Cuntz algebras, generalized Walsh bases and applications
|
|
- Abigayle Lester
- 6 years ago
- Views:
Transcription
1 Cuntz algebras, generalized Walsh bases and applications Gabriel Picioroaga November 9, 2013 INFAS 1 / 91
2 Basics H, separable Hilbert space, (e n ) n N ONB in H: e n, e m = δ n,m span{e n } = H v = k=1 v, e k e k lim n v n k=1 v, e k e k = 0 2 / 91
3 Basics H, separable Hilbert space, (e n ) n N ONB in H: e n, e m = δ n,m span{e n } = H v = k=1 v, e k e k lim n v n k=1 v, e k e k = 0 In applications: H = L 2 space and v encodes a signal, state, image, measurable function. Good Approximation: least mean square deviation 3 / 91
4 Example Fourier: ( 1 2π e inx ) n Z ONB on L 2 [ π, π] Wavelet : {2 n/2 ψ(2 n t k) n, k Z} ONB in L 2 (R) Walsh: discrete sine-cosine versions, ±1 on dyadic intervals (exp(λ 2πx) λ Λ exponential bases on some L 2 (fractals) 4 / 91
5 Main ideas and layout of the talk: Cuntz relations generate a diversity of bases: Examples, Old and New (generalized Walsh) Zoom in on the new Walsh, study structure properties (How different from the old one is it?) Possible applications of the generalized Walsh. 5 / 91
6 Set Up R- d d expansive. B R d, N = B. IFS: τ b (x) = R 1 (x + b) (x R d, b B) Hutchinson:! attractor (X B, µ B ) invariant for the IFS. µ B is invariant for r : X B X B r(x) = τ 1 b (x), if x τ b(x B ) 6 / 91
7 Set Up R- d d expansive. B R d, N = B. IFS: τ b (x) = R 1 (x + b) (x R d, b B) Hutchinson:! attractor (X B, µ B ) invariant for the IFS. µ B is invariant for r : X B X B Example IFS : τ j (x) = x+j N, j = 0, 1,..., N 1 r(x) = τ 1 b (x), if x τ b(x B ) Attractor: X = [0, 1], with λ the Lebesgue measure r(x) = Nx mod 1 IFS : τ j (x) = x+j N, j = 0, 1,..., N 1 7 / 91
8 Cuntz Relations Definition O N : S i S j = δ i,j I, N 1 i=0 S i S i = I 8 / 91
9 QMFs QMF basis = multiresolution for the wavelet representation associated to a filter m 0. Definition A QMF basis is a set of N QMF s 1 N r(w)=z m 0, m 1,..., m N 1 such that m i (w)m j (w) = δ ij, (i, j {0,..., N 1}, z X ) 9 / 91
10 QMF bases and Cuntz algebra representations Proposition Let (m i ) N 1 i=0 be a QMF basis. The operators on L2 (X, µ) S i (f ) = m i f r, i = 0,..., N 1 are isometries and form a representation of the Cuntz algebra O N. 10 / 91
11 Main Result Theorem H Hilbert space, (S i ) N 1 i=0 Cuntz representation of O N. E orthonormal, X top.space, f : X H norm continuous function and: 11 / 91
12 Main Result Theorem H Hilbert space, (S i ) N 1 i=0 Cuntz representation of O N. E orthonormal, X top.space, f : X H norm continuous function and: 1 E = N 1 i=0 S ie. 2 span{f (t) : t X } = H and f (t) = 1, for all t X. 12 / 91
13 Main Result Theorem H Hilbert space, (S i ) N 1 i=0 Cuntz representation of O N. E orthonormal, X top.space, f : X H norm continuous function and: 1 E = N 1 i=0 S ie. 2 span{f (t) : t X } = H and f (t) = 1, for all t X. 3 on the range of f the Cuntz isometries are like multiplication-dilation operators 4 c 0 X such that f (c 0 ) spane. 13 / 91
14 Main Result Theorem H Hilbert space, (S i ) N 1 i=0 Cuntz representation of O N. E orthonormal, X top.space, f : X H norm continuous function and: 1 E = N 1 i=0 S ie. 2 span{f (t) : t X } = H and f (t) = 1, for all t X. 3 on the range of f the Cuntz isometries are like multiplication-dilation operators 4 c 0 X such that f (c 0 ) spane. 5 If the Ruelle (transfer) operator admits as fixed point a function h constant on f 1 (spane) then h is constant. 14 / 91
15 Main Result Theorem H Hilbert space, (S i ) N 1 i=0 Cuntz representation of O N. E orthonormal, X top.space, f : X H norm continuous function and: 1 E = N 1 i=0 S ie. 2 span{f (t) : t X } = H and f (t) = 1, for all t X. 3 on the range of f the Cuntz isometries are like multiplication-dilation operators 4 c 0 X such that f (c 0 ) spane. 5 If the Ruelle (transfer) operator admits as fixed point a function h constant on f 1 (spane) then h is constant. Then E is an orthonormal basis for H. 15 / 91
16 In applications: f (t) = exp t on L 2 (X B, µ B ) S l (g) = e l g r, (B, L) Hadamard pair S i (g) = m i g r, m i = N N 1 j=0 a ij χ [j/n,(j+1)/n] E = {S l1 S l2 S ln (exp c )}, c extreme cycle point. E = {S i1 S i2 S in (1)} 16 / 91
17 Consequences 1-dimensional: 0 B R, R > 1, 1 R B admits a set L as spectrum. C1. E = {S w (exp c ) : c extreme cycle point} is ONB in L 2 (µ B ) made of piecewise exponential functions. S l1...s ln e c (x) = e l1 (x)e l2 (rx)...e ln (r n 1 x)e c (r n x) C2. When B Z, L Z, and R Z then Λ such that {e λ : λ Λ} is ONB for L 2 (µ B ). 17 / 91
18 Consequences 1-dimensional: 0 B R, R > 1, 1 R B admits a set L as spectrum. C1. E = {S w (exp c ) : c extreme cycle point} is ONB in L 2 (µ B ) made of piecewise exponential functions. S l1...s ln e c (x) = e l1 (x)e l2 (rx)...e ln (r n 1 x)e c (r n x) C2. When B Z, L Z, and R Z then Λ such that {e λ : λ Λ} is ONB for L 2 (µ B ). Example Cantor s (X 1/4, µ 1/4 ) admits exp ONB: R = 4, B = {0, 2}, spectrum L = {0, 1} Example R = 3, B = {0, 2}, L = {0, 3 4 } spectrum of 1 3B: Middle third Cantor set which is known not to admit exponential bases. 18 / 91
19 Consequences C3. Walsh Bases: [0, 1] is the attractor of the IFS: τ 0 x = x 2, τ 1x = x+1 2. rx = 2xmod1. m 0 = 1, m 1 = χ [0,1/2) χ [1/2,1) form a QMF basis. E := {S w 1 : w {0, 1} } is an ONB for L 2 [0, 1], the Walsh basis. Description: For n = lk=0 i k2 k, the n th Walsh function : W n (x) = m i0 (x) m i1 (rx) m il (r l x) = S i0 i 1...i l 1 19 / 91
20 Walsh bases 20 / 91
21 Walsh bases 21 / 91
22 Walsh bases 22 / 91
23 Walsh bases 23 / 91
24 Walsh bases 24 / 91
25 Walsh bases 25 / 91
26 Walsh bases 26 / 91
27 Walsh bases 27 / 91
28 Walsh bases 28 / 91
29 Walsh bases 29 / 91
30 Walsh bases 30 / 91
31 Generalized Walsh bases C4. Let A = [a ij ] a N N unitary matrix, a 1j = 1 N. m i (x) := N N 1 j=0 a ij χ [j/n,(j+1)/n] (x) r(x) = Nxmod1, n = lk=0 i kn k with i k {0, 1,.., N 1}. The n th generalized Walsh function : W n,a (x) = m i0 (x) m i1 (rx) m il (r l x) The set (W n,a ) n N is ONB in L 2 [0, 1]. 31 / 91
32 Generalized Walsh bases Example We will graph a few generalized Walsh functions that correspond to 4 4 matrix A = / 91
33 Generalized Walsh bases 33 / 91
34 Generalized Walsh bases 34 / 91
35 Generalized Walsh bases 35 / 91
36 Generalized Walsh bases 36 / 91
37 Generalized Walsh bases 37 / 91
38 Generalized Walsh bases 38 / 91
39 Generalized Walsh bases 39 / 91
40 Generalized Walsh bases 40 / 91
41 Generalized Walsh bases 41 / 91
42 Generalized Walsh bases 42 / 91
43 Generalized Walsh bases 43 / 91
44 Generalized Walsh bases 44 / 91
45 Generalized Walsh bases 45 / 91
46 Generalized Walsh bases 46 / 91
47 Generalized Walsh bases 47 / 91
48 Generalized Walsh bases 48 / 91
49 Example We will graph a few generalized Walsh functions that correspond to 3 3 matrix A = / 91
50 Generalized Walsh bases 50 / 91
51 Generalized Walsh bases 51 / 91
52 Generalized Walsh bases 52 / 91
53 Generalized Walsh bases 53 / 91
54 Generalized Walsh bases 54 / 91
55 Generalized Walsh bases 55 / 91
56 Generalized Walsh bases 56 / 91
57 Generalized Walsh bases 57 / 91
58 Generalized Walsh bases 58 / 91
59 Generalized Walsh bases 59 / 91
60 Generalized Walsh bases 60 / 91
61 Some differences The classic Walsh functions form a group : W n (x) W m (x) = W n m (x) Figure: Graph of W 4 7,A (W n,a) n does not form a group 61 / 91
62 Convergence properties Theorem For f L 1 [0, 1] the sequence converges a.e. to f (x). Corollary S N q(x) = N q 1 n=0 f, W n,a W n,a (x) If f L 1 [0, 1] is continuous in a neighborhood of x = a then S N q f uniformly inside an interval centered at a. 62 / 91
63 Approximation issues Example f (x) = { 0, x [0, 1/16) [1/8, 3/16) [1/4, 1/2) 1, x [1/16, 1/8) [3/16, 1/4) [1/2, 1] With generalized Walsh ONB to the unitary matrix A = / 91
64 Figure: Graph of f and S 27 (f ) 64 / 91
65 Figure: Graph of f and S 36 (f ) 65 / 91
66 Figure: Graph of f and S 60 (f ) 66 / 91
67 Figure: Graph of f and S 81 (f ) 67 / 91
68 Figure: Graph of f and S 100 (f ) 68 / 91
69 Figure: Graph of f and S 200 (f ) 69 / 91
70 Figure: Graph of f and S 241 (f ) 70 / 91
71 Figure: Graph of f and S 300 (f ) 71 / 91
72 Symmetric encryption Corollary If f : [0, 1] C is constant on the interval I j := [j/n q, (j + 1)/N q ) for some j {0, 1,.., N q 1}, then for all x I j : f (x) = N q 1 n=0 f, W n,a W n,a (x) f (x) = v j, x I j, j = 0,..., N q 1. The sequence f, W n,a encrypts f with respect to a secret matrix A. 72 / 91
73 Example f = abcadbcad is encoded as a n = [ , , , , , , , , e 1] A = / 91
74 Example Given the previous sequence a n and slightly perturbed matrix à = 0.2 Figure: Graph of a n W n,ã 74 / 91
75 Continuity w.r.t. matrix entries For a fixed sequence (a n ) Nq 1 n=0 the map R N2 A N q 1 n=0 a n W n,a is continuous To strengthen the encryption : f f, W n,a + extra, e.g. ( 1) n M sin(1/a 2 ) 75 / 91
76 Previous example, now with entry a = Figure: Graph of a n W n, Ã 76 / 91
77 Encryption/Compression with Cuntz QMF basis m i (x) := N N 1 j=0 a ij χ [j/n,(j+1)/n] (x) S i (f ) = m i f r S i (f ) = 1 N N 1 k=0 m i( x+k N ) f ( x+k N ) signal f [S i (f )] i=0,n 1 (i.e. f encrypted). Compress [S i (f )] i=0,n / 91
78 Example Figure: Signal f, piece wise constant on tri-adic intervals 78 / 91
79 Example Figure: First frequency band, signal S 0 f 79 / 91
80 Example Figure: 2 nd frequency band, signal S 1 f 80 / 91
81 Example Figure: 3 rd frequency band, signal S 2 f 81 / 91
82 A cryptographic protocol H 1 space of messages, H 2 the space of encrypted messages Assume plenty of operators A : H 1 H 2 and B : H 1 H 2 such that B 1 A B 1 A = I H1 Ping-pong messaging (also Eve is eavesdropping): 1) Alice to Bob: w 1 = A(v) H 2 2) Bob to Alice: w 2 = B 1 A(v) H 1 3) Alice to Bob: w 3 = AB 1 A(v) H 2 4) Bob applies B 1 to w / 91
83 Bad choices A(f )(x) = f (x + a), B(f ) = f (x + b) f can be detected from its translations A(f )(x) = f (x a ), B(f )(x) = f (x b ) dilation/compression, some of f could be guessed, issues with the domain More generally f G, G Abelian group: Ax = ax, Bx = bx. Previous ping-pong: w 1 = af, w 2 = b 1 w 1 Eve can figure out b = w2 1 w 1 w 3 = a 1 w 2 = b 1 f Eve multiplies by b and reveals f 83 / 91
84 Transforms commutation A, B unitary N N matrices having constant 1/ N first row. W A : L 2 [0, 1] l 2 (N), W A (f ) = f, W n,a n 0 The inverse tranform (only needed for finite sequences ) : W 1 A ((a n) n ) = n a n W n,a Question: Given f under what conditions for A and B does the ping-pong protocol work? W 1 B W A W 1 B W A(f ) = f 84 / 91
85 Theorem If row l,b, row k,a = row l,a, row k,b for all k, l in {1, 2, 3,..., N} then f piecewise constant on consecutive N-adic intervals : W 1 B W A W 1 B W A(f ) = f 85 / 91
86 Theorem If row l,b, row k,a = row l,a, row k,b for all k, l in {1, 2, 3,..., N} then f piecewise constant on consecutive N-adic intervals : W 1 B N = 3 one equation is relevant: W A W 1 B W A(f ) = f 86 / 91
87 Protocol set up Alice has A = [a i,j ] j=1,n i=1,n Bob receives from Alice: with real number entries. N a kj x lj = j=1 N a lj x kj, 1 < l < k N masking coefficients j=1 87 / 91
88 Protocol set up Alice has A = [a i,j ] j=1,n i=1,n Bob receives from Alice: with real number entries. N a kj x lj = j=1 N a lj x kj, 1 < l < k N masking coefficients j=1 B = [x i,j ] j=1,n i=1,n must be unitary: x 1,j = 1/ N, j = 1,..., N N j=1 x i,j 2 = 1, i = 2,..., N N j=1 x i,j = 0, i = 2,..., N N k=1 x i,k x j,k = 0, 1 < i < j N System of N 2 N quadratics with N 2 N unknowns. 88 / 91
89 Question Are there infinitely many A for which the previous system has infinitely many solutions? Study their Grobner bases. 89 / 91
90 Question Are there infinitely many A for which the previous system has infinitely many solutions? Study their Grobner bases. Example There are infintely many B transform commuting with A = / 91
91 Thank you! Bibliography: 1) D.Dutkay, G.Picioroaga, M.S. Song Orthonormal bases generated by Cuntz algebras to appear in JMAA 2) D.Dutkay, G.Picioroaga Generalized Walsh bases and applications, to appear in ACAP 3) S.Harding, G.Picioroaga Continuity properties of a generalized Walsh system and applications to cryptography -undergraduate research project 91 / 91
Fourier Bases on the Skewed Sierpinski Gasket
Fourier Bases on the Skewed Sierpinski Gasket Calvin Hotchkiss University Nebraska-Iowa Functional Analysis Seminar November 5, 2016 Part 1: A Fast Fourier Transform for Fractal Approximations The Fractal
More informationarxiv:math/ v1 [math.ca] 19 May 2004
Fractal Components of Wavelet Measures arxiv:math/040537v [math.ca] 9 May 004 Abstract Palle E.T. Jorgensen Department of Mathematics, The University of Iowa, 4 MacLean Hall, Iowa City, IA, 54-49, U.S.A.
More informationAnalysis of Fractals, Image Compression and Entropy Encoding
Analysis of Fractals, Image Compression and Entropy Encoding Myung-Sin Song Southern Illinois University Edwardsville Jul 10, 2009 Joint work with Palle Jorgensen. Outline 1. Signal and Image processing,
More informationMathematical Methods for Computer Science
Mathematical Methods for Computer Science Computer Laboratory Computer Science Tripos, Part IB Michaelmas Term 2016/17 Professor J. Daugman Exercise problems Fourier and related methods 15 JJ Thomson Avenue
More informationFourier bases on the skewed Sierpinski gasket
Graduate Theses and Dissertations Iowa State University Capstones, Theses and Dissertations 2017 Fourier bases on the skewed Sierpinski gasket Calvin Francis Hotchkiss Iowa State University Follow this
More informationFunctional Analysis Exercise Class
Functional Analysis Exercise Class Week: December 4 8 Deadline to hand in the homework: your exercise class on week January 5. Exercises with solutions ) Let H, K be Hilbert spaces, and A : H K be a linear
More informationSolutions: Problem Set 4 Math 201B, Winter 2007
Solutions: Problem Set 4 Math 2B, Winter 27 Problem. (a Define f : by { x /2 if < x
More informationMore on Fourier Series
More on Fourier Series R. C. Trinity University Partial Differential Equations Lecture 6.1 New Fourier series from old Recall: Given a function f (x, we can dilate/translate its graph via multiplication/addition,
More informationarxiv: v7 [quant-ph] 20 Mar 2017
Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding arxiv:1306.5863v7 [quant-ph] 0 Mar 017 Li Yang State Key Laboratory of Information Security, Institute
More informationCHEBYSHEV INEQUALITIES AND SELF-DUAL CONES
CHEBYSHEV INEQUALITIES AND SELF-DUAL CONES ZDZISŁAW OTACHEL Dept. of Applied Mathematics and Computer Science University of Life Sciences in Lublin Akademicka 13, 20-950 Lublin, Poland EMail: zdzislaw.otachel@up.lublin.pl
More informationFourier Bases on Fractals
Fourier Bases on Fractals Keri Kornelson University of Oklahoma - Norman February Fourier Talks February 21, 2013 K. Kornelson (U. Oklahoma) Fractal Fourier Bases FFT 02/21/2013 1 / 21 Coauthors This is
More informationSelf-Referentiality, Fractels, and Applications
Self-Referentiality, Fractels, and Applications Peter Massopust Center of Mathematics Research Unit M15 Technical University of Munich Germany 2nd IM-Workshop on Applied Approximation, Signals, and Images,
More informationOPERATOR THEORY ON HILBERT SPACE. Class notes. John Petrovic
OPERATOR THEORY ON HILBERT SPACE Class notes John Petrovic Contents Chapter 1. Hilbert space 1 1.1. Definition and Properties 1 1.2. Orthogonality 3 1.3. Subspaces 7 1.4. Weak topology 9 Chapter 2. Operators
More informationCourse 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography
Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups
More informationAffine and Quasi-Affine Frames on Positive Half Line
Journal of Mathematical Extension Vol. 10, No. 3, (2016), 47-61 ISSN: 1735-8299 URL: http://www.ijmex.com Affine and Quasi-Affine Frames on Positive Half Line Abdullah Zakir Husain Delhi College-Delhi
More informationAPPENDIX A. Background Mathematics. A.1 Linear Algebra. Vector algebra. Let x denote the n-dimensional column vector with components x 1 x 2.
APPENDIX A Background Mathematics A. Linear Algebra A.. Vector algebra Let x denote the n-dimensional column vector with components 0 x x 2 B C @. A x n Definition 6 (scalar product). The scalar product
More informationKaczmarz algorithm in Hilbert space
STUDIA MATHEMATICA 169 (2) (2005) Kaczmarz algorithm in Hilbert space by Rainis Haller (Tartu) and Ryszard Szwarc (Wrocław) Abstract The aim of the Kaczmarz algorithm is to reconstruct an element in a
More informationA class of non-convex polytopes that admit no orthonormal basis of exponentials
A class of non-convex polytopes that admit no orthonormal basis of exponentials Mihail N. Kolountzakis and Michael Papadimitrakis 1 Abstract A conjecture of Fuglede states that a bounded measurable set
More informationContents. Acknowledgments
Table of Preface Acknowledgments Notation page xii xx xxi 1 Signals and systems 1 1.1 Continuous and discrete signals 1 1.2 Unit step and nascent delta functions 4 1.3 Relationship between complex exponentials
More informationLinear Algebra (Review) Volker Tresp 2018
Linear Algebra (Review) Volker Tresp 2018 1 Vectors k, M, N are scalars A one-dimensional array c is a column vector. Thus in two dimensions, ( ) c1 c = c 2 c i is the i-th component of c c T = (c 1, c
More informationTopics in Harmonic Analysis Lecture 1: The Fourier transform
Topics in Harmonic Analysis Lecture 1: The Fourier transform Po-Lam Yung The Chinese University of Hong Kong Outline Fourier series on T: L 2 theory Convolutions The Dirichlet and Fejer kernels Pointwise
More informationElliptic Curve Cryptography
AIMS-VOLKSWAGEN STIFTUNG WORKSHOP ON INTRODUCTION TO COMPUTER ALGEBRA AND APPLICATIONS Douala, Cameroon, October 12, 2017 Elliptic Curve Cryptography presented by : BANSIMBA Gilda Rech BANSIMBA Gilda Rech
More informationCourse MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography
Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups
More informationMATH642. COMPLEMENTS TO INTRODUCTION TO DYNAMICAL SYSTEMS BY M. BRIN AND G. STUCK
MATH642 COMPLEMENTS TO INTRODUCTION TO DYNAMICAL SYSTEMS BY M BRIN AND G STUCK DMITRY DOLGOPYAT 13 Expanding Endomorphisms of the circle Let E 10 : S 1 S 1 be given by E 10 (x) = 10x mod 1 Exercise 1 Show
More informationLogic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation
Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate
More informationSPECTRAL THEOREM FOR COMPACT SELF-ADJOINT OPERATORS
SPECTRAL THEOREM FOR COMPACT SELF-ADJOINT OPERATORS G. RAMESH Contents Introduction 1 1. Bounded Operators 1 1.3. Examples 3 2. Compact Operators 5 2.1. Properties 6 3. The Spectral Theorem 9 3.3. Self-adjoint
More informationCALCULUS JIA-MING (FRANK) LIOU
CALCULUS JIA-MING (FRANK) LIOU Abstract. Contents. Power Series.. Polynomials and Formal Power Series.2. Radius of Convergence 2.3. Derivative and Antiderivative of Power Series 4.4. Power Series Expansion
More informationSpectral Properties of an Operator-Fractal
Spectral Properties of an Operator-Fractal Keri Kornelson University of Oklahoma - Norman NSA Texas A&M University July 18, 2012 K. Kornelson (U. Oklahoma) Operator-Fractal TAMU 07/18/2012 1 / 25 Acknowledgements
More informationHadamard matrices and Compact Quantum Groups
Hadamard matrices and Compact Quantum Groups Uwe Franz 18 février 2014 3ème journée FEMTO-LMB based in part on joint work with: Teodor Banica, Franz Lehner, Adam Skalski Uwe Franz (LMB) Hadamard & CQG
More informationSparse linear models
Sparse linear models Optimization-Based Data Analysis http://www.cims.nyu.edu/~cfgranda/pages/obda_spring16 Carlos Fernandez-Granda 2/22/2016 Introduction Linear transforms Frequency representation Short-time
More informationAdvanced Cryptography Quantum Algorithms Christophe Petit
The threat of quantum computers Advanced Cryptography Quantum Algorithms Christophe Petit University of Oxford Christophe Petit -Advanced Cryptography 1 Christophe Petit -Advanced Cryptography 2 The threat
More informationStrengthened Sobolev inequalities for a random subspace of functions
Strengthened Sobolev inequalities for a random subspace of functions Rachel Ward University of Texas at Austin April 2013 2 Discrete Sobolev inequalities Proposition (Sobolev inequality for discrete images)
More informationFractal wavelets of Dutkay-Jorgensen type for the Sierpinski gasket space
Fractal wavelets of Dutkay-Jorgensen type for the Sierpinski gasket space Jonas D Andrea, Kathy D. Merrill, and Judith Packer Abstract. Several years ago, D. Dutkay and P. Jorgensen developed the concept
More informationEvidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs
Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Jonah Brown-Cohen 1 Introduction The Diffie-Hellman protocol was one of the first methods discovered for two people, say Alice
More informationb = 10 a, is the logarithm of b to the base 10. Changing the base to e we obtain natural logarithms, so a = ln b means that b = e a.
INTRODUCTION TO CRYPTOGRAPHY 5. Discrete Logarithms Recall the classical logarithm for real numbers: If we write b = 10 a, then a = log 10 b is the logarithm of b to the base 10. Changing the base to e
More informationA remarkable representation of the Clifford group
A remarkable representation of the Clifford group Steve Brierley University of Bristol March 2012 Work with Marcus Appleby, Ingemar Bengtsson, Markus Grassl, David Gross and Jan-Ake Larsson Outline Useful
More information1 Math 241A-B Homework Problem List for F2015 and W2016
1 Math 241A-B Homework Problem List for F2015 W2016 1.1 Homework 1. Due Wednesday, October 7, 2015 Notation 1.1 Let U be any set, g be a positive function on U, Y be a normed space. For any f : U Y let
More informationMoreover this binary operation satisfies the following properties
Contents 1 Algebraic structures 1 1.1 Group........................................... 1 1.1.1 Definitions and examples............................. 1 1.1.2 Subgroup.....................................
More informationLecture 3 Linear Algebra Background
Lecture 3 Linear Algebra Background Dan Sheldon September 17, 2012 Motivation Preview of next class: y (1) w 0 + w 1 x (1) 1 + w 2 x (1) 2 +... + w d x (1) d y (2) w 0 + w 1 x (2) 1 + w 2 x (2) 2 +...
More informationExamples of the Fourier Theorem (Sect. 10.3). The Fourier Theorem: Continuous case.
s of the Fourier Theorem (Sect. 1.3. The Fourier Theorem: Continuous case. : Using the Fourier Theorem. The Fourier Theorem: Piecewise continuous case. : Using the Fourier Theorem. The Fourier Theorem:
More informationPart IA Numbers and Sets
Part IA Numbers and Sets Theorems Based on lectures by A. G. Thomason Notes taken by Dexter Chua Michaelmas 2014 These notes are not endorsed by the lecturers, and I have modified them (often significantly)
More informationFRAMES, BASES AND GROUP REPRESENTATIONS
FRAMES, BASES AND GROUP REPRESENTATIONS Deguang Han Department of Mathematics Texas A&M University College Station, Texas 77843 dhan@math.tamu.edu and David R. Larson Department of Mathematics Texas A&M
More informationMath 4377/6308 Advanced Linear Algebra
2.3 Composition Math 4377/6308 Advanced Linear Algebra 2.3 Composition of Linear Transformations Jiwen He Department of Mathematics, University of Houston jiwenhe@math.uh.edu math.uh.edu/ jiwenhe/math4377
More informationRecovering overcomplete sparse representations from structured sensing
Recovering overcomplete sparse representations from structured sensing Deanna Needell Claremont McKenna College Feb. 2015 Support: Alfred P. Sloan Foundation and NSF CAREER #1348721. Joint work with Felix
More informationChapter 8 Integral Operators
Chapter 8 Integral Operators In our development of metrics, norms, inner products, and operator theory in Chapters 1 7 we only tangentially considered topics that involved the use of Lebesgue measure,
More informationTransformation of functions
Transformation of functions Translations Dilations (from the x axis) Dilations (from the y axis) Reflections (in the x axis) Reflections (in the y axis) Summary Applying transformations Finding equations
More informationElliptic Curve Cryptography
Elliptic Curve Cryptography Elliptic Curves An elliptic curve is a cubic equation of the form: y + axy + by = x 3 + cx + dx + e where a, b, c, d and e are real numbers. A special addition operation is
More informationMATH 167: APPLIED LINEAR ALGEBRA Chapter 3
MATH 167: APPLIED LINEAR ALGEBRA Chapter 3 Jesús De Loera, UC Davis February 18, 2012 Orthogonal Vectors and Subspaces (3.1). In real life vector spaces come with additional METRIC properties!! We have
More informationSpectral Hutchinson-3 Measures and Their Associated Operator Fractals
University of Colorado, Boulder CU Scholar Mathematics Graduate Theses & Dissertations Mathematics Spring 1-1-2017 Spectral Hutchinson- Measures and Their Associated Operator Fractals Ian Long University
More informationELEMENTARY LINEAR ALGEBRA
ELEMENTARY LINEAR ALGEBRA K R MATTHEWS DEPARTMENT OF MATHEMATICS UNIVERSITY OF QUEENSLAND First Printing, 99 Chapter LINEAR EQUATIONS Introduction to linear equations A linear equation in n unknowns x,
More informationWeek 15-16: Combinatorial Design
Week 15-16: Combinatorial Design May 8, 2017 A combinatorial design, or simply a design, is an arrangement of the objects of a set into subsets satisfying certain prescribed properties. The area of combinatorial
More informationLattice Cryptography
CSE 06A: Lattice Algorithms and Applications Winter 01 Instructor: Daniele Micciancio Lattice Cryptography UCSD CSE Many problems on point lattices are computationally hard. One of the most important hard
More informationJoseph Fadyn Kennesaw State University 1100 South Marietta Parkway Marietta, Georgia
ELLIPTIC CURVE CRYPTOGRAPHY USING MAPLE Joseph Fadyn Kennesaw State University 1100 South Marietta Parkway Marietta, Georgia 30060 jfadyn@spsu.edu An elliptic curve is one of the form: y 2 = x 3 + ax +
More informationMatrices: 2.1 Operations with Matrices
Goals In this chapter and section we study matrix operations: Define matrix addition Define multiplication of matrix by a scalar, to be called scalar multiplication. Define multiplication of two matrices,
More informationReview of linear algebra
Review of linear algebra 1 Vectors and matrices We will just touch very briefly on certain aspects of linear algebra, most of which should be familiar. Recall that we deal with vectors, i.e. elements of
More informationErrata Applied Analysis
Errata Applied Analysis p. 9: line 2 from the bottom: 2 instead of 2. p. 10: Last sentence should read: The lim sup of a sequence whose terms are bounded from above is finite or, and the lim inf of a sequence
More informationQuantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem
Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted
More informationCarmen s Core Concepts (Math 135)
Carmen s Core Concepts (Math 135) Carmen Bruni University of Waterloo Week 8 1 The following are equivalent (TFAE) 2 Inverses 3 More on Multiplicative Inverses 4 Linear Congruence Theorem 2 [LCT2] 5 Fermat
More informationPublic Key Cryptography
Public Key Cryptography Introduction Public Key Cryptography Unlike symmetric key, there is no need for Alice and Bob to share a common secret Alice can convey her public key to Bob in a public communication:
More informationChap. 3. Controlled Systems, Controllability
Chap. 3. Controlled Systems, Controllability 1. Controllability of Linear Systems 1.1. Kalman s Criterion Consider the linear system ẋ = Ax + Bu where x R n : state vector and u R m : input vector. A :
More informationLecture 3. Random Fourier measurements
Lecture 3. Random Fourier measurements 1 Sampling from Fourier matrices 2 Law of Large Numbers and its operator-valued versions 3 Frames. Rudelson s Selection Theorem Sampling from Fourier matrices Our
More informationTHREE LECTURES ON QUASIDETERMINANTS
THREE LECTURES ON QUASIDETERMINANTS Robert Lee Wilson Department of Mathematics Rutgers University The determinant of a matrix with entries in a commutative ring is a main organizing tool in commutative
More informationReal Variables # 10 : Hilbert Spaces II
randon ehring Real Variables # 0 : Hilbert Spaces II Exercise 20 For any sequence {f n } in H with f n = for all n, there exists f H and a subsequence {f nk } such that for all g H, one has lim (f n k,
More informationMath 115 ( ) Yum-Tong Siu 1. Derivation of the Poisson Kernel by Fourier Series and Convolution
Math 5 (006-007 Yum-Tong Siu. Derivation of the Poisson Kernel by Fourier Series and Convolution We are going to give a second derivation of the Poisson kernel by using Fourier series and convolution.
More informationAn Introduction to Quantum Information and Applications
An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded
More informationSection 9.2: Matrices. Definition: A matrix A consists of a rectangular array of numbers, or elements, arranged in m rows and n columns.
Section 9.2: Matrices Definition: A matrix A consists of a rectangular array of numbers, or elements, arranged in m rows and n columns. That is, a 11 a 12 a 1n a 21 a 22 a 2n A =...... a m1 a m2 a mn A
More informationMobile Robotics 1. A Compact Course on Linear Algebra. Giorgio Grisetti
Mobile Robotics 1 A Compact Course on Linear Algebra Giorgio Grisetti SA-1 Vectors Arrays of numbers They represent a point in a n dimensional space 2 Vectors: Scalar Product Scalar-Vector Product Changes
More informationMTH5112 Linear Algebra I MTH5212 Applied Linear Algebra (2017/2018)
MTH5112 Linear Algebra I MTH5212 Applied Linear Algebra (2017/2018) COURSEWORK 3 SOLUTIONS Exercise ( ) 1. (a) Write A = (a ij ) n n and B = (b ij ) n n. Since A and B are diagonal, we have a ij = 0 and
More informationMaths for Signals and Systems Linear Algebra in Engineering
Maths for Signals and Systems Linear Algebra in Engineering Lectures 13 15, Tuesday 8 th and Friday 11 th November 016 DR TANIA STATHAKI READER (ASSOCIATE PROFFESOR) IN SIGNAL PROCESSING IMPERIAL COLLEGE
More informationBoolean Inner-Product Spaces and Boolean Matrices
Boolean Inner-Product Spaces and Boolean Matrices Stan Gudder Department of Mathematics, University of Denver, Denver CO 80208 Frédéric Latrémolière Department of Mathematics, University of Denver, Denver
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer 1 Lecture 13 October 16, 2017 (notes revised 10/23/17) 1 Derived from lecture notes by Ewa Syta. CPSC 467, Lecture 13 1/57 Elliptic Curves
More informationa 11 x 1 + a 12 x a 1n x n = b 1 a 21 x 1 + a 22 x a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 11 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,, a n, b are given real
More informationQuantum Computing Lecture 2. Review of Linear Algebra
Quantum Computing Lecture 2 Review of Linear Algebra Maris Ozols Linear algebra States of a quantum system form a vector space and their transformations are described by linear operators Vector spaces
More informationShannon-Like Wavelet Frames on a Class of Nilpotent Lie Groups
Bridgewater State University From the SelectedWorks of Vignon Oussa Winter April 15, 2013 Shannon-Like Wavelet Frames on a Class of Nilpotent Lie Groups Vignon Oussa Available at: https://works.bepress.com/vignon_oussa/1/
More informationIsogenies in a quantum world
Isogenies in a quantum world David Jao University of Waterloo September 19, 2011 Summary of main results A. Childs, D. Jao, and V. Soukharev, arxiv:1012.4019 For ordinary isogenous elliptic curves of equal
More informationChapter 4: Interpolation and Approximation. October 28, 2005
Chapter 4: Interpolation and Approximation October 28, 2005 Outline 1 2.4 Linear Interpolation 2 4.1 Lagrange Interpolation 3 4.2 Newton Interpolation and Divided Differences 4 4.3 Interpolation Error
More informationInterpolation via weighted l 1 -minimization
Interpolation via weighted l 1 -minimization Holger Rauhut RWTH Aachen University Lehrstuhl C für Mathematik (Analysis) Matheon Workshop Compressive Sensing and Its Applications TU Berlin, December 11,
More informationA SIMPLE GENERALIZATION OF THE ELGAMAL CRYPTOSYSTEM TO NON-ABELIAN GROUPS
Communications in Algebra, 3: 3878 3889, 2008 Copyright Taylor & Francis Group, LLC ISSN: 0092-7872 print/132-12 online DOI: 10.1080/0092787080210883 A SIMPLE GENERALIZATION OF THE ELGAMAL CRYPTOSYSTEM
More informationNotes on Continued Fractions for Math 4400
. Continued fractions. Notes on Continued Fractions for Math 4400 The continued fraction expansion converts a positive real number α into a sequence of natural numbers. Conversely, a sequence of natural
More informationInformation Dimension
Information Dimension Mina Karzand Massachusetts Institute of Technology November 16, 2011 1 / 26 2 / 26 Let X would be a real-valued random variable. For m N, the m point uniform quantized version of
More informationDUALITY FOR FRAMES ZHITAO FAN, ANDREAS HEINECKE, AND ZUOWEI SHEN
DUALITY FOR FRAMES ZHITAO FAN, ANDREAS HEINECKE, AND ZUOWEI SHEN Abstract. The subject of this article is the duality principle, which, well beyond its stand at the heart of Gabor analysis, is a universal
More informationPositive entries of stable matrices
Positive entries of stable matrices Shmuel Friedland Department of Mathematics, Statistics and Computer Science, University of Illinois at Chicago Chicago, Illinois 60607-7045, USA Daniel Hershkowitz,
More informationTopics in Representation Theory: Fourier Analysis and the Peter Weyl Theorem
Topics in Representation Theory: Fourier Analysis and the Peter Weyl Theorem 1 Fourier Analysis, a review We ll begin with a short review of simple facts about Fourier analysis, before going on to interpret
More informationarxiv: v2 [math.fa] 27 Sep 2016
Decomposition of Integral Self-Affine Multi-Tiles Xiaoye Fu and Jean-Pierre Gabardo arxiv:43.335v2 [math.fa] 27 Sep 26 Abstract. In this paper we propose a method to decompose an integral self-affine Z
More informationDistributed Optimization over Networks Gossip-Based Algorithms
Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random
More information5.6. PSEUDOINVERSES 101. A H w.
5.6. PSEUDOINVERSES 0 Corollary 5.6.4. If A is a matrix such that A H A is invertible, then the least-squares solution to Av = w is v = A H A ) A H w. The matrix A H A ) A H is the left inverse of A and
More informationChapter 2 Formulas and Definitions:
Chapter 2 Formulas and Definitions: (from 2.1) Definition of Polynomial Function: Let n be a nonnegative integer and let a n,a n 1,...,a 2,a 1,a 0 be real numbers with a n 0. The function given by f (x)
More informationON SPECTRAL CANTOR MEASURES. 1. Introduction
ON SPECTRAL CANTOR MEASURES IZABELLA LABA AND YANG WANG Abstract. A probability measure in R d is called a spectral measure if it has an orthonormal basis consisting of exponentials. In this paper we study
More informationWavelet Analysis. Willy Hereman. Department of Mathematical and Computer Sciences Colorado School of Mines Golden, CO Sandia Laboratories
Wavelet Analysis Willy Hereman Department of Mathematical and Computer Sciences Colorado School of Mines Golden, CO 8040-887 Sandia Laboratories December 0, 998 Coordinate-Coordinate Formulations CC and
More informationDECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS
DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS SCOTT HOTTOVY Abstract. Quantum networks are used to transmit and process information by using the phenomena of quantum mechanics.
More informationLinear Algebra: Matrix Eigenvalue Problems
CHAPTER8 Linear Algebra: Matrix Eigenvalue Problems Chapter 8 p1 A matrix eigenvalue problem considers the vector equation (1) Ax = λx. 8.0 Linear Algebra: Matrix Eigenvalue Problems Here A is a given
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 13 March 3, 2013 CPSC 467b, Lecture 13 1/52 Elliptic Curves Basics Elliptic Curve Cryptography CPSC
More information2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms
CRYPTOGRAPHY 19 Cryptography 5 ElGamal cryptosystems and Discrete logarithms Definition Let G be a cyclic group of order n and let α be a generator of G For each A G there exists an uniue 0 a n 1 such
More informationLecture 5. Ch. 5, Norms for vectors and matrices. Norms for vectors and matrices Why?
KTH ROYAL INSTITUTE OF TECHNOLOGY Norms for vectors and matrices Why? Lecture 5 Ch. 5, Norms for vectors and matrices Emil Björnson/Magnus Jansson/Mats Bengtsson April 27, 2016 Problem: Measure size of
More informationEE263 Review Session 1
EE263 Review Session 1 October 5, 2018 0.1 Importing Variables from a MALAB.m file If you are importing variables given in file vars.m, use the following code at the beginning of your script. close a l
More informationModule 7:Data Representation Lecture 35: Wavelets. The Lecture Contains: Wavelets. Discrete Wavelet Transform (DWT) Haar wavelets: Example
The Lecture Contains: Wavelets Discrete Wavelet Transform (DWT) Haar wavelets: Example Haar wavelets: Theory Matrix form Haar wavelet matrices Dimensionality reduction using Haar wavelets file:///c /Documents%20and%20Settings/iitkrana1/My%20Documents/Google%20Talk%20Received%20Files/ist_data/lecture35/35_1.htm[6/14/2012
More informationICS 6N Computational Linear Algebra Matrix Algebra
ICS 6N Computational Linear Algebra Matrix Algebra Xiaohui Xie University of California, Irvine xhx@uci.edu February 2, 2017 Xiaohui Xie (UCI) ICS 6N February 2, 2017 1 / 24 Matrix Consider an m n matrix
More informationLecture 2: Haar Multiresolution analysis
WAVELES AND MULIRAE DIGIAL SIGNAL PROCESSING Lecture 2: Haar Multiresolution analysis Prof.V. M. Gadre, EE, II Bombay 1 Introduction HAAR was a mathematician, who has given an idea that any continuous
More informationColored Burau Matrices, E-multiplication, and the Algebraic Eraser Key Agreement Protocol
Colored Burau Matrices, E-multiplication, and the Algebraic Eraser Key Agreement Protocol SecureRF Corporation 100 Beard Sawmill Road Suite 350 Shelton, CT 06484 203-227-3151 info@securerf.com www.securerf.com
More informationQuantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security
Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD
More information