Provable Security Against a Dierential Attack? Aarhus University, DK-8000 Aarhus C.

Size: px
Start display at page:

Download "Provable Security Against a Dierential Attack? Aarhus University, DK-8000 Aarhus C."

Transcription

1 Provable Security Against a Dierential Attack Kaisa Nyberg and Lars Ramkilde Knudsen Aarus University, DK-8000 Aarus C. Abstract. Te purpose of tis paper is to sow tat tere exist DESlike iterated cipers, wic are provably resistant against dierential attacks. Te main result on te security of a DES-like ciper wit independent round keys is Teorem 1, wic gives an upper bound to te probability of s-round dierentials, as dened in [4] and tis upper bound depends only on te round function of te iterated ciper. Moreover, it is sown tat tere exist functions suc tat te probabilities of differentials are less tan or equal to 2 3,n, were n is te lengt of te plaintext block. We also sow a prototype of an iterated block ciper, wic is compatible wit DES and as proven security against dierential attacks. Key words. DES-like cipers, Dierential cryptanalysis, Almost perfect nonlinear permutations, Markov Cipers. 1 Introduction A DES-like ciper is a block ciper based on iterating a function, called F, several times. Eac iteration is called a round. Te input to eac round is divided into two alves. Te rigt alf is fed into F togeter wit a round key derived from akey scedule algoritm. Te output of F is added (modulo 2) to te left alf of te input and te two alves are swapped except for te last round. Te plaintext is te input to te rst round and te cipertext is te output of te last round. In [1] E. Biam and A. Samir introduced dierential cryptanalysis of DESlike cipers. In teir attacks tey make use of caracteristics, wic describe te beaviour of input and output dierences for some number of consecutive rounds. Te probability of a one-round caracteristic is te conditional probability tat given a certain dierence in te inputs to te round we get a certain dierence in te outputs of te round. Lai and Massey [4] observed tat for te success of dierential cryptanalysis it may not be necessary to x te values of input and output dierences for te intermediate rounds in a caracteristic. Tey introduced te notion of dierentials. Te probability of an s-round dierential is te conditional probability tat given an input dierence at te rst round, te output dierence at te s't round will be some xed value. Note tat A preliminary version of tis paper was presented in te rump session at Crypto '92 and will appear in te proceedings. Te work of te autor on tis project is supported by MATINE Board, Finland.

2 te probability of an s-round dierential wit input dierence A and output dierence B is te sum of te probabilities of all s-round caracteristics wit input dierence A and output dierence B. For s 2 te probabilities for a dierential and for te corresponding caracteristic are equal, but in general te probabilities for dierentials will be iger. In order to make a successful attack on a DES-like iterated ciper by dierential cryptanalysis te existence of good caracteristics is sucient. On te oter and to prove security against dierential attacks for DES-like iterated cipers we must ensure tat tere is no dierential wit a probability ig enoug to enable successful attacks. 2 Resistance against dierential attacks A DES-like iterated ciper wit block size 2n and wit r rounds is dened as follows. Let f : GF (2) m! GF (2) n ; m n E : GF (2) n! GF (2) m ; an ane expansion mapping and let K =(K 1 ;K 2 ; :::; K r ), were K i 2 GF (2) m, be te r round keys. Te round function (in te i't round) F : GF (2) n GF (2) m! GF (2) n is ten dened F (X; K i )=f(e(x) +K i ), were '+' is te bitwise addition modulo 2. Given a plaintext X =(X L ;X R ) and a key K =(K 1 ;K 2 ;:::;K r ) te cipertext Y =(Y L ;Y R ) is computed in r rounds. Set X L (0) = X L and X R (0) = X R and compute for i =1; 2; :::; r X L (i) =X R (i, 1) X R (i) =F ((X R (i, 1);K i )+X L (i, 1) X(i) =(X L (i);x R (i)) Set Y L = X R (r) andy R = X L (r). Te dierence between two n-bit blocks is dened as X = X + X An s-round caracteristic is an (s+1)-tuple ((0); (1); :::; (s)) considered as te possible values of (X(0); X(1);:::; X(s)); wereas an s-round dierential is a pair((0);(s)) considered as te possible values of (X(0);X(s)) [1, 4]. To prove resistance against dierential cryptanalysis we need to nd te best dierentials, so for te remainder of tis paper we consider only dierentials. Dierential attacks use s-round dierentials to pus forward te information of a xed input dierence at te rst round to te s't round independently of te used key. In tis paper we will sow tatitispossibletocoose te

3 round function so tat no single dierential is useful. Given a plaintext pair X; X,cosen by te cryptanalyst and r independent uniformly random round keys K 1 ;K 2 ; :::; K r, unknown to te cryptanalyst, te dierential may ormay not old. It is natural to measure te rate of success for te cryptanalyst by te probability of te dierential taken over te distributions of X and K. Te probability of a one-round dierential (X(0) = ; X(1) = ) is P (X(1) = j X(0) = ) wic by te property of Markov cipers, as dened in [4], is equal to P (X(1) = j X(0) = ; X = ) for all values of X, if te round key K is uniformly distributed. Hence te probability of a one round dierential is independent of te distribution of X and is taken over te distribution of K. Assuming tat te round keys K 1 ;K 2 ; :::; K r are mutually independent it follows tat te probability of an s-round caracteristic is te product of te probabilities of te individual rounds. Ten te probability of an s-round dierential equals (see also [4]) P (X(s) =(s) j X(0) = (0)) = X X (1) (2) :::: X sy (s,1) i=1 P (X(i) =(i) j X(i, 1) = (i, 1)) We denote by p max te igest probability for a non-trivial one-round dierential acievable by te cryptanalyst, i.e. p max = max max R6=0P (X(1) = j X(0) = ) were R is te rigt alfof. We sall sow in Sect. 3 tat te round function of a DES-like ciper can be cosen in suc away tat p max is small. Teorem 1 It is assumed tat in a DES-like ciper wit f : GF (2) m! GF (2) n te round keys are independent and uniformly random. Ten te probability of an s-round dierential, s 4, is less tan or equal to 2p 2 max. Proof: We sall rst give te proof for s = 4, i.e. P (X(4) = j X(0) = ) 2p 2 max for any ; (6= 0).Let L, R and L, R be te left and rigt alves of and. We denote by X R (i) te rigt input dierences at te i't round, see Figure 1. Let! denote tat, in order for te s-round dierential (; ) tooccur,itis necessary tat inputs to F wit dierence lead to outputs wit dierence. We split te proof into cases were L = 0 and L 6=0. Note tat wen L = 0 ten R 6= 0, oterwise L = R = L = R = 0, wic is of no use in dierential cryptanalysis. Similarly if L = 0 ten R 6=0.

4 X L(0) = L X R(0) = R F ( (( ( (((( ( (((( ( ( ((( F X R(1) ( (( ( (((( ( (((( ( ( ((( F X R(2) ( (( ( (((( ( (((( ( ( ((( F X R(3) = L ( (( ( (((( ( (((( ( ( ((( X L(4) = L X R(4) = R Fig. 1. Te four round dierential 1. L =0.Ten clearly X R (2) = R 6=0.IfX R (1) = 0 ten X R (2) = R = R 6= 0. It ten follows tat R = R! L in te rst round and X R (2) = R! 0 in te tird round, bot combinations wit probability at most p max.ifx R (1) 6= 0 ten it follows tat for any given X R (1) te second round must be X R (1)! R + R and te tird round must be X R (2) = R! X R (1), bot combinations wit probability atmostp max.we obtain P (X(4) X = j X(0) = ) = P (X R (1) j X(0) = ) P (X(4) = j X(0) = ; X R (1)) X R(1) = P (X X R (1) = 0 j X(0) = ) P (X(4) = j X(0) = ; X R (1) = 0) + P (X R (1) j X(0) = ) P (X(4) = j X(0) = ; X R (1)) X R(1)6=0 p 2 max + X X R(1)6=0 P (X R (1) j X(0) = ) p 2 max

5 2p 2 max since P X R(1)6=0 P (X R(1) j X(0) = ) L 6=0.We consider rst te 3-round dierential obtained by xing X R (1). We obtain P (X(4) X = j X(0) = ; X R (1)) = P (X R (2) j X(0) = ; X R (1)) X R(2) P (X(4) = j X(0) = ; X R (1);X R (2)) = P (X R (2) = 0 j X(0) = ; X R (1)) P (X(4) X = j X(0) = ; X R (1);X R (2) = 0) + P (X R (2) j X(0) = ; X R (1)) X R(2)6=0 p max p max + 2p 2 max P (X(4) = j X(0) = ; X R (1);X R (2)) X X R(2)6=0 P (X R (2) j X(0) = ; X R (1)) p 2 max Te above sows tat Teorem 1 olds for s-round dierentials for s 3if L 6= 0. In te rst inequality we used tat if X R (2) = 0 ten X R (1) 6= 0, since oterwise L = R =0.Now P (X(4) X = j X(0) = ) = P (X R (1) j X(0) = ) P (X(4) = j X(0) = ; X R (1)) X X R(1) X R(1) 2p 2 max Let now s>4. Ten P (X R (1) j X(0) = ) 2p 2 max P (X(s) X =jx(0) = ) = P (X(s, 4) j X(0) = ) P (X(s) =jx(0) = ; X(s, 4)) X(s,4) Since we assumed tat te round keys are independent and uniformly random it follows from te proof for s = 4 tat P (X(s) = j X(0) = ; X(s, 4)) = P (X(s) = j X(s, 4)) 2p 2 max Tus P (X(s) = j X(0) = ) 2p 2 max. 2 If f is a permutation, Teorem 1 can be proved for s 3. It comes from te fact tat to ave equal outputs of one round we must ave equal inputs.

6 Teorem 2 It is assumed tat te function f in a DES-like ciper is a permutation and tat te round keys are independent and uniformly random. Ten te probability of an s-round dierential for s 3 is less tan or equal to 2p 2 max. Proof: We give te proof for s = 3. Te general case can ten be proved like in te preceding teorem. Again we separate between two cases and use te same notation as before. 1. L =0.Ten X R (0) = R 6= 0, oterwise dierent inputs would ave to yield equal outputs in te second round, but tat is not possible, since f is a permutation. Te dierence in te inputs at te rst round is R 6=0andte dierence in te inputs at te second round is R 6=0,tus P (X(3) = j X(0) = ) p 2 max. 2. L 6=0.Like in te proof of Teorem 1 we split into cases were X R (1) is zero or not. Note tat if X R (1)=0) L 6= 0 oterwise R! L =0) R =0.We obtain P (X(3) X = j X(0) = ) = P (X R (1) j X(0) = ) P (X(3) = j X(0) = ; X R (1)) X R(1) = P (X X R (1) = 0 j X(0) = ) P (X(3) = j X(0) = ; X R (1) = 0) + P (X R (1) j X(0) = ) P (X(3) = j X(0) = ; X R (1)) X R(1)6=0 p 2 max + X X R(1)6=0 P (X R (1) j X(0) = ) p 2 max 2p 2 max 2 3 Almost perfect nonlinear permutations First we sow tat te maximum probability p max of a one-round dierential as an upperbound tat can be expressed in terms of te function f. Let Ten p f = max bmax a6=0 P (f(y + a)+f(y )=b): p max = max max R6=0P (X(1) = j X(0) = ) = max max R6=0P ( L + f(e(x + R )+K)+f(E(X)+K) = R ) p f ; were we ave assumed tat E is ane and denoted K + E(X) by Y.IfK is uniformly distributed ten so is Y. For a mapping f : GF (2) m! GF (2) n te lower bound for p f is 2,n. Mappings attaining tis lower bound were investigated in [7], were tey are called

7 perfect nonlinear generalizing te denition of perfect nonlinearity given for Boolean functions in [6]. It was sown in [7] tat perfect nonlinear mappings from GF (2) m! GF (2) n only exist for m even and m 2n. Hence tey can be adapted for use in DES-like cipers only wit expansion mappings tat double te block lengt. If te round function of a DES-like ciper does not involve any expansion, i.e. in te case wen f : GF (2) m! GF (2) n is a permutation, te trivial lower bound for p f is 2 1,n, since ten te dierence f(x + w)+f(x) obtains alf of te values in GF (2) n twice and never te oter alf of te values. We sall call te permutations wit p f =2 1,n almost perfect nonlinear. Te purpose of tis section is to sow tat suc permutations exist. For unexplained terminology we refer to [5]. Let m = nd, were n is odd. In [8] permutations f of GF (2 m )=GF (2 d ) n were constructed to satisfy te following property: (P) Every nonzero linear combination of te components of f is a nondegenerate quadratic form x t Cx in n indeterminates over GF (2 d ) wit rank(c+c t )= n, 1: It follows immediately from te denition tat te coordinate functions of a permutation wit (P) are complete, tat is, depend on all input variables. Te main result of tis section is te following teorem. Teorem 3 Let f : GF (2 d ) n! GF (2 d ) n, n odd, be apermutation satisfying (P). Ten p f =2d(1,n). Our proof of te teorem is based on te following tree lemmata concerning properties of linear structures of quadratic forms. Recall tat a linear structure w of f : F n! F, F a eld, is a vector in F n suc tat f(x + w) +f(x) is constant asx varies. Te linear structures of a quadratic form f(x) =x t Ax in n indeterminates over GF (2 d ) wit rank(a+a t )=n,1 form a one-dimensional linear subspace of GF (2 d ) n (see [8], Prop. 3). For a quadratic form f and every xed w te function f(x + w)+f(x) ofx is ane or constant. From tis we get te rst lemma. Lemma 1 Let w 2 GF (2 d ) n be not a linear structure of f : GF (2 d ) n! GF (2 d );f(x) =x t Ax. Ten te function f(x + w) +f(x) of x is balanced, i.e. obtains eac value in GF (2 d ) equally many times. Lemma 2 Let f(x) = x t Ax be a quadratic form in n indeterminates over GF (2) suc tat rank(a + A t )=n, 1. Ten f is nondegenerate if and only if f(w) 6= 0 for te nonzero linear structures w of f (see also Lemma 4.1. in [3]). Proof: Let '(x 1 ;:::;x n )=x 1 x 2 + :::+ x n,2 x n,1 + x 2 n

8 = 0 or 1, be te quadratic forms to wic all quadratic forms f(x) =x t Ax wit rank(a + A t )=n, 1 are equivalent (see [5], C.6.2). It means tat tere is a linear transformation T of coordinates suc tat f(x) ='(Tx). Ten w is a linear structure of f if and only if Tw =(0; 0;:::;0;a), were a 2 GF (2 d ). Ten f is nondegenerate if and only if ' is nondegenerate wic is true if and only if =1.But = 1 if and only if f(w) ='(Tw) ='(0;:::;0;a)=a 2 6=0 for a 6= 0: 2 Lemma 3 Let f : GF (2 d ) n! GF (2 d ) n beapermutation wit property (P). Ten every nonzero w 2 GF (2 d ) n is a linear structure of a nonzero linear combination of te components of f. Proof: Let u be a nonzero vector in GF (2 d ) n and let w 2 GF (2 d ) n be a nonzero linear structure of u f. Ten w, 2 GF (2 d ) are te linear structures of cu f, c 2 GF (2 d ). Hence it suces to sow tat if u 1 f and u 2 f sare a nonzero linear structure ten tere is c 2 GF (2 d ) suc tat u 1 = cu 2. Let w be a nonzero linear structure of u 1 f and u 2 f. Ten w is also te linear structure of (c 1 u 1 + c 2 u 2 ) f ; for all c 1 ;c 2 2 GF (2 d ): Since u 1 f and u 2 f are nondegenerate it follows from Lemma 2 tat u 1 f(w) 6= 0 and u 2 f(w) 6= 0: Hence tere exists c 6= 0 suc tat cu 1 f(w) =u 2 f(w) or, wat is te same, (cu 1 + u 2 ) f(w) =0: If cu 1 6= u 2,ten(cu 1 + u 2 ) f is nondegenerate wic cannot be true by Lemma 2. Consequently cu 1 = u 2. 2 Now Teorem 3 is a consequence of te following Teorem 4 Let f =(f 1 ;f 2 ;:::;f n ): GF (2 d ) n! GF (2 d ) n beapermutation tat satises (P). Ten for every xed nonzero dierence w 2 GF (2 d ) n of te inputs to f, te dierences of te outputs lie in an ane yperplane of GF (2 d ) n and are uniformly distributed tere. Proof: Let w be a nonzero input dierence for f. Ten by Lemma 3 tere is v 2 GF (2 d ) n, v 6= 0, suc tat w is te linear structure of vf and by Lemma 2 v f(x + w)+v f(x) =v f(w) 6= 0 for all x 2 GF (2 d ) n.we denote b 0 = v f(w): Let u 1 ;:::;u n,1 be linearly independent vectors in GF (2 d ) n suc tat v 62 spanfu 1 ;:::;u n,1 g: Ten by Lemma 1 for every u 2 spanfu 1 ;:::;u n,1 g te function x 7! u f(x + w)+u f(x)

9 obtains eac value in GF (2 d ) equally many times. Consequently (see [5]), for every (b 1 ;:::;b n,1 ) 2 GF (2 d ) n,1, te system of equations u i f(x + w)+u i f(x) =b i ;i=1;:::;n, 1; as 2 d solutions x 2 GF (2 d ) n. Hence te system of n equations: (2) u i f(x + w)+u i f(x) =b i ;i=1;:::;n, 1; v f(x + w)+v f(x) =b as 2 d solutions if b = b 0 and no solutions if b 6= b 0 : Every system of n equations f i (x + w)+f i (x) =a i ;i=1; 2;:::;n is a linear transformation of (2), from wic te claim follows. 2 By a similar argumentation one can prove te following generalization of Teorem 3. Teorem 5 Let f be apermutation in GF (2 d ) n, n odd, wit property (P ) and let f 1 ;:::;f n be te components of f wit respect to some arbitrary xed basis over GF (2 d ).Let l n and set =(f 1 ;f 2 ;:::;f l ). Ten p =2d(1,l). From te results of Section 2 we now obtain Teorem 6 Assume tat in a DES-like ciper te function f is a mapping from GF (2) nd to GF (2) ld, n l, obtained fromapermutation in GF (2 d ) n wit (P) by discarding n, l output coordinates. Ten p f =2d(1,l). Moreover, if n>l, ten te probability of every r-round dierential, r 4, is less tan or equal to 2 2d(1,l)+1, assuming tat te round keys are uniformly random and independent. If n = l, te probability of every r-round dierential, r 3, is less tan or equal to 2 2d(1,l)+1. 4 Class of permutations wit property (P) In tis section we sow tat te permutations f(x) =x 2k +1 in GF (2 nd ) wit k =0modd, gcd(k; n) = 1, and n odd, ave property (P), wen considered as permutations of GF (2 d ) n. Let 1 ; :::; P n be a basis in GF (2 nd )over GF (2 d )and 1 ; :::; n be its dual basis. n Let x = i=1 x i i ;x i 2 GF (2 d ). Ten te i't component f i (x) off(x) wit respect to te basis 1 ;:::; n is f i (x) =Tr( i x 2k +1 ) = Tr( i ( = = j=1 l=1 j=1 l=1 j=1 x j j )( l=1 x l l ) 2k ) Tr( i j 2k l )x j x l Tr( i j ( i l ) 2k )x j x l

10 were i 2 GF (2 nd )issuc tat 2k +1 i = i ;i=1; 2; :::; n: Now it is straigtforward to ceck tat Tr( i j ( i l ) 2k ) 2 GF (2 d )isteentry on te j't row and l't column in te matrix A i = B t i Rk B i were B i = 0 B i 1 i 2 i n ( i 1 ) 2 ( i 2 ) 2 ( i n ) ( i 1 ) 2n,1 ( i 2 ) 2n,1 ( i n ) 2n,1 is a n n regular matrix over GF (2 nd ) and R = 0 B is te cyclic sift for wic rank(r k +(R k ) t )=n, 1ifgcd(k; n) = 1. Ten also x t Rx is nondegenerate. Consequently, and f i (x) =x t A i x 1 C C A 1 C C A rank(a i + A t i)=rank(b t i(r k +(R k ) t )B i )=rank(r k +(R k ) t )=n, 1 over GF (2 nd ). Tus rank(a i + A t i )=n, 1alsoover GF (2d ), since te rank does not decrease wen going to a subeld and it cannot be n. By te linearity of te trace function te same olds for every nonzero linear combination of te components f i of f : Tis completes te proof of property (P) for f. 5 A prototype of a DES-like ciper for encryption Let g(x) = x 3 in GF (2 33 ). Tere are several ecient ways of implementing tis power polynomial and eac of tem suggest a coice of a basis in GF (2 33 ). Let us x a basis and discard one output coordinate. Ten we ave a function f : GF (2) 33! GF (2) 32 : Te 64-bit plaintext block is divided into two 32-bit alves L and R. Te plaintext expansion is an ane mapping E : GF (2) 32! GF (2) 33 : Eac round take a 32 bit input and a 33 bit key. Te round function is LkR 7! R k L + f(e(r)+k): In [2] E. Biam and A. Samir introduced an improved dierential attack on 16-round DES. Tis means, tat in general for an r-round DES-like ciper te existence of an (r, 2)-round dierential wit a suciently ig probability may enable a successful dierential attack. From Teorem 6 we ave tat every four and ve round dierential of tis block ciper as probability less tan or equal to 2,61. Terefore we suggest at least six rounds for te block ciper. All round

11 keys sould be independent, terefore we need at least 198 key bits. More examples of permutations f for wic p max is low can be found in [9]. Te examples include te inverses of x 7! x 2k +1 and te mappings x 7! x,1, wose coordinate functions are of iger nonlinear order tan quadratic. 6 Acknowledgements We would like to tank D. Coppersmit and an anonymous referee for comments tat improved te paper. References 1. E. Biam, A. Samir. Dierential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, Vol. 4 No E. Biam, A. Samir. Dierential Cryptanalysis of te full 16-round DES. Tecnical Report # 708, Tecnion - Israel Institute of Tecnology. 3. P. Camion, C. Carlet, P. Carpin, N. Sendrier. On Correlation-immune functions. Advances in Cryptology - Crypto '91. Lecture Notes in Computer Science 576, Springer-Verlag, 1992, pp X. Lai, J. L. Massey, S. Murpy. Markov Cipers and Dierential Cryptanalysis. Advances in Cryptology - Eurocrypt '91. Lecture Notes in Computer Science 547, Springer-Verlag, 1992, pp R. Lidl, H. Niederreiter. Finite Fields. Encyclopedia of Matematics and its applications, Vol. 20. Addison-Wesley, Reading, Massacusetts, W. Meier, O. Staelbac. Nonlinearity criteria for cryptograpic functions. Advances in Cryptology - Eurocrypt '89. Lecture Notes in Computer Science, 434, Springer-Verlag, 1990, pp K. Nyberg. Perfect nonlinear S-boxes. Advances in Cryptology - Proceedings of Eurocrypt '91. Lecture Notes in Computer Science 547, Springer Verlag, 1991, pp K. Nyberg. On te construction of igly nonlinear permutations. Advances in Cryptology - Eurocrypt '92. Lecture Notes in Computer Science, 658, Springer- Verlag, 1993, pp K. Nyberg. Dierentially uniform mappings for cryptograpy. Proceedings of Eurocrypt '93 (to appear). Tis article was processed using te LaT E X macro package wit LLNCS style

Effect of the Dependent Paths in Linear Hull

Effect of the Dependent Paths in Linear Hull 1 Effect of te Dependent Pats in Linear Hull Zenli Dai, Meiqin Wang, Yue Sun Scool of Matematics, Sandong University, Jinan, 250100, Cina Key Laboratory of Cryptologic Tecnology and Information Security,

More information

MA455 Manifolds Solutions 1 May 2008

MA455 Manifolds Solutions 1 May 2008 MA455 Manifolds Solutions 1 May 2008 1. (i) Given real numbers a < b, find a diffeomorpism (a, b) R. Solution: For example first map (a, b) to (0, π/2) and ten map (0, π/2) diffeomorpically to R using

More information

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria Kaoru Kurosawa 1 and Takashi Satoh?2 1 Dept. of Comper Science, Graduate School of Information Science and Engineering,

More information

The total error in numerical differentiation

The total error in numerical differentiation AMS 147 Computational Metods and Applications Lecture 08 Copyrigt by Hongyun Wang, UCSC Recap: Loss of accuracy due to numerical cancellation A B 3, 3 ~10 16 In calculating te difference between A and

More information

Exercises for numerical differentiation. Øyvind Ryan

Exercises for numerical differentiation. Øyvind Ryan Exercises for numerical differentiation Øyvind Ryan February 25, 2013 1. Mark eac of te following statements as true or false. a. Wen we use te approximation f (a) (f (a +) f (a))/ on a computer, we can

More information

Continuity and Differentiability Worksheet

Continuity and Differentiability Worksheet Continuity and Differentiability Workseet (Be sure tat you can also do te grapical eercises from te tet- Tese were not included below! Typical problems are like problems -3, p. 6; -3, p. 7; 33-34, p. 7;

More information

Math 161 (33) - Final exam

Math 161 (33) - Final exam Name: Id #: Mat 161 (33) - Final exam Fall Quarter 2015 Wednesday December 9, 2015-10:30am to 12:30am Instructions: Prob. Points Score possible 1 25 2 25 3 25 4 25 TOTAL 75 (BEST 3) Read eac problem carefully.

More information

lecture 26: Richardson extrapolation

lecture 26: Richardson extrapolation 43 lecture 26: Ricardson extrapolation 35 Ricardson extrapolation, Romberg integration Trougout numerical analysis, one encounters procedures tat apply some simple approximation (eg, linear interpolation)

More information

Differentiation in higher dimensions

Differentiation in higher dimensions Capter 2 Differentiation in iger dimensions 2.1 Te Total Derivative Recall tat if f : R R is a 1-variable function, and a R, we say tat f is differentiable at x = a if and only if te ratio f(a+) f(a) tends

More information

Math 102 TEST CHAPTERS 3 & 4 Solutions & Comments Fall 2006

Math 102 TEST CHAPTERS 3 & 4 Solutions & Comments Fall 2006 Mat 102 TEST CHAPTERS 3 & 4 Solutions & Comments Fall 2006 f(x+) f(x) 10 1. For f(x) = x 2 + 2x 5, find ))))))))) and simplify completely. NOTE: **f(x+) is NOT f(x)+! f(x+) f(x) (x+) 2 + 2(x+) 5 ( x 2

More information

University Mathematics 2

University Mathematics 2 University Matematics 2 1 Differentiability In tis section, we discuss te differentiability of functions. Definition 1.1 Differentiable function). Let f) be a function. We say tat f is differentiable at

More information

Complexity of Decoding Positive-Rate Reed-Solomon Codes

Complexity of Decoding Positive-Rate Reed-Solomon Codes Complexity of Decoding Positive-Rate Reed-Solomon Codes Qi Ceng 1 and Daqing Wan 1 Scool of Computer Science Te University of Oklaoma Norman, OK73019 Email: qceng@cs.ou.edu Department of Matematics University

More information

Order of Accuracy. ũ h u Ch p, (1)

Order of Accuracy. ũ h u Ch p, (1) Order of Accuracy 1 Terminology We consider a numerical approximation of an exact value u. Te approximation depends on a small parameter, wic can be for instance te grid size or time step in a numerical

More information

Solutions to the Multivariable Calculus and Linear Algebra problems on the Comprehensive Examination of January 31, 2014

Solutions to the Multivariable Calculus and Linear Algebra problems on the Comprehensive Examination of January 31, 2014 Solutions to te Multivariable Calculus and Linear Algebra problems on te Compreensive Examination of January 3, 24 Tere are 9 problems ( points eac, totaling 9 points) on tis portion of te examination.

More information

DK-2800 Lyngby, Denmark, Mercierlaan 94, B{3001 Heverlee, Belgium,

DK-2800 Lyngby, Denmark, Mercierlaan 94, B{3001 Heverlee, Belgium, The Interpolation Attack on Block Ciphers? Thomas Jakobsen 1 and Lars R. Knudsen 2 1 Department of Mathematics, Building 303, Technical University of Denmark, DK-2800 Lyngby, Denmark, email:jakobsen@mat.dtu.dk.

More information

3.4 Worksheet: Proof of the Chain Rule NAME

3.4 Worksheet: Proof of the Chain Rule NAME Mat 1170 3.4 Workseet: Proof of te Cain Rule NAME Te Cain Rule So far we are able to differentiate all types of functions. For example: polynomials, rational, root, and trigonometric functions. We are

More information

hold or a eistel cipher. We nevertheless prove that the bound given by Nyberg and Knudsen still holds or any round keys. This stronger result implies

hold or a eistel cipher. We nevertheless prove that the bound given by Nyberg and Knudsen still holds or any round keys. This stronger result implies Dierential cryptanalysis o eistel ciphers and dierentially uniorm mappings Anne Canteaut INRIA Projet codes Domaine de Voluceau BP 105 78153 Le Chesnay Cedex rance Abstract In this paper we study the round

More information

Mathematics 5 Worksheet 11 Geometry, Tangency, and the Derivative

Mathematics 5 Worksheet 11 Geometry, Tangency, and the Derivative Matematics 5 Workseet 11 Geometry, Tangency, and te Derivative Problem 1. Find te equation of a line wit slope m tat intersects te point (3, 9). Solution. Te equation for a line passing troug a point (x

More information

Precalculus Test 2 Practice Questions Page 1. Note: You can expect other types of questions on the test than the ones presented here!

Precalculus Test 2 Practice Questions Page 1. Note: You can expect other types of questions on the test than the ones presented here! Precalculus Test 2 Practice Questions Page Note: You can expect oter types of questions on te test tan te ones presented ere! Questions Example. Find te vertex of te quadratic f(x) = 4x 2 x. Example 2.

More information

Volume 29, Issue 3. Existence of competitive equilibrium in economies with multi-member households

Volume 29, Issue 3. Existence of competitive equilibrium in economies with multi-member households Volume 29, Issue 3 Existence of competitive equilibrium in economies wit multi-member ouseolds Noriisa Sato Graduate Scool of Economics, Waseda University Abstract Tis paper focuses on te existence of

More information

HOMEWORK HELP 2 FOR MATH 151

HOMEWORK HELP 2 FOR MATH 151 HOMEWORK HELP 2 FOR MATH 151 Here we go; te second round of omework elp. If tere are oters you would like to see, let me know! 2.4, 43 and 44 At wat points are te functions f(x) and g(x) = xf(x)continuous,

More information

Consider a function f we ll specify which assumptions we need to make about it in a minute. Let us reformulate the integral. 1 f(x) dx.

Consider a function f we ll specify which assumptions we need to make about it in a minute. Let us reformulate the integral. 1 f(x) dx. Capter 2 Integrals as sums and derivatives as differences We now switc to te simplest metods for integrating or differentiating a function from its function samples. A careful study of Taylor expansions

More information

Recent Progress in the Integration of Poisson Systems via the Mid Point Rule and Runge Kutta Algorithm

Recent Progress in the Integration of Poisson Systems via the Mid Point Rule and Runge Kutta Algorithm Recent Progress in te Integration of Poisson Systems via te Mid Point Rule and Runge Kutta Algoritm Klaus Bucner, Mircea Craioveanu and Mircea Puta Abstract Some recent progress in te integration of Poisson

More information

Quantum Numbers and Rules

Quantum Numbers and Rules OpenStax-CNX module: m42614 1 Quantum Numbers and Rules OpenStax College Tis work is produced by OpenStax-CNX and licensed under te Creative Commons Attribution License 3.0 Abstract Dene quantum number.

More information

1. Consider the trigonometric function f(t) whose graph is shown below. Write down a possible formula for f(t).

1. Consider the trigonometric function f(t) whose graph is shown below. Write down a possible formula for f(t). . Consider te trigonometric function f(t) wose grap is sown below. Write down a possible formula for f(t). Tis function appears to be an odd, periodic function tat as been sifted upwards, so we will use

More information

Chapter 4: Numerical Methods for Common Mathematical Problems

Chapter 4: Numerical Methods for Common Mathematical Problems 1 Capter 4: Numerical Metods for Common Matematical Problems Interpolation Problem: Suppose we ave data defined at a discrete set of points (x i, y i ), i = 0, 1,..., N. Often it is useful to ave a smoot

More information

Numerical Differentiation

Numerical Differentiation Numerical Differentiation Finite Difference Formulas for te first derivative (Using Taylor Expansion tecnique) (section 8.3.) Suppose tat f() = g() is a function of te variable, and tat as 0 te function

More information

1 Lecture 13: The derivative as a function.

1 Lecture 13: The derivative as a function. 1 Lecture 13: Te erivative as a function. 1.1 Outline Definition of te erivative as a function. efinitions of ifferentiability. Power rule, erivative te exponential function Derivative of a sum an a multiple

More information

Section 3.1: Derivatives of Polynomials and Exponential Functions

Section 3.1: Derivatives of Polynomials and Exponential Functions Section 3.1: Derivatives of Polynomials and Exponential Functions In previous sections we developed te concept of te derivative and derivative function. Te only issue wit our definition owever is tat it

More information

Symmetry Labeling of Molecular Energies

Symmetry Labeling of Molecular Energies Capter 7. Symmetry Labeling of Molecular Energies Notes: Most of te material presented in tis capter is taken from Bunker and Jensen 1998, Cap. 6, and Bunker and Jensen 2005, Cap. 7. 7.1 Hamiltonian Symmetry

More information

2.3 Algebraic approach to limits

2.3 Algebraic approach to limits CHAPTER 2. LIMITS 32 2.3 Algebraic approac to its Now we start to learn ow to find its algebraically. Tis starts wit te simplest possible its, and ten builds tese up to more complicated examples. Fact.

More information

1 The concept of limits (p.217 p.229, p.242 p.249, p.255 p.256) 1.1 Limits Consider the function determined by the formula 3. x since at this point

1 The concept of limits (p.217 p.229, p.242 p.249, p.255 p.256) 1.1 Limits Consider the function determined by the formula 3. x since at this point MA00 Capter 6 Calculus and Basic Linear Algebra I Limits, Continuity and Differentiability Te concept of its (p.7 p.9, p.4 p.49, p.55 p.56). Limits Consider te function determined by te formula f Note

More information

Polynomial Interpolation

Polynomial Interpolation Capter 4 Polynomial Interpolation In tis capter, we consider te important problem of approximatinga function fx, wose values at a set of distinct points x, x, x,, x n are known, by a polynomial P x suc

More information

MVT and Rolle s Theorem

MVT and Rolle s Theorem AP Calculus CHAPTER 4 WORKSHEET APPLICATIONS OF DIFFERENTIATION MVT and Rolle s Teorem Name Seat # Date UNLESS INDICATED, DO NOT USE YOUR CALCULATOR FOR ANY OF THESE QUESTIONS In problems 1 and, state

More information

Inf sup testing of upwind methods

Inf sup testing of upwind methods INTERNATIONAL JOURNAL FOR NUMERICAL METHODS IN ENGINEERING Int. J. Numer. Met. Engng 000; 48:745 760 Inf sup testing of upwind metods Klaus-Jurgen Bate 1; ;, Dena Hendriana 1, Franco Brezzi and Giancarlo

More information

64 IX. The Exceptional Lie Algebras

64 IX. The Exceptional Lie Algebras 64 IX. Te Exceptional Lie Algebras IX. Te Exceptional Lie Algebras We ave displayed te four series of classical Lie algebras and teir Dynkin diagrams. How many more simple Lie algebras are tere? Surprisingly,

More information

LECTURE 14 NUMERICAL INTEGRATION. Find

LECTURE 14 NUMERICAL INTEGRATION. Find LECTURE 14 NUMERCAL NTEGRATON Find b a fxdx or b a vx ux fx ydy dx Often integration is required. However te form of fx may be suc tat analytical integration would be very difficult or impossible. Use

More information

CHAPTER (A) When x = 2, y = 6, so f( 2) = 6. (B) When y = 4, x can equal 6, 2, or 4.

CHAPTER (A) When x = 2, y = 6, so f( 2) = 6. (B) When y = 4, x can equal 6, 2, or 4. SECTION 3-1 101 CHAPTER 3 Section 3-1 1. No. A correspondence between two sets is a function only if eactly one element of te second set corresponds to eac element of te first set. 3. Te domain of a function

More information

Subdifferentials of convex functions

Subdifferentials of convex functions Subdifferentials of convex functions Jordan Bell jordan.bell@gmail.com Department of Matematics, University of Toronto April 21, 2014 Wenever we speak about a vector space in tis note we mean a vector

More information

Exam 1 Review Solutions

Exam 1 Review Solutions Exam Review Solutions Please also review te old quizzes, and be sure tat you understand te omework problems. General notes: () Always give an algebraic reason for your answer (graps are not sufficient),

More information

Complexity of Decoding Positive-Rate Primitive Reed-Solomon Codes

Complexity of Decoding Positive-Rate Primitive Reed-Solomon Codes 1 Complexity of Decoding Positive-Rate Primitive Reed-Solomon Codes Qi Ceng and Daqing Wan Abstract It as been proved tat te maximum likeliood decoding problem of Reed-Solomon codes is NP-ard. However,

More information

4. The slope of the line 2x 7y = 8 is (a) 2/7 (b) 7/2 (c) 2 (d) 2/7 (e) None of these.

4. The slope of the line 2x 7y = 8 is (a) 2/7 (b) 7/2 (c) 2 (d) 2/7 (e) None of these. Mat 11. Test Form N Fall 016 Name. Instructions. Te first eleven problems are wort points eac. Te last six problems are wort 5 points eac. For te last six problems, you must use relevant metods of algebra

More information

Packing polynomials on multidimensional integer sectors

Packing polynomials on multidimensional integer sectors Pacing polynomials on multidimensional integer sectors Luis B Morales IIMAS, Universidad Nacional Autónoma de México, Ciudad de México, 04510, México lbm@unammx Submitted: Jun 3, 015; Accepted: Sep 8,

More information

Solution. Solution. f (x) = (cos x)2 cos(2x) 2 sin(2x) 2 cos x ( sin x) (cos x) 4. f (π/4) = ( 2/2) ( 2/2) ( 2/2) ( 2/2) 4.

Solution. Solution. f (x) = (cos x)2 cos(2x) 2 sin(2x) 2 cos x ( sin x) (cos x) 4. f (π/4) = ( 2/2) ( 2/2) ( 2/2) ( 2/2) 4. December 09, 20 Calculus PracticeTest s Name: (4 points) Find te absolute extrema of f(x) = x 3 0 on te interval [0, 4] Te derivative of f(x) is f (x) = 3x 2, wic is zero only at x = 0 Tus we only need

More information

arxiv: v1 [math.dg] 4 Feb 2015

arxiv: v1 [math.dg] 4 Feb 2015 CENTROID OF TRIANGLES ASSOCIATED WITH A CURVE arxiv:1502.01205v1 [mat.dg] 4 Feb 2015 Dong-Soo Kim and Dong Seo Kim Abstract. Arcimedes sowed tat te area between a parabola and any cord AB on te parabola

More information

Finding and Using Derivative The shortcuts

Finding and Using Derivative The shortcuts Calculus 1 Lia Vas Finding and Using Derivative Te sortcuts We ave seen tat te formula f f(x+) f(x) (x) = lim 0 is manageable for relatively simple functions like a linear or quadratic. For more complex

More information

Section 15.6 Directional Derivatives and the Gradient Vector

Section 15.6 Directional Derivatives and the Gradient Vector Section 15.6 Directional Derivatives and te Gradient Vector Finding rates of cange in different directions Recall tat wen we first started considering derivatives of functions of more tan one variable,

More information

Analytic Functions. Differentiable Functions of a Complex Variable

Analytic Functions. Differentiable Functions of a Complex Variable Analytic Functions Differentiable Functions of a Complex Variable In tis capter, we sall generalize te ideas for polynomials power series of a complex variable we developed in te previous capter to general

More information

The Complexity of Computing the MCD-Estimator

The Complexity of Computing the MCD-Estimator Te Complexity of Computing te MCD-Estimator Torsten Bernolt Lerstul Informatik 2 Universität Dortmund, Germany torstenbernolt@uni-dortmundde Paul Fiscer IMM, Danisc Tecnical University Kongens Lyngby,

More information

1 + t5 dt with respect to x. du = 2. dg du = f(u). du dx. dg dx = dg. du du. dg du. dx = 4x3. - page 1 -

1 + t5 dt with respect to x. du = 2. dg du = f(u). du dx. dg dx = dg. du du. dg du. dx = 4x3. - page 1 - Eercise. Find te derivative of g( 3 + t5 dt wit respect to. Solution: Te integrand is f(t + t 5. By FTC, f( + 5. Eercise. Find te derivative of e t2 dt wit respect to. Solution: Te integrand is f(t e t2.

More information

Lecture 15. Interpolation II. 2 Piecewise polynomial interpolation Hermite splines

Lecture 15. Interpolation II. 2 Piecewise polynomial interpolation Hermite splines Lecture 5 Interpolation II Introduction In te previous lecture we focused primarily on polynomial interpolation of a set of n points. A difficulty we observed is tat wen n is large, our polynomial as to

More information

Math 1241 Calculus Test 1

Math 1241 Calculus Test 1 February 4, 2004 Name Te first nine problems count 6 points eac and te final seven count as marked. Tere are 120 points available on tis test. Multiple coice section. Circle te correct coice(s). You do

More information

(a) At what number x = a does f have a removable discontinuity? What value f(a) should be assigned to f at x = a in order to make f continuous at a?

(a) At what number x = a does f have a removable discontinuity? What value f(a) should be assigned to f at x = a in order to make f continuous at a? Solutions to Test 1 Fall 016 1pt 1. Te grap of a function f(x) is sown at rigt below. Part I. State te value of eac limit. If a limit is infinite, state weter it is or. If a limit does not exist (but is

More information

Math 1210 Midterm 1 January 31st, 2014

Math 1210 Midterm 1 January 31st, 2014 Mat 110 Midterm 1 January 1st, 01 Tis exam consists of sections, A and B. Section A is conceptual, wereas section B is more computational. Te value of every question is indicated at te beginning of it.

More information

POLYNOMIAL AND SPLINE ESTIMATORS OF THE DISTRIBUTION FUNCTION WITH PRESCRIBED ACCURACY

POLYNOMIAL AND SPLINE ESTIMATORS OF THE DISTRIBUTION FUNCTION WITH PRESCRIBED ACCURACY APPLICATIONES MATHEMATICAE 36, (29), pp. 2 Zbigniew Ciesielski (Sopot) Ryszard Zieliński (Warszawa) POLYNOMIAL AND SPLINE ESTIMATORS OF THE DISTRIBUTION FUNCTION WITH PRESCRIBED ACCURACY Abstract. Dvoretzky

More information

Taylor Series and the Mean Value Theorem of Derivatives

Taylor Series and the Mean Value Theorem of Derivatives 1 - Taylor Series and te Mean Value Teorem o Derivatives Te numerical solution o engineering and scientiic problems described by matematical models oten requires solving dierential equations. Dierential

More information

Lecture XVII. Abstract We introduce the concept of directional derivative of a scalar function and discuss its relation with the gradient operator.

Lecture XVII. Abstract We introduce the concept of directional derivative of a scalar function and discuss its relation with the gradient operator. Lecture XVII Abstract We introduce te concept of directional derivative of a scalar function and discuss its relation wit te gradient operator. Directional derivative and gradient Te directional derivative

More information

b 1 A = bh h r V = pr

b 1 A = bh h r V = pr . Te use of a calculator is not permitted.. All variables and expressions used represent real numbers unless oterwise indicated.. Figures provided in tis test are drawn to scale unless oterwise indicated..

More information

Some Review Problems for First Midterm Mathematics 1300, Calculus 1

Some Review Problems for First Midterm Mathematics 1300, Calculus 1 Some Review Problems for First Midterm Matematics 00, Calculus. Consider te trigonometric function f(t) wose grap is sown below. Write down a possible formula for f(t). Tis function appears to be an odd,

More information

Lecture 21. Numerical differentiation. f ( x+h) f ( x) h h

Lecture 21. Numerical differentiation. f ( x+h) f ( x) h h Lecture Numerical differentiation Introduction We can analytically calculate te derivative of any elementary function, so tere migt seem to be no motivation for calculating derivatives numerically. However

More information

Continuity. Example 1

Continuity. Example 1 Continuity MATH 1003 Calculus and Linear Algebra (Lecture 13.5) Maoseng Xiong Department of Matematics, HKUST A function f : (a, b) R is continuous at a point c (a, b) if 1. x c f (x) exists, 2. f (c)

More information

Material for Difference Quotient

Material for Difference Quotient Material for Difference Quotient Prepared by Stepanie Quintal, graduate student and Marvin Stick, professor Dept. of Matematical Sciences, UMass Lowell Summer 05 Preface Te following difference quotient

More information

WYSE Academic Challenge 2004 Sectional Mathematics Solution Set

WYSE Academic Challenge 2004 Sectional Mathematics Solution Set WYSE Academic Callenge 00 Sectional Matematics Solution Set. Answer: B. Since te equation can be written in te form x + y, we ave a major 5 semi-axis of lengt 5 and minor semi-axis of lengt. Tis means

More information

Math 212-Lecture 9. For a single-variable function z = f(x), the derivative is f (x) = lim h 0

Math 212-Lecture 9. For a single-variable function z = f(x), the derivative is f (x) = lim h 0 3.4: Partial Derivatives Definition Mat 22-Lecture 9 For a single-variable function z = f(x), te derivative is f (x) = lim 0 f(x+) f(x). For a function z = f(x, y) of two variables, to define te derivatives,

More information

UNIVERSITY OF MANITOBA DEPARTMENT OF MATHEMATICS MATH 1510 Applied Calculus I FIRST TERM EXAMINATION - Version A October 12, :30 am

UNIVERSITY OF MANITOBA DEPARTMENT OF MATHEMATICS MATH 1510 Applied Calculus I FIRST TERM EXAMINATION - Version A October 12, :30 am DEPARTMENT OF MATHEMATICS MATH 1510 Applied Calculus I October 12, 2016 8:30 am LAST NAME: FIRST NAME: STUDENT NUMBER: SIGNATURE: (I understand tat ceating is a serious offense DO NOT WRITE IN THIS TABLE

More information

A classical particle with spin realized

A classical particle with spin realized A classical particle wit spin realized by reduction of a nonlinear nonolonomic constraint R. Cusman D. Kemppainen y and J. Sniatycki y Abstract 1 In tis paper we describe te motion of a nonlinear nonolonomically

More information

1. Questions (a) through (e) refer to the graph of the function f given below. (A) 0 (B) 1 (C) 2 (D) 4 (E) does not exist

1. Questions (a) through (e) refer to the graph of the function f given below. (A) 0 (B) 1 (C) 2 (D) 4 (E) does not exist Mat 1120 Calculus Test 2. October 18, 2001 Your name Te multiple coice problems count 4 points eac. In te multiple coice section, circle te correct coice (or coices). You must sow your work on te oter

More information

INTRODUCTION AND MATHEMATICAL CONCEPTS

INTRODUCTION AND MATHEMATICAL CONCEPTS Capter 1 INTRODUCTION ND MTHEMTICL CONCEPTS PREVIEW Tis capter introduces you to te basic matematical tools for doing pysics. You will study units and converting between units, te trigonometric relationsips

More information

Continuity and Differentiability of the Trigonometric Functions

Continuity and Differentiability of the Trigonometric Functions [Te basis for te following work will be te definition of te trigonometric functions as ratios of te sides of a triangle inscribed in a circle; in particular, te sine of an angle will be defined to be te

More information

The derivative function

The derivative function Roberto s Notes on Differential Calculus Capter : Definition of derivative Section Te derivative function Wat you need to know already: f is at a point on its grap and ow to compute it. Wat te derivative

More information

Differentially uniform mappings for cryptography

Differentially uniform mappings for cryptography Differentially uniform mappings for cryptography KAISA NYBERG* Institute of Computer Technology, Vienna Technical University Abstract. This work is motivated by the observation that in DES-like ciphexs

More information

Efficient algorithms for for clone items detection

Efficient algorithms for for clone items detection Efficient algoritms for for clone items detection Raoul Medina, Caroline Noyer, and Olivier Raynaud Raoul Medina, Caroline Noyer and Olivier Raynaud LIMOS - Université Blaise Pascal, Campus universitaire

More information

DIGRAPHS FROM POWERS MODULO p

DIGRAPHS FROM POWERS MODULO p DIGRAPHS FROM POWERS MODULO p Caroline Luceta Box 111 GCC, 100 Campus Drive, Grove City PA 1617 USA Eli Miller PO Box 410, Sumneytown, PA 18084 USA Clifford Reiter Department of Matematics, Lafayette College,

More information

ALGEBRA AND TRIGONOMETRY REVIEW by Dr TEBOU, FIU. A. Fundamental identities Throughout this section, a and b denotes arbitrary real numbers.

ALGEBRA AND TRIGONOMETRY REVIEW by Dr TEBOU, FIU. A. Fundamental identities Throughout this section, a and b denotes arbitrary real numbers. ALGEBRA AND TRIGONOMETRY REVIEW by Dr TEBOU, FIU A. Fundamental identities Trougout tis section, a and b denotes arbitrary real numbers. i) Square of a sum: (a+b) =a +ab+b ii) Square of a difference: (a-b)

More information

Blanca Bujanda, Juan Carlos Jorge NEW EFFICIENT TIME INTEGRATORS FOR NON-LINEAR PARABOLIC PROBLEMS

Blanca Bujanda, Juan Carlos Jorge NEW EFFICIENT TIME INTEGRATORS FOR NON-LINEAR PARABOLIC PROBLEMS Opuscula Matematica Vol. 26 No. 3 26 Blanca Bujanda, Juan Carlos Jorge NEW EFFICIENT TIME INTEGRATORS FOR NON-LINEAR PARABOLIC PROBLEMS Abstract. In tis work a new numerical metod is constructed for time-integrating

More information

Function Composition and Chain Rules

Function Composition and Chain Rules Function Composition and s James K. Peterson Department of Biological Sciences and Department of Matematical Sciences Clemson University Marc 8, 2017 Outline 1 Function Composition and Continuity 2 Function

More information

How to Find the Derivative of a Function: Calculus 1

How to Find the Derivative of a Function: Calculus 1 Introduction How to Find te Derivative of a Function: Calculus 1 Calculus is not an easy matematics course Te fact tat you ave enrolled in suc a difficult subject indicates tat you are interested in te

More information

Math 312 Lecture Notes Modeling

Math 312 Lecture Notes Modeling Mat 3 Lecture Notes Modeling Warren Weckesser Department of Matematics Colgate University 5 7 January 006 Classifying Matematical Models An Example We consider te following scenario. During a storm, a

More information

f a h f a h h lim lim

f a h f a h h lim lim Te Derivative Te derivative of a function f at a (denoted f a) is f a if tis it exists. An alternative way of defining f a is f a x a fa fa fx fa x a Note tat te tangent line to te grap of f at te point

More information

On convexity of polynomial paths and generalized majorizations

On convexity of polynomial paths and generalized majorizations On convexity of polynomial pats and generalized majorizations Marija Dodig Centro de Estruturas Lineares e Combinatórias, CELC, Universidade de Lisboa, Av. Prof. Gama Pinto 2, 1649-003 Lisboa, Portugal

More information

The Derivative as a Function

The Derivative as a Function Section 2.2 Te Derivative as a Function 200 Kiryl Tsiscanka Te Derivative as a Function DEFINITION: Te derivative of a function f at a number a, denoted by f (a), is if tis limit exists. f (a) f(a + )

More information

MAT 145. Type of Calculator Used TI-89 Titanium 100 points Score 100 possible points

MAT 145. Type of Calculator Used TI-89 Titanium 100 points Score 100 possible points MAT 15 Test #2 Name Solution Guide Type of Calculator Used TI-89 Titanium 100 points Score 100 possible points Use te grap of a function sown ere as you respond to questions 1 to 8. 1. lim f (x) 0 2. lim

More information

MATH 155A FALL 13 PRACTICE MIDTERM 1 SOLUTIONS. needs to be non-zero, thus x 1. Also 1 +

MATH 155A FALL 13 PRACTICE MIDTERM 1 SOLUTIONS. needs to be non-zero, thus x 1. Also 1 + MATH 55A FALL 3 PRACTICE MIDTERM SOLUTIONS Question Find te domain of te following functions (a) f(x) = x3 5 x +x 6 (b) g(x) = x+ + x+ (c) f(x) = 5 x + x 0 (a) We need x + x 6 = (x + 3)(x ) 0 Hence Dom(f)

More information

Polynomial Functions. Linear Functions. Precalculus: Linear and Quadratic Functions

Polynomial Functions. Linear Functions. Precalculus: Linear and Quadratic Functions Concepts: definition of polynomial functions, linear functions tree representations), transformation of y = x to get y = mx + b, quadratic functions axis of symmetry, vertex, x-intercepts), transformations

More information

7.1 Using Antiderivatives to find Area

7.1 Using Antiderivatives to find Area 7.1 Using Antiderivatives to find Area Introduction finding te area under te grap of a nonnegative, continuous function f In tis section a formula is obtained for finding te area of te region bounded between

More information

More on generalized inverses of partitioned matrices with Banachiewicz-Schur forms

More on generalized inverses of partitioned matrices with Banachiewicz-Schur forms More on generalized inverses of partitioned matrices wit anaciewicz-scur forms Yongge Tian a,, Yosio Takane b a Cina Economics and Management cademy, Central University of Finance and Economics, eijing,

More information

Solving Generalized Small Inverse Problems

Solving Generalized Small Inverse Problems Solving Generalized Small Inverse Problems Noboru Kuniiro Te University of Tokyo, Japan kuniiro@k.u-tokyo.ac.jp Abstract. We introduce a generalized small inverse problem (GSIP) and present an algoritm

More information

= 0 and states ''hence there is a stationary point'' All aspects of the proof dx must be correct (c)

= 0 and states ''hence there is a stationary point'' All aspects of the proof dx must be correct (c) Paper 1: Pure Matematics 1 Mark Sceme 1(a) (i) (ii) d d y 3 1x 4x x M1 A1 d y dx 1.1b 1.1b 36x 48x A1ft 1.1b Substitutes x = into teir dx (3) 3 1 4 Sows d y 0 and states ''ence tere is a stationary point''

More information

1 (10) 2 (10) 3 (10) 4 (10) 5 (10) 6 (10) Total (60)

1 (10) 2 (10) 3 (10) 4 (10) 5 (10) 6 (10) Total (60) First Name: OSU Number: Last Name: Signature: OKLAHOMA STATE UNIVERSITY Department of Matematics MATH 2144 (Calculus I) Instructor: Dr. Matias Sculze MIDTERM 1 September 17, 2008 Duration: 50 minutes No

More information

5.1 introduction problem : Given a function f(x), find a polynomial approximation p n (x).

5.1 introduction problem : Given a function f(x), find a polynomial approximation p n (x). capter 5 : polynomial approximation and interpolation 5 introduction problem : Given a function f(x), find a polynomial approximation p n (x) Z b Z application : f(x)dx b p n(x)dx, a a one solution : Te

More information

Reflection Symmetries of q-bernoulli Polynomials

Reflection Symmetries of q-bernoulli Polynomials Journal of Nonlinear Matematical Pysics Volume 1, Supplement 1 005, 41 4 Birtday Issue Reflection Symmetries of q-bernoulli Polynomials Boris A KUPERSHMIDT Te University of Tennessee Space Institute Tullaoma,

More information

1 Calculus. 1.1 Gradients and the Derivative. Q f(x+h) f(x)

1 Calculus. 1.1 Gradients and the Derivative. Q f(x+h) f(x) Calculus. Gradients and te Derivative Q f(x+) δy P T δx R f(x) 0 x x+ Let P (x, f(x)) and Q(x+, f(x+)) denote two points on te curve of te function y = f(x) and let R denote te point of intersection of

More information

Dedicated to the 70th birthday of Professor Lin Qun

Dedicated to the 70th birthday of Professor Lin Qun Journal of Computational Matematics, Vol.4, No.3, 6, 4 44. ACCELERATION METHODS OF NONLINEAR ITERATION FOR NONLINEAR PARABOLIC EQUATIONS Guang-wei Yuan Xu-deng Hang Laboratory of Computational Pysics,

More information

The cluster problem in constrained global optimization

The cluster problem in constrained global optimization Te cluster problem in constrained global optimization Te MIT Faculty as made tis article openly available. Please sare ow tis access benefits you. Your story matters. Citation As Publised Publiser Kannan,

More information

Combining functions: algebraic methods

Combining functions: algebraic methods Combining functions: algebraic metods Functions can be added, subtracted, multiplied, divided, and raised to a power, just like numbers or algebra expressions. If f(x) = x 2 and g(x) = x + 2, clearly f(x)

More information

Affine equivalence in the AES round function

Affine equivalence in the AES round function Discrete Applied Mathematics 148 (2005) 161 170 www.elsevier.com/locate/dam Affine equivalence in the AES round function A.M. Youssef a, S.E. Tavares b a Concordia Institute for Information Systems Engineering,

More information

Quaternion Dynamics, Part 1 Functions, Derivatives, and Integrals. Gary D. Simpson. rev 01 Aug 08, 2016.

Quaternion Dynamics, Part 1 Functions, Derivatives, and Integrals. Gary D. Simpson. rev 01 Aug 08, 2016. Quaternion Dynamics, Part 1 Functions, Derivatives, and Integrals Gary D. Simpson gsim1887@aol.com rev 1 Aug 8, 216 Summary Definitions are presented for "quaternion functions" of a quaternion. Polynomial

More information

THE IMPLICIT FUNCTION THEOREM

THE IMPLICIT FUNCTION THEOREM THE IMPLICIT FUNCTION THEOREM ALEXANDRU ALEMAN 1. Motivation and statement We want to understand a general situation wic occurs in almost any area wic uses matematics. Suppose we are given number of equations

More information

A = h w (1) Error Analysis Physics 141

A = h w (1) Error Analysis Physics 141 Introduction In all brances of pysical science and engineering one deals constantly wit numbers wic results more or less directly from experimental observations. Experimental observations always ave inaccuracies.

More information

Transform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and

Transform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and Transform Domain Analysis of DES Guang Gong and Solomon W. Golomb Communication Sciences Institute University of Southern California Electrical Engineering-Systems, EEB # 500 Los Angeles, California 90089-2565

More information