Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
|
|
- Sophia Williamson
- 6 years ago
- Views:
Transcription
1 H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence & IT Department of Appled Mathematcs Pt. Ravshanker Shukla Unversty Rungta College of Engneerng &Technology Rapur (C.G.) Inda Bhla (C.G.) Inda Abstract. The basc operaton n ellptc curve cryptosystem s scalar multplcaton. It s the computaton of nteger multple of a gven pont on the curve. Computaton of scalar multple s faster by usng sgned bnary representaton as compared to bnary representaton. In ths paper Drect Recodng Method a new modfed algorthm for computaton of sgned bnary representaton s proposed. Our proposed method s effcent when compared to other standard methods such as NAF, MOF and complementary recodng method. Keywords. Ellptc curve cryptography, Scalar multplcaton, Sgned bnary method, NAF, MOF, Complementary recodng. 1. Introducton Ellptc curve Cryptography was ndepen dently ntroduced by Mller [1] and Kobltz [2] n Snce then t has ganed wde acceptance manly due to ts smaller key sze and greater securty. Scalar multp lcaton s the central operaton of ellptc curve cryptosystem. It nvolves comput aton of kp where k s the secret key (scalar) and P a pont on the ellptc curve. Sgnfcant methods to optmze ECC operatons have been proposed. In ths paper we ntroduce Drect Recodng an effcent method to compute KP effcently. For 2 (p+1) > k > 2 p, k = (2 p+1 ) 2 (2 p+1 k) 2. As ths computaton uses only btwse subtracton t gves the sgned bnary representaton wth the lowest hammng weght. The rest of the paper s organzed as follows. We start wth the ntroducton of Bnary method along wth the computaton of scalar multplcaton n secton 2. Sgned bnary NAF and MOF methods wth ther algorthms for computaton of scalar multplcatons are presented n Sectons 3 and 4 respectvely. In Secton 5 we explan the Complementary recodng method based on NAF and fnally n Secton 6 we explan our proposed method wth examples. Also the run tme of varous scalar multplcaton algorthms are presented n ths secton. 2. Bnary Method Scalar pont multplcaton s the man cryptographc operaton n ECC whch computes Q = kp, a pont P s multpled by an nteger k resultng n another pont Q on the ellptc curve. Bnary method [3] s the tradtonal scalar multplcaton method based on the bnary expanson of the scalar k usng (0, 1). If k has bnary representaton (k l-1, k l-2,,k 0 ) 2 where k Є (0, 1) then k = 0 k 0 k 2. Gven an ellptc pont P, kp 2 P = k 0 P + k P + k P +..+ k l-1 2 l-1 P. = k 0 P + 2(k 1 P + 2(k 2 P +. +2(k l-2 P +2(k l-1 P)..)..e., t uses repeated ellptc curve pont addton and doublng operatons. Ths method scans the bts of k ether from left to rght or rght to left. Algorthm for the computaton of KP s gven below. Algorthm 1. Left-to-rght bnary method for pont multplcaton. Input: Bnary representaton of k and pont P. Output: Q = kp. 1. Q =. 2. For = l-1 to 0 do 2.1 Q = 2Q (Doublng). 2.2 If k = 1 then Q = Q + P (Addton). 3. Return Q. The runnng tme of an algorthm s determned as how many operatons are performed throughout ts ISSN :
2 H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng executon. If k s l then a pont addton s performed and the expected number of ones (hammng weght) n the bnary representaton of k s half of ts length.e., l/2. Fnally a doublng s performed for each value of I.e., l tmes. Therefore the expected runnng tme s l/2 addtons + l doublngs denoted as 2 l A + l D. Example 1. Let k = 26 and P a pont on the ellptc curve E. Gven the bnary expanson of k as 26 = = (11010) 2. The scalar multplcaton denoted by 26P by usng Algorthm 1 would be as follows: 26 P = ( 2 ( 2 2 ( 2P + P) + P )..e., t requres 2 addtons and 4 doublngs. 3. Non Adjacent Form The densty of the bnary expanson can be effectvely reduced wth a sgned bnary representaton [7] that uses elements n the set (-1, 0, 1). Sgned bnary representaton was frst proposed by Booth [4] n Later Retwesner [5] gave a constructve proof that every postve nteger can be unquely represented wth fewest number of non-zero dgts (mnmum hammng weght) whch s called Non Adjacent Form or NAF. In ths form nteger k s represented as k = k 2 where K Є (-1, 0, 1). 0 Algorthm 2. Computaton of NAF of an nteger k. Input: A Postve nteger k. Output: NAF of k (k l-1.k 2 k 1 k 0 ) NAF. 1. = Whle k 0 do 2.1 If k s odd k = 2 - (k mod4), k = k - k ; 2.2 Else k = k = k/2, = Return (k -1 k -2.k 1 k 0 ). NAF method uses both addton and subtracton operatons [6] but subtracton of ponts on ellktc curves s smlar to addton operaton. Hence runnng l tme of NAF s A + ld.e., t reduces the 3 l l hammng weght from to 2 3. Example 2. NAF of k = 687 s 687 = = ( ) NAF = , the hammng weght s 5.e. t uses 5 addton (subtracton equvalent to ad dton) operatons whle the bnary representaton of 687 s = ( ) 2. the hammng weght s 7. By NAF hammng weght of k s reduced from 7 to 5.e. 2 addton operatons have been saved. 4. Mutual Opposte Form (MOF) MOF Mutual Opposte form s an effcent left to rght recodng scheme proposed by Okeya [7] that satsfes the followng propertes: 1. The sgns of adjacent non-zero bts (wthout consderng 0 bts) are opposte. 2. The most nonzero bt and the least nonzero bt are 1 and -1 respectvely. Convertng bnary strng to MOF: The n-bt bnary strng k can be converted to a sgned bnary strng by computng mk = 2k - k where - stands for a btwse subtracton. 2k = k n-1 k n-2... k -1...k 1 k 0. - k = k n-1... k...k 2 k 1 k 0. mk = k n-1 k n-2 - k n-1 k -1 - k.k 1 - k 2 k 0 - k 1 k 0 Algorthm 3: Left to rght generaton from Bnary to MOF. Input: A non-zero n-bt bnary strng k = k n 1 k n 2..k 1 k 0. Output: MOF of k (mk n...mk 1 mk 0 ). 1. mk n = k n-1 2. For = n -1 to 0 do 2.1 mk = k 1 - k. 2.1 mk 0 = - k. 3. Return mk n, mk n 1,...mk 1, mk 0. ISSN :
3 H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Example 3. Let k = 27, MOF of k s = ( ). Lke bnary method MOF scans the bts ether from left to rght [8] or from rght to left. 5. Complementary Recodng Technque Gven the bnary representaton of a scalar k = (k l 1.k 1 k 0 ) 2 the procedure for convertng bnary strng nto sgned bnary strng usng complementary method ([9], [10]) s gven below: K = 0 where k = 1 k 2 = ( ) (l+1) bts - k - 1 k k 2 k 0 and k = 0 f k = 1 k = 1 f k = 0 for = 0, 1,..., l-1. Example 4. For k = 687 = ( ) 2, by the above method K = ( ) (10 +1) bts - ( ) - 1 = ( ).e., t gves the same output as NAF but by usng the complement of k. 6. Proposed method (Drect Recodng method) Accordng to our proposed method the procedure for convertng the scalar k nto sgned bnary representaton s as follows: For any scalar k where 2 p+1 > k > 2 p, we have K = (2 p+1 ) 2 - (2 p+1 -k) 2. Snce ths method uses only sngle operaton of btwse subtracton wth 0-1 = 1 t gves the sgned bnary representaton wth the lowest hammng weght and n the least possble tme. Hence ths method can be called as Drect recodng method. The output of ths method s also smlar to other standard recodng methods such as NAF, MOF, and complementary recodng. Algorthm 4: Scalar multplcaton usng Proposed method. Input: Sgned bnary representaton usng proposed method. Output: Q = kp. 1. Q = For = n-1 to 0 do 2.1 Q = 2Q. 2.1 If k = 1, Q = Q + P; 2.2 Else If k = -1, Q = Q P. 3. End If. 4. Return Q. Example 5. For k = 686 () By bnary method, we have 686 = ( ) 2. Clearly, the hammng weght of 686 s 6. () By NAF we fnd that 686 = ( ). In ths case, the hammng weght of 686 s reduced from 6 to 5. () By complementary recodng we have 686 = ( ) - ( )- 1 = ( ) - 1 The hammng weght s 6 (5 nternal and 1 external). (v) By our proposed method, for 2 10 > 686 > 2 9 we have 686 = (2 10 ) 2 - ( ) 2 = ( ) - ( ) = ( ). Thus the hammng weght of 686 s 5 but by usng only sngle operaton of btwse subtracton. Example 6. For k = 240 () By bnary method we fnd that 240 = ( ) 2. Clearly, the hammng weght of 240 s 4. () By complementary recodng, we have 240 = ( ) (( ) 1) = ( ) 1. Here, the hammng weght of 240 s ncreased to 6 (5 nternal and 1 external). () By our proposed method for 2 8 > 240 > 2 7 we have, 240 = (2 8 ) 2 - ( ) 2 ISSN :
4 H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng = ( ) - (10000) = ( ). Here, the hammng weght of 240 s reduced from 4 to 2.e., the least hammng weght when compared to all other exstng methods. We know that one addton operaton requres 2 squarng, 2 multplcatons and 1 nverson. Hence our proposed method saves computatonal cost and tme for performng 4 squarng, 4 multplcatons and 2 nversons. TABLE 1 COMPARISION OF RUN TIMES The followng table gves the comparson of run tme of varous sgned bnary represen tatons NAF the Non Adjacent form, MOF the Mutual Opposte form, CRM the Complementary Recodng method and DRM Drect Recodng, the proposed method n seconds. Bt sze Sgned bnary representatons NAF MOF CRM DRM Fg 1 Tme rato of the drect recodng method wth other algorthms (NAF, MOF, CRM, DRM). 7. Concluson In the mplementaton of ECC scalar multplcaton s not only the basc computaton but also the most tme consumng operaton. Its Operatonal effcency drectly determnes the performance of ECC. In ths paper we proposed a scalar multplcaton usng drect recodng method. Theoretcal tasks and numercal tests reveal that ths algorthm can remarkably enhance the computng effcency of scalar multplcaton compared wth other tradtonal algorthms and therefore has practcal sgnfcance for the mplementaton of ECC. Moreover, Fg. 1 shown above earnestly justfes our concluson. We mplemented our algorthm on Intel p4 dual core processor 1.6 GHz and 782 MHz and 504 MB of memory usng Matlab. From the table we fnd that our proposed method takes the least tme to fnd the sgned bnary representaton of any nteger k when compared to the other known methods (See, for nstance, Fg.1 below). 8. References [1] V. S. Mller, Use of ellptc curves n cryptography, Advances n Cryptology, Proceedngs of CRYPTO'85, LNCS, 218 (1986), [2] N. Kobltz, Ellptc curve cryptosystem, Mathematcs of Computaton, 48 (1987) [3] Standard specfcatons for Publc key cryptography, IEEE Standard 1363, [4] A.D. Booth, A sgned bnary multplcaton technque, Journal of Appled Mathematcs, 4(2) (1951), [5] G. W. Retwesner, Bnary Arthmetc, Advances n computers, 1 (1960), [6] F. Moran, J.Olvos, Speedng up the computatons on an ellptc curve usng addton subtracton chans, RAIRO Theoretcal Informatcs and Applcatons, 24 (1990), [7] K. Okeya, Sgned bnary representatons revsted, Proceedngs of CRYPTO'04 (2004), [8] M. Joye, S. Yen, Optmal left to rght bnary sgned dgt recodng, IEEE Transactons on Computers, 49 (2000), [9] P. Balasubramanam, E. Karthkeyan, Ellptc curve scalar multplcaton algorthm usng complementary ISSN :
5 H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng recodng, Appled Mathematcs and Computaton, 190 (2007), [10] P.Balasubramanam, E. Karthkeyan, Fast Smultaneous scalar multplcaton, Appled Mathematcs and Computaton, 192 (2007), Authors Profle 1. Dr. H. K. Pathak receved Post Graduate degree n Mathematcs from Pt. Ravshanker Shukla Unversty, Rapur. He was awarded Ph.D n 1988 by the same Unversty. He has publshed more than 185 research papers n varous nternatonal journals n the feld of non lnear analyss-approxmaton and expanson, Calculus of varatons and optmal controls Optmzaton, Feld theory and polynomals, Fourer analyss, General topology, Integral equatons, Number theory, Operatons research, Mathematcal programmng, Operator theory, Sequences, Seres, summablty. At present he s Professor and Head n S.o.S n Computer scence & IT n Pt. Ravshanker Shukla Unversty. 2. Mrs. Manju Sangh receved the post graduate degree n Mathematcs from Ravshanker Unversty Rapur n Snce 2001 she has been workng as lecturer n Rungta college of Engneerng & Technology Bhla. Currently she s pursung PhD from School of studes n Mathematcs Ravshanker Shukla Unversty Rapur. Her research nterests nclude Cryptography. ISSN :
The Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationFormulas for the Determinant
page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use
More informationCryptanalysis of pairing-free certificateless authenticated key agreement protocol
Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen
More informationA Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition
(IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer
More informationA New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic
Internatonal Journal of Computer Applcatons Technology and Research A New Desgn of Multpler usng Modfed Booth Algorthm and Reversble Gate Logc K.Nagarjun Department of ECE Vardhaman College of Engneerng,
More informationPerformance Analysis of the Postcomputation- Based Generic-Point Parallel Scalar Multiplication Method
P a g e 3 Vol. 1 Issue 11 (Ver. 1.) October 1 Global Journal of Computer Scence and Technology Performance Analyss of the Postcomputaton- Based Generc-Pont Parallel Scalar Multplcaton Method Tur F. Al-Soman
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationCOMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More informationA Hybrid Variational Iteration Method for Blasius Equation
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method
More informationApplication of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations
Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More informationOn the Multicriteria Integer Network Flow Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of
More informationComplement of Type-2 Fuzzy Shortest Path Using Possibility Measure
Intern. J. Fuzzy Mathematcal rchve Vol. 5, No., 04, 9-7 ISSN: 30 34 (P, 30 350 (onlne Publshed on 5 November 04 www.researchmathsc.org Internatonal Journal of Complement of Type- Fuzzy Shortest Path Usng
More informationNON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS
IJRRAS 8 (3 September 011 www.arpapress.com/volumes/vol8issue3/ijrras_8_3_08.pdf NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS H.O. Bakodah Dept. of Mathematc
More informationRemarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence
Remarks on the Propertes of a Quas-Fbonacc-lke Polynomal Sequence Brce Merwne LIU Brooklyn Ilan Wenschelbaum Wesleyan Unversty Abstract Consder the Quas-Fbonacc-lke Polynomal Sequence gven by F 0 = 1,
More informationInteractive Bi-Level Multi-Objective Integer. Non-linear Programming Problem
Appled Mathematcal Scences Vol 5 0 no 65 3 33 Interactve B-Level Mult-Objectve Integer Non-lnear Programmng Problem O E Emam Department of Informaton Systems aculty of Computer Scence and nformaton Helwan
More informationA PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS
HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,
More informationCOMPLEX NUMBERS AND QUADRATIC EQUATIONS
COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not
More informationCryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm
www.ijcsi.org 110 Cryptanalyss of a Publc-key Cryptosystem Usng Lattce Bass Reducton Algorthm Roohallah Rastagh 1, Hamd R. Dall Oskoue 2 1,2 Department of Electrcal Engneerng, Aeronautcal Unversty of Snce
More informationarxiv: v1 [math.co] 12 Sep 2014
arxv:1409.3707v1 [math.co] 12 Sep 2014 On the bnomal sums of Horadam sequence Nazmye Ylmaz and Necat Taskara Department of Mathematcs, Scence Faculty, Selcuk Unversty, 42075, Campus, Konya, Turkey March
More informationGeneral theory of fuzzy connectedness segmentations: reconciliation of two tracks of FC theory
General theory of fuzzy connectedness segmentatons: reconclaton of two tracks of FC theory Krzysztof Chrs Ceselsk Department of Mathematcs, West Vrgna Unversty and MIPG, Department of Radology, Unversty
More informationVARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES
VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES BÂRZĂ, Slvu Faculty of Mathematcs-Informatcs Spru Haret Unversty barza_slvu@yahoo.com Abstract Ths paper wants to contnue
More informationLecture 5 Decoding Binary BCH Codes
Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture
More informationUse of Sparse and/or Complex Exponents in Batch Verification of Exponentiations
Use of Sparse and/or Complex Exponents n Batch Verfcaton of Exponentatons Jung Hee Cheon 1 and Dong Hoon Lee 2 1 Department of Mathematcs, Seoul Natonal Unversty jhcheon@math.snu.ac.kr, 2 Natonal Securty
More informationInternational Journal of Mathematical Archive-3(3), 2012, Page: Available online through ISSN
Internatonal Journal of Mathematcal Archve-3(3), 2012, Page: 1136-1140 Avalable onlne through www.ma.nfo ISSN 2229 5046 ARITHMETIC OPERATIONS OF FOCAL ELEMENTS AND THEIR CORRESPONDING BASIC PROBABILITY
More informationNumerical Heat and Mass Transfer
Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and
More informationCalculation of time complexity (3%)
Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add
More informationFinding Primitive Roots Pseudo-Deterministically
Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms
More informationTOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION
1 2 MULTIPLIERLESS FILTER DESIGN Realzaton of flters wthout full-fledged multplers Some sldes based on support materal by W. Wolf for hs book Modern VLSI Desgn, 3 rd edton. Partly based on followng papers:
More informationJournal of Universal Computer Science, vol. 1, no. 7 (1995), submitted: 15/12/94, accepted: 26/6/95, appeared: 28/7/95 Springer Pub. Co.
Journal of Unversal Computer Scence, vol. 1, no. 7 (1995), 469-483 submtted: 15/12/94, accepted: 26/6/95, appeared: 28/7/95 Sprnger Pub. Co. Round-o error propagaton n the soluton of the heat equaton by
More informationFUZZY GOAL PROGRAMMING VS ORDINARY FUZZY PROGRAMMING APPROACH FOR MULTI OBJECTIVE PROGRAMMING PROBLEM
Internatonal Conference on Ceramcs, Bkaner, Inda Internatonal Journal of Modern Physcs: Conference Seres Vol. 22 (2013) 757 761 World Scentfc Publshng Company DOI: 10.1142/S2010194513010982 FUZZY GOAL
More informationOn the Repeating Group Finding Problem
The 9th Workshop on Combnatoral Mathematcs and Computaton Theory On the Repeatng Group Fndng Problem Bo-Ren Kung, Wen-Hsen Chen, R.C.T Lee Graduate Insttute of Informaton Technology and Management Takmng
More informationAn efficient algorithm for multivariate Maclaurin Newton transformation
Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,
More informationKernel Methods and SVMs Extension
Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general
More informationComparative Studies of Law of Conservation of Energy. and Law Clusters of Conservation of Generalized Energy
Comparatve Studes of Law of Conservaton of Energy and Law Clusters of Conservaton of Generalzed Energy No.3 of Comparatve Physcs Seres Papers Fu Yuhua (CNOOC Research Insttute, E-mal:fuyh1945@sna.com)
More informationAttacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction
Attacks on RSA The Rabn Cryptosystem Semantc Securty of RSA Cryptology, Tuesday, February 27th, 2007 Nls Andersen Square Roots modulo n Complexty Theoretc Reducton Factorng Algorthms Pollard s p 1 Pollard
More information5 The Rational Canonical Form
5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces
More informationExercises. 18 Algorithms
18 Algorthms Exercses 0.1. In each of the followng stuatons, ndcate whether f = O(g), or f = Ω(g), or both (n whch case f = Θ(g)). f(n) g(n) (a) n 100 n 200 (b) n 1/2 n 2/3 (c) 100n + log n n + (log n)
More informationDouble Layered Fuzzy Planar Graph
Global Journal of Pure and Appled Mathematcs. ISSN 0973-768 Volume 3, Number 0 07), pp. 7365-7376 Research Inda Publcatons http://www.rpublcaton.com Double Layered Fuzzy Planar Graph J. Jon Arockaraj Assstant
More informationA new Approach for Solving Linear Ordinary Differential Equations
, ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of
More informationLOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin
Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence
More informationErrors for Linear Systems
Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch
More informationIntroduction to Information Theory, Data Compression,
Introducton to Informaton Theory, Data Compresson, Codng Mehd Ibm Brahm, Laura Mnkova Aprl 5, 208 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on the 3th of March 208 for a Data Structures
More informationHiding data in images by simple LSB substitution
Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty
More informationOne-sided finite-difference approximations suitable for use with Richardson extrapolation
Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationUnit 2: Binary Numbering Systems
Unt 2: Bnary Numberng Systems Defntons Number bases Numercal representatons. Integer fxed pont. Bnary 2 s complement BCD Addton-subtracton Alphanumercal representatons Basc Bblography Any book on dgtal
More informationThe internal structure of natural numbers and one method for the definition of large prime numbers
The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract
More informationThe Exact Formulation of the Inverse of the Tridiagonal Matrix for Solving the 1D Poisson Equation with the Finite Difference Method
Journal of Electromagnetc Analyss and Applcatons, 04, 6, 0-08 Publshed Onlne September 04 n ScRes. http://www.scrp.org/journal/jemaa http://dx.do.org/0.46/jemaa.04.6000 The Exact Formulaton of the Inverse
More informationA Novel, Low-Power Array Multiplier Architecture
A Noel, Low-Power Array Multpler Archtecture by Ronak Bajaj, Saransh Chhabra, Sreehar Veeramachanen, MB Srnas n 9th Internatonal Symposum on Communcaton and Informaton Technology 29 (ISCIT 29) Songdo -
More informationPRIME NUMBER GENERATION BASED ON POCKLINGTON S THEOREM
PRIME NUMBER GENERATION BASED ON POCKLINGTON S THEOREM Alexandros Papankolaou and Song Y. Yan Department of Computer Scence, Aston Unversty, Brmngham B4 7ET, UK 24 October 2000, Receved 26 June 2001 Abstract
More informationCube Attack on Reduced-Round Quavium
3rd Internatonal onference on Mechatroncs and Industral Informatcs (IMII 05 ube Attac on Reduced-Round Quavum Shyong Zhang, a *, Gonglang hen,b and Janhua L,c School of Informaton Securty Engneerng, Shangha
More informationSingle-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition
Sngle-Faclty Schedulng over Long Tme Horzons by Logc-based Benders Decomposton Elvn Coban and J. N. Hooker Tepper School of Busness, Carnege Mellon Unversty ecoban@andrew.cmu.edu, john@hooker.tepper.cmu.edu
More informationThe Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL
The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp
More informationEEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming
EEL 6266 Power System Operaton and Control Chapter 3 Economc Dspatch Usng Dynamc Programmng Pecewse Lnear Cost Functons Common practce many utltes prefer to represent ther generator cost functons as sngle-
More informationSection 8.3 Polar Form of Complex Numbers
80 Chapter 8 Secton 8 Polar Form of Complex Numbers From prevous classes, you may have encountered magnary numbers the square roots of negatve numbers and, more generally, complex numbers whch are the
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationAppendix B: Resampling Algorithms
407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More informationBit Juggling. Representing Information. representations. - Some other bits. - Representing information using bits - Number. Chapter
Representng Informaton 1 1 1 1 Bt Jugglng - Representng nformaton usng bts - Number representatons - Some other bts Chapter 3.1-3.3 REMINDER: Problem Set #1 s now posted and s due next Wednesday L3 Encodng
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationThe L(2, 1)-Labeling on -Product of Graphs
Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh
More informationHongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)
ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of
More informationOn the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros
Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong
More informationSome Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM
Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s
More informationLecture 10 Support Vector Machines II
Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed
More informationApplication of B-Spline to Numerical Solution of a System of Singularly Perturbed Problems
Mathematca Aeterna, Vol. 1, 011, no. 06, 405 415 Applcaton of B-Splne to Numercal Soluton of a System of Sngularly Perturbed Problems Yogesh Gupta Department of Mathematcs Unted College of Engneerng &
More informationEfficient Fixed Base Exponentiation and Scalar Multiplication based on a Multiplicative Splitting Exponent Recoding
Effcent Fxed Base Exponentaton and Scalar Multplcaton based on a Multplcatve Splttng Exponent Recodng Jean-Marc Robert, Chrstophe Negre, Thomas Plantard To cte ths verson: Jean-Marc Robert, Chrstophe Negre,
More informationComputing Correlated Equilibria in Multi-Player Games
Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,
More informationLecture 10: May 6, 2013
TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,
More informationThe Study of Teaching-learning-based Optimization Algorithm
Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017
U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that
More informationMEM 255 Introduction to Control Systems Review: Basics of Linear Algebra
MEM 255 Introducton to Control Systems Revew: Bascs of Lnear Algebra Harry G. Kwatny Department of Mechancal Engneerng & Mechancs Drexel Unversty Outlne Vectors Matrces MATLAB Advanced Topcs Vectors A
More informationRSA /2002/13(08) , ); , ) RSA RSA : RSA RSA [2] , [1,4]
1000-9825/2002/13(081729-06 2002 Journal of Software Vol13, No8 RSA 1,2 1, 1 (, 200433; 2 (, 200070 E-mal: yfhu@fudaneducn http://wwwfudaneducn : RSA RSA :, ; RSA,,, RSA,, : ; RSA ; ;RSA; : TP309 : A RSA
More informationMath Review. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University
Math Revew CptS 223 dvanced Data Structures Larry Holder School of Electrcal Engneerng and Computer Scence Washngton State Unversty 1 Why do we need math n a data structures course? nalyzng data structures
More informationDiscussion 11 Summary 11/20/2018
Dscusson 11 Summary 11/20/2018 1 Quz 8 1. Prove for any sets A, B that A = A B ff B A. Soluton: There are two drectons we need to prove: (a) A = A B B A, (b) B A A = A B. (a) Frst, we prove A = A B B A.
More informationCHAPTER 4. Vector Spaces
man 2007/2/16 page 234 CHAPTER 4 Vector Spaces To crtcze mathematcs for ts abstracton s to mss the pont entrel. Abstracton s what makes mathematcs work. Ian Stewart The man am of ths tet s to stud lnear
More informationCurve Fitting with the Least Square Method
WIKI Document Number 5 Interpolaton wth Least Squares Curve Fttng wth the Least Square Method Mattheu Bultelle Department of Bo-Engneerng Imperal College, London Context We wsh to model the postve feedback
More informationDETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM
Ganj, Z. Z., et al.: Determnaton of Temperature Dstrbuton for S111 DETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM by Davood Domr GANJI
More informationFuzzy Boundaries of Sample Selection Model
Proceedngs of the 9th WSES Internatonal Conference on ppled Mathematcs, Istanbul, Turkey, May 7-9, 006 (pp309-34) Fuzzy Boundares of Sample Selecton Model L. MUHMD SFIIH, NTON BDULBSH KMIL, M. T. BU OSMN
More informationDepartment of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification
Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled
More informationValuated Binary Tree: A New Approach in Study of Integers
Internatonal Journal of Scentfc Innovatve Mathematcal Research (IJSIMR) Volume 4, Issue 3, March 6, PP 63-67 ISS 347-37X (Prnt) & ISS 347-34 (Onlne) wwwarcournalsorg Valuated Bnary Tree: A ew Approach
More informationExample: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,
The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson
More informationEcon107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)
I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes
More informationNew modular multiplication and division algorithms based on continued fraction expansion
New modular multplcaton and dvson algorthms based on contnued fracton expanson Mourad Goucem a a UPMC Unv Pars 06 and CNRS UMR 7606, LIP6 4 place Jusseu, F-75252, Pars cedex 05, France Abstract In ths
More informationSelf-complementing permutations of k-uniform hypergraphs
Dscrete Mathematcs Theoretcal Computer Scence DMTCS vol. 11:1, 2009, 117 124 Self-complementng permutatons of k-unform hypergraphs Artur Szymańsk A. Paweł Wojda Faculty of Appled Mathematcs, AGH Unversty
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More informationSome modelling aspects for the Matlab implementation of MMA
Some modellng aspects for the Matlab mplementaton of MMA Krster Svanberg krlle@math.kth.se Optmzaton and Systems Theory Department of Mathematcs KTH, SE 10044 Stockholm September 2004 1. Consdered optmzaton
More informationAppendix for Causal Interaction in Factorial Experiments: Application to Conjoint Analysis
A Appendx for Causal Interacton n Factoral Experments: Applcaton to Conjont Analyss Mathematcal Appendx: Proofs of Theorems A. Lemmas Below, we descrbe all the lemmas, whch are used to prove the man theorems
More informationNumerical Solutions of a Generalized Nth Order Boundary Value Problems Using Power Series Approximation Method
Appled Mathematcs, 6, 7, 5-4 Publshed Onlne Jul 6 n ScRes. http://www.scrp.org/journal/am http://.do.org/.436/am.6.77 umercal Solutons of a Generalzed th Order Boundar Value Problems Usng Power Seres Approxmaton
More informationDynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence)
/24/27 Prevew Fbonacc Sequence Longest Common Subsequence Dynamc programmng s a method for solvng complex problems by breakng them down nto smpler sub-problems. It s applcable to problems exhbtng the propertes
More informationTHE SUMMATION NOTATION Ʃ
Sngle Subscrpt otaton THE SUMMATIO OTATIO Ʃ Most of the calculatons we perform n statstcs are repettve operatons on lsts of numbers. For example, we compute the sum of a set of numbers, or the sum of the
More informationExponential Type Product Estimator for Finite Population Mean with Information on Auxiliary Attribute
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 193-9466 Vol. 10, Issue 1 (June 015), pp. 106-113 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) Exponental Tpe Product Estmator
More informationComparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method
Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method
More informationLETTER Skew-Frobenius Maps on Hyperelliptic Curves
189 Skew-Frobenus Maps on Hyperellptc Curves Shunj KOZAKI a, Nonmember, Kazuto MATSUO, Member, and Yasutomo SHIMBARA, Nonmember SUMMARY Scalar multplcaton methods usng the Frobenus maps are known for effcent
More informationConvexity preserving interpolation by splines of arbitrary degree
Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete
More informationMMA and GCMMA two methods for nonlinear optimization
MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons
More information(Online First)A Lattice Boltzmann Scheme for Diffusion Equation in Spherical Coordinate
Internatonal Journal of Mathematcs and Systems Scence (018) Volume 1 do:10.494/jmss.v1.815 (Onlne Frst)A Lattce Boltzmann Scheme for Dffuson Equaton n Sphercal Coordnate Debabrata Datta 1 *, T K Pal 1
More informationYong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 )
Kangweon-Kyungk Math. Jour. 4 1996), No. 1, pp. 7 16 AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS Yong Joon Ryang Abstract. The optmzaton problems wth quadratc constrants often
More information