Gentry s ideal-lattice based encryption scheme. Gentry s STOC 09 paper - Part III

Size: px
Start display at page:

Download "Gentry s ideal-lattice based encryption scheme. Gentry s STOC 09 paper - Part III"

Transcription

1 Getry s ideal-lattice based ecryptio scheme Getry s STOC 09 paper - Part 1

2 From Micciacio's paper

3 Why ideal lattices --- as opposed to just ideals or lattices? We described a ideal-based ecryptio scheme Σ. Ec ( B ) Recall X Samp, P ad X R mod B. The scheme is correct for circuit C if x,, x X, g( C) x,, x X. Dec ( ) 1 t Ec 1 t Dec For Σ to be correct as a ordiary ecryptio scheme, we require: X X. For Σ Ec Dec to be additively ad multiplicatively homomorphic, we require: XEc + XEc XDec ad XEc XEc XDec. 3

4 Our goal is to have gc ( ) ( X ) Ec Dec circuits C, icludig the decryptio circuit D. X for deep eough Σ So, we wat to aalyze, for example, how ( ) ( ) ( ) X + X X + X X X Ec Ec Ec Ec expad, ad how to esure ( ) ( ) ( ) Ec X + X X + X X X Ec Ec Ec Ec Ec Ec Ec X Dec. Coectig ideals with lattices makes such aalysis possible, because, with R= [ x] ( f( x)), X ad X become subsets of Ec Dec ad we ca aalyze them geometrically. 4

5 statiate the ideal-based scheme To istatiate the (abstract) ideal-based ecryptio scheme usig ideal lattices, we will do the followig. Choose a polyomial ( ) let rig R= [ x] f( x). f( x) with iteger coefficiets ad Choose a elemet s R, ideal = s, B = the rotatio basis. Plaitext space M: a subset of C( B ), cetered parallelepiped. Samp: choose a rage for Samp. Samp ( ) Choose a ideal ad a good basis B. pk Let B = HNF( B ). 5

6 deal Lattices 6

7 [ x] ( f( x ) ) : a polyomial rig [ x]: the rig of all polyomials with iteger coefficiets. f( x): a moic polyomial of degree i [ x] Moic meas the leadig coefficiet is 1 Ofte choose f( x) to be irreducible. ( f( x) ) : the ideal geerated by f( x). ( f( x) ) = f( x) [ x] = { f( x) g( x): g x x } ( ) [ ]. gx ( ) h( x)mod f( x) iff g( x) hx ( ) is divisible by f( x). [ x] is divided ito classes (cosets) such that gx ( ) ad hx ( ) are i the same class (coset) iff gx ( ) hx ( )mod f( x). 7

8 [ x] ( f( x) ): [ x] ( f( x)) deotes the set of those classes (cosets). Each class has exactly oe polyomial of degree 1. Thus, [ x] ( f x ) ( ) may also be polyomials of degree 1, i.e., defied as the set of all ( ) { 1 = } a1x + a0 ai [ x] f( x) a x : Additio ad multiplicatio i [ x] ( f ( x)) are like regular polyomial additio ad multiplicatio except that the result is reduced modulo f( x). ( f x ) [ x] ( ) is a commutative rig with idetity.. 8

9 f a( x) = a x + + ax+ a ad b( x) = b x + + bx+ b, the ax ( ) + bx ( ) = ( a + b ) x + + ( a+ b) x+ ( a + b). The group [ x] ( f( x)) [x] ( f ( x)) as a additive group is isomorphic to the lattice. a + ax+ + a x ( a, a,, a ). Defie multiplicatio i by way of multiplicatio i [ x] ( f( x)), ad the we have multiplicatio i. Each ideal i [x] ( f( x)) defies a sublattice i. Lattices correspodig to ideals are ideal latti ces. 9

10 Rotatio basis for pricipal ideal ( v) Sice R= [ x] ( f( x)), we do ot distiguish betwee rig elemets i R ad lattice poits/vectors i. Ay ideal i R correspods to a lattice i. ( ) [ ] particular, the ideal v geerated by 0 v R defies a lattice with basis B= v,, v, where v i = v 0 1 x i mod f( x). This basis is called the rotatio basis for the ideal lattice ( v). Not every ideal has a rotatio basis. 10

11 Examples ( ) = R = e = [ e e v ] deal Rotatio basis,,,. deal lattice = ( ) = R= { R eve } [ e e v ] deal 2 2 all polyomials i with coefficiets. Rotatio basis: 2, 2,, all lattice poits i Correspodig lattice, 2 =. with eve coordiates ( + x) ( + ) Q: Fid the rotatio basis of 2 or 2 e e

12 [ x] ( f( x)) ad fractioal ideals [ x]: the rig of polyomials with ratioal coefficiets. { 1 } i [ x] ( f( x)) = a x + + ax+ a : a. R= x f x 1 { v [ x] ( f( x)) : v R} R. 1 f is a ideal i [ ] ( ( )), defie as 1 is a fractioal ideal. t behaves like a ideal of except that it is ot ecessarily cotaied i R.. is said to be ivertible if =. 1 1 R R All ivertible (fractioal) ideals form a group with as the idetity. R R 12

13 [x] ( f( x)) ad fractioal ideals ( ) ( ) f, the is geerated by [ ] ( ( )). = v = v v x f x v 1 exists if f( x) is irreducible. 1 defies a lattice i, ot ecessarily i. ( t ) We have de ( 1 det ) = 1. [ ] ( ) ( ) Recall: det = det B = det L( B ) = vol P( B ), the volum of the fudametal parallelepiped of the lattice defied by. det = the idex R: the umber of elemets i R. 13

14 Review Hermite oral form (HNF): a basis which is iy, ew, ad will be used as a pk. Cetered [ ) [ ] fudametal parallelepiped: // B= b,, b // P( B) xibi : xi 12, 12 i= 1 t mod B the uique t P( B) with t t L( B). tmod B ca be efficietly computed as t B B t x x rouded to the earest iteger. { } B max b : b B. i i 14

15 statiatig the ideal-based scheme usig ideal lattices 15

16 From Micciacio's paper

17 Recall: To istatiate the (abstract) ideal-based ecryptio scheme usig (ideal) lattices, we will do the followig. ( ) Choose a polyomial f( x) ad let rig R= [ x] f(). x Choose a vector s, let ideal = s, let B = the rotatio basis. ( ) Plaitext space M: a subset of P( B ). Samp: choose a rage Samp for Samp. Choose a ideal ad a good basis B. pk Let B = HNF( B ). Our goal is to have gc ( ) ( X ) circuits C, icludig the decryptio circui t D. Ec X Dec for deep eough Σ 17

18 Balls: Ec Dec B( r ) ad B( r ) Ec Ec ( M) X Samp B,. Dec X R mod B = P( B ). Defie: r the smallest radius s.t. X B ( r ), Ec r the largest radius s.t. B ( r ) X Ec Dec Dec Dec. Theorem ( a sufficiet coditio for permitted circuits): A mod B -circuit C (icludig the idetity circuit) with t 1 iputs is a permitted circuit for the schecme if: x,, x ( r ), gc ( ) 1 t Ec B ( ) x,, x B ( r ). 1 t Dec 18

19 X Ec X Dec B ( r ) Ec B ( r ) Dec 19

20 20

21 Expasio of vectors with operatios Startig from B : = B( r ), how does B expad with Ec additio ad multiplicatio? u+v u + v for all u, v R (triagle iequality). u v γ u v for all uv, R, where Mult is a factor depedet o R. Let m = γ. Mult γ Mult f iput vectors are i B( r), the after a m-fa-i additio or a 2-fa-i multiplicatio, the output vecto 2 r is i ( mr ). B 21

22 By iductio, if iput vectors are i B( r Ec ( ) Ec Ec ), the after k levels of m-fa-i additio ad/or 2-fa-i multiplicatio, k k k the result is i B( m r ) B ( mr ). We will have ( mr ) Ec 2 k r if k log log r log log mr. Dec Dec Ec Theorem: The proposed scheme correctly evaluates ( γ r ) circuits of depth up to log log r log log. To maximize the depth attempt to subject of Σ Dec Mult Ec permitted circuits, we will miimize r ad γ ad maximize to security costraits. Ec Mult Dec r 22

23 Security costraits Roughly: the ratio r r must be subexpoetial. Dec Ec Recall: the security of the abstract scheme relies o the hardess of CP. the settig of ideal lattices (where π is chose to be pk shorter tha rec ad t: = mod B ), CP becomes: Decide whether t is withi a small distace ( rec) of lattice, or is uiformly radom modulo. This is a decisio versio of BDDP, which is ot surprisig sice the abstract scheme is a variat of GGH ad the security of GGH relies o the hardess of BDDP. 23

24 Roughly: the ratio r r must be sub-expoetial. Dec Ec f r is too small, say r λ ( ) 2, BDDP ca be Ec Ec 1 solved usig, for example, the LLL algorithm. No algorithm is kow to solve BDDP if rec λ1 ( ) 2, c < 1. O the other had, by defiitio, we have rde c λ1( ). Thus, for BDDP to be hard, we require r r 2, c< 1 //sub-expoetial// Dec Ec 1 f we choose 2 c, r = Dec c γ Mult r = Ec ca hadle circuits of depth up to ( c 2 c2 c 1 2, the the scheme )log. c 24

25 Miimizig γ ( R) Mult Goal: Set f( x) so that R= [ x] ( f( x)) has a small γ ( R). Mult To this ed, we oly have to choose f( x) such that f( x) ad gx ( ) have small orms, due to the followig theorem. Theorem: f f( x) is a moic polyomial of degree the γ Mult ( ) ( R) f g, gx= Fx x x x where ( ) ( ) mod //iverse i [ ] ( ) // F( x) = x f(1 x) //reversig the coefficiets of f( x)// 2 = i = + + p a for px ( ) ax a //polyomial orm// 0 25

26 Theorem: f f( x) = x hx ( ) where hx ( ) has degree at most ( 1) k, k 2, the, for R= [ x] ( f( x)), γ Mult ( ( ) k ) ( R) ( k 1) f. Theorem: Let f( x) = x ± 1 ad R= [ x] ( f ( x)). The, γ Mult ( R). There are o-fatal attacks o hard problems over this rig. 26

27 Miimizig r Ec ( ) Let R= [ x] f( x) with f( x) = x 1 ad so γ ( R). Let s R, ad = ( s) the ideal geerated by s, Mult ( ) { } B = s,, s the rotatio basis of s, B = max s, 0 1 i L( B ) the lattice geerated by B, P( B ) the cetered fudametal parallelepiped, M P( B ) the message space, x M a message, ( ) = + 1 ( R) ( B, ) Samp B,x : x Samp s. We wat Samp M X B( r ). Samp 1 Ec Let be a upper boud o r, Ec r 1 ( R) Samp. 27

28 Theorem: r B + B. Proof : Ec Samp 1 ( ) { x r s x r } r = max + : M, Samp R. Ec 1 1 Sice x M P( B ) x s 2 B x+ r s x + i i= 0 r s B + B Samp 1. May choose s= 2 e to make B small. Q: why ot s = e? The size of Samp Samp 1 is a security. t eeds to be large eough to pk make t Samp ( R) mod B i CP sufficietly radom. May set = ad let Samp sample uiformly i B( ). 1.5 With this settig, rec

29 Maximizig r Dec Dec Dec Dec ( ψ B ) Recall: the decryptio equatio: π mod mod B. We wat B( r ) X P( B ). r To have a large, the shape of P( B ) is importat. We wat it to be "fat" (i.e. cotaiig a large ball). The "fattest" parallelepiped is that associated with basis ( ) t E= t e,, t e, cotaiig a ball of radius t. 1 So, we will choose our B to be "close" to t E. Q: why ot simply lettig B = t e,, t e? B ( ) 1 29

30 Theorem: Let t 4 s γ ( R). Suppose v t e + B( s), Mult 1 1 i.e., withi distace s of t e. Let B be the rotatio basis of v. The, P( B Proof: 1 1 ) circumscribes a ball of radius at least t 4. ( ) i 1 We have = 1,,, with i 1. The differece ( ) has legth z = v t e = v t e x s γ ( R). j j j j Mult For every poit a o the surface of P( B ), we have 1 a=± vi + 2 z = v t e a v j i B v v v = v j j j for some i ad a 1 2. j j j We will show a t 4, from which the theorem will follow. x 30

31 1 a=± vi + ajv j, aj j i 1 a ae, v, e + a v, e 2 i i i j j i j i = 1 1 t+ z, e + a z, e 2 2 i i j j i j i t 2 z, e t 2 z t 2 s γ ( R) j i j t 2 t 4 t 4, where we have used v, e = z + t e, e = t+ z, e i i i i i i i v, e = z + t e, e = z, e j i j j i j i Mult 31

32 Geeratig B ad B pk pk By the theorem, we may geerate B ad B as follows: Radomly geerate a vector v withi distace s of t e. Let B be the rotatio basis of v. Let B pk be the HNF of B. We have to choose s, t, to esure that r r is sub-expoetial. Samp Dec Ec 1 32

33 A example istatiatio of the abstract scheme ( ) γ Mult ( ) B ( e1 e) Ec { x x x } Rig: R= [ x] f( x), f( x) = x 1,. 32 deal: = 2 = 2. = 2,, 2. r Plaitext space: (a subset of) (,, ) : {0, 1}. Samp 1: samples uiformly i B( ). Samp( B, π): π+ 2 r with r Samp 1. deal: 1 i 33

34 How good is it? A improvemet over previous work. Boeh-Goh-Nissim (2005): quadratic formulas with ay umber of moomials. plaitext space: log λ bits for security prameter λ. Getry (2009): polyomials of degree log. plaitext space: larger. Not bootstrappable ye t! 34

35 Why ot bootstrappable? ( 1 ψ B B ) ψ ) Decryptio ( mod B ivolves addig vectors. Addig [ ) k-bit umbers i 0,1 requires a costat fa-i boolea circuit of depth Ω (log + log k) : 3-for-2: covert 3 umbers to 2 umbers with the same sum; this ca be doe with a circuit of costat depth, say depth c. t takes a circuit of depth clog to covert umbers to 2 umbers with the same sum. t eeds depth Ω(log k) to add the fial two umbers. The proposed scheme permits circuits of depth O(log )

36 Tweak 1 to simplify the decryptio circuit Tweak: Narrow the permitted circuits from B( r Dec ) o tb( r 2). Purpose: To esure that the ciphertexts vectors are closer to the lattice eeded to esure the correctess of decryptio. 1 Allowig the coefficiets of ( ) ψ to be very close to half-itegrs (i.e., tha they strictly eed to be, so that less precisio B ψ very close to the sphere of B( r Dec Dec is )) would require high precisio (large k) to esure correct roudig. 36

37 Lemma: f ψ is a valid ciphertext after tweak 1, 1 i.e., ψ < rdec 2, the each coefficiet of ( B ) ψ is withi 1 4 of a iteger. With Tweak 1, we ca reduce the precisio to ad cut the the circuit depth of addig Ω(log + log log ) =Ω(log ). ( r ) g( γ r ) Dec Mult Ec umbers to The ew maximum depth of permitted circuits is log log 2 loglo, origial O(log ) bits, almost the same as the depth, which ca be as large as O(log ). Ufortuately, the costat hidde i Ω (log ) is > 1, while that i O(log ) < 1. So, still ot bootstrappable. 37

38 Tweak 2, optioal, more techical, less essetial Tweak: Modify Decrypt (, ψ ) ( 1 ) ( ψ ( ψ ψ ψ ) 1 for some vector. from B B ) mod B v mod B v Purpose: To reduce the secret key size ( as well as public key size i bootstrappig) ad per-gate computatio i decryptio (from matrix-vector mult to rig mult). To use this tweak, we will eed to replace B ( rdec ) ( B 2 r ) Dec ( γ Mult B ) 38

39 Decryptio complexity of the tweaked scheme Decrypt, : ( ) ( ψ π ψ v ) ψ B = B 1 2 f Tweak 2 is used, ad is some rotatio matrix, otherwise, B = B ad B = B. ( ) mod B Split the computatio of decryptio ito three steps: 2 Step 1: Geerate vectors xi with sum B ψ. Step 2: From the vectors x, geerate iteger vectors y,, y, y with sum i xi. ( 1 ψ ) Step 3: Compute π B y mod B. i 39

40 Plaitext space As a somewhat homomorphic scheme, Getry's scheme provides a large plaitext space, However, i order to make the scheme bootstrappable, Getry Evaluate Rmod B = P( B ). has to limit the plaitext space to 0,1 mod B. evaluates mod B { } -circuits. For bootstrappig, the decryptio circuit must be composed of mod B -gates. Ordiary boolea operatios B mod operatios. ca be esaily emulated with 40

41 Decryptio complexity of the tweaked scheme Decrypt, : ( ) ( 1 2 ψ π ψ B B ψ ) 1 2 f Tweak 2 is used, B ad B is some rotatio matrix, otherwise, = B = B ad B ( k B ) 1 2 s 1. md o B Split the computatio of decryptio ito three steps: 2 Step 1: Geerate vectors i with i = ψ. Step 2: From the vectors x, geerate i teger vectors y,, y, y with i = x x B. yi = xi ( 1 ψ ) Step 3: Compute π B y mod B. i 41

42 Squashig the Decryptio Circuit 42

43 Squashig A techique to lower the complexity of the decryptio circuit, so as to make the ecryptio scheme bootstrapable. Basic idea is to split the decryptio algorithm ito two phases: computatioally itesive, secret-key idepedet, by the ecrypter. computatioally lightweight, secret-key depedet, by the decrypter : Properties: Does ot reduce the evaluatio capacity (i.e., the set of permitted circuits remais the same), but may potetially weakes security. 43

44 Squashig: geeric versio ε ε : the origial ecryptio scheme. : to be costructed from usig two algorithms, SplitKey ad ExpadCT. KeyGe( λ): ( pk, ) KeyGe ( λ) ε ( pk, ) SplitKey( pk, ) where is the (ew) secret key ad pk : = ( pk, τ ). Ecrypt( pk, π) : ψ Ecrypt ( pk, π ) x ExpadCT( pk, ψ ) //heavy use of τ // ψ (, x) ψ 44

45 Decrypt(, ψ) : decrypts ψ makig use of ad x. t is desired that Decrypt(, ψ ) works wheever Decrypt (, ψ ) does. Add( pk, ψ, ψ ) : ( ψ, ψ ) extracted from ( ψ, ψ ) Mult( pk, ψ, ψ ) : similar. 1 2 ψ Add ( pk, ψ, ψ ) x 1 2 ExpadCT( pk, ψ ) ψ ( ψ, x) 45

46 Squash: cocrete scheme ε Let be the ecryptio scheme with Tweak 2. Let v be 1 the secret key, which is a elemet of the fractioal ideal. Recall the decryptio equatio: π : = ψ ψ v mod B 1 Let ti u mod B, i U. //uiformly geerate a set of ti // Let S U be a sparse subset s.t. t = v mod B i S i SplitKey( pk, ) : { t } τ : =. pk : = ( pk, i i U τ ). : = S (ecodig of S). 46

47 ExpadCT( pk, ψ ) : //recall pk = ( pk, τ )// Compute c : = t ψ mod B for i U. i i { c } ( ψ ) i The expaded ciphertext is ψ : =,. i U Decrypt( pk, ψ ) : Recall π : = ψ ψ v mod B Recall v t mod B. i S Thus, v ψ t ψ c mod B. Thus, π : = ψ c i mod B. i S i i S i i S i 47

Lecture 11: Pseudorandom functions

Lecture 11: Pseudorandom functions COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt

More information

Lecture 9: Pseudo-random generators against space bounded computation,

Lecture 9: Pseudo-random generators against space bounded computation, Lecture 9: Pseudo-radom geerators agaist space bouded computatio, Primality Testig Topics i Pseudoradomess ad Complexity (Sprig 2018) Rutgers Uiversity Swastik Kopparty Scribes: Harsha Tirumala, Jiyu Zhag

More information

Math 299 Supplement: Real Analysis Nov 2013

Math 299 Supplement: Real Analysis Nov 2013 Math 299 Supplemet: Real Aalysis Nov 203 Algebra Axioms. I Real Aalysis, we work withi the axiomatic system of real umbers: the set R alog with the additio ad multiplicatio operatios +,, ad the iequality

More information

Polynomial identity testing and global minimum cut

Polynomial identity testing and global minimum cut CHAPTER 6 Polyomial idetity testig ad global miimum cut I this lecture we will cosider two further problems that ca be solved usig probabilistic algorithms. I the first half, we will cosider the problem

More information

Complex Numbers Solutions

Complex Numbers Solutions Complex Numbers Solutios Joseph Zoller February 7, 06 Solutios. (009 AIME I Problem ) There is a complex umber with imagiary part 64 ad a positive iteger such that Fid. [Solutio: 697] 4i + + 4i. 4i 4i

More information

We are mainly going to be concerned with power series in x, such as. (x)} converges - that is, lims N n

We are mainly going to be concerned with power series in x, such as. (x)} converges - that is, lims N n Review of Power Series, Power Series Solutios A power series i x - a is a ifiite series of the form c (x a) =c +c (x a)+(x a) +... We also call this a power series cetered at a. Ex. (x+) is cetered at

More information

Metric Space Properties

Metric Space Properties Metric Space Properties Math 40 Fial Project Preseted by: Michael Brow, Alex Cordova, ad Alyssa Sachez We have already poited out ad will recogize throughout this book the importace of compact sets. All

More information

Review of Elementary Cryptography. For more material, see my notes of CSE 5351, available on my webpage

Review of Elementary Cryptography. For more material, see my notes of CSE 5351, available on my webpage Review of Elemetary Cryptography For more material, see my otes of CSE 5351, available o my webpage Outlie Security (CPA, CCA, sematic security, idistiguishability) RSA ElGamal Homomorphic ecryptio 2 Two

More information

Modern Algebra. Previous year Questions from 2017 to Ramanasri

Modern Algebra. Previous year Questions from 2017 to Ramanasri Moder Algebra Previous year Questios from 017 to 199 Ramaasri 017 S H O P NO- 4, 1 S T F L O O R, N E A R R A P I D F L O U R M I L L S, O L D R A J E N D E R N A G A R, N E W D E L H I. W E B S I T E

More information

Optimally Sparse SVMs

Optimally Sparse SVMs A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but

More information

TEACHER CERTIFICATION STUDY GUIDE

TEACHER CERTIFICATION STUDY GUIDE COMPETENCY 1. ALGEBRA SKILL 1.1 1.1a. ALGEBRAIC STRUCTURES Kow why the real ad complex umbers are each a field, ad that particular rigs are ot fields (e.g., itegers, polyomial rigs, matrix rigs) Algebra

More information

Chapter 6 Infinite Series

Chapter 6 Infinite Series Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat

More information

6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer.

6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer. 6 Itegers Modulo I Example 2.3(e), we have defied the cogruece of two itegers a,b with respect to a modulus. Let us recall that a b (mod ) meas a b. We have proved that cogruece is a equivalece relatio

More information

ACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory

ACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory 1. Graph Theory Prove that there exist o simple plaar triagulatio T ad two distict adjacet vertices x, y V (T ) such that x ad y are the oly vertices of T of odd degree. Do ot use the Four-Color Theorem.

More information

Lecture Notes for Analysis Class

Lecture Notes for Analysis Class Lecture Notes for Aalysis Class Topological Spaces A topology for a set X is a collectio T of subsets of X such that: (a) X ad the empty set are i T (b) Uios of elemets of T are i T (c) Fiite itersectios

More information

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee

More information

Lecture 2. The Lovász Local Lemma

Lecture 2. The Lovász Local Lemma Staford Uiversity Sprig 208 Math 233A: No-costructive methods i combiatorics Istructor: Ja Vodrák Lecture date: Jauary 0, 208 Origial scribe: Apoorva Khare Lecture 2. The Lovász Local Lemma 2. Itroductio

More information

1 Generating functions for balls in boxes

1 Generating functions for balls in boxes Math 566 Fall 05 Some otes o geeratig fuctios Give a sequece a 0, a, a,..., a,..., a geeratig fuctio some way of represetig the sequece as a fuctio. There are may ways to do this, with the most commo ways

More information

Math 113, Calculus II Winter 2007 Final Exam Solutions

Math 113, Calculus II Winter 2007 Final Exam Solutions Math, Calculus II Witer 7 Fial Exam Solutios (5 poits) Use the limit defiitio of the defiite itegral ad the sum formulas to compute x x + dx The check your aswer usig the Evaluatio Theorem Solutio: I this

More information

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3 MATH 337 Sequeces Dr. Neal, WKU Let X be a metric space with distace fuctio d. We shall defie the geeral cocept of sequece ad limit i a metric space, the apply the results i particular to some special

More information

1 Hash tables. 1.1 Implementation

1 Hash tables. 1.1 Implementation Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a

More information

Analytic Continuation

Analytic Continuation Aalytic Cotiuatio The stadard example of this is give by Example Let h (z) = 1 + z + z 2 + z 3 +... kow to coverge oly for z < 1. I fact h (z) = 1/ (1 z) for such z. Yet H (z) = 1/ (1 z) is defied for

More information

CHAPTER I: Vector Spaces

CHAPTER I: Vector Spaces CHAPTER I: Vector Spaces Sectio 1: Itroductio ad Examples This first chapter is largely a review of topics you probably saw i your liear algebra course. So why cover it? (1) Not everyoe remembers everythig

More information

The multiplicative structure of finite field and a construction of LRC

The multiplicative structure of finite field and a construction of LRC IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio

More information

11. FINITE FIELDS. Example 1: The following tables define addition and multiplication for a field of order 4.

11. FINITE FIELDS. Example 1: The following tables define addition and multiplication for a field of order 4. 11. FINITE FIELDS 11.1. A Field With 4 Elemets Probably the oly fiite fields which you ll kow about at this stage are the fields of itegers modulo a prime p, deoted by Z p. But there are others. Now although

More information

APPENDIX F Complex Numbers

APPENDIX F Complex Numbers APPENDIX F Complex Numbers Operatios with Complex Numbers Complex Solutios of Quadratic Equatios Polar Form of a Complex Number Powers ad Roots of Complex Numbers Operatios with Complex Numbers Some equatios

More information

Solutions to Math 347 Practice Problems for the final

Solutions to Math 347 Practice Problems for the final Solutios to Math 347 Practice Problems for the fial 1) True or False: a) There exist itegers x,y such that 50x + 76y = 6. True: the gcd of 50 ad 76 is, ad 6 is a multiple of. b) The ifiimum of a set is

More information

PRELIM PROBLEM SOLUTIONS

PRELIM PROBLEM SOLUTIONS PRELIM PROBLEM SOLUTIONS THE GRAD STUDENTS + KEN Cotets. Complex Aalysis Practice Problems 2. 2. Real Aalysis Practice Problems 2. 4 3. Algebra Practice Problems 2. 8. Complex Aalysis Practice Problems

More information

1 Summary: Binary and Logic

1 Summary: Binary and Logic 1 Summary: Biary ad Logic Biary Usiged Represetatio : each 1-bit is a power of two, the right-most is for 2 0 : 0110101 2 = 2 5 + 2 4 + 2 2 + 2 0 = 32 + 16 + 4 + 1 = 53 10 Usiged Rage o bits is [0...2

More information

Introduction to Optimization Techniques

Introduction to Optimization Techniques Itroductio to Optimizatio Techiques Basic Cocepts of Aalysis - Real Aalysis, Fuctioal Aalysis 1 Basic Cocepts of Aalysis Liear Vector Spaces Defiitio: A vector space X is a set of elemets called vectors

More information

On Random Line Segments in the Unit Square

On Random Line Segments in the Unit Square O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,

More information

Lesson 10: Limits and Continuity

Lesson 10: Limits and Continuity www.scimsacademy.com Lesso 10: Limits ad Cotiuity SCIMS Academy 1 Limit of a fuctio The cocept of limit of a fuctio is cetral to all other cocepts i calculus (like cotiuity, derivative, defiite itegrals

More information

In number theory we will generally be working with integers, though occasionally fractions and irrationals will come into play.

In number theory we will generally be working with integers, though occasionally fractions and irrationals will come into play. Number Theory Math 5840 otes. Sectio 1: Axioms. I umber theory we will geerally be workig with itegers, though occasioally fractios ad irratioals will come ito play. Notatio: Z deotes the set of all itegers

More information

Math 220A Fall 2007 Homework #2. Will Garner A

Math 220A Fall 2007 Homework #2. Will Garner A Math 0A Fall 007 Homewor # Will Garer Pg 3 #: Show that {cis : a o-egative iteger} is dese i T = {z œ : z = }. For which values of q is {cis(q): a o-egative iteger} dese i T? To show that {cis : a o-egative

More information

6.003 Homework #3 Solutions

6.003 Homework #3 Solutions 6.00 Homework # Solutios Problems. Complex umbers a. Evaluate the real ad imagiary parts of j j. π/ Real part = Imagiary part = 0 e Euler s formula says that j = e jπ/, so jπ/ j π/ j j = e = e. Thus the

More information

Sequences and Series of Functions

Sequences and Series of Functions Chapter 6 Sequeces ad Series of Fuctios 6.1. Covergece of a Sequece of Fuctios Poitwise Covergece. Defiitio 6.1. Let, for each N, fuctio f : A R be defied. If, for each x A, the sequece (f (x)) coverges

More information

lim za n n = z lim a n n.

lim za n n = z lim a n n. Lecture 6 Sequeces ad Series Defiitio 1 By a sequece i a set A, we mea a mappig f : N A. It is customary to deote a sequece f by {s } where, s := f(). A sequece {z } of (complex) umbers is said to be coverget

More information

The Growth of Functions. Theoretical Supplement

The Growth of Functions. Theoretical Supplement The Growth of Fuctios Theoretical Supplemet The Triagle Iequality The triagle iequality is a algebraic tool that is ofte useful i maipulatig absolute values of fuctios. The triagle iequality says that

More information

Complex Analysis Spring 2001 Homework I Solution

Complex Analysis Spring 2001 Homework I Solution Complex Aalysis Sprig 2001 Homework I Solutio 1. Coway, Chapter 1, sectio 3, problem 3. Describe the set of poits satisfyig the equatio z a z + a = 2c, where c > 0 ad a R. To begi, we see from the triagle

More information

Chapter 2. Periodic points of toral. automorphisms. 2.1 General introduction

Chapter 2. Periodic points of toral. automorphisms. 2.1 General introduction Chapter 2 Periodic poits of toral automorphisms 2.1 Geeral itroductio The automorphisms of the two-dimesioal torus are rich mathematical objects possessig iterestig geometric, algebraic, topological ad

More information

Addition: Property Name Property Description Examples. a+b = b+a. a+(b+c) = (a+b)+c

Addition: Property Name Property Description Examples. a+b = b+a. a+(b+c) = (a+b)+c Notes for March 31 Fields: A field is a set of umbers with two (biary) operatios (usually called additio [+] ad multiplicatio [ ]) such that the followig properties hold: Additio: Name Descriptio Commutativity

More information

The Boolean Ring of Intervals

The Boolean Ring of Intervals MATH 532 Lebesgue Measure Dr. Neal, WKU We ow shall apply the results obtaied about outer measure to the legth measure o the real lie. Throughout, our space X will be the set of real umbers R. Whe ecessary,

More information

CALCULUS BASIC SUMMER REVIEW

CALCULUS BASIC SUMMER REVIEW CALCULUS BASIC SUMMER REVIEW NAME rise y y y Slope of a o vertical lie: m ru Poit Slope Equatio: y y m( ) The slope is m ad a poit o your lie is, ). ( y Slope-Itercept Equatio: y m b slope= m y-itercept=

More information

10-701/ Machine Learning Mid-term Exam Solution

10-701/ Machine Learning Mid-term Exam Solution 0-70/5-78 Machie Learig Mid-term Exam Solutio Your Name: Your Adrew ID: True or False (Give oe setece explaatio) (20%). (F) For a cotiuous radom variable x ad its probability distributio fuctio p(x), it

More information

Chapter 2 The Solution of Numerical Algebraic and Transcendental Equations

Chapter 2 The Solution of Numerical Algebraic and Transcendental Equations Chapter The Solutio of Numerical Algebraic ad Trascedetal Equatios Itroductio I this chapter we shall discuss some umerical methods for solvig algebraic ad trascedetal equatios. The equatio f( is said

More information

Lecture 2 Clustering Part II

Lecture 2 Clustering Part II COMS 4995: Usupervised Learig (Summer 8) May 24, 208 Lecture 2 Clusterig Part II Istructor: Nakul Verma Scribes: Jie Li, Yadi Rozov Today, we will be talkig about the hardess results for k-meas. More specifically,

More information

RADICAL EXPRESSION. If a and x are real numbers and n is a positive integer, then x is an. n th root theorems: Example 1 Simplify

RADICAL EXPRESSION. If a and x are real numbers and n is a positive integer, then x is an. n th root theorems: Example 1 Simplify Example 1 Simplify 1.2A Radical Operatios a) 4 2 b) 16 1 2 c) 16 d) 2 e) 8 1 f) 8 What is the relatioship betwee a, b, c? What is the relatioship betwee d, e, f? If x = a, the x = = th root theorems: RADICAL

More information

, then cv V. Differential Equations Elements of Lineaer Algebra Name: Consider the differential equation. and y2 cos( kx)

, then cv V. Differential Equations Elements of Lineaer Algebra Name: Consider the differential equation. and y2 cos( kx) Cosider the differetial equatio y '' k y 0 has particular solutios y1 si( kx) ad y cos( kx) I geeral, ay liear combiatio of y1 ad y, cy 1 1 cy where c1, c is also a solutio to the equatio above The reaso

More information

Definitions and Theorems. where x are the decision variables. c, b, and a are constant coefficients.

Definitions and Theorems. where x are the decision variables. c, b, and a are constant coefficients. Defiitios ad Theorems Remember the scalar form of the liear programmig problem, Miimize, Subject to, f(x) = c i x i a 1i x i = b 1 a mi x i = b m x i 0 i = 1,2,, where x are the decisio variables. c, b,

More information

Machine Learning Theory Tübingen University, WS 2016/2017 Lecture 11

Machine Learning Theory Tübingen University, WS 2016/2017 Lecture 11 Machie Learig Theory Tübige Uiversity, WS 06/07 Lecture Tolstikhi Ilya Abstract We will itroduce the otio of reproducig kerels ad associated Reproducig Kerel Hilbert Spaces (RKHS). We will cosider couple

More information

A Simple Derivation for the Frobenius Pseudoprime Test

A Simple Derivation for the Frobenius Pseudoprime Test A Simple Derivatio for the Frobeius Pseudoprime Test Daiel Loebeberger Bo-Aache Iteratioal Ceter for Iformatio Techology March 17, 2008 Abstract Probabilistic compositeess tests are of great practical

More information

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function.

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function. MATH 532 Measurable Fuctios Dr. Neal, WKU Throughout, let ( X, F, µ) be a measure space ad let (!, F, P ) deote the special case of a probability space. We shall ow begi to study real-valued fuctios defied

More information

w (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ.

w (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ. 2 5. Weighted umber of late jobs 5.1. Release dates ad due dates: maximimizig the weight of o-time jobs Oce we add release dates, miimizig the umber of late jobs becomes a sigificatly harder problem. For

More information

18.01 Calculus Jason Starr Fall 2005

18.01 Calculus Jason Starr Fall 2005 Lecture 18. October 5, 005 Homework. Problem Set 5 Part I: (c). Practice Problems. Course Reader: 3G 1, 3G, 3G 4, 3G 5. 1. Approximatig Riema itegrals. Ofte, there is o simpler expressio for the atiderivative

More information

6.867 Machine learning, lecture 7 (Jaakkola) 1

6.867 Machine learning, lecture 7 (Jaakkola) 1 6.867 Machie learig, lecture 7 (Jaakkola) 1 Lecture topics: Kerel form of liear regressio Kerels, examples, costructio, properties Liear regressio ad kerels Cosider a slightly simpler model where we omit

More information

Real Numbers R ) - LUB(B) may or may not belong to B. (Ex; B= { y: y = 1 x, - Note that A B LUB( A) LUB( B)

Real Numbers R ) - LUB(B) may or may not belong to B. (Ex; B= { y: y = 1 x, - Note that A B LUB( A) LUB( B) Real Numbers The least upper boud - Let B be ay subset of R B is bouded above if there is a k R such that x k for all x B - A real umber, k R is a uique least upper boud of B, ie k = LUB(B), if () k is

More information

A) is empty. B) is a finite set. C) can be a countably infinite set. D) can be an uncountable set.

A) is empty. B) is a finite set. C) can be a countably infinite set. D) can be an uncountable set. M.A./M.Sc. (Mathematics) Etrace Examiatio 016-17 Max Time: hours Max Marks: 150 Istructios: There are 50 questios. Every questio has four choices of which exactly oe is correct. For correct aswer, 3 marks

More information

MATH 205 HOMEWORK #2 OFFICIAL SOLUTION. (f + g)(x) = f(x) + g(x) = f( x) g( x) = (f + g)( x)

MATH 205 HOMEWORK #2 OFFICIAL SOLUTION. (f + g)(x) = f(x) + g(x) = f( x) g( x) = (f + g)( x) MATH 205 HOMEWORK #2 OFFICIAL SOLUTION Problem 2: Do problems 7-9 o page 40 of Hoffma & Kuze. (7) We will prove this by cotradictio. Suppose that W 1 is ot cotaied i W 2 ad W 2 is ot cotaied i W 1. The

More information

NICK DUFRESNE. 1 1 p(x). To determine some formulas for the generating function of the Schröder numbers, r(x) = a(x) =

NICK DUFRESNE. 1 1 p(x). To determine some formulas for the generating function of the Schröder numbers, r(x) = a(x) = AN INTRODUCTION TO SCHRÖDER AND UNKNOWN NUMBERS NICK DUFRESNE Abstract. I this article we will itroduce two types of lattice paths, Schröder paths ad Ukow paths. We will examie differet properties of each,

More information

Introduction to Optimization Techniques. How to Solve Equations

Introduction to Optimization Techniques. How to Solve Equations Itroductio to Optimizatio Techiques How to Solve Equatios Iterative Methods of Optimizatio Iterative methods of optimizatio Solutio of the oliear equatios resultig form a optimizatio problem is usually

More information

HOMEWORK #10 SOLUTIONS

HOMEWORK #10 SOLUTIONS Math 33 - Aalysis I Sprig 29 HOMEWORK # SOLUTIONS () Prove that the fuctio f(x) = x 3 is (Riema) itegrable o [, ] ad show that x 3 dx = 4. (Without usig formulae for itegratio that you leart i previous

More information

Recursive Algorithms. Recurrences. Recursive Algorithms Analysis

Recursive Algorithms. Recurrences. Recursive Algorithms Analysis Recursive Algorithms Recurreces Computer Sciece & Egieerig 35: Discrete Mathematics Christopher M Bourke cbourke@cseuledu A recursive algorithm is oe i which objects are defied i terms of other objects

More information

Ma 530 Introduction to Power Series

Ma 530 Introduction to Power Series Ma 530 Itroductio to Power Series Please ote that there is material o power series at Visual Calculus. Some of this material was used as part of the presetatio of the topics that follow. What is a Power

More information

x x x Using a second Taylor polynomial with remainder, find the best constant C so that for x 0,

x x x Using a second Taylor polynomial with remainder, find the best constant C so that for x 0, Math Activity 9( Due with Fial Eam) Usig first ad secod Taylor polyomials with remaider, show that for, 8 Usig a secod Taylor polyomial with remaider, fid the best costat C so that for, C 9 The th Derivative

More information

Sequences. Notation. Convergence of a Sequence

Sequences. Notation. Convergence of a Sequence Sequeces A sequece is essetially just a list. Defiitio (Sequece of Real Numbers). A sequece of real umbers is a fuctio Z (, ) R for some real umber. Do t let the descriptio of the domai cofuse you; it

More information

CS / MCS 401 Homework 3 grader solutions

CS / MCS 401 Homework 3 grader solutions CS / MCS 401 Homework 3 grader solutios assigmet due July 6, 016 writte by Jāis Lazovskis maximum poits: 33 Some questios from CLRS. Questios marked with a asterisk were ot graded. 1 Use the defiitio of

More information

End-of-Year Contest. ERHS Math Club. May 5, 2009

End-of-Year Contest. ERHS Math Club. May 5, 2009 Ed-of-Year Cotest ERHS Math Club May 5, 009 Problem 1: There are 9 cois. Oe is fake ad weighs a little less tha the others. Fid the fake coi by weighigs. Solutio: Separate the 9 cois ito 3 groups (A, B,

More information

1. (25 points) Use the limit definition of the definite integral and the sum formulas 1 to compute

1. (25 points) Use the limit definition of the definite integral and the sum formulas 1 to compute Math, Calculus II Fial Eam Solutios. 5 poits) Use the limit defiitio of the defiite itegral ad the sum formulas to compute 4 d. The check your aswer usig the Evaluatio Theorem. ) ) Solutio: I this itegral,

More information

# fixed points of g. Tree to string. Repeatedly select the leaf with the smallest label, write down the label of its neighbour and remove the leaf.

# fixed points of g. Tree to string. Repeatedly select the leaf with the smallest label, write down the label of its neighbour and remove the leaf. Combiatorics Graph Theory Coutig labelled ad ulabelled graphs There are 2 ( 2) labelled graphs of order. The ulabelled graphs of order correspod to orbits of the actio of S o the set of labelled graphs.

More information

5. Matrix exponentials and Von Neumann s theorem The matrix exponential. For an n n matrix X we define

5. Matrix exponentials and Von Neumann s theorem The matrix exponential. For an n n matrix X we define 5. Matrix expoetials ad Vo Neuma s theorem 5.1. The matrix expoetial. For a matrix X we defie e X = exp X = I + X + X2 2! +... = 0 X!. We assume that the etries are complex so that exp is well defied o

More information

Fall 2013 MTH431/531 Real analysis Section Notes

Fall 2013 MTH431/531 Real analysis Section Notes Fall 013 MTH431/531 Real aalysis Sectio 8.1-8. Notes Yi Su 013.11.1 1. Defiitio of uiform covergece. We look at a sequece of fuctios f (x) ad study the coverget property. Notice we have two parameters

More information

PRACTICE FINAL/STUDY GUIDE SOLUTIONS

PRACTICE FINAL/STUDY GUIDE SOLUTIONS Last edited December 9, 03 at 4:33pm) Feel free to sed me ay feedback, icludig commets, typos, ad mathematical errors Problem Give the precise meaig of the followig statemets i) a f) L ii) a + f) L iii)

More information

Last time, we talked about how Equation (1) can simulate Equation (2). We asserted that Equation (2) can also simulate Equation (1).

Last time, we talked about how Equation (1) can simulate Equation (2). We asserted that Equation (2) can also simulate Equation (1). 6896 Quatum Complexity Theory Sept 23, 2008 Lecturer: Scott Aaroso Lecture 6 Last Time: Quatum Error-Correctio Quatum Query Model Deutsch-Jozsa Algorithm (Computes x y i oe query) Today: Berstei-Vazirii

More information

Lecture 19: Convergence

Lecture 19: Convergence Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may

More information

7. Modern Techniques. Data Encryption Standard (DES)

7. Modern Techniques. Data Encryption Standard (DES) 7. Moder Techiques. Data Ecryptio Stadard (DES) The objective of this chapter is to illustrate the priciples of moder covetioal ecryptio. For this purpose, we focus o the most widely used covetioal ecryptio

More information

6.895 Essential Coding Theory October 20, Lecture 11. This lecture is focused in comparisons of the following properties/parameters of a code:

6.895 Essential Coding Theory October 20, Lecture 11. This lecture is focused in comparisons of the following properties/parameters of a code: 6.895 Essetial Codig Theory October 0, 004 Lecture 11 Lecturer: Madhu Suda Scribe: Aastasios Sidiropoulos 1 Overview This lecture is focused i comparisos of the followig properties/parameters of a code:

More information

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet

More information

REVISION SHEET FP1 (MEI) ALGEBRA. Identities In mathematics, an identity is a statement which is true for all values of the variables it contains.

REVISION SHEET FP1 (MEI) ALGEBRA. Identities In mathematics, an identity is a statement which is true for all values of the variables it contains. The mai ideas are: Idetities REVISION SHEET FP (MEI) ALGEBRA Before the exam you should kow: If a expressio is a idetity the it is true for all values of the variable it cotais The relatioships betwee

More information

CS284A: Representations and Algorithms in Molecular Biology

CS284A: Representations and Algorithms in Molecular Biology CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by

More information

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,

More information

Math 61CM - Solutions to homework 3

Math 61CM - Solutions to homework 3 Math 6CM - Solutios to homework 3 Cédric De Groote October 2 th, 208 Problem : Let F be a field, m 0 a fixed oegative iteger ad let V = {a 0 + a x + + a m x m a 0,, a m F} be the vector space cosistig

More information

Zeros of Polynomials

Zeros of Polynomials Math 160 www.timetodare.com 4.5 4.6 Zeros of Polyomials I these sectios we will study polyomials algebraically. Most of our work will be cocered with fidig the solutios of polyomial equatios of ay degree

More information

Lecture 1: Basic problems of coding theory

Lecture 1: Basic problems of coding theory Lecture 1: Basic problems of codig theory Error-Correctig Codes (Sprig 016) Rutgers Uiversity Swastik Kopparty Scribes: Abhishek Bhrushudi & Aditya Potukuchi Admiistrivia was discussed at the begiig of

More information

Lecture 4: Unique-SAT, Parity-SAT, and Approximate Counting

Lecture 4: Unique-SAT, Parity-SAT, and Approximate Counting Advaced Complexity Theory Sprig 206 Lecture 4: Uique-SAT, Parity-SAT, ad Approximate Coutig Prof. Daa Moshkovitz Scribe: Aoymous Studet Scribe Date: Fall 202 Overview I this lecture we begi talkig about

More information

Appendix F: Complex Numbers

Appendix F: Complex Numbers Appedix F Complex Numbers F1 Appedix F: Complex Numbers Use the imagiary uit i to write complex umbers, ad to add, subtract, ad multiply complex umbers. Fid complex solutios of quadratic equatios. Write

More information

Fully homomorphic encryption scheme using ideal lattices. Gentry s STOC 09 paper - Part II

Fully homomorphic encryption scheme using ideal lattices. Gentry s STOC 09 paper - Part II Fully homomorphic encryption scheme using ideal lattices Gentry s STOC 09 paper - Part GGH cryptosystem Gentry s scheme is a GGH-like scheme. GGH: Goldreich, Goldwasser, Halevi. ased on the hardness of

More information

Seunghee Ye Ma 8: Week 5 Oct 28

Seunghee Ye Ma 8: Week 5 Oct 28 Week 5 Summary I Sectio, we go over the Mea Value Theorem ad its applicatios. I Sectio 2, we will recap what we have covered so far this term. Topics Page Mea Value Theorem. Applicatios of the Mea Value

More information

MA131 - Analysis 1. Workbook 2 Sequences I

MA131 - Analysis 1. Workbook 2 Sequences I MA3 - Aalysis Workbook 2 Sequeces I Autum 203 Cotets 2 Sequeces I 2. Itroductio.............................. 2.2 Icreasig ad Decreasig Sequeces................ 2 2.3 Bouded Sequeces..........................

More information

ROSE WONG. f(1) f(n) where L the average value of f(n). In this paper, we will examine averages of several different arithmetic functions.

ROSE WONG. f(1) f(n) where L the average value of f(n). In this paper, we will examine averages of several different arithmetic functions. AVERAGE VALUES OF ARITHMETIC FUNCTIONS ROSE WONG Abstract. I this paper, we will preset problems ivolvig average values of arithmetic fuctios. The arithmetic fuctios we discuss are: (1)the umber of represetatios

More information

REGRESSION WITH QUADRATIC LOSS

REGRESSION WITH QUADRATIC LOSS REGRESSION WITH QUADRATIC LOSS MAXIM RAGINSKY Regressio with quadratic loss is aother basic problem studied i statistical learig theory. We have a radom couple Z = X, Y ), where, as before, X is a R d

More information

A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece,, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet as

More information

Week 5-6: The Binomial Coefficients

Week 5-6: The Binomial Coefficients Wee 5-6: The Biomial Coefficiets March 6, 2018 1 Pascal Formula Theorem 11 (Pascal s Formula For itegers ad such that 1, ( ( ( 1 1 + 1 The umbers ( 2 ( 1 2 ( 2 are triagle umbers, that is, The petago umbers

More information

Fundamental Theorem of Algebra. Yvonne Lai March 2010

Fundamental Theorem of Algebra. Yvonne Lai March 2010 Fudametal Theorem of Algebra Yvoe Lai March 010 We prove the Fudametal Theorem of Algebra: Fudametal Theorem of Algebra. Let f be a o-costat polyomial with real coefficiets. The f has at least oe complex

More information

4.1 Sigma Notation and Riemann Sums

4.1 Sigma Notation and Riemann Sums 0 the itegral. Sigma Notatio ad Riema Sums Oe strategy for calculatig the area of a regio is to cut the regio ito simple shapes, calculate the area of each simple shape, ad the add these smaller areas

More information

Chimica Inorganica 3

Chimica Inorganica 3 himica Iorgaica Irreducible Represetatios ad haracter Tables Rather tha usig geometrical operatios, it is ofte much more coveiet to employ a ew set of group elemets which are matrices ad to make the rule

More information

CS161 Handout 05 Summer 2013 July 10, 2013 Mathematical Terms and Identities

CS161 Handout 05 Summer 2013 July 10, 2013 Mathematical Terms and Identities CS161 Hadout 05 Summer 2013 July 10, 2013 Mathematical Terms ad Idetities Thaks to Ady Nguye ad Julie Tibshirai for their advice o this hadout. This hadout covers mathematical otatio ad idetities that

More information

Recitation 4: Lagrange Multipliers and Integration

Recitation 4: Lagrange Multipliers and Integration Math 1c TA: Padraic Bartlett Recitatio 4: Lagrage Multipliers ad Itegratio Week 4 Caltech 211 1 Radom Questio Hey! So, this radom questio is pretty tightly tied to today s lecture ad the cocept of cotet

More information

(for homogeneous primes P ) defining global complex algebraic geometry. Definition: (a) A subset V CP n is algebraic if there is a homogeneous

(for homogeneous primes P ) defining global complex algebraic geometry. Definition: (a) A subset V CP n is algebraic if there is a homogeneous Math 6130 Notes. Fall 2002. 4. Projective Varieties ad their Sheaves of Regular Fuctios. These are the geometric objects associated to the graded domais: C[x 0,x 1,..., x ]/P (for homogeeous primes P )

More information

Quantum Computing Lecture 7. Quantum Factoring

Quantum Computing Lecture 7. Quantum Factoring Quatum Computig Lecture 7 Quatum Factorig Maris Ozols Quatum factorig A polyomial time quatum algorithm for factorig umbers was published by Peter Shor i 1994. Polyomial time meas that the umber of gates

More information

Machine Learning Brett Bernstein

Machine Learning Brett Bernstein Machie Learig Brett Berstei Week Lecture: Cocept Check Exercises Starred problems are optioal. Statistical Learig Theory. Suppose A = Y = R ad X is some other set. Furthermore, assume P X Y is a discrete

More information