcd(a, b) = 1. (i) Show that if a divides the product bc, then a must divide c. I give two proofs here, to illustrate the different methods.

More information

On the existence of primitive completely normal bases of finite fields

On the existence of primitive completely normal bases of finite fields On the existence of primitive completely normal bases of finite fields Theodoulos Garefalakis a, Giorgos Kapetanakis b, a Department of Mathematics and Applied Mathematics, University of Crete, Voutes

More information

A New Characterization of Semi-bent and Bent Functions on Finite Fields

A New Characterization of Semi-bent and Bent Functions on Finite Fields A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department

More information

MATH FINAL EXAM REVIEW HINTS

MATH FINAL EXAM REVIEW HINTS MATH 109 - FINAL EXAM REVIEW HINTS Answer: Answer: 1. Cardinality (1) Let a < b be two real numbers and define f : (0, 1) (a, b) by f(t) = (1 t)a + tb. (a) Prove that f is a bijection. (b) Prove that any

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

FURTHER REFINEMENT OF PAIRING COMPUTATION BASED ON MILLER S ALGORITHM

FURTHER REFINEMENT OF PAIRING COMPUTATION BASED ON MILLER S ALGORITHM Unspecified Journal Volume 00, Number 0, Pages 000 000 S????-????(XX)0000-0 FURTHER REFINEMENT OF PAIRING COMPUTATION BASED ON MILLER S ALGORITHM CHAO-LIANG LIU, GWOBOA HORNG, AND TE-YU CHEN Abstract.

More information

Finite Fields. [Parts from Chapter 16. Also applications of FTGT]

Finite Fields. [Parts from Chapter 16. Also applications of FTGT] Finite Fields [Parts from Chapter 16. Also applications of FTGT] Lemma [Ch 16, 4.6] Assume F is a finite field. Then the multiplicative group F := F \ {0} is cyclic. Proof Recall from basic group theory

More information

ON THE ASYMPTOTIC EFFECTIVENESS OF WEIL DESCENT ATTACKS

ON THE ASYMPTOTIC EFFECTIVENESS OF WEIL DESCENT ATTACKS ON THE ASYMPTOTIC EFFECTIVENESS OF WEIL DESCENT ATTACKS KORAY KARABINA, ALFRED MENEZES, CARL POMERANCE, AND IGOR E. SHPARLINSKI Abstract. In this paper we investigate the asymptotic effectiveness of the

More information

A PASCAL-LIKE BOUND FOR THE NUMBER OF NECKLACES WITH FIXED DENSITY

A PASCAL-LIKE BOUND FOR THE NUMBER OF NECKLACES WITH FIXED DENSITY A PASCAL-LIKE BOUND FOR THE NUMBER OF NECKLACES WITH FIXED DENSITY I. HECKENBERGER AND J. SAWADA Abstract. A bound resembling Pascal s identity is presented for binary necklaces with fixed density using

More information

Efficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields

Efficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields Efficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields ARASH REYHANI-MASOLEH and M. ANWAR HASAN University of Waterloo In this article, two digit-serial architectures for normal basis

More information

Section X.55. Cyclotomic Extensions

Section X.55. Cyclotomic Extensions X.55 Cyclotomic Extensions 1 Section X.55. Cyclotomic Extensions Note. In this section we return to a consideration of roots of unity and consider again the cyclic group of roots of unity as encountered

More information

Lecture Notes Math 371: Algebra (Fall 2006) by Nathanael Leedom Ackerman

Lecture Notes Math 371: Algebra (Fall 2006) by Nathanael Leedom Ackerman Lecture Notes Math 371: Algebra (Fall 2006) by Nathanael Leedom Ackerman October 31, 2006 TALK SLOWLY AND WRITE NEATLY!! 1 0.1 Symbolic Adjunction of Roots When dealing with subfields of C it is easy to

More information

CS 5319 Advanced Discrete Structure. Lecture 9: Introduction to Number Theory II

CS 5319 Advanced Discrete Structure. Lecture 9: Introduction to Number Theory II CS 5319 Advanced Discrete Structure Lecture 9: Introduction to Number Theory II Divisibility Outline Greatest Common Divisor Fundamental Theorem of Arithmetic Modular Arithmetic Euler Phi Function RSA

More information

Discrete Mathematics CS October 17, 2006

Discrete Mathematics CS October 17, 2006 Discrete Mathematics CS 2610 October 17, 2006 Uncountable sets Theorem: The set of real numbers is uncountable. If a subset of a set is uncountable, then the set is uncountable. The cardinality of a subset

More information

Non-generic attacks on elliptic curve DLPs

Non-generic attacks on elliptic curve DLPs Non-generic attacks on elliptic curve DLPs Benjamin Smith Team GRACE INRIA Saclay Île-de-France Laboratoire d Informatique de l École polytechnique (LIX) ECC Summer School Leuven, September 13 2013 Smith

More information

Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves

Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves Dongryeol Kim and Seongan Lim KISA (Korea Information Security Agency), 78, Garak-Dong, Songpa-Gu, Seoul 138-803, Korea {drkim, seongan}@kisa.or.kr

More information

Math 118: Advanced Number Theory. Samit Dasgupta and Gary Kirby

Math 118: Advanced Number Theory. Samit Dasgupta and Gary Kirby Math 8: Advanced Number Theory Samit Dasgupta and Gary Kirby April, 05 Contents Basics of Number Theory. The Fundamental Theorem of Arithmetic......................... The Euclidean Algorithm and Unique

More information

UNDERSTANDING RULER AND COMPASS CONSTRUCTIONS WITH FIELD THEORY

UNDERSTANDING RULER AND COMPASS CONSTRUCTIONS WITH FIELD THEORY UNDERSTANDING RULER AND COMPASS CONSTRUCTIONS WITH FIELD THEORY ISAAC M. DAVIS Abstract. By associating a subfield of R to a set of points P 0 R 2, geometric properties of ruler and compass constructions

More information

Finite Fields. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay

Finite Fields. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay 1 / 25 Finite Fields Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay September 25, 2014 2 / 25 Fields Definition A set F together

More information

The Final Exponentiation in Pairing-Based Cryptography

The Final Exponentiation in Pairing-Based Cryptography The Final Exponentiation in Pairing-Based Cryptography Barış Bülent Kırlar Department of Mathematics, Süleyman Demirel University, 3220, Isparta, Turkey Institute of Applied Mathematics, Middle East Technical

More information

Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves

Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves CT-RSA 2012 February 29th, 2012 Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves Joint work with: Nicolas Estibals CARAMEL project-team, LORIA, Université de Lorraine / CNRS / INRIA,

More information

José Felipe Voloch. Abstract: We discuss the problem of constructing elements of multiplicative high

José Felipe Voloch. Abstract: We discuss the problem of constructing elements of multiplicative high On the order of points on curves over finite fields José Felipe Voloch Abstract: We discuss the problem of constructing elements of multiplicative high order in finite fields of large degree over their

More information

On squares in Lucas sequences

On squares in Lucas sequences On squares in Lucas sequences A. Bremner N. Tzanakis July, 2006 Abstract Let P and Q be non-zero integers. The Lucas sequence {U n (P, Q)} is defined by U 0 = 0, U 1 = 1, U n = P U n 1 QU n 2 (n 2). The

More information