Computer Security Laboratory Concordia Institute for Information Systems Engineering Concordia University, Montreal (QC), Canada

Size: px
Start display at page:

Download "Computer Security Laboratory Concordia Institute for Information Systems Engineering Concordia University, Montreal (QC), Canada"

Transcription

1 2005 Intenational Confeence on Wieless Netwoks, Communications and Mobile Computing Impoving the Diffie-Heliman Secue Key Exchange P. Bhattachaya, M. Debbabi and H. Otok Compute Secuity Laboatoy Concodia Institute fo Infomation Systems Engineeing Concodia Univesity, Monteal (QC), Canada Abstact-Diffie-Hellman (DH) is a well-known cyptogaphic algoithm used fo secue key exchange. The fist appeaance of DH was in 1976 (2]. The algoithm allows two uses to exchange a symmetic secet key though an insecue wied o wieless channel and without any pio secets. DH woks unde the domain of integes Zn whee n = p. Hee, p and a ae the two paametes of DH whee p is a lage pime numbe and a is a geneato selected fom the cyclic goup Zn. In this pape, we popose two modifications of DH. The fist modification is to change the domain to intege with n=2pt whee Zn is still cyclic and the second modification is to change the domain to Gaussian aithmetic Z [i]. Afte implementing the thee algoithms we found that the symmetic key size deived fom the two modified algoithms is much geate than the classical one. Moeove, attacking the two modified algoithms using Pohlig-Hellman algoithm, using the same pime value p and pivate value a o b, needs much moe time than the classical one. Index Tems- Diffie-Heliman, Wieless netwoks, Pohlig- Hellman and Gaussian Intege. I. INTRODUCTION Diffie Hellman (DH) allows two uses to exchange a symmetic secet key though an insecue wied o wieless [9,10] channel and without any pio secets [5]. DH is widely used in many cyptogaphic potocols such as Secue Socket Laye (SSL), Secue Shell (SSH) and IP Secuity (IPSec) [1]. Modifing the secuity of DH means impoving the secuity of the potocols that use DH. DH woks unde the domain of intege Zn whee n p. P and = a ae the two paametes of DH whee p is a lage pime numbe and a is a geneato selected fom the cyclic goup Zn. Two pincipals A and B can use the DH algoithm to exchange a symmetic key. The pincipal A chooses a pivate value a, then it chooses a lage andom pime P and a geneato a. The public key of A is (p,a, a') and the pivate key is a. A sends its public key to B. Afte eceiving A's public key, B chooses its own pivate key b and computes its public key (p,a, ab). B sends its public key to A. Now A and B computes thei symmetic key [3]. Two modifications of DH ae pesented in this pape. The fist modification is unde the domain of intege with n=2pt whee Zn is still cyclic and the second modification is unde the domain of Gaussian aithmetic Z*[i]. We implemented the thee algoithms using Mathematica 4.0 unde Pentium 4 pocesso unning at a fequency of {pabi, debbabi, h_otok}@ciise.concodia.ca /05/$ IEEE GHz with 256 MB of RAM. We found that the symmetic key size deived fom the two modified algoithms is geate than the classical one. Moeove, testing the secuity of the modified algoithms is a big issue that let us implement thee diffeent attack algoithms such as: Baby-step Giant-step, Pollad's Rho, Pohlig-Hellman [7]. Afte implementing the thee methods we found that Pohlig-Hellman algoithm needs less time, compaed to the othe methods, to compute the discete logaithm poblem that DH depends on. Fo this eason, we used Pohlig-Hellman algoithm to test the secuity of the thee algoitms. Attacking the two modified algoithms, using the same pime value p and pivate value a o b fo all the algoithms, needs much moe time than the classical one. This pape is oganized as follows: Section 2 descibes the Mathematical backgound. Section 3 pesents the classical and modified DH. Section 4 descibes Pohlig-Hellman algoithm used fo attacking the algoithms. Section 5 descibes an evaluation of the thee algoitms. Section 6 shows the time needed to attack the algoithms. Section 7 illustates the DH potocol used ove wieless netwoks with its possible attacks. A conclusion is dawn in section 8. II. MATHEMATICAL BACKGROUND In this section, we will pesent the mathematical backgound needed fo the modified algoithms [4, 6, 7]. A. Goups Definition 1: A binay opeation (*) on a set G is a function that assigns to each pai of elements a and b in G a Unique a * b in G. Binay opeations ae denoted by: *,-, +, o, (D, 0. In case of '... the element a * b may be a.b fo simplicity, and the opeation is said to be witten in the multiplicative notation. In case of "+", the opeation is witten in additive notation. Definition 2: A goup (G, *) consists of a set G with a binay opeation * on G satisfying the following thee axioms: 1) The goup opeation is associative. That is, a * (b * c) = (a * b) * c fo all a,b,c E G. 2) Fo all a E G, thee is an identity element e o 1 E G suchthat: a * e = e * a = a. 3) Fo a E G, thee is an element b E G which is called the invese of a and denoted by a-, such that: a * b=b * a=e o

2 4) A goup G is an abelian if: a * b = b * a fo all a,b E G (commutative) The above ae witten in multiplicative notations. If the goup opeation is addition, then the goup is said to be an additive goup, the identity element is denoted by 0, and the invese a is denoted by -a. So the additive goup will be in this fom: 1) a+(b+c)=(a+b)+c 2) a+0=o+a=a 3) a+b=b+a=0 (& b=-a). Definition 3: A goup G is finite if the set G has a finite numbe of elements. The ode of G is the numbe of elements in the goup and denoted by IGI. Definition 4: (ode) Let G be a goup and a e G. The ode of a is defined to be the least positive intege t such that at=l. If t does not exist, then the ode of a is defined to be oo. B. Cyclic Goup Definition 5: (The multiplicative goup) The set Un is the multiplicative goup of Zn of ode 4P(n), which is defined as follows: Un={[a]EZn : GCD(a,n) = 1} Definition 6: A goup G is cyclic if thee is an element a e G suchthat fo each b e G thee is an intege i with b= oa. Such that an element a is called a geneato of G. Example 7: U1 =1 1,2,3,4,5,6,7,8,9, 10},by taking any element fom Ul,we have: (2){20, 21, 22, 23 2, 2, 26, 27, 28, 29 }={ 1,2,4,8,5,10,9,7,3,6}=U11. Theefoe,U11 is cyclic. Theoem 8: (Othe Geneatos of a cyclic goup) Let G =(a), then ak is a geneato iff GCD(n, k) = 1 whee 1 < k < n and n=igi=l (a) 1. Coollay 9: If Un is cyclic goup then the numbe of geneatos of U11 is (D4I(n)). Theoem 10: (Kenneth) U1 is cyclic iff n=2; 4; P'; o 2P1, whee P is an odd pime and a is any intege geate than zeo. 1) All Zn ae cyclic (fo all n), but not all Un ae cyclic (not fo all n). 2) Un=={ [a] e Z, GCD(a,n)=I }. If n =p, whee p is a pime numbe, then Up=Zp-{0),whee U, is the set of the invetible elements in Z, 3) The numbe of elements in U. =4(n), 1U.1 = 4(n) and Znl=jn. 4) The numbe of geneatos: In Zn is 4b(n). In Un is '(1Q(n)). Notation 1]: The function 4>(n) is called the Eule Phi Function. - If n = p, whee p is pime, then Up=Zp and (n) =p-1. - If n P l.p2 2...pn is the pime factoization of n, then (n)p -'.(P1-1).P21*(P2-1)..Pn.(Pn-1). Example 12: Fo U13: - U13={ 1,2,3,4,5,6,7,8,9,10,11, The ode of the multiplicative goup U13 is ju13 j=(13)=13-l=12. - U13 is cyclic, because n=13 is pime intege (By Theoem). - The numbe of the geneatos of U13 = 4I(l 2) = 4(22 x 3) = 2(2-1)(2 1)3(1-1)(3-1)=4. - The following steps ae used to find the geneatos of U13 using the divisos of 4(13)=12. 1) The divisos of 12 ae 1,2,3,4,6,12. 2) Choose any element fom the multiplicative goup U13. 3) 21=2; 22=4; 23=8; 24 =3 (mod 13); 26=12(mod 13); 2l2=144_ 1 (mod 13). Theefoe, 2 is a geneato since the ode of the element 2 121=12=lUl31 is the same as the ode of U13. The othe geneatos ae computed as follows: - ak (mod 13) whee (k,12)=1, k=1,2,...,12. - Fo a=2, the geneatos ae: 21,25,27,211 (mod 13). OR: 1) The pime divisos of 12 ae: 2,3. 2) Choose any element fom the multiplicative goup U13. 3) 212=26=12#1 and 2132=24=3#41 (mod 13). Theefoe, 2 is a geneato since the element 2 p :A 1 fo all pime divisos of n, so 121=12=1U131 is the same as the ode of U13. The othe geneatos can be found in the fom: ak (mod 13) whee (k,12)=1, k=l,2,...,12. Fo a=2, the geneatos ae: (mod 13). Example 13: Fo U8: - U8={ 1,3,5,7}, - The ode of the multiplicative goup U8 is lu81 =b(8)= (23)=2(3-1) (2-1)=4. - U8 is not cyclic, because n=8=23 is not satisfying the conditions of the theoem. Theefoe, U8 is not cyclic. C. Gaussian Intege Finding the geneatos in the case of Gaussian intege will be illustated though out the following example. Example 14: In Z3[i]={a+ ib: a,b E Z3}= {0, 1, 2, i, 2i, i+1, i+2,2i+1,2i+2} The multiplicative goup Z* is cyclic, since 3 can be witen in the fom 4k+3 whee k=0. To find the geneatos of the cyclic goup Z3[i], we will go though the following steps: 1) Divisos of 8 ae 1,2,4,8. 2) Choose any element fom the multiplicative goup Z3 [i]. 3) (1+ i)2= 2i (mod 3); (l+i)4= 2i. 2i- -4-2(mod 3); (1+i)8=4u- 1(mod 3) Theefoe, (1 +i) is a geneato since the ode of the element (1+i) 1(1+i)l=8= IZ*[i]l is the same as the ode of Z*[i]. The othe geneatos can be found in the fom: {akmod3: GCD(k,8)=1 whee 1 < k < 8 and a is a geneato}. Fo a=(l+i), the geneatos ae : (1+i)I, (1+i)3,(l +i)5, (l+i)7 (mod 3). III. CLASSICAL AND MODIFIED DH In this section, we will pesent the Classical DH [2], the modified DH in the same domain of integes with n=2ptand DH in the domain of Gaussian integes. 194

3 A. Classical DH Method The steps of the Diffie-Hellman algoithm ae as follows: 1) Key Geneation: a) Geneate a lage andom pime intege p and a geneato a of the multiplicative goup Up. b) Select a andom intege a and b 1 < a, b < p - 1 fo entity A and B, then compute x = a' (mod p) and y=ab (mod p). c) Boadcast the public key of A and B whee A's public 2) A computes the symmetic key ka=ya (mod p) and B computes the symmetic key kb=xb(mod p). Example 15: - p =71 - The geneato a = 69 - Picking intege a: a = 29 - Picking intege b: b = 40 - Computing a a = 61 - Computing ab = 32 - Public Key of A is (x, a, p) = 161, 69, Public Key of B is (y, a, p) ={32, 69, Ka =32 - Kb =32 B. Modified DH in 2pt Diffie Hellman public-key encyption scheme depends on the fact that the goup selected is cyclic. Kenneth theoem [6] said that the multiplicative goup Un is cyclic iff n is eithe 2, 4, pt, o 2pt, whee p is an odd pime and t > 1. 1) Key Geneation: a) Geneate a lage andom n = 2pt and a geneato a of the multiplicative cyclic goup U,. b) Select a andom intege a and b 1 < a, b < &1(n) fo entity A and B, then compute x = Ca (mod n) and y=aeb (mod n). c) Boadcast the public key ofa and B whee A's public 2) A computes the symmetic key ka=ya (mod n) and B computes the symmetic key kb=xb(mod n). Example 16: - P= 11, t=3 - Picking n= The geneato a= Picking intege a =351 - Picking intege b = 16 - Computing aa= Computing a b=885 - Public Key of A is (x, a, n) = 12129,2657, Public Key of B is (y, a, n) ={ 885,2657, Ka = Kb =1347 C. Modified DH in Zn [i] The classical method of DH public-key encyption scheme is extended to the domain of Gaussian intege. We choose a Gaussian pime intege 13 to be a lage pime intege p of the fom 4k+3 so that G3={a + i b: 0 < a, b < p-i },whee the numbe of elements in Gf is q(w) = p2 and in G, is 1D(,3)=p2-i (whee 4 is the Eule phi function). 1) Key Geneation: a) Geneate a lage andom n =/3, which is in the fom 4k+3 and a geneato a of the multiplicative cyclic goup U[Zn[i]J=Zn[i]. b) Select a andom intege a and b, 1 < a, b < P(n) fo entity A and B, then compute x = &a (mod 13) and y=ab (mod,3). c) Boadcast the public key of A and B whee A's public 2) A computes the symmetic key ka=ya(mod 1) and B computes the symmetic key kb=xb(mod,8). Example 17: - Choose a pime intege 1= 83 - Mod[83, 4]=3 - The geneato a= Picking intege a = Picking intege b = Computing aa= Computing a b= Public Key ofa is (x, a, n) = , I, 831 -Public KeyofBis(y,a,n)={34+751,82+731,83} -Ka= Kb= Ka=(14+291)* (14-29I)=1037 -Kb=(14+29I)*(14-29I)=1037 IV. POHLIG-HELLMAN ALGORITHM The Pohlig-Hellman algoithm [8] fo computing discete logaithms takes advantage of the factoization of the ode D(n) of the goup G. Let 4>(n) = 1P p elp12 p2... ~ ep be the pimefc factoization of n. If x = log(, 13, then the appoach is to detemine xi = x(modpi'i) fo 1 < i <, and then use Gausss algoithm to ecove x(mod n). Each intege xi is detemined by computing the digits 10,11,..., l,i in tun of its pi-ay epesentation: Xi lo+pi lei_ipel whee 0lj < P-1.The Pohlig-Hellman algoithm is as follows: Pohlig-Hellman algoithm INPUT: a geneato a of a cyclic goup G of ode 4.(n), and an element13 E G. OUTPUT: the discete logaithm x I log,,3 1) Find the pime factoization of 4?(n): (J(n) = pelpe2 pe, whee ei > 1. 2) Fo i fom 1 to, do the following: (Compute xi = lo + lipi leippei-1, whee xi = x (modpei). 2.1 (Simplify the notation) Set q = pi and e = ei. 2.2 Sety=1 and-1 = Compute 7e -= n/q. 2.4 (Compute the lj) Fo j fom 0 to e - 1 do the following: Compute -y = yijq3land -= (13,-l)n/qj+l Compute ij = log Set xi = lo + 11q le1q- 3) Use Gausss algoithm (stated in the next chapte in the pogam) to compute the intege x, 0 < x < (4(n) - 19 such that x _ xi (modp"i) fo 1 < i <.

4 4) Retun(x). The example below illustates Pohlig-Hellman algoithm with atificially small paametes. Example 18: Let p = The element a = 4184 is a geneato of Z643129, of ode td(n) = p - 1 = Conside,8 = By using Pohlig-Hellman algoithm fo logaithms in Z the discete logaithm x = log is computed as follows. 1) The pime factoization of 4?(n) is = 23 x x x 2) Apply step 2 to find the values xi's fo i = 1,2,3 and 4 as follows: a) To findx= x(mod23) = lo , we compute (i) <i = a12 (modp) = (ii) Compute -y = 1 and:l = (3-y-1)12 (modp) = Then using the exhaustive seach to compute lo = log = 1. (iii) Compute -y =-yal(modp) = 4184 and = (07-")44(modp) = Then using the exhaustive seach to compute 10 = log = 1. (iv)compute -Y = -ya12(modp) = and 1 = (3y- ) 7 (modp) = Then using the exhaustive seach to compute lo = log = 1. Hence, x1 = 1o =1 +1 x x 22= 7. b) To find x2 = x(mod 3), we compute a! a 3 (modp) = and3 = 33 (modp) = 1. Then using the exhaustive seach to compute X2 = log = 3- c) To find X3 = x(mod 127), we compute ci = a1!27(mod p) = and,b =8/T7(mod p) = Then using the exhaustive seach to compute X3 = log = 121. d) To find X4 = x(mod211), we compute a = a-2' (modp) = and: = /3lT (modp) = Then using the exhaustive seach to compute X4 = log = ) Finally, use the Chinese emainde theoem to find the solution x, 0 < x < , of the system of conguences x 7 (mod2) x 3 (mod 3) x 121 (mod 127) x 118 (mod 211) to get the intege x = log = Note: Given the factoization of 4)(n), the unning time of the Pohlig-Hellman algoithm is O(Eei(lgI(n) + VI/)) goup multiplications. Symmetic Key value with p=4831 Fig. 1. Symmetic Key Geneation V. EVALUATION OF THE METHODS In ode to compae the thee diffeent algoithms let us take the same value fo the pime numbe p, pivate key a, and pivate key b. Let us take as an example p=4831, a=4646, and b=4571. It is clealy shown fom Figue 1. that the classical DH geneates a symmetic key of size 12 bits. While the DH in the domain of Gaussian geneates a symmetic key of size 28 bits. Finally, DH unde the domian of intege but with n= 2p2 geneates a symmetic key of size 24 bits. VI DH DH DH2p't Classical Gaussian TESTING THE SECURITY OF THE METHODS The Pohlig-Hellman is used to compute the discette logaithm poblem. Testing of the diffeent algoithms will be done using the same pime value p and pivate key a. It is clealy shown fom Figue 2. that the time needed to attack the two new methods is geate than the classical one. Mathematically, the complexity of the classical Pohlig-Hellman is O(Eei(lg,(n) + +/i)), whee tp(n) is the ode of the set i=l Z (D(n)=p-1, pi is the pime value deived fom the pime factoization of?(n) and ei is the powe of pi. The complexity of the modified Pollig-Hellman used to compute the discette logaithm unde the domain of intege with 2pt is O( Eei(lg,(n)++,/p)), whee 4(n) is the ode of the set Zm i=1 with m=2pt and <>(n)=pt-1(p-1), pi is the pime value deived fom the pime factoization of the ode 41(n) of the modified method (which is geate than the classical one) and ei is the powe of pi. The complexity of the modified Pollig-Hellman used to compute the discette logaithm unde the domain of whee 1(n) is Gaussian intege is O(Eei(lg '(n) + lpf)), i=l the ode of the set Z n=p2_1, pi is the pime value deived fom the pime factoization of the ode P(n) of the modified method (which is geate than the classical one) and ei is the powe of pi. 196

5 Time needed to compute the pivate key a=4646 ETime needed to compute the pivate key 250 2s- C 2 00 X - E l 0~~~~~~0 M = Fig.2. Attacking the methods VII. DIFFIE-HELLMAN PROTOCOL Diffie-Hellman method is used fo symmetic key exchange between entities in wieless netwoks [9,10]. One big poblem of Diffie-Hellman key exchange potocol is the man-in-themiddle attack. In ode to pevent this attack "Time Stamps" and "Signatues" ae used to impove the secuity of DH potocol. A. Diffie-Hellman Potocol Achitectue A and B will use the public cyptogaphy Diffie-Hellman algoithm to exchange symmetic keys ove wieless netwoks. They use the following key ageement potocol. 1) A B: IDA, IDB, TimeA, a', a, p, SignA. 2) B A: IDB, IDA, TimeB, ab, SignB. 3) A B: IDA, IDB, TimeA, SignA. In step I, entity A chooses a lage pime numbe p and a geneato a of Z*. It then chooses a pivate value a (whee a is between 1 < a < (n)) and computes aa mod p. Finally, it computes its signatue though computing the following using the hash function H(: In this potocol, if an attacke wants to play the ole of the man-in-the-middle attack, the eceive can easily discove it though the exchanged signatues. Moeove, the attacke cannot modify the message because of the use of 'ime stamp" and signatues in each step of the potocol. Finally, attacking Diffie-Hellman algoithm depends on the discete logaithm poblem which usually needs too much time to be computed. With the DH modified algoithms computing the discete logaithm poblem is much moe complex than the classical one. VIII. CONCLUSION Diffie Hellman is widely used in diffeent potocols such as SSL, IPSec and SSH. Modifing the secuity of DH means impoving the secuity of the potocols that use DH. The DH method depends on the discete logithm poblem. Solving the discete logithm poblem needs the implementation of Pohlig- Hellman algoithm. Pohlig-Hellman algoithm was choosen between thee diffeent algoithms to be used because of its pefomance and time. Compaison between the thee DH methods was done accoding to the key size geneated by the methods, which shows that the geneated key size fom the modified methods is geate than the classical one. To ensue the secuity of the algoithms we used Pohlig Hellman to compute the value of the same pivate key used by all the methods. Attacking the methods shows that the time needed to compute the pivate key fo the two modified algoithms is geate than the classical one. So, the two modified methods ae moe secue than the classical method as they take longe time to be cacked. REFERENCES [1] David Cats, A Review of the Diffie llellinan Algoithm and its Use in Secue Intenet Potocols, SANS Institute, [2] W. Diffie and M.E. Hellman, New Diections in Cyptogaphy. IEEE Tansaction on infomation theoy, IT-22, pp , [3] T. ElGamal,A public key cyptosystem and a signatue scheme based on discete logaithms, IEEE Tans. Infom., pp , [4] S. Fiedbeg. A. Insel and L. Spence, Linea Algeba, Pentice Hall, 4th edition, ISBN: , Novembe 11, [5] Intenet Engineeing Task Foce (IETF) Woking Goup. Diffie-Hellman Key Ageement Method, RFC 2631, June SignA = SignA (H(IDA, IDB, TimeA, a0, a, p)) [6] R. Kenneth, Elementay numbe theoy and its applications, AT & T Bell Then it sends the message to B. Laboatoies, 4th edition, ISBN: , [7] A. Menezes, P. Ooschot and S. Vanstone,Handbook ofapplied Cyptogaphy, CRC Pess, ISBN: , Octobe In step 2, entity B eceives the messages fom A. Entity B fist veifies whethe o not the messages: TimeA and SignB [8] A. Odlyzko, Discete logaithms: The past and the fitue, AT&T Labsae coect. If the messages ae coect, then B chooses a pivate Reseach, [9] H. Otok, A. Mouad, M. Debbabi and C. Assi,Impoving the Secuity of value b (whee b is between 1 < a < 4?(n)) and computes aob SNMP in Wieless Netwoks, to appea in the poceedings of Wielessmod p. Finally, it computes its signatue as follows: Com [10] R. Song and L. Koba, Secuity Communication Achitectuefo Mobile SignB = SignB (H(IDB, IDA, TimeB, ab)) Agents and E-commece, National Reseach Council Canada, Then it sends the message to A. In Step 3, entity A veifies whethe o not the messages: TimeB, SignB ae coect. If the messages ae coect, then it computes its signatue as follows: SignA = SignA(H(IDA, IDB, TimeA, TimeB, ab)) Then it sends the message to B. Finally, B veifies whethe o not the messages eceived fom A ae coect. If the esult is tue, it means that A and B have the same shaed key K. K will be computed as follows: KME= (aa)b mod p. KAE= (Ceb)a mod p. 197

Lecture 25: Pairing Based Cryptography

Lecture 25: Pairing Based Cryptography 6.897 Special Topics in Cyptogaphy Instucto: Ran Canetti May 5, 2004 Lectue 25: Paiing Based Cyptogaphy Scibe: Ben Adida 1 Intoduction The field of Paiing Based Cyptogaphy has exploded ove the past 3 yeas

More information

Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University

Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University Key Establishment Potocols Cyptogaphy CS 507 Ekay Savas Sabanci Univesity ekays@sabanciuniv.edu Key distibution poblem Secuity of the keys Even if the cyptogaphic algoithms & potocols ae cyptogaphically

More information

A more efficient secure event signature protocol for massively multiplayer online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng Chu1,c

A more efficient secure event signature protocol for massively multiplayer online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng Chu1,c Intenational Foum on Mechanical, Contol and Automation (IFMCA 2016) A moe efficient secue event signatue potocol fo massively multiplaye online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng

More information

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de

More information

Chapter 3: Theory of Modular Arithmetic 38

Chapter 3: Theory of Modular Arithmetic 38 Chapte 3: Theoy of Modula Aithmetic 38 Section D Chinese Remainde Theoem By the end of this section you will be able to pove the Chinese Remainde Theoem apply this theoem to solve simultaneous linea conguences

More information

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic.

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic. Chapte 9 Pimitive Roots 9.1 The multiplicative goup of a finite fld Theoem 9.1. The multiplicative goup F of a finite fld is cyclic. Remak: In paticula, if p is a pime then (Z/p) is cyclic. In fact, this

More information

Quantum Fourier Transform

Quantum Fourier Transform Chapte 5 Quantum Fouie Tansfom Many poblems in physics and mathematics ae solved by tansfoming a poblem into some othe poblem with a known solution. Some notable examples ae Laplace tansfom, Legende tansfom,

More information

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL

CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL U.P.B. Sci. Bull. Seies A, Vol. 80, Iss.3, 018 ISSN 13-707 CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL Sasengali ABDYMANAPOV 1,

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

When two numbers are written as the product of their prime factors, they are in factored form.

When two numbers are written as the product of their prime factors, they are in factored form. 10 1 Study Guide Pages 420 425 Factos Because 3 4 12, we say that 3 and 4 ae factos of 12. In othe wods, factos ae the numbes you multiply to get a poduct. Since 2 6 12, 2 and 6 ae also factos of 12. The

More information

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013 AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the

More information

10/04/18. P [P(x)] 1 negl(n).

10/04/18. P [P(x)] 1 negl(n). Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the

More information

New Finding on Factoring Prime Power RSA Modulus N = p r q

New Finding on Factoring Prime Power RSA Modulus N = p r q Jounal of Mathematical Reseach with Applications Jul., 207, Vol. 37, o. 4, pp. 404 48 DOI:0.3770/j.issn:2095-265.207.04.003 Http://jme.dlut.edu.cn ew Finding on Factoing Pime Powe RSA Modulus = p q Sadiq

More information

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms Peason s Chi-Squae Test Modifications fo Compaison of Unweighted and Weighted Histogams and Two Weighted Histogams Univesity of Akueyi, Bogi, v/noduslód, IS-6 Akueyi, Iceland E-mail: nikolai@unak.is Two

More information

ASTR415: Problem Set #6

ASTR415: Problem Set #6 ASTR45: Poblem Set #6 Cuan D. Muhlbege Univesity of Mayland (Dated: May 7, 27) Using existing implementations of the leapfog and Runge-Kutta methods fo solving coupled odinay diffeential equations, seveal

More information

Berkeley Math Circle AIME Preparation March 5, 2013

Berkeley Math Circle AIME Preparation March 5, 2013 Algeba Toolkit Rules of Thumb. Make sue that you can pove all fomulas you use. This is even bette than memoizing the fomulas. Although it is best to memoize, as well. Stive fo elegant, economical methods.

More information

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22 C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.

More information

QIP Course 10: Quantum Factorization Algorithm (Part 3)

QIP Course 10: Quantum Factorization Algorithm (Part 3) QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse

More information

ONE-POINT CODES USING PLACES OF HIGHER DEGREE

ONE-POINT CODES USING PLACES OF HIGHER DEGREE ONE-POINT CODES USING PLACES OF HIGHER DEGREE GRETCHEN L. MATTHEWS AND TODD W. MICHEL DEPARTMENT OF MATHEMATICAL SCIENCES CLEMSON UNIVERSITY CLEMSON, SC 29634-0975 U.S.A. E-MAIL: GMATTHE@CLEMSON.EDU, TMICHEL@CLEMSON.EDU

More information

Gradient-based Neural Network for Online Solution of Lyapunov Matrix Equation with Li Activation Function

Gradient-based Neural Network for Online Solution of Lyapunov Matrix Equation with Li Activation Function Intenational Confeence on Infomation echnology and Management Innovation (ICIMI 05) Gadient-based Neual Netwok fo Online Solution of Lyapunov Matix Equation with Li Activation unction Shiheng Wang, Shidong

More information

arxiv: v1 [math.co] 4 May 2017

arxiv: v1 [math.co] 4 May 2017 On The Numbe Of Unlabeled Bipatite Gaphs Abdullah Atmaca and A Yavuz Ouç axiv:7050800v [mathco] 4 May 207 Abstact This pape solves a poblem that was stated by M A Haison in 973 [] This poblem, that has

More information

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu Available at https://edupediapublicationsog/jounals Volume 3 Issue 4 Febuay 216 Using Laplace Tansfom to Evaluate Impope Integals Chii-Huei Yu Depatment of Infomation Technology, Nan Jeon Univesity of

More information

Introduction Common Divisors. Discrete Mathematics Andrei Bulatov

Introduction Common Divisors. Discrete Mathematics Andrei Bulatov Intoduction Common Divisos Discete Mathematics Andei Bulatov Discete Mathematics Common Divisos 3- Pevious Lectue Integes Division, popeties of divisibility The division algoithm Repesentation of numbes

More information

Fixed Argument Pairing Inversion on Elliptic Curves

Fixed Argument Pairing Inversion on Elliptic Curves Fixed Agument Paiing Invesion on Elliptic Cuves Sungwook Kim and Jung Hee Cheon ISaC & Dept. of Mathematical Sciences Seoul National Univesity Seoul, Koea {avell7,jhcheon}@snu.ac.k Abstact. Let E be an

More information

Goodness-of-fit for composite hypotheses.

Goodness-of-fit for composite hypotheses. Section 11 Goodness-of-fit fo composite hypotheses. Example. Let us conside a Matlab example. Let us geneate 50 obsevations fom N(1, 2): X=nomnd(1,2,50,1); Then, unning a chi-squaed goodness-of-fit test

More information

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES AGU Intenational Jounal of Science and Technology A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES Ritu Ahuja Depatment of Mathematics Khalsa College fo Women, Civil Lines, Ludhiana-141001, Punjab, (India)

More information

Application of Parseval s Theorem on Evaluating Some Definite Integrals

Application of Parseval s Theorem on Evaluating Some Definite Integrals Tukish Jounal of Analysis and Numbe Theoy, 4, Vol., No., -5 Available online at http://pubs.sciepub.com/tjant/// Science and Education Publishing DOI:.69/tjant--- Application of Paseval s Theoem on Evaluating

More information

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution Statistics Reseach Lettes Vol. Iss., Novembe Cental Coveage Bayes Pediction Intevals fo the Genealized Paeto Distibution Gyan Pakash Depatment of Community Medicine S. N. Medical College, Aga, U. P., India

More information

A Comparison and Contrast of Some Methods for Sample Quartiles

A Comparison and Contrast of Some Methods for Sample Quartiles A Compaison and Contast of Some Methods fo Sample Quatiles Anwa H. Joade and aja M. Latif King Fahd Univesity of Petoleum & Mineals ABSTACT A emainde epesentation of the sample size n = 4m ( =, 1, 2, 3)

More information

Rate Splitting is Approximately Optimal for Fading Gaussian Interference Channels

Rate Splitting is Approximately Optimal for Fading Gaussian Interference Channels Rate Splitting is Appoximately Optimal fo Fading Gaussian Intefeence Channels Joyson Sebastian, Can Kaakus, Suhas Diggavi, I-Hsiang Wang Abstact In this pape, we study the -use Gaussian intefeence-channel

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

1. INTRODUCTION FAST ELLIPTIC CURVE CRYPTOGRAPHY USING OPTIMAL DOUBLE-BASE CHAINS

1. INTRODUCTION FAST ELLIPTIC CURVE CRYPTOGRAPHY USING OPTIMAL DOUBLE-BASE CHAINS FAST ELLIPTIC CURVE CRYPTOGRAPHY USING OPTIMAL DOUBLE-BASE CHAINS Voapong Suppakitpaisan, Hioshi Imai Gaduate School of Infomation Science and Technology, The Univesity of Tokyo Tokyo, Japan 11-00 m t

More information

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity Constuction and Analysis of Boolean Functions of 2t + 1 Vaiables with Maximum Algebaic Immunity Na Li and Wen-Feng Qi Depatment of Applied Mathematics, Zhengzhou Infomation Engineeing Univesity, Zhengzhou,

More information

Enumerating permutation polynomials

Enumerating permutation polynomials Enumeating pemutation polynomials Theodoulos Gaefalakis a,1, Giogos Kapetanakis a,, a Depatment of Mathematics and Applied Mathematics, Univesity of Cete, 70013 Heaklion, Geece Abstact We conside thoblem

More information

Cryptography. Primitives and Protocols. Aggelos Kiayias

Cryptography. Primitives and Protocols. Aggelos Kiayias P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by G. Panagiotakos, S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction

More information

Lifting Private Information Retrieval from Two to any Number of Messages

Lifting Private Information Retrieval from Two to any Number of Messages Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu

More information

A Power Method for Computing Square Roots of Complex Matrices

A Power Method for Computing Square Roots of Complex Matrices JOURNAL OF MATHEMATICAL ANALYSIS AND APPLICATIONS 13, 39345 1997 ARTICLE NO. AY975517 A Powe Method fo Computing Squae Roots of Complex Matices Mohammed A. Hasan Depatment of Electical Engineeing, Coloado

More information

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Based on notes by S. Pehlivanoglu, J. Todd, K. Samari, T. Zacharias and H.S.

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Based on notes by S. Pehlivanoglu, J. Todd, K. Samari, T. Zacharias and H.S. P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction 4 1.1 Flipping

More information

A New Design of Binary MDS Array Codes with Asymptotically Weak-Optimal Repair

A New Design of Binary MDS Array Codes with Asymptotically Weak-Optimal Repair IEEE TRANSACTIONS ON INFORMATION THEORY 1 A New Design of Binay MDS Aay Codes with Asymptotically Weak-Optimal Repai Hanxu Hou, Membe, IEEE, Yunghsiang S. Han, Fellow, IEEE, Patick P. C. Lee, Senio Membe,

More information

COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS

COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS Pogess In Electomagnetics Reseach, PIER 73, 93 105, 2007 COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS T.-X. Song, Y.-H. Liu, and J.-M. Xiong School of Mechanical Engineeing

More information

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution Applied Mathematical Sciences, Vol 11, 2017, no 27, 1337-1351 HIKARI Ltd, wwwm-hikaicom https://doiog/1012988/ams20177273 On the Quasi-invese of a Non-squae Matix: An Infinite Solution Ruben D Codeo J

More information

MULTILAYER PERCEPTRONS

MULTILAYER PERCEPTRONS Last updated: Nov 26, 2012 MULTILAYER PERCEPTRONS Outline 2 Combining Linea Classifies Leaning Paametes Outline 3 Combining Linea Classifies Leaning Paametes Implementing Logical Relations 4 AND and OR

More information

arxiv: v1 [math.co] 1 Apr 2011

arxiv: v1 [math.co] 1 Apr 2011 Weight enumeation of codes fom finite spaces Relinde Juius Octobe 23, 2018 axiv:1104.0172v1 [math.co] 1 Ap 2011 Abstact We study the genealized and extended weight enumeato of the - ay Simplex code and

More information

Solving Some Definite Integrals Using Parseval s Theorem

Solving Some Definite Integrals Using Parseval s Theorem Ameican Jounal of Numeical Analysis 4 Vol. No. 6-64 Available online at http://pubs.sciepub.com/ajna///5 Science and Education Publishing DOI:.69/ajna---5 Solving Some Definite Integals Using Paseval s

More information

Efficient Multiplication in for Elliptic Curve Cryptography

Efficient Multiplication in for Elliptic Curve Cryptography Efficient Multiplication in fo Elliptic Cuve Cyptogaphy JC Bajad, L Imbet, C Nège and T Plantad Laboatoie d Infomatique de Robotique et de Micoélectonique de Montpellie LIRMM, ue Ada, 3439 Montpellie cedex

More information

(n 1)n(n + 1)(n + 2) + 1 = (n 1)(n + 2)n(n + 1) + 1 = ( (n 2 + n 1) 1 )( (n 2 + n 1) + 1 ) + 1 = (n 2 + n 1) 2.

(n 1)n(n + 1)(n + 2) + 1 = (n 1)(n + 2)n(n + 1) + 1 = ( (n 2 + n 1) 1 )( (n 2 + n 1) + 1 ) + 1 = (n 2 + n 1) 2. Paabola Volume 5, Issue (017) Solutions 151 1540 Q151 Take any fou consecutive whole numbes, multiply them togethe and add 1. Make a conjectue and pove it! The esulting numbe can, fo instance, be expessed

More information

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou CONTENTS 1 Contents 2 1 Intoduction To begin discussing the basic popeties

More information

Markscheme May 2017 Calculus Higher level Paper 3

Markscheme May 2017 Calculus Higher level Paper 3 M7/5/MATHL/HP3/ENG/TZ0/SE/M Makscheme May 07 Calculus Highe level Pape 3 pages M7/5/MATHL/HP3/ENG/TZ0/SE/M This makscheme is the popety of the Intenational Baccalaueate and must not be epoduced o distibuted

More information

Probablistically Checkable Proofs

Probablistically Checkable Proofs Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol

More information

Duality between Statical and Kinematical Engineering Systems

Duality between Statical and Kinematical Engineering Systems Pape 00, Civil-Comp Ltd., Stiling, Scotland Poceedings of the Sixth Intenational Confeence on Computational Stuctues Technology, B.H.V. Topping and Z. Bittna (Editos), Civil-Comp Pess, Stiling, Scotland.

More information

Hypothesis Test and Confidence Interval for the Negative Binomial Distribution via Coincidence: A Case for Rare Events

Hypothesis Test and Confidence Interval for the Negative Binomial Distribution via Coincidence: A Case for Rare Events Intenational Jounal of Contempoay Mathematical Sciences Vol. 12, 2017, no. 5, 243-253 HIKARI Ltd, www.m-hikai.com https://doi.og/10.12988/ijcms.2017.7728 Hypothesis Test and Confidence Inteval fo the Negative

More information

12th WSEAS Int. Conf. on APPLIED MATHEMATICS, Cairo, Egypt, December 29-31,

12th WSEAS Int. Conf. on APPLIED MATHEMATICS, Cairo, Egypt, December 29-31, th WSEAS Int. Conf. on APPLIED MATHEMATICS, Caio, Egypt, Decembe 9-3, 7 5 Magnetostatic Field calculations associated with thick Solenoids in the Pesence of Ion using a Powe Seies expansion and the Complete

More information

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS?

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? 6th INTERNATIONAL MULTIDISCIPLINARY CONFERENCE HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? Cecília Sitkuné Göömbei College of Nyíegyháza Hungay Abstact: The

More information

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the

More information

On the Computation of the Optimal Ate Pairing at the 192-bit Security Level

On the Computation of the Optimal Ate Pairing at the 192-bit Security Level On the Computation of the Optimal Ate Paiing at the 192-bit Secuity Level Loubna Ghammam 1 and Emmanuel Fouotsa 2 (1) IRMAR, UMR CNRS 6625, Univesité Rennes 1, Campus de Beaulieu 35042 Rennes cedex, Fance.

More information

A Three-Dimensional Magnetic Force Solution Between Axially-Polarized Permanent-Magnet Cylinders for Different Magnetic Arrangements

A Three-Dimensional Magnetic Force Solution Between Axially-Polarized Permanent-Magnet Cylinders for Different Magnetic Arrangements Poceedings of the 213 Intenational Confeence on echanics, Fluids, Heat, Elasticity Electomagnetic Fields A Thee-Dimensional agnetic Foce Solution Between Axially-Polaied Pemanent-agnet Cylindes fo Diffeent

More information

Some RSA-based Encryption Schemes with Tight Security Reduction

Some RSA-based Encryption Schemes with Tight Security Reduction Some RSA-based Encyption Schemes with Tight Secuity Reduction Kaou Kuosawa 1 and Tsuyoshi Takagi 2 1 Ibaaki Univesity, 4-12-1 Nakanausawa, Hitachi, Ibaaki, 316-8511, Japan kuosawa@cis.ibaaki.ac.jp 2 Technische

More information

Rigid Body Dynamics 2. CSE169: Computer Animation Instructor: Steve Rotenberg UCSD, Winter 2018

Rigid Body Dynamics 2. CSE169: Computer Animation Instructor: Steve Rotenberg UCSD, Winter 2018 Rigid Body Dynamics 2 CSE169: Compute Animation nstucto: Steve Rotenbeg UCSD, Winte 2018 Coss Poduct & Hat Opeato Deivative of a Rotating Vecto Let s say that vecto is otating aound the oigin, maintaining

More information

The Substring Search Problem

The Substring Search Problem The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is

More information

KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS

KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS Jounal of Applied Analysis Vol. 14, No. 1 2008), pp. 43 52 KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS L. KOCZAN and P. ZAPRAWA Received Mach 12, 2007 and, in evised fom,

More information

1) (A B) = A B ( ) 2) A B = A. i) A A = φ i j. ii) Additional Important Properties of Sets. De Morgan s Theorems :

1) (A B) = A B ( ) 2) A B = A. i) A A = φ i j. ii) Additional Important Properties of Sets. De Morgan s Theorems : Additional Impotant Popeties of Sets De Mogan s Theoems : A A S S Φ, Φ S _ ( A ) A ) (A B) A B ( ) 2) A B A B Cadinality of A, A, is defined as the numbe of elements in the set A. {a,b,c} 3, { }, while

More information

Provable Security in Cryptography

Provable Security in Cryptography Povable Secuity in Cyptogaphy Thomas Baignèes EPFL http://lasecwww.epfl.ch May 29, 2007 (ve. 25) These lectue notes ae a compilation of some of my eadings while I was pepaing two lectues given at EPFL

More information

The Congestion of n-cube Layout on a Rectangular Grid S.L. Bezrukov J.D. Chavez y L.H. Harper z M. Rottger U.-P. Schroeder Abstract We consider the pr

The Congestion of n-cube Layout on a Rectangular Grid S.L. Bezrukov J.D. Chavez y L.H. Harper z M. Rottger U.-P. Schroeder Abstract We consider the pr The Congestion of n-cube Layout on a Rectangula Gid S.L. Bezukov J.D. Chavez y L.H. Hape z M. Rottge U.-P. Schoede Abstact We conside the poblem of embedding the n-dimensional cube into a ectangula gid

More information

A Converse to Low-Rank Matrix Completion

A Converse to Low-Rank Matrix Completion A Convese to Low-Rank Matix Completion Daniel L. Pimentel-Alacón, Robet D. Nowak Univesity of Wisconsin-Madison Abstact In many pactical applications, one is given a subset Ω of the enties in a d N data

More information

arxiv: v1 [math.nt] 12 May 2017

arxiv: v1 [math.nt] 12 May 2017 SEQUENCES OF CONSECUTIVE HAPPY NUMBERS IN NEGATIVE BASES HELEN G. GRUNDMAN AND PAMELA E. HARRIS axiv:1705.04648v1 [math.nt] 12 May 2017 ABSTRACT. Fo b 2 and e 2, let S e,b : Z Z 0 be the function taking

More information

A Deep Convolutional Neural Network Based on Nested Residue Number System

A Deep Convolutional Neural Network Based on Nested Residue Number System A Deep Convolutional Neual Netwok Based on Nested Residue Numbe System Hioki Nakahaa Ehime Univesity, Japan Tsutomu Sasao Meiji Univesity, Japan Abstact A pe-tained deep convolutional neual netwok (DCNN)

More information

Analysis of high speed machining center spindle dynamic unit structure performance Yuan guowei

Analysis of high speed machining center spindle dynamic unit structure performance Yuan guowei Intenational Confeence on Intelligent Systems Reseach and Mechatonics Engineeing (ISRME 0) Analysis of high speed machining cente spindle dynamic unit stuctue pefomance Yuan guowei Liaoning jidian polytechnic,dan

More information

Appraisal of Logistics Enterprise Competitiveness on the Basis of Fuzzy Analysis Algorithm

Appraisal of Logistics Enterprise Competitiveness on the Basis of Fuzzy Analysis Algorithm Appaisal of Logistics Entepise Competitiveness on the Basis of Fuzzy Analysis Algoithm Yan Zhao, Fengge Yao, Minming She Habin Univesity of Commece, Habin, Heilongjiang 150028, China, zhaoyan2000@yahoo.com.cn

More information

Divisibility. c = bf = (ae)f = a(ef) EXAMPLE: Since 7 56 and , the Theorem above tells us that

Divisibility. c = bf = (ae)f = a(ef) EXAMPLE: Since 7 56 and , the Theorem above tells us that Divisibility DEFINITION: If a and b ae integes with a 0, we say that a divides b if thee is an intege c such that b = ac. If a divides b, we also say that a is a diviso o facto of b. NOTATION: d n means

More information

WIENER MODELS OF DIRECTION-DEPENDENT DYNAMIC SYSTEMS. Singleton Park, Swansea, SA2 8PP, UK. University of Warwick, Coventry, CV4 7AL, UK

WIENER MODELS OF DIRECTION-DEPENDENT DYNAMIC SYSTEMS. Singleton Park, Swansea, SA2 8PP, UK. University of Warwick, Coventry, CV4 7AL, UK Copyight IFAC 5th Tiennial Wold Congess, Bacelona, Spain WIEER MOELS OF IRECTIO-EPEET YAMIC SYSTEMS H. A. Bake, A. H. Tan and K. R. Godfey epatment of Electical and Electonic Engineeing, Univesity of Wales,

More information

Revision of Lecture Eight

Revision of Lecture Eight Revision of Lectue Eight Baseband equivalent system and equiements of optimal tansmit and eceive filteing: (1) achieve zeo ISI, and () maximise the eceive SNR Thee detection schemes: Theshold detection

More information

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra Poceedings of the 006 IASME/SEAS Int. Conf. on ate Resouces, Hydaulics & Hydology, Chalkida, Geece, May -3, 006 (pp7-) Analytical Solutions fo Confined Aquifes with non constant Pumping using Compute Algeba

More information

Question 1: The dipole

Question 1: The dipole Septembe, 08 Conell Univesity, Depatment of Physics PHYS 337, Advance E&M, HW #, due: 9/5/08, :5 AM Question : The dipole Conside a system as discussed in class and shown in Fig.. in Heald & Maion.. Wite

More information

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated

More information

Application of homotopy perturbation method to the Navier-Stokes equations in cylindrical coordinates

Application of homotopy perturbation method to the Navier-Stokes equations in cylindrical coordinates Computational Ecology and Softwae 5 5(): 9-5 Aticle Application of homotopy petubation method to the Navie-Stokes equations in cylindical coodinates H. A. Wahab Anwa Jamal Saia Bhatti Muhammad Naeem Muhammad

More information

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix Jounal of Sciences, Islamic Republic of Ian (): - () Univesity of Tehan, ISSN - http://sciencesutaci Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matix H Ahsani

More information

QUANTUM ALGORITHMS IN ALGEBRAIC NUMBER THEORY

QUANTUM ALGORITHMS IN ALGEBRAIC NUMBER THEORY QUANTU ALGORITHS IN ALGEBRAIC NUBER THEORY SION RUBINSTEIN-SALZEDO Abstact. In this aticle, we discuss some quantum algoithms fo detemining the goup of units and the ideal class goup of a numbe field.

More information

Bayesian Congestion Control over a Markovian Network Bandwidth Process

Bayesian Congestion Control over a Markovian Network Bandwidth Process Bayesian Congestion Contol ove a Makovian Netwok Bandwidth Pocess Paisa Mansouifad,, Bhaska Kishnamachai, Taa Javidi Ming Hsieh Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles,

More information

Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference

Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference Impoved Factoing Attacks on Multi-Pime RSA with Small Pime Diffeence Mengce Zheng 1,2, Nobou Kunihio 2, and Honggang Hu 1 1 Univesity of Science and Technology of China, China mengce.zheng@gmail.com 2

More information

Steady State and Transient Performance Analysis of Three Phase Induction Machine using MATLAB Simulations

Steady State and Transient Performance Analysis of Three Phase Induction Machine using MATLAB Simulations Intenational Jounal of Recent Tends in Engineeing, Vol, No., May 9 Steady State and Tansient Pefomance Analysis of Thee Phase Induction Machine using MATAB Simulations Pof. Himanshu K. Patel Assistant

More information

Method for Approximating Irrational Numbers

Method for Approximating Irrational Numbers Method fo Appoximating Iational Numbes Eic Reichwein Depatment of Physics Univesity of Califonia, Santa Cuz June 6, 0 Abstact I will put foth an algoithm fo poducing inceasingly accuate ational appoximations

More information

A dual-reciprocity boundary element method for axisymmetric thermoelastodynamic deformations in functionally graded solids

A dual-reciprocity boundary element method for axisymmetric thermoelastodynamic deformations in functionally graded solids APCOM & ISCM 11-14 th Decembe, 013, Singapoe A dual-ecipocity bounday element method fo axisymmetic themoelastodynamic defomations in functionally gaded solids *W. T. Ang and B. I. Yun Division of Engineeing

More information

Chapter 5 Linear Equations: Basic Theory and Practice

Chapter 5 Linear Equations: Basic Theory and Practice Chapte 5 inea Equations: Basic Theoy and actice In this chapte and the next, we ae inteested in the linea algebaic equation AX = b, (5-1) whee A is an m n matix, X is an n 1 vecto to be solved fo, and

More information

ON SPARSELY SCHEMMEL TOTIENT NUMBERS. Colin Defant 1 Department of Mathematics, University of Florida, Gainesville, Florida

ON SPARSELY SCHEMMEL TOTIENT NUMBERS. Colin Defant 1 Department of Mathematics, University of Florida, Gainesville, Florida #A8 INTEGERS 5 (205) ON SPARSEL SCHEMMEL TOTIENT NUMBERS Colin Defant Depatment of Mathematics, Univesity of Floida, Gainesville, Floida cdefant@ufl.edu Received: 7/30/4, Revised: 2/23/4, Accepted: 4/26/5,

More information

Magnetometer Calibration Algorithm Based on Analytic Geometry Transform Yongjian Yang, Xiaolong Xiao1,Wu Liao

Magnetometer Calibration Algorithm Based on Analytic Geometry Transform Yongjian Yang, Xiaolong Xiao1,Wu Liao nd Intenational Foum on Electical Engineeing and Automation (IFEEA 5 Magnetomete Calibation Algoithm Based on Analytic Geomety ansfom Yongjian Yang, Xiaolong Xiao,u Liao College of Compute Science and

More information

Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks

Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks Modeling Pimay Use Emulation Attacks and efenses in Cognitive Radio Netwoks Zesheng Chen, Todo Cooklev, Chao Chen, and Calos Pomalaza-Ráez Indiana Univesity - Pudue Univesity Fot Wayne Fot Wayne, IN 46805

More information

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM Poceedings of the ASME 2010 Intenational Design Engineeing Technical Confeences & Computes and Infomation in Engineeing Confeence IDETC/CIE 2010 August 15-18, 2010, Monteal, Quebec, Canada DETC2010-28496

More information

Multiple Criteria Secretary Problem: A New Approach

Multiple Criteria Secretary Problem: A New Approach J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and

More information

Supplementary information Efficient Enumeration of Monocyclic Chemical Graphs with Given Path Frequencies

Supplementary information Efficient Enumeration of Monocyclic Chemical Graphs with Given Path Frequencies Supplementay infomation Efficient Enumeation of Monocyclic Chemical Gaphs with Given Path Fequencies Masaki Suzuki, Hioshi Nagamochi Gaduate School of Infomatics, Kyoto Univesity {m suzuki,nag}@amp.i.kyoto-u.ac.jp

More information

Guide to Pairing-Based Cryptography. Nadia El Mrabet and Marc Joye, Eds.

Guide to Pairing-Based Cryptography. Nadia El Mrabet and Marc Joye, Eds. Guide to Paiing-Based Cyptogaphy by Nadia El Mabet and Mac Joye, Eds. 3 Paiings Soina Ionica Univesité de Picadie Jules Vene Damien Robet INRIA Bodeaux Sud-Ouest, Univesité de Bodeaux 3.1 Functions, Divisos

More information

Power efficiency and optimum load formulas on RF rectifiers featuring flow-angle equations

Power efficiency and optimum load formulas on RF rectifiers featuring flow-angle equations LETTE IEICE Electonics Expess, Vol.10, No.11, 1 9 Powe efficiency and optimum load fomulas on F ectifies featuing flow-angle equations Takashi Ohia a) Toyohashi Univesity of Technology, 1 1 Hibaigaoka,

More information

FUSE Fusion Utility Sequence Estimator

FUSE Fusion Utility Sequence Estimator FUSE Fusion Utility Sequence Estimato Belu V. Dasaathy Dynetics, Inc. P. O. Box 5500 Huntsville, AL 3584-5500 belu.d@dynetics.com Sean D. Townsend Dynetics, Inc. P. O. Box 5500 Huntsville, AL 3584-5500

More information

EM Boundary Value Problems

EM Boundary Value Problems EM Bounday Value Poblems 10/ 9 11/ By Ilekta chistidi & Lee, Seung-Hyun A. Geneal Desciption : Maxwell Equations & Loentz Foce We want to find the equations of motion of chaged paticles. The way to do

More information

Implicit Constraint Enforcement for Rigid Body Dynamic Simulation

Implicit Constraint Enforcement for Rigid Body Dynamic Simulation Implicit Constaint Enfocement fo Rigid Body Dynamic Simulation Min Hong 1, Samuel Welch, John app, and Min-Hyung Choi 3 1 Division of Compute Science and Engineeing, Soonchunhyang Univesity, 646 Eupnae-i

More information

Research Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function

Research Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function Abstact and Applied Analysis Volume 011, Aticle ID 697547, 7 pages doi:10.1155/011/697547 Reseach Aticle On Alze and Qiu s Conjectue fo Complete Elliptic Integal and Invese Hypebolic Tangent Function Yu-Ming

More information

The height of minimal Hilbert bases

The height of minimal Hilbert bases 1 The height of minimal Hilbet bases Matin Henk and Robet Weismantel Abstact Fo an integal polyhedal cone C = pos{a 1,..., a m, a i Z d, a subset BC) C Z d is called a minimal Hilbet basis of C iff i)

More information

Experiment I Voltage Variation and Control

Experiment I Voltage Variation and Control ELE303 Electicity Netwoks Expeiment I oltage aiation and ontol Objective To demonstate that the voltage diffeence between the sending end of a tansmission line and the load o eceiving end depends mainly

More information

3.1 Random variables

3.1 Random variables 3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated

More information