Extended GCD and Hermite Normal Form Algorithms via Lattice Basis Reduction

Size: px
Start display at page:

Download "Extended GCD and Hermite Normal Form Algorithms via Lattice Basis Reduction"

Transcription

1 Extended GCD and Hermite Normal Form Algorithms via Lattice Basis Reduction George Havas, Bohdan S. Majewski, and Keith R. Matthews CONTENTS 1. Introduction. The LLL Algorithm. Analysis of Algorithm. Algorithm 5. Multiplier Estimates 6. A LLL-Based Hermite Normal Form Algorithm 7. Examples Acknowledgments Electronic Availability References Extended gcd calculation has a long history and plays an important role in computational number theory and linear algebra. Recent results have shown that finding optimal multipliers in extended gcd calculations is difficult. We present an algorithm which uses lattice basis reduction to produce small integer multipliers x 1,..., x m for the equation s = gcd (s 1,..., s m ) = x 1 s x m s m, where s 1,..., s m are given integers. The method generalises to produce small unimodular transformation matrices for computing the Hermite normal form of an integer matrix. 1. INTRODUCTION Let s 1 ; : : : ; s m be integers and s = gcd (s 1 ; : : : ; s m ). It is easy to nd integer multipliers x 1 ; : : : ; x m such that s = x 1 s x m s m, but not so easy to nd multiplier vectors X of small Euclidean length kxk = (x x m) 1= [Majewski and Havas 199; Rossner and Seifert 1996]. Such multipliers may be found by performing, for example, Euclid's algorithm on s 1 ; s, to get gcd (s 1 ; s ) = g, then on g ; s and so on. If the corresponding sequence of integer row operations is performed on the identity matrix I m, the result will be an m m unimodular matrix P such that P S = [0; : : : ; 0; s] T, where S = [s 1 ; : : : ; s m ] T. Such a P is implicit in [Jacobi 1868, pages 6{8]. For some variations on this theme see [Kertzner 1981], as well as [Ford and Havas 1996] (where it is shown that one can ensure jx i j 1 max(s 1; : : : ; s m )) and [Majewski and Havas 1995] (the sorting gcd algorithm). Also see [Brentjes 1981, pages {] for references to older work. c A K Peters, Ltd /1998 $0.50 per page Experimental Mathematics 7:, page 15

2 16 Experimental Mathematics, Vol. 7 (1998), No. With a little matrix algebra, the equation P S = [0; : : : ; 0; s] T tells us that rows p 1 ; : : : ; p m 1 of P form a lattice basis for the (m 1)-dimensional lattice formed by the vectors X = (x 1 ; : : : ; x m ) with x 1 ; : : : ; x m Z, satisfying x 1 s 1 + +x m s m = 0. In other words, every such X can be expressed as an integer linear combination X = z 1 p z m 1 p m 1. The general multiplier vector is p m + z 1 p z m 1 p m 1 ; with z 1 ; : : : ; z m 1 Z. Lattice basis reduction can be used to nd good multipliers. Such an approach dates back at least to [Rosser 191] and [Ficken 19], where it was used for some small examples. A particularly eective algorithm for lattice basis reduction is due to Lenstra, Lenstra and Lovasz [Lenstra et al. 198]. For a brief description of the LLL algorithm, see Section. Of importance in the LLL algorithm is a parameter, which is in the range ( 1 ; 1]. The complexity of the algorithm increases with, as does the quality guarantee on the basis vectors. Earlier Approaches: Algorithm 1 One approach to the extended gcd problem, proposed by Babai [Grotschel et al. 1988, page 1] and Sims [199, page 81], is to perform the LLL algorithm on p 1 ; : : : ; p m 1 to produce a lattice basis of short vectors. Then size-reduce p m, by adding suitable multiples of these short vectors to p m ; this reduces its entries in practice to small size. We call this Algorithm 1. It has the drawback that an initial unimodular transforming matrix P has to be calculated. Preview of Algorithms and Another approach to the problem is to apply the LLL algorithm to the lattice L spanned by the rows of the matrix C = [I m js], where is a positive integer. It is not dicult to show that if > y (m )= ksk, with y = =( 1) for 1 < 1, the reduced basis for C must satisfy c 1 m+1 = 0,..., c m 1 m+1 = 0 and c m m+1 = s. Then c m1 ; : : : ; c mm will in practice be a small multiplier vector of similar size to that produced by Algorithm 1. We call this Algorithm. It has the drawback that multiplying the entries in the last column of the matrix by leads to an increase in the theoretical complexity and practical running time of the algorithm. Experimentally one nds that if is large, Algorithm seems to settle down to the same sequence of row operations. It is not dicult to identify these operations and perform them instead on the matrix [I m js]. This is justied in Section. Our limiting algorithm is called Algorithm and is described explicitly in Section. In Section 5, we show that with 1 the 8 smallest multiplier for numbers is one of the 7 values b +" 1 b 1 +" b, with j" i j 1, (" 1 ; " ) 6= (1; 0), where multiplier b and lattice basis b 1 ; b for are produced by Algorithm. We also derive an upper estimate in the general case of m numbers for the length of the multiplier produced by Algorithm with 1 < 1. Section 6 describes a LLL-based Hermite normal form algorithm, which we also arrive at by limiting considerations. In practice the method yields transformation matrices with very small entries. Such algorithms have applications in class group calculations; see [Cohen 199, pages 5, 88]. The paper nishes with some examples which show how well the algorithms perform.. THE LLL ALGORITHM In order to analyse Algorithms and we need to briey outline the LLL algorithm. More complete descriptions are given in [Grotschel et al. 1988, pages 19{150; Sims 199, pages 60{8; Cohen 199, pages 8{10; Pohst and Zassenhaus 1989, pages 00{0]. Let C be an m n matrix of integers, with linearly independent rows c 1 ; : : : ; c m. The Gram{ Schmidt basis is denoted by c 1; : : : ; c m, where c 1 = c 1 ; c k = c k k 1 X j=1 kj c j; kj = c k c j : c j c j

3 Havas, Majewski, and Matthews: Extended GCD and Hermite Normal Form Algorithms via Lattice Basis Reduction 17 We say c 1 ; : : : ; c m is reduced if j kj j 1 j < k m and for 1 are linearly independent in L and satisfy kx i k ksk, so c k c k ( k k 1)c k 1 c k 1 ( 1) for 1 < k m. (Here 1 < 1.) We say c k is size-reduced if j kj j 1 for 1 j < k. Assume that rows 1 to k 1 have been processed. The inductive step is as follows: Do a partial size-reduction by c k c k d k k 1 cc k 1 ; where dc is the nearest integer symbol, with dc = 1, if is a half-integer. If inequality ({1) holds, size-reduce c k completely by performing c k c k d kj cc j for j = k ; : : : ; 1 and increment k. Otherwise swap c k and c k 1 and decrement k.. ANALYSIS OF ALGORITHM Algorithm works for the following reasons. consists of the vectors (X; a) = (x 1 ; : : : ; x m ; (x 1 s x m s m )); where x 1 ; : : : ; x m Z. Hence X, (X; 0) L. Also, if (X; a) L and X does not belong to, then a 6= 0 and k(x; a)k : ( 1) Further, the lemma of [Pohst and Zassenhaus 1989, page 00] implies that if b 1 ; : : : ; b m 1 form a reduced basis for L, then kb j k y (m )= max kx 1 k; : : : ; kx m 1 k ; ( ) if X 1 ; : : : ; X m 1 are linearly independent vectors in L. But the m 1 vectors X 1 = ( s ; s 1 ; 0; : : : ; 0; 0) X = ( s ; 0; s 1 ; 0; : : : ; 0; 0) : : : : : : : : : : : : : : : : : : : : : : : : : : : : : X m 1 = ( s m ; 0; 0; : : : ; s 1 ; 0) L max kx 1 k; : : : ; kx m 1 k ksk: ( ) Hence if > y (m )= ksk, it follows from inequalities ({1){({) that the rst m 1 rows of a reduced basis for L have the form (b j1 ; : : : ; b jm ; 0). The last vector of the reduced basis then has the form (b m1 ; : : : ; b mm ; g) for some g, and the equations P S = 0 g ; S = P 1 0 g (where P is a unimodular matrix) imply sjg and gjs, respectively, and hence g = s. Now we justify our earlier assertion that if is suciently large and the LLL algorithm is performed on [I m js], then the sequence of operations is independent of. Let c i m+1 = a i and let C = [BjA], where initially B = I m and A = S. Let us assume that the rst k 1 rows of C are LLL-reduced (which implies a 1 = 0; : : : ; a k = 0 by the above argument) and examine the inductive step of LLL. First, from the equation c r = c r r 1 X j=1 rj c j ; ( ) we have c 1 m+1 = 0; : : : ; c k m+1 = 0. Also from equation ({), with r = k 1, we have c k 1 m+1 = a k 1. Further, kj = c k c j c j c j P m q=1 = c kqc jq + a k c j m+1 P m q=1 (c jq) + (c j m+1) : ( 5) So, c 1 m+1 = 0; : : : ; c k m+1 = 0 and equation ({5) give P m q=1 kj = c kqc jq P m for j = 1; : : : ; k ; q=1 (c jq) the Gram{Schmidt coecient for C with the last column ignored.

4 18 Experimental Mathematics, Vol. 7 (1998), No. Next k k 1 = P m q=1 c kqc k 1 q + a k a k 1 P m q=1 (c k 1 q ) + a k 1 a k a k 1 as! 1 if a k 1 6= 0: (If a k 1 = 0, k;k 1 reduces to the Gram{Schmidt coecient for C with the last column ignored.) Then (for a k 1 6= 0) if t = da k =a k 1 c, d k k 1 c = t if a k =a k 1 is not an odd multiple of 1, or t or t + 1 otherwise, as! 1. Thus in the partial sizereduction, t or t + 1 times row k 1 is subtracted from row k. We now discuss the possible interchange of rows k 1 and k. This takes place if the inequality ({1) fails to hold. If a k 1 = 0 = a k, then condition ({1) becomes the standard LLL condition involving k k 1. If a k 1 = 0 but a k 6= 0, then c k m+1 = a k and condition ({1) will be satised for large and no interchange of rows takes place. If a k 1 6= 0, then since the c j did not change under partial size-reduction, we see from c k = c k k X j=1 kj c j k k 1 c k 1; that with c j m+1 = 0; j = 1; : : : ; k and the limiting form of the old k;k 1, we have c k 0. m+1 Consequently, as k k 1 > 0 if > 1, ({1) will not be satised for large, if > 1, thereby resulting in an interchange of rows. The kj are rational functions of and, if not constant, will tend to a limit strictly monotonically, thereby resulting in a limiting sequence of row operations for large. Thus, for large, the LLL algorithm will perform a version of the leastremainder gcd algorithm (LRA) on a 1 = s 1 ; a = s, until it arrives at a 1 = 0; a = g = gcd (s 1 ; s ), with (b 1 ; b ) being the shortest multiplier vector for gcd (s 1 ; s ). It then eventually performs a version of the LRA on a = g ; a = s, punctuated by updating of the rst three rows of B, till it arrives at a 1 = 0; a = 0; a = g = gcd (g ; s ), with (b 1 ; b ; b ) being a short multiplier vector for gcd (s 1 ; s ; s ); and so on.. ALGORITHM The analysis of Section leads to Algorithm below, the nal LLL-based extended gcd algorithm. Our implementation is a modication of de Weger's LLL algorithm [1987, pages 9{], simplied in that initial construction of the Gram{Schmidt basis is not needed, as we start with the identity matrix I m. De Weger works in terms of integers and writes kb i k = D i =D i 1, D 0 = 1 and ij = D j ij. This allows algorithms to be implemented using only integers, avoiding explicit calculation with rationals. The algorithm works by successively producing for k = ; : : : ; m, a multiplier vector (b k1 ; : : : ; b kk ) for s 1 ; : : : ; s k which is size-reduced with respect to a LLL-reduced lattice basis (b 11 ; : : : ; b 1k ),..., (b k 11 ; : : : ; b k 1k ) for the lattice dened by x 1 s x k s k = 0. Algorithm. (We denote by bi the i-th row of B.) Input: Positive integers s 1 ; : : : ; s m Output: a m = gcd(s 1 ; : : : ; s m ); small multipliers b m1 ; : : : ; b mm ; small null space basis B I m ; for r = ; : : : ; m do for s = 1; : : : ; r 1 do rs 0; for i = 0; : : : ; m do D i 1; for i = 1; : : : ; m do a i s i ; m 1 ; n 1 ; = = m 1 =n 1 = k ; while k m do Reduce1(k; k 1); if a k 1 6= 0 or a k 1 = 0 and a k = 0 and n 1 (D k D k + k k 1) < m 1 Dk 1 then Swap(k); if k > then k k 1; else for i = k ; : : : ; 1 do Reduce(k; i); k k + 1; if a m < 0 then a m a m ; bm bm;

5 Havas, Majewski, and Matthews: Extended GCD and Hermite Normal Form Algorithms via Lattice Basis Reduction 19 Reduce1(k; i) if a i 6= 0 then q da k =a i c; else if j ki j > D i then q d ki =D i c; else q 0; if q 6= 0 then a k a k qa i ; bk bk qbi; ki ki qd i ; for j = 1; : : : ; i 1 do kj kj q ij ; Swap(k) a k $ a k 1 ; bk $ bk 1; for j = 1; : : : ; k do kj $ k 1 j ; for i = k + 1; : : : ; m do t i k 1 D k ik k k 1 ; i k 1 ( i k 1 k k 1 + ik D k )=D k 1 ; ik t=d k 1 ; D k 1 (D k D k + k k 1)=D k 1 ; 5. MULTIPLIER ESTIMATES Even when m =, our LLL-based gcd algorithm does not always produce the shortest multiplier: 1 in the example ; 6; 9, LLL (for all < 1) produces the multiplier b = ( ; 0; 1), whereas the shortest is b + b + b 1 = (1; 1; 1). After much numerical experiment we were led to the following result: Theorem 5.1. If B is a unimodular integer matrix such that the rst rows b 1 ; b form a LLLreduced basis for the lattice with 8 1, while b is size-reduced and is a multiplier vector for s 1 ; s ; s, then the smallest multiplier is one of seven vectors b + " 1 b 1 + " b, where " i = 1; 0; 1 for i = 1; and (" 1 ; " ) 6= (1; 0). Proof. We have and b = b + b + 1 b 1 b = b + 1 b 1 ; where j ij j 1. Then, if u; v Z, recalling that b + ub 1 + vb is the general multiplier, we have the following expression for the square of its length: f(u; v) = kb +ub 1 +vb k = kb +(u+ 1 +v 1 )b 1+(v+ )b k = kb k +(u+ 1 +v 1 ) kb 1k +(v+ ) kb k : Suppose f(x; y) < f(0; 0). Then or, equivalently, kb + xb 1 + yb k < kb k ; kb k +(x+ 1 y+ 1 ) kb 1 k +(y+ ) kb k < kb k + 1 kb 1 k + kb k : Hence, noting that kb k kb 1 k ( 1), we have kb (y + ) < 1k 1 kb k + ; (y + ) < = 9 ; if 8 ; jy + j < ) jyj < ) jyj 1: Then, since y(y + ) 0 if y Z, (x + 1 y + 1 ) kb 1 k hence < (x + 1 y + 1 ) kb 1 k + y(y + )kb k < 1kb 1k ; jx + 1 y + 1 j < j 1 j; jxj < j 1 y + 1 j + j 1 j; (5 1) jxj < j 1 j + j 1 j 1 + 1; jxj 1: Also from inequality (5{1), y = 0 implies x = 0.

6 10 Experimental Mathematics, Vol. 7 (1998), No. Remarks. 1. We can be more specic about the optimum multipliers, in terms of the signs of 1, 1, and : 1 1 Optimum multiplier b or b b + b or b + b + b or b + b + b or b b b or b b or b + b 1 + b + + b or b b or b b 1 + b + + b or b + b or b b 1 b + + b or b + b or b + b 1 b All cases occur for suitable choices of (s 1 ; s ; s ).. The theorem is not true for all > 1. For with (s 1 ; s ; s ) = (100000; ; ) and = , the optimum multiplier is b b 1 1b = (11088; 06; 159); where b 1 = ( ; 19; 1), b = ( ; 11109; 5), and b = ( 55551; 5558; ). Corollary 5.. Our LLL extended gcd algorithm is the basis of a practical polynomial-time algorithm for nding an optimal solution to the extended gcd problem for numbers. Proof. Apply Algorithm (with =, say) and 8 then check which of the possibilities is optimal. Theorem 5.. Let B be a unimodular m m integer matrix such that the rst m 1 rows form a LLLreduced basis for the lattice with 1 < 1, while b m is size-reduced and is a multiplier vector for s 1 ; : : : ; s m. Then with y = =( 1), we have kb m k (m 1)ym ksk : P Proof. We have b m = b m 1 m + j=1 mjb j. The vector S T is orthogonal to b 1 ; : : : ; b m 1 and we see from BS = [0; : : : ; 0; s] T that b m = ss T =ksk. Then X b m = sst m 1 ksk + mj b j j=1 with j mj j 1 for j = 1; : : : ; m 1. But kb i k kb ik. Hence kb m k m 1 X j=1 kb j k m 1 X j=1 kb j k : (5 ) Repeating the argument for inequalities ({) and ({) we deduce that kb j k y (m )= ksk; for j = 1; : : : ; m 1; and inequality (5{) gives as required. kb m k (m 1)ym ksk ; Remark. Knuth [1969, Section.5., Problem ; 1981, Section.5., Problem 5] posed researchlevel problems on the analysis of algorithms for computing the greatest common divisor of three or more integers. The theorems and corollary of this section resolve aspects of these problems. Algorithm and its analysis provide much further information. 6. A LLL-BASED HERMITE NORMAL-FORM ALGORITHM An m n integer matrix H is said to be in row Hermite normal form if (i) the rst r rows of H are nonzero; (ii) for 1 i r, if h iji is the rst nonzero entry in row i of H, then j 1 < j < < j r ; (iii) h iji > 0 for 1 i r; (iv) if 1 k < i r, then 0 h kji < h iji. Let G be an m n integer matrix. Then there are various algorithms for nding a unimodular matrix P such that P G = H is in row Hermite normal form. These include those of Kannan{Bachem [199, pages 9{57] and Havas{Majewski [199], which attempt to reduce coecient explosion during their execution.

7 Havas, Majewski, and Matthews: Extended GCD and Hermite Normal Form Algorithms via Lattice Basis Reduction 11 By considering the limiting behaviour of the LLL algorithm on the matrix G() = [I m j n G 1 j n 1 G j j G n ] (where G i is the i-th column of G) as! 1, we are led to the following LLL-based Hermite normal form algorithm, generalising the earlier gcd case where n = 1. (We have omitted Swap(k) because it is the same as in Algorithm, with ai replacing a i.) It is an easy extension of the argument in Section 1 to show that for large, on LLL reducing G(), the last n columns form a matrix whose rows, starting from the bottom, are in row echelon form, corresponding to the indices j 1 ; : : : ; j r. This algorithm gives as output A, which is the Hermite normal form of G, but in reverse order. It is trivial to turn A and the transforming matrix B into the standard H and P. Algorithm (LLL-based Hermite normal form). Input: An m n integer matrix G Output: A, the Hermite normal form of G (upside down), and B, the corresponding transformation matrix B I m ; for r = ; : : : ; m do for s = 1; : : : ; r 1 do rs 0; A G; for i = 0; : : : ; m do D i 1; m 1 ; n 1 ; = = m 1 =n 1 = if there is exactly one nonzero element a ij in the rst nonzero column of A and i = m and a mj < 0 then am am; b m;m = 1; k ; while k m do Reduce(k; k 1); if col1 min(col; n) or col1 = col = n+1 and n 1 (D k D k + k k 1) < m 1 D k 1 then Swap(k); if k > then k k 1; else for i = k ; : : : ; 1 do Reduce(k; i); k k + 1; Reduce(k; i) if there is j such that a i;j 6= 0 then col1 least j such that a i;j 6= 0; if a i;col1 < 0 then Minus(i); ai ai; bi bi; else col1 n + 1; if there is j such that a k;j 6= 0 then col least j such that a k;j 6= 0; else col n + 1; if col1 n then q ba k;col1 =a i;col1 c; else if j ki j > D i then q d ki =D i c; else q 0; if q 6= 0 then ak ak qai; bk bk qbi; ki ki qd i ; for j = 1; : : : ; i 1 do kj kj q ij ; Minus(j) for r = ; : : : ; m do for s = 1; : : : ; r 1 do if r = j or s = j then rs rs ; We remark that if a row of G has to be multiplied by 1, there is a necessary adjustment for the ij. Hence the function Minus(i). Let C denote the submatrix of H formed by the Q r nonzero rows and write P = R, where Q and R have r and m r rows, respectively. (Q corresponds to the bottom r rows of A in reverse order. comprises the top m r rows of A.) Then QG = C and RG = 0 and the rows of R will form a Z basis of short vectors for the sublattice N(G) of Z m formed by the vectors X satisfying XG = 0. The rows of Q are size-reduced with respect to the short lattice basis vectors for N(G). 7. EXAMPLES We have applied the methods described here to numerous examples, all with excellent performance. Note that there are many papers which study explicit input sets for the extended gcd problem and a number of these are listed in the references of R

8 1 Experimental Mathematics, Vol. 7 (1998), No. [Brentjes 1981] and [Majewski and Havas 199]. We illustrate algorithm performance with a small selection of interesting examples and make some performance comparisons. Many parameters can aect the performance of LLL lattice basis reduction algorithms (this has been observed by many others; see [Schnorr and Euchner 1991], for example). Foremost is the value of. Smaller values of tend to give faster execution times but worse multipliers; however this is by no means uniform. Also, the order of input may have an eect. Example 7.1. As input to an extended gcd algorithm, take s 1 = , s = , s = 1591, s = Algorithm produces a nal matrix B = : The multiplier vector ( 88; 5; 167; 101) is the unique multiplier vector of least length. In fact, LLL-based methods give this optimal multiplier vector for all 1 ; 1. Earlier algorithms which aim to improve on the multipliers do not fare particularly well. Blankinship's algorithm [196] gives the multiplier vector (0; ; 1; ): The algorithm of [Bradley 1970] gives (7759, 17609, 1, 0). (This shows that Bradley's definition of minimal is not useful.) Example 7.. Take s 1 = 7686; s = ; s = 1119; s = ; s 5 = ; s 6 = 07775; s 7 = 1179; s 8 = 1675; s 9 = ; s 10 = 60018: Algorithm gives, for various values of, the multiplier vectors shown at the top of the next column. Also shown are the lengths-squared. multiplier vector x kxk The unique shortest multiplier vector is (; 1; 1; ; 1; ; ; ; ; ); with length-squared 6. Other methods give the following results: Jacobi: ( 1; 5; ; ; 1; ; ; 0; ; 0); kxk = 59 recursive gcd: (19670; ; 1; 0; 0; 0; 0; 0; 0; 0; 0) Kannan{Bachem: ( ; ; 0; 0; 0; 0; 0; 0; 0; 1) Blankinship: (85869; 1; ; 0; 0; 0; 0; 0; 0; 0) Bradley: ( 158; 96885; 1; 0; 0; 0; 0; 0; 0; 0) Example 7.. The following example involving the Fibonacci number F i and the Lucas numbers L i = F i 1 + F i+1 [Hoggatt 1969] has theoretical signicance. Take s 1 ; : : : ; s m to be the Fibonacci numbers F n ; F n+1 ; : : : ; F n F n ; F n+1 ; : : : ; F n 1 for n 5 odd, for n even. Using the identity F i L j = F i+j + ( 1) j F i j, it can be shown that the vectors and ( L n ; L n ; : : : ; L ; L 1 ; 1; 1; 0; 0) (L n ; L n ; : : : ; L ; L 1 +1; 1; 0; 0)

9 Havas, Majewski, and Matthews: Extended GCD and Hermite Normal Form Algorithms via Lattice Basis Reduction Input matrix G of Example 7.. are multipliers in the case of n odd or even, respectively. These multipliers are the unique vectors of least length. (This is a special case of a more general result from [Matthews 1996], where F n ; : : : ; F n+m is treated.) The length-squared of the multipliers is L n 5 +1 in both cases. (In practice, the LLL-based algorithms compute these minimal multipliers.) These results give bounds for extended gcd multipliers in terms of Euclidean norms. Since L n ' n 5 ' 5p 5 F n ; where ' = p 5, a general upper bound for the Euclidean norm of the multiplier vector in terms of the initial numbers s i must be at least O p maxfsi g : Also, the length of the vector (F n ; F n+1 ; : : : ; F n ) is of the same order of magnitude as F n, so a general upper bound for the length of the multipliers in terms of the Euclidean length of the input, ksk, is at least O p ksk. A range of random type extended gcd examples is presented in [Havas and Majewski 1995], showing excellent performance. Example 7.. For a Hermite normal form example, take G = [g ij ] to be the matrix dened by g ij = i j + i + j, and spelled out at the top of the page. The Hermite normal form H of G has three nonzero rows: : The unimodular matrix provided by the Kannan{ Bachem algorithm is whereas that supplied by our algorithm is ; :

10 1 Experimental Mathematics, Vol. 7 (1998), No. Kannan{Bachem LLL HNF M M M M M M Entry of maximal magnitude for the transforming matrices obtained by applying the Kannan{Bachem algorithm and ours to the matrices of Example 7.5. Example 7.5. An interesting family of matrices arises in the work of Daberkow [1995]. In some situations involving ideal class groups, matrices arise with k rows and 10 columns for k ranging from 100 to 150 in steps of 10. We designate the matrix with k rows by M k. The maximal magnitude entry in M k is of the order 11 (k 90)=10. Daberkow needs to compute both the Hermite normal form and a transforming matrix. We tabulate above the maximal magnitude entry in the transforming matrix (which includes many entries of this size) for our algorithm using = 1 in comparison with that of Kannan{Bachem. It can be seen from these examples that the algorithm we propose here often dramatically outperforms earlier methods in the search for good multipliers and transforming matrices. ACKNOWLEDGMENTS Havas and Majewski were supported by the Australian Research Council. We are grateful to Jean- Pierre Seifert and Clemens Wagner for helpful discussions and to a referee for improvements to the manuscript. ELECTRONIC AVAILABILITY Implementations of these algorithms are available in Matthews' number theory calculator program CALC at ~ krm/. Variants of the algorithms are available in GAP [Schonert et al. 1996] and Magma [Bosma et al. 1997]. REFERENCES [Blankinship 196] W. A. Blankinship, \A new version of the Euclidean algorithm", Amer. Math. Monthly 70 (196), 7{75. [Bosma et al. 1997] W. Bosma, J. Cannon, and C. Playoust, \The Magma algebra system, I: The user language", J. Symbolic Comput. :- (1997), 5{65. See comp/magma/overview.html. [Bradley 1970] G. H. Bradley, \Algorithm and bound for the greatest common divisor of n integers", Comm. ACM 1 (1970), {6. [Brentjes 1981] A. J. Brentjes, Multidimensional continued fraction algorithms, Mathematical Centre Tracts 15, Mathematisch Centrum, Amsterdam, [Cohen 199] H. Cohen, A course in computational algebraic number theory, Graduate Texts in Mathematics 18, Springer, Berlin, 199. [Daberkow 1995] M. Daberkow, Uber die Bestimmung der ganzen Elemente in Radikalerweiterungen algebraischer Zahlkorper, Dissertation, Tech. Univ. Berlin, Berlin, [de Weger 1987] B. M. M. de Weger, \Solving exponential Diophantine equations using lattice basis reduction algorithms", J. Number Theory 6: (1987), 5{67. Erratum in 1:1 (1989), 88{89. [Ficken 19] F. A. Ficken, \Rosser's generalization of the Euclid algorithm", Duke Math. J. 10 (19), 55{79. [Ford and Havas 1996] D. Ford and G. Havas, \A new algorithm and rened bounds for extended GCD computation", pp. 15{150 in Algorithmic number

11 Havas, Majewski, and Matthews: Extended GCD and Hermite Normal Form Algorithms via Lattice Basis Reduction 15 theory (Talence, 1996), edited by H. Cohen, Lecture Notes in Comput. Sci. 11, Springer, Berlin, [Grotschel et al. 1988] M. Grotschel, L. Lovasz, and A. Schrijver, Geometric algorithms and combinatorial optimization, Algorithms and Combinatorics, Springer, Berlin, [Havas and Majewski 199] G. Havas and B. S. Majewski, \Hermite normal form computation for integer matrices", Congr. Numer. 105 (199), 87{ 96. [Havas and Majewski 1995] G. Havas and B. S. Majewski, \Extended gcd calculation", Congr. Numer. 111 (1995), 10{11. [Hoggatt 1969] V. E. Hoggatt, Jr., Fibonacci and Lucas Numbers, Houghton Miin Co., Boston, [Jacobi 1868] C. G. J. Jacobi, \ Uber die Auosung der Gleichung 1 x 1 + x + + n x n = f u", J. Reine Angew. Math. 69 (1868), 1{8. [Kertzner 1981] S. Kertzner, \The linear Diophantine equation", Amer. Math. Monthly 88: (1981), 00{ 0. [Knuth 1969] D. E. Knuth, The art of computer programming, Vol. : Seminumerical algorithms, 1st ed., Addison-Wesley, Reading, MA, [Knuth 1981] D. E. Knuth, The art of computer programming, Vol. : Seminumerical algorithms, nd ed., Addison-Wesley, Reading, MA, [Lenstra et al. 198] A. K. Lenstra, H. W. Lenstra Jr., and L. Lovasz, \Factoring polynomials with rational coecients", Math. Ann. 61: (198), 515{5. [Majewski and Havas 199] B. S. Majewski and G. Havas, \The complexity of greatest common divisor computations", pp. 18{19 in Algorithmic number theory (Ithaca, NY, 199), edited by L. M. Adleman and M.-D. Huang, Lecture Notes in Comput. Sci. 877, Springer, Berlin, 199. [Majewski and Havas 1995] B. S. Majewski and G. Havas, \A solution to the extended gcd problem", pp. 8{5 in ISSAC'95: Proceedings of the 1995 International Symposium on Symbolic and Algebraic Computation (Montreal, 1995), edited by A. H. M. Levelt, ACM Press, New York, [Matthews 1996] K. R. Matthews, \Minimal multipliers for consecutive Fibonacci numbers", Acta Arith. 75: (1996), 05{18. [Pohst and Zassenhaus 1989] M. Pohst and H. Zassenhaus, Algorithmic algebraic number theory, Encyclopedia of Mathematics and its Applications 0, Cambridge University Press, Cambridge, [Rosser 191] B. Rosser, \A note on the linear Diophantine equation", Amer. Math. Monthly 8 (191), 66{666. [Rossner and Seifert 1996] C. Rossner and J.-P. Seifert, \The complexity of approximate optima for greatest common divisor computations", pp. 07{ in Algorithmic number theory (Talence, 1996), edited by H. Cohen, Lecture Notes in Comput. Sci. 11, Springer, Berlin, [Schnorr and Euchner 1991] C.-P. Schnorr and M. Euchner, \Lattice basis reduction: improved practical algorithms and solving subset sum problems", pp. 68{85 in Fundamentals of computation theory (Gosen, 1991), edited by L. Budach, Lecture Notes in Comput. Sci. 59, Springer, Berlin, [Schonert et al. 1996] M. Schonert et al., GAP: Groups, algorithms, and programming, Lehrstuhl D fur Mathematik, RWTH Aachen, See ftp:// dimacs.rutgers.edu/pub/ or st-and.ac.uk/ ~ gap. [Sims 199] C. C. Sims, Computation with nitely presented groups, Encyclopedia of Mathematics and its Applications 8, Cambridge University Press, Cambridge, 199. (addresses overleaf)

12 16 Experimental Mathematics, Vol. 7 (1998), No. George Havas, George Havas, Centre for Discrete Mathematics and Computing, Department of Computer Science and Electrical Engineering, The University of Queensland, Queensland 07, Australia (havas@csee.uq.edu.au, ~ havas/) Bohdan S. Majewski, Department of Computer Science and Software Engineering, University of Newcastle, Callaghan, NSW 08, Australia (bohdan@cs.newcastle.edu.au, Keith R. Matthews, Centre for Discrete Mathematics and Computing, Department of Mathematics, The University of Queensland, Queensland 07, Australia (krm@maths.uq.edu.au, ~ krm/) Received May 1, 1997; accepted in revised form July 18, 1997

Extended gcd and Hermite normal form algorithms via lattice basis reduction

Extended gcd and Hermite normal form algorithms via lattice basis reduction Extended gcd and Hermite normal form algorithms via lattice basis reduction George Havas School of Information Technology The University of Queensland Queensland 4072, Australia URL: http://www.it.uq.edu.au/personal/havas/

More information

Reduction of Smith Normal Form Transformation Matrices

Reduction of Smith Normal Form Transformation Matrices Reduction of Smith Normal Form Transformation Matrices G. Jäger, Kiel Abstract Smith normal form computations are important in group theory, module theory and number theory. We consider the transformation

More information

Short multipliers for the extended gcd problem

Short multipliers for the extended gcd problem Short multipliers for the extended gcd problem Keith Matthews Abstract For given non zero integers s 1,, s m, the problem of finding integers a 1,, a m satisfying s = gcd (s 1,, s m ) = a 1 s 1 + + a m

More information

Complexity of the Havas, Majewski, Matthews LLL. Mathematisch Instituut, Universiteit Utrecht. P.O. Box

Complexity of the Havas, Majewski, Matthews LLL. Mathematisch Instituut, Universiteit Utrecht. P.O. Box J. Symbolic Computation (2000) 11, 1{000 Complexity of the Havas, Majewski, Matthews LLL Hermite Normal Form algorithm WILBERD VAN DER KALLEN Mathematisch Instituut, Universiteit Utrecht P.O. Box 80.010

More information

Minimal multipliers for consecutive Fibonacci numbers

Minimal multipliers for consecutive Fibonacci numbers ACTA ARITHMETICA LXXV3 (1996) Minimal multipliers for consecutive Fibonacci numbers by K R Matthews (Brisbane) 1 Introduction The Fibonacci and Lucas numbers F n, L n (see [2]) are defined by Since F 1

More information

A New Algorithm and Refined Bounds for Extended Gcd Computation

A New Algorithm and Refined Bounds for Extended Gcd Computation A New Algorithm and Refined Bounds for Extended Gcd Computation David Ford* and George Havas** Department of Computer Science, Concordia University, Montrfial, Qufibec, Canada H3G 1M8 and Department of

More information

Block Korkin{Zolotarev Bases. and Successive Minima. C.P. Schnorr TR September Abstract

Block Korkin{Zolotarev Bases. and Successive Minima. C.P. Schnorr TR September Abstract Block Korkin{Zolotarev Bases and Successive Minima P Schnorr TR-9-0 September 99 Abstract A lattice basis b ; : : : ; b m is called block Korkin{Zolotarev with block size if for every consecutive vectors

More information

CSE 206A: Lattice Algorithms and Applications Spring Basic Algorithms. Instructor: Daniele Micciancio

CSE 206A: Lattice Algorithms and Applications Spring Basic Algorithms. Instructor: Daniele Micciancio CSE 206A: Lattice Algorithms and Applications Spring 2014 Basic Algorithms Instructor: Daniele Micciancio UCSD CSE We have already seen an algorithm to compute the Gram-Schmidt orthogonalization of a lattice

More information

Lattice Basis Reduction and the LLL Algorithm

Lattice Basis Reduction and the LLL Algorithm Lattice Basis Reduction and the LLL Algorithm Curtis Bright May 21, 2009 1 2 Point Lattices A point lattice is a discrete additive subgroup of R n. A basis for a lattice L R n is a set of linearly independent

More information

satisfying ( i ; j ) = ij Here ij = if i = j and 0 otherwise The idea to use lattices is the following Suppose we are given a lattice L and a point ~x

satisfying ( i ; j ) = ij Here ij = if i = j and 0 otherwise The idea to use lattices is the following Suppose we are given a lattice L and a point ~x Dual Vectors and Lower Bounds for the Nearest Lattice Point Problem Johan Hastad* MIT Abstract: We prove that given a point ~z outside a given lattice L then there is a dual vector which gives a fairly

More information

Primitive sets in a lattice

Primitive sets in a lattice Primitive sets in a lattice Spyros. S. Magliveras Department of Mathematical Sciences Florida Atlantic University Boca Raton, FL 33431, U.S.A spyros@fau.unl.edu Tran van Trung Institute for Experimental

More information

Fraction-free Row Reduction of Matrices of Skew Polynomials

Fraction-free Row Reduction of Matrices of Skew Polynomials Fraction-free Row Reduction of Matrices of Skew Polynomials Bernhard Beckermann Laboratoire d Analyse Numérique et d Optimisation Université des Sciences et Technologies de Lille France bbecker@ano.univ-lille1.fr

More information

and the polynomial-time Turing p reduction from approximate CVP to SVP given in [10], the present authors obtained a n=2-approximation algorithm that

and the polynomial-time Turing p reduction from approximate CVP to SVP given in [10], the present authors obtained a n=2-approximation algorithm that Sampling short lattice vectors and the closest lattice vector problem Miklos Ajtai Ravi Kumar D. Sivakumar IBM Almaden Research Center 650 Harry Road, San Jose, CA 95120. fajtai, ravi, sivag@almaden.ibm.com

More information

Note on shortest and nearest lattice vectors

Note on shortest and nearest lattice vectors Note on shortest and nearest lattice vectors Martin Henk Fachbereich Mathematik, Sekr. 6-1 Technische Universität Berlin Straße des 17. Juni 136 D-10623 Berlin Germany henk@math.tu-berlin.de We show that

More information

1 Shortest Vector Problem

1 Shortest Vector Problem Lattices in Cryptography University of Michigan, Fall 25 Lecture 2 SVP, Gram-Schmidt, LLL Instructor: Chris Peikert Scribe: Hank Carter Shortest Vector Problem Last time we defined the minimum distance

More information

Shortest Vector Problem (1982; Lenstra, Lenstra, Lovasz)

Shortest Vector Problem (1982; Lenstra, Lenstra, Lovasz) Shortest Vector Problem (1982; Lenstra, Lenstra, Lovasz) Daniele Micciancio, University of California at San Diego, www.cs.ucsd.edu/ daniele entry editor: Sanjeev Khanna INDEX TERMS: Point lattices. Algorithmic

More information

CSE 206A: Lattice Algorithms and Applications Spring Basis Reduction. Instructor: Daniele Micciancio

CSE 206A: Lattice Algorithms and Applications Spring Basis Reduction. Instructor: Daniele Micciancio CSE 206A: Lattice Algorithms and Applications Spring 2014 Basis Reduction Instructor: Daniele Micciancio UCSD CSE No efficient algorithm is known to find the shortest vector in a lattice (in arbitrary

More information

Partial LLL Reduction

Partial LLL Reduction Partial Reduction Xiaohu Xie School of Computer Science McGill University Montreal, Quebec, Canada H3A A7 Email: xiaohu.xie@mail.mcgill.ca Xiao-Wen Chang School of Computer Science McGill University Montreal,

More information

Hermite normal form: Computation and applications

Hermite normal form: Computation and applications Integer Points in Polyhedra Gennady Shmonin Hermite normal form: Computation and applications February 24, 2009 1 Uniqueness of Hermite normal form In the last lecture, we showed that if B is a rational

More information

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) Contents 1 Vector Spaces 1 1.1 The Formal Denition of a Vector Space.................................. 1 1.2 Subspaces...................................................

More information

Short solutions for a linear Diophantine equation

Short solutions for a linear Diophantine equation Lecturas Matemáticas Volumen 27 (2006), páginas 5 16 Short solutions for a linear Diophantine equation H. Esmaeili Bu-Ali Sina University, Hamedan, Iran Abstract. It is known that finding the shortest

More information

The Simple 7-(33,8,10)-Designs with Automorphism Group PΓL(2,32)

The Simple 7-(33,8,10)-Designs with Automorphism Group PΓL(2,32) The Simple 7-(33,8,10)-Designs with Automorphism Group PΓL(2,32) Alfred Wassermann Abstract Lattice basis reduction in combination with an efficient backtracking algorithm is used to find all (4 996 426)

More information

ELEMENTARY LINEAR ALGEBRA

ELEMENTARY LINEAR ALGEBRA ELEMENTARY LINEAR ALGEBRA K R MATTHEWS DEPARTMENT OF MATHEMATICS UNIVERSITY OF QUEENSLAND First Printing, 99 Chapter LINEAR EQUATIONS Introduction to linear equations A linear equation in n unknowns x,

More information

A matrix over a field F is a rectangular array of elements from F. The symbol

A matrix over a field F is a rectangular array of elements from F. The symbol Chapter MATRICES Matrix arithmetic A matrix over a field F is a rectangular array of elements from F The symbol M m n (F ) denotes the collection of all m n matrices over F Matrices will usually be denoted

More information

The Shortest Vector Problem (Lattice Reduction Algorithms)

The Shortest Vector Problem (Lattice Reduction Algorithms) The Shortest Vector Problem (Lattice Reduction Algorithms) Approximation Algorithms by V. Vazirani, Chapter 27 - Problem statement, general discussion - Lattices: brief introduction - The Gauss algorithm

More information

SOLVING QUADRATIC EQUATIONS IN DIMENSION 5 OR MORE WITHOUT FACTORING

SOLVING QUADRATIC EQUATIONS IN DIMENSION 5 OR MORE WITHOUT FACTORING SOLVING QUADRATIC EQUATIONS IN DIMENSION 5 OR MORE WITHOUT FACTORING PIERRE CASTEL Abstract. Let Q be a 5 5 symmetric matrix with integral entries and with det Q 0, but neither positive nor negative denite.

More information

WRONSKIANS AND LINEAR INDEPENDENCE... f (n 1)

WRONSKIANS AND LINEAR INDEPENDENCE... f (n 1) WRONSKIANS AND LINEAR INDEPENDENCE ALIN BOSTAN AND PHILIPPE DUMAS Abstract We give a new and simple proof of the fact that a finite family of analytic functions has a zero Wronskian only if it is linearly

More information

Irreducible Polynomials over Finite Fields

Irreducible Polynomials over Finite Fields Chapter 4 Irreducible Polynomials over Finite Fields 4.1 Construction of Finite Fields As we will see, modular arithmetic aids in testing the irreducibility of polynomials and even in completely factoring

More information

ODD REPDIGITS TO SMALL BASES ARE NOT PERFECT

ODD REPDIGITS TO SMALL BASES ARE NOT PERFECT #A34 INTEGERS 1 (01) ODD REPDIGITS TO SMALL BASES ARE NOT PERFECT Kevin A. Broughan Department of Mathematics, University of Waikato, Hamilton 316, New Zealand kab@waikato.ac.nz Qizhi Zhou Department of

More information

Linear Algebra (part 1) : Matrices and Systems of Linear Equations (by Evan Dummit, 2016, v. 2.02)

Linear Algebra (part 1) : Matrices and Systems of Linear Equations (by Evan Dummit, 2016, v. 2.02) Linear Algebra (part ) : Matrices and Systems of Linear Equations (by Evan Dummit, 206, v 202) Contents 2 Matrices and Systems of Linear Equations 2 Systems of Linear Equations 2 Elimination, Matrix Formulation

More information

Short Vectors of Planar Lattices via Continued Fractions. Friedrich Eisenbrand Max-Planck-Institut für Informatik

Short Vectors of Planar Lattices via Continued Fractions. Friedrich Eisenbrand Max-Planck-Institut für Informatik Short Vectors of Planar Lattices via Continued Fractions Friedrich Eisenbrand Max-Planck-Institut für Informatik Outline Lattices Definition of planar integral lattices Shortest Vectors Applications The

More information

ELEMENTARY LINEAR ALGEBRA

ELEMENTARY LINEAR ALGEBRA ELEMENTARY LINEAR ALGEBRA K. R. MATTHEWS DEPARTMENT OF MATHEMATICS UNIVERSITY OF QUEENSLAND Second Online Version, December 1998 Comments to the author at krm@maths.uq.edu.au Contents 1 LINEAR EQUATIONS

More information

ARITHMETIC PROGRESSIONS OF SQUARES, CUBES AND n-th POWERS

ARITHMETIC PROGRESSIONS OF SQUARES, CUBES AND n-th POWERS ARITHMETIC PROGRESSIONS OF SQUARES, CUBES AND n-th POWERS L. HAJDU 1, SZ. TENGELY 2 Abstract. In this paper we continue the investigations about unlike powers in arithmetic progression. We provide sharp

More information

ELEMENTARY LINEAR ALGEBRA

ELEMENTARY LINEAR ALGEBRA ELEMENTARY LINEAR ALGEBRA K. R. MATTHEWS DEPARTMENT OF MATHEMATICS UNIVERSITY OF QUEENSLAND Corrected Version, 7th April 013 Comments to the author at keithmatt@gmail.com Chapter 1 LINEAR EQUATIONS 1.1

More information

arxiv:math/ v2 [math.nt] 18 Jun 1999

arxiv:math/ v2 [math.nt] 18 Jun 1999 arxiv:math/9906016v2 [math.nt] 18 Jun 1999 On periodic sequences for algebraic numbers Thomas Garrity Department of Mathematics Williams College Williamstown, MA 01267 email:tgarrity@williams.edu Abstract

More information

Lattice Reduction of Modular, Convolution, and NTRU Lattices

Lattice Reduction of Modular, Convolution, and NTRU Lattices Summer School on Computational Number Theory and Applications to Cryptography Laramie, Wyoming, June 19 July 7, 2006 Lattice Reduction of Modular, Convolution, and NTRU Lattices Project suggested by Joe

More information

a 11 x 1 + a 12 x a 1n x n = b 1 a 21 x 1 + a 22 x a 2n x n = b 2.

a 11 x 1 + a 12 x a 1n x n = b 1 a 21 x 1 + a 22 x a 2n x n = b 2. Chapter 1 LINEAR EQUATIONS 11 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,, a n, b are given real

More information

On Systems of Diagonal Forms II

On Systems of Diagonal Forms II On Systems of Diagonal Forms II Michael P Knapp 1 Introduction In a recent paper [8], we considered the system F of homogeneous additive forms F 1 (x) = a 11 x k 1 1 + + a 1s x k 1 s F R (x) = a R1 x k

More information

Contents. 4 Arithmetic and Unique Factorization in Integral Domains. 4.1 Euclidean Domains and Principal Ideal Domains

Contents. 4 Arithmetic and Unique Factorization in Integral Domains. 4.1 Euclidean Domains and Principal Ideal Domains Ring Theory (part 4): Arithmetic and Unique Factorization in Integral Domains (by Evan Dummit, 018, v. 1.00) Contents 4 Arithmetic and Unique Factorization in Integral Domains 1 4.1 Euclidean Domains and

More information

Linear Algebra March 16, 2019

Linear Algebra March 16, 2019 Linear Algebra March 16, 2019 2 Contents 0.1 Notation................................ 4 1 Systems of linear equations, and matrices 5 1.1 Systems of linear equations..................... 5 1.2 Augmented

More information

New Minimal Weight Representations for Left-to-Right Window Methods

New Minimal Weight Representations for Left-to-Right Window Methods New Minimal Weight Representations for Left-to-Right Window Methods James A. Muir 1 and Douglas R. Stinson 2 1 Department of Combinatorics and Optimization 2 School of Computer Science University of Waterloo

More information

LATTICE POINT COVERINGS

LATTICE POINT COVERINGS LATTICE POINT COVERINGS MARTIN HENK AND GEORGE A. TSINTSIFAS Abstract. We give a simple proof of a necessary and sufficient condition under which any congruent copy of a given ellipsoid contains an integral

More information

1. Introduction

1. Introduction Séminaire Lotharingien de Combinatoire 49 (2002), Article B49a AVOIDING 2-LETTER SIGNED PATTERNS T. MANSOUR A AND J. WEST B A LaBRI (UMR 5800), Université Bordeaux, 35 cours de la Libération, 33405 Talence

More information

1 Matrices and Systems of Linear Equations

1 Matrices and Systems of Linear Equations Linear Algebra (part ) : Matrices and Systems of Linear Equations (by Evan Dummit, 207, v 260) Contents Matrices and Systems of Linear Equations Systems of Linear Equations Elimination, Matrix Formulation

More information

Factoring Polynomials with Rational Coecients. Kenneth Giuliani

Factoring Polynomials with Rational Coecients. Kenneth Giuliani Factoring Polynomials with Rational Coecients Kenneth Giuliani 17 April 1998 1 Introduction Factorization is a problem well-studied in mathematics. Of particular focus is factorization within unique factorization

More information

ELEMENTARY LINEAR ALGEBRA

ELEMENTARY LINEAR ALGEBRA ELEMENTARY LINEAR ALGEBRA K R MATTHEWS DEPARTMENT OF MATHEMATICS UNIVERSITY OF QUEENSLAND Second Online Version, December 998 Comments to the author at krm@mathsuqeduau All contents copyright c 99 Keith

More information

Another View of the Gaussian Algorithm

Another View of the Gaussian Algorithm Another View of the Gaussian Algorithm Ali Akhavi and Céline Moreira Dos Santos GREYC Université de Caen, F-14032 Caen Cedex, France {ali.akhavi,moreira}@info.unicaen.fr Abstract. We introduce here a rewrite

More information

Lattices and Hermite normal form

Lattices and Hermite normal form Integer Points in Polyhedra Lattices and Hermite normal form Gennady Shmonin February 17, 2009 1 Lattices Let B = { } b 1,b 2,...,b k be a set of linearly independent vectors in n-dimensional Euclidean

More information

Collatz cycles with few descents

Collatz cycles with few descents ACTA ARITHMETICA XCII.2 (2000) Collatz cycles with few descents by T. Brox (Stuttgart) 1. Introduction. Let T : Z Z be the function defined by T (x) = x/2 if x is even, T (x) = (3x + 1)/2 if x is odd.

More information

MATH 315 Linear Algebra Homework #1 Assigned: August 20, 2018

MATH 315 Linear Algebra Homework #1 Assigned: August 20, 2018 Homework #1 Assigned: August 20, 2018 Review the following subjects involving systems of equations and matrices from Calculus II. Linear systems of equations Converting systems to matrix form Pivot entry

More information

Some Combinatorial Aspects of Time-Stamp Systems. Unite associee C.N.R.S , cours de la Liberation F TALENCE.

Some Combinatorial Aspects of Time-Stamp Systems. Unite associee C.N.R.S , cours de la Liberation F TALENCE. Some Combinatorial spects of Time-Stamp Systems Robert Cori Eric Sopena Laboratoire Bordelais de Recherche en Informatique Unite associee C.N.R.S. 1304 351, cours de la Liberation F-33405 TLENCE bstract

More information

Elementary maths for GMT

Elementary maths for GMT Elementary maths for GMT Linear Algebra Part 2: Matrices, Elimination and Determinant m n matrices The system of m linear equations in n variables x 1, x 2,, x n a 11 x 1 + a 12 x 2 + + a 1n x n = b 1

More information

#A5 INTEGERS 18A (2018) EXPLICIT EXAMPLES OF p-adic NUMBERS WITH PRESCRIBED IRRATIONALITY EXPONENT

#A5 INTEGERS 18A (2018) EXPLICIT EXAMPLES OF p-adic NUMBERS WITH PRESCRIBED IRRATIONALITY EXPONENT #A5 INTEGERS 8A (208) EXPLICIT EXAMPLES OF p-adic NUMBERS WITH PRESCRIBED IRRATIONALITY EXPONENT Yann Bugeaud IRMA, UMR 750, Université de Strasbourg et CNRS, Strasbourg, France bugeaud@math.unistra.fr

More information

Mathematical Optimisation, Chpt 2: Linear Equations and inequalities

Mathematical Optimisation, Chpt 2: Linear Equations and inequalities Mathematical Optimisation, Chpt 2: Linear Equations and inequalities Peter J.C. Dickinson p.j.c.dickinson@utwente.nl http://dickinson.website version: 12/02/18 Monday 5th February 2018 Peter J.C. Dickinson

More information

A Course in Computational Algebraic Number Theory

A Course in Computational Algebraic Number Theory Henri Cohen 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. A Course in Computational Algebraic Number Theory Springer

More information

Parallel Algorithms for Computing the Smith Normal Form of Large Matrices

Parallel Algorithms for Computing the Smith Normal Form of Large Matrices Parallel Algorithms for Computing the Smith Normal Form of Large Matrices Gerold Jäger Mathematisches Seminar der Christian-Albrechts-Universität zu Kiel, Christian-Albrechts-Platz 4, D-24118 Kiel, Germany

More information

Divisibility. Chapter Divisors and Residues

Divisibility. Chapter Divisors and Residues Chapter 1 Divisibility Number theory is concerned with the properties of the integers. By the word integers we mean the counting numbers 1, 2, 3,..., together with their negatives and zero. Accordingly

More information

Contents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces

Contents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v 250) Contents 2 Vector Spaces 1 21 Vectors in R n 1 22 The Formal Denition of a Vector Space 4 23 Subspaces 6 24 Linear Combinations and

More information

arxiv: v1 [math.nt] 20 Nov 2017

arxiv: v1 [math.nt] 20 Nov 2017 REDUCED IDEALS FROM THE REDUCTION ALGORITHM HA THANH NGUYEN TRAN arxiv:171107573v1 [mathnt] 20 Nov 2017 Abstract The reduction algorithm is used to compute reduced ideals of a number field However, there

More information

GENERATING SETS KEITH CONRAD

GENERATING SETS KEITH CONRAD GENERATING SETS KEITH CONRAD 1 Introduction In R n, every vector can be written as a unique linear combination of the standard basis e 1,, e n A notion weaker than a basis is a spanning set: a set of vectors

More information

COS 598D - Lattices. scribe: Srdjan Krstic

COS 598D - Lattices. scribe: Srdjan Krstic COS 598D - Lattices scribe: Srdjan Krstic Introduction In the first part we will give a brief introduction to lattices and their relevance in some topics in computer science. Then we show some specific

More information

1 Last time: inverses

1 Last time: inverses MATH Linear algebra (Fall 8) Lecture 8 Last time: inverses The following all mean the same thing for a function f : X Y : f is invertible f is one-to-one and onto 3 For each b Y there is exactly one a

More information

How to Factor N 1 and N 2 When p 1 = p 2 mod 2 t

How to Factor N 1 and N 2 When p 1 = p 2 mod 2 t How to Factor N 1 and N 2 When p 1 = p 2 mod 2 t Kaoru Kurosawa and Takuma Ueda Ibaraki University, Japan Abstract. Let N 1 = p 1q 1 and N 2 = p 2q 2 be two different RSA moduli. Suppose that p 1 = p 2

More information

Preface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques

Preface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques Two Lectures on Advanced Topics in Computability Oded Goldreich Department of Computer Science Weizmann Institute of Science Rehovot, Israel. oded@wisdom.weizmann.ac.il Spring 2002 Abstract This text consists

More information

#A2 INTEGERS 12A (2012): John Selfridge Memorial Issue ON A CONJECTURE REGARDING BALANCING WITH POWERS OF FIBONACCI NUMBERS

#A2 INTEGERS 12A (2012): John Selfridge Memorial Issue ON A CONJECTURE REGARDING BALANCING WITH POWERS OF FIBONACCI NUMBERS #A2 INTEGERS 2A (202): John Selfridge Memorial Issue ON A CONJECTURE REGARDING BALANCING WITH POWERS OF FIBONACCI NUMBERS Saúl Díaz Alvarado Facultad de Ciencias, Universidad Autónoma del Estado de México,

More information

A STUDY ON THE CONCEPT OF DIOPHANTINE EQUATIONS

A STUDY ON THE CONCEPT OF DIOPHANTINE EQUATIONS Airo International Research Journal March, 2014 Volume III, ISSN: 2320-3714 A STUDY ON THE CONCEPT OF DIOPHANTINE EQUATIONS Alham Research Scholar, Himalayan University, Itanagar, Arunachal Pradesh ABSTRACT

More information

Diophantine equations via weighted LLL algorithm

Diophantine equations via weighted LLL algorithm Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL algorithm Momonari Kudo Graduate School of Mathematics, Kyushu University, JAPAN Kyushu University Number Theory

More information

Airo International Research Journal September, 2016 Volume VII, ISSN:

Airo International Research Journal September, 2016 Volume VII, ISSN: 1 DIOPHANTINE EQUATIONS AND THEIR SIGNIFICANCE Neelam Rani Asstt. Professor in Department of Mathematics Shri Krishna Institute of Engg, & Technology, Kurukshetra (Haryana) ABSTRACT A Diophantine equation

More information

APPROXIMATING THE COMPLEXITY MEASURE OF. Levent Tuncel. November 10, C&O Research Report: 98{51. Abstract

APPROXIMATING THE COMPLEXITY MEASURE OF. Levent Tuncel. November 10, C&O Research Report: 98{51. Abstract APPROXIMATING THE COMPLEXITY MEASURE OF VAVASIS-YE ALGORITHM IS NP-HARD Levent Tuncel November 0, 998 C&O Research Report: 98{5 Abstract Given an m n integer matrix A of full row rank, we consider the

More information

Structural Grobner Basis. Bernd Sturmfels and Markus Wiegelmann TR May Department of Mathematics, UC Berkeley.

Structural Grobner Basis. Bernd Sturmfels and Markus Wiegelmann TR May Department of Mathematics, UC Berkeley. I 1947 Center St. Suite 600 Berkeley, California 94704-1198 (510) 643-9153 FAX (510) 643-7684 INTERNATIONAL COMPUTER SCIENCE INSTITUTE Structural Grobner Basis Detection Bernd Sturmfels and Markus Wiegelmann

More information

A Disaggregation Approach for Solving Linear Diophantine Equations 1

A Disaggregation Approach for Solving Linear Diophantine Equations 1 Applied Mathematical Sciences, Vol. 12, 2018, no. 18, 871-878 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ams.2018.8687 A Disaggregation Approach for Solving Linear Diophantine Equations 1 Baiyi

More information

Max-Planck-Institut fur Mathematik in den Naturwissenschaften Leipzig Uniformly distributed measures in Euclidean spaces by Bernd Kirchheim and David Preiss Preprint-Nr.: 37 1998 Uniformly Distributed

More information

Calculus and linear algebra for biomedical engineering Week 3: Matrices, linear systems of equations, and the Gauss algorithm

Calculus and linear algebra for biomedical engineering Week 3: Matrices, linear systems of equations, and the Gauss algorithm Calculus and linear algebra for biomedical engineering Week 3: Matrices, linear systems of equations, and the Gauss algorithm Hartmut Führ fuehr@matha.rwth-aachen.de Lehrstuhl A für Mathematik, RWTH Aachen

More information

DS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra.

DS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra. DS-GA 1002 Lecture notes 0 Fall 2016 Linear Algebra These notes provide a review of basic concepts in linear algebra. 1 Vector spaces You are no doubt familiar with vectors in R 2 or R 3, i.e. [ ] 1.1

More information

Fast Reduction of Ternary Quadratic Forms

Fast Reduction of Ternary Quadratic Forms 1:01 Fast Reduction of Ternary Quadratic Forms 1:02 1:0 1:04 1:05 1:06 Friedrich Eisenbrand 1 and Günter Rote 2 1 Max-Planck-Institut für Informatik, Stuhlsatzenhausweg 85, 6612 Saarbrücken, Germany, eisen@mpi-sb.mpg.de

More information

BALANCED INTEGER SOLUTIONS OF LINEAR EQUATIONS

BALANCED INTEGER SOLUTIONS OF LINEAR EQUATIONS BALANCED INTEGER SOLUTIONS OF LINEAR EQUATIONS KONSTANTINOS A. DRAZIOTIS Abstract. We use lattice based methods in order to get an integer solution of the linear equation a x + +a nx n = a 0, which satisfies

More information

ACI-matrices all of whose completions have the same rank

ACI-matrices all of whose completions have the same rank ACI-matrices all of whose completions have the same rank Zejun Huang, Xingzhi Zhan Department of Mathematics East China Normal University Shanghai 200241, China Abstract We characterize the ACI-matrices

More information

Bricklaying and the Hermite Normal Form

Bricklaying and the Hermite Normal Form Bricklaying and the Hermite Normal Form William J. Gilbert Pure Mathematics Department University of Waterloo Waterloo, Ontario Canada N2L 3G1 AMS Classifications: Primary: 15A36 Appeared in the American

More information

MATH 1120 (LINEAR ALGEBRA 1), FINAL EXAM FALL 2011 SOLUTIONS TO PRACTICE VERSION

MATH 1120 (LINEAR ALGEBRA 1), FINAL EXAM FALL 2011 SOLUTIONS TO PRACTICE VERSION MATH (LINEAR ALGEBRA ) FINAL EXAM FALL SOLUTIONS TO PRACTICE VERSION Problem (a) For each matrix below (i) find a basis for its column space (ii) find a basis for its row space (iii) determine whether

More information

Definition 2.3. We define addition and multiplication of matrices as follows.

Definition 2.3. We define addition and multiplication of matrices as follows. 14 Chapter 2 Matrices In this chapter, we review matrix algebra from Linear Algebra I, consider row and column operations on matrices, and define the rank of a matrix. Along the way prove that the row

More information

47-831: Advanced Integer Programming Lecturer: Amitabh Basu Lecture 2 Date: 03/18/2010

47-831: Advanced Integer Programming Lecturer: Amitabh Basu Lecture 2 Date: 03/18/2010 47-831: Advanced Integer Programming Lecturer: Amitabh Basu Lecture Date: 03/18/010 We saw in the previous lecture that a lattice Λ can have many bases. In fact, if Λ is a lattice of a subspace L with

More information

On some properties of elementary derivations in dimension six

On some properties of elementary derivations in dimension six Journal of Pure and Applied Algebra 56 (200) 69 79 www.elsevier.com/locate/jpaa On some properties of elementary derivations in dimension six Joseph Khoury Department of Mathematics, University of Ottawa,

More information

THE LARGEST INTERSECTION LATTICE OF A CHRISTOS A. ATHANASIADIS. Abstract. We prove a conjecture of Bayer and Brandt [J. Alg. Combin.

THE LARGEST INTERSECTION LATTICE OF A CHRISTOS A. ATHANASIADIS. Abstract. We prove a conjecture of Bayer and Brandt [J. Alg. Combin. THE LARGEST INTERSECTION LATTICE OF A DISCRIMINANTAL ARRANGEMENT CHRISTOS A. ATHANASIADIS Abstract. We prove a conjecture of Bayer and Brandt [J. Alg. Combin. 6 (1997), 229{246] about the \largest" intersection

More information

(Inv) Computing Invariant Factors Math 683L (Summer 2003)

(Inv) Computing Invariant Factors Math 683L (Summer 2003) (Inv) Computing Invariant Factors Math 683L (Summer 23) We have two big results (stated in (Can2) and (Can3)) concerning the behaviour of a single linear transformation T of a vector space V In particular,

More information

Lecture 5: CVP and Babai s Algorithm

Lecture 5: CVP and Babai s Algorithm NYU, Fall 2016 Lattices Mini Course Lecture 5: CVP and Babai s Algorithm Lecturer: Noah Stephens-Davidowitz 51 The Closest Vector Problem 511 Inhomogeneous linear equations Recall that, in our first lecture,

More information

The Dual Lattice, Integer Linear Systems and Hermite Normal Form

The Dual Lattice, Integer Linear Systems and Hermite Normal Form New York University, Fall 2013 Lattices, Convexity & Algorithms Lecture 2 The Dual Lattice, Integer Linear Systems and Hermite Normal Form Lecturers: D. Dadush, O. Regev Scribe: D. Dadush 1 Dual Lattice

More information

Central Groupoids, Central Digraphs, and Zero-One Matrices A Satisfying A 2 = J

Central Groupoids, Central Digraphs, and Zero-One Matrices A Satisfying A 2 = J Central Groupoids, Central Digraphs, and Zero-One Matrices A Satisfying A 2 = J Frank Curtis, John Drew, Chi-Kwong Li, and Daniel Pragel September 25, 2003 Abstract We study central groupoids, central

More information

290 J.M. Carnicer, J.M. Pe~na basis (u 1 ; : : : ; u n ) consisting of minimally supported elements, yet also has a basis (v 1 ; : : : ; v n ) which f

290 J.M. Carnicer, J.M. Pe~na basis (u 1 ; : : : ; u n ) consisting of minimally supported elements, yet also has a basis (v 1 ; : : : ; v n ) which f Numer. Math. 67: 289{301 (1994) Numerische Mathematik c Springer-Verlag 1994 Electronic Edition Least supported bases and local linear independence J.M. Carnicer, J.M. Pe~na? Departamento de Matematica

More information

A Fast Euclidean Algorithm for Gaussian Integers

A Fast Euclidean Algorithm for Gaussian Integers J. Symbolic Computation (2002) 33, 385 392 doi:10.1006/jsco.2001.0518 Available online at http://www.idealibrary.com on A Fast Euclidean Algorithm for Gaussian Integers GEORGE E. COLLINS Department of

More information

x 3 2x = (x 2) (x 2 2x + 1) + (x 2) x 2 2x + 1 = (x 4) (x + 2) + 9 (x + 2) = ( 1 9 x ) (9) + 0

x 3 2x = (x 2) (x 2 2x + 1) + (x 2) x 2 2x + 1 = (x 4) (x + 2) + 9 (x + 2) = ( 1 9 x ) (9) + 0 1. (a) i. State and prove Wilson's Theorem. ii. Show that, if p is a prime number congruent to 1 modulo 4, then there exists a solution to the congruence x 2 1 mod p. (b) i. Let p(x), q(x) be polynomials

More information

A lower regulator bound for number fields

A lower regulator bound for number fields A lower regulator bound for number fields Claus Fieker and Michael E. Pohst Abstract 1 Introduction In [] a regulator bound for algebraic number fields F was derived which makes use of specific data of

More information

Worst case complexity of the optimal LLL algorithm

Worst case complexity of the optimal LLL algorithm Worst case complexity of the optimal LLL algorithm ALI AKHAVI GREYC - Université de Caen, F-14032 Caen Cedex, France aliakhavi@infounicaenfr Abstract In this paper, we consider the open problem of the

More information

4.1 Eigenvalues, Eigenvectors, and The Characteristic Polynomial

4.1 Eigenvalues, Eigenvectors, and The Characteristic Polynomial Linear Algebra (part 4): Eigenvalues, Diagonalization, and the Jordan Form (by Evan Dummit, 27, v ) Contents 4 Eigenvalues, Diagonalization, and the Jordan Canonical Form 4 Eigenvalues, Eigenvectors, and

More information

THE COMPLEXITY OF THE QUATERNION PROD- UCT*

THE COMPLEXITY OF THE QUATERNION PROD- UCT* 1 THE COMPLEXITY OF THE QUATERNION PROD- UCT* Thomas D. Howell Jean-Claude Lafon 1 ** TR 75-245 June 1975 2 Department of Computer Science, Cornell University, Ithaca, N.Y. * This research was supported

More information

Prof. Ila Varma HW 8 Solutions MATH 109. A B, h(i) := g(i n) if i > n. h : Z + f((i + 1)/2) if i is odd, g(i/2) if i is even.

Prof. Ila Varma HW 8 Solutions MATH 109. A B, h(i) := g(i n) if i > n. h : Z + f((i + 1)/2) if i is odd, g(i/2) if i is even. 1. Show that if A and B are countable, then A B is also countable. Hence, prove by contradiction, that if X is uncountable and a subset A is countable, then X A is uncountable. Solution: Suppose A and

More information

1 Introduction It will be convenient to use the inx operators a b and a b to stand for maximum (least upper bound) and minimum (greatest lower bound)

1 Introduction It will be convenient to use the inx operators a b and a b to stand for maximum (least upper bound) and minimum (greatest lower bound) Cycle times and xed points of min-max functions Jeremy Gunawardena, Department of Computer Science, Stanford University, Stanford, CA 94305, USA. jeremy@cs.stanford.edu October 11, 1993 to appear in the

More information

from Lattice Reduction Problems MIT - Laboratory for Computer Science November 12, 1996 Abstract

from Lattice Reduction Problems MIT - Laboratory for Computer Science November 12, 1996 Abstract Public-Key Cryptosystems from Lattice Reduction Problems Oded Goldreich Sha Goldwasser y Shai Halevi z MIT - Laboratory for Computer Science November 12, 1996 Abstract We present a new proposal for a trapdoor

More information

A Sixteenth-order Polylogarithm Ladder

A Sixteenth-order Polylogarithm Ladder A Sixteenth-order Polylogarithm Ladder Henri Cohen, Leonard Lewin and Don Zagier CONTENTS 1. Introduction 2. Numerical Computation of Polylogarithms 3. Ladders 4. Climbing the Ladder 5. Numerical Results

More information

On the power-free parts of consecutive integers

On the power-free parts of consecutive integers ACTA ARITHMETICA XC4 (1999) On the power-free parts of consecutive integers by B M M de Weger (Krimpen aan den IJssel) and C E van de Woestijne (Leiden) 1 Introduction and main results Considering the

More information

Questionnaire for CSET Mathematics subset 1

Questionnaire for CSET Mathematics subset 1 Questionnaire for CSET Mathematics subset 1 Below is a preliminary questionnaire aimed at finding out your current readiness for the CSET Math subset 1 exam. This will serve as a baseline indicator for

More information