EFFICIENT COMPUTATION OF TERMS OF LINEAR RECURRENCE SEQUENCES OF ANY ORDER
|
|
- Ada Howard
- 5 years ago
- Views:
Transcription
1 #A39 INTEGERS 8 (28) EFFIIENT OMPUTATION OF TERMS OF LINEAR REURRENE SEQUENES OF ANY ORDER Dmitry I. Khomovsky Lomonosov Moscow State University, Moscow, Russia khomovskij@physics.msu.ru Received: /2/6, Accepted: 4/5/8, Published: 4/2/8 Abstract In this paper we give e cient algorithms for computing second-, third-, and fourthorder linear recurrences. We also present an algorithm scheme for computing terms with the indices N,..., N +n of an nth-order linear recurrence. Unlike Fiduccia s algorithm, our approach uses certain formulas for modular polynomial squarings.. Introduction Let {W k (a,..., a n ; p... p n )} be an nth-order linear recurrence defined by the relation f k+n = p f k+n + p f k+n p n f k, () with the initial values W i = a i ( apple i apple n ). The characteristic polynomial is g(x) = x n (p x n + p x n p n ). (2) Widely known particular cases are the Lucas sequences {U k (P, Q)} and {V k (P, Q)}. They are defined recursively by f k+2 = P f k+ Qf k, (3) with the initial values U =, U =, V = 2, V = P. The characteristic polynomial in this case is x 2 P x + Q. omputation of linear recurrences has been studied by many authors [5, 8, 2]. The most e ective algorithm was proposed by Fiduccia in 985. To obtain the Nth term of an nth-order linear recurrence using this method, we need to compute r(x) = x N mod g(x), where g(x) = x n P n i= p ix n i. Then we compute r(),
2 INTEGERS: 8 (28) 2 where is the n n companion matrix of the linear recurrence: p n p n 2 = p n 3. (4) A p Finally, we multiply the row vector of initial values (a,..., a n ) by the first column of r() and obtain the N th term. The computational complexity of this algorithm is O(µ(n) log N + n 3 ). Here, µ(n) is the total number of operations required to multiply two polynomials of degree n in the polynomial ring. Fiduccia actually manages to exploit the structure of the matrix in order to decrease the complexity to O(µ(n) log N), see Theorem 3. and Proposition 3.2 in [5]. 2. omputation of Second-order Linear Recurrences Let the second-order linear recurrence sequence {W k } be defined by the relation W k+2 = P W k+ QW k, with W = A, W = B. It was intensively studied by Horadam [9, ]. For the Lucas sequences we have the following matrix formula: Uk+ V k+ Uk V = M k P Q, where M =. (5) U k V k U k V k Then Uk+ V k+ = M U k V k P. (6) k 2 Lemma. For the sequence {W k (A, B; P, Q)} the following holds: Proof. We have: Wk+ = M W k B = BM k A k BUk+ AQU = k. BU k AQU k W k = BU k AQU k, (7) W k = (B AP )U k + AU k+. (8) + AM k Uk+ = B + AM U k Q k From this we get (7). By the definition of the Lucas sequence QU k = P U k U k+. Using this, we obtain (8). For recurrences of order greater than 2 we will use the relation ().
3 INTEGERS: 8 (28) 3 The obtained result is known (for example, see [9]). We see that the computation of remote terms of {W k (A, B; P, Q)} can be done by the Lucas sequence {U k (P, Q)}. In a sense, {U k } is a basis. We note that the result given in the following theorem is known, moreover, there is a generalization [6]. But we still give the proof, since we will use a similar approach for higher-order linear recurrences. Theorem. Let {U k (P, Q)} be the Lucas sequence. Then Umk+ U mk = Proof. We use the notations S = Uk+ m QU k Uk+. (9) U k U k+ P U k U k P 2, S = P/2. () /2 We have Umk+ = M U mk = (M mk k SS ) m Uk+. () U k By (6) and (), M k SS = Uk+ ( P U k+ + V k+ )/2. (2) U k ( P U k + V k )/2 By Lemma we can get the classical identity V k = P U k 2QU k, with the help of which we eliminate V k, V k+ from (2). Then M k SS Uk+ QU = k. U k QU k (3) Since QU k = U k+ P U k, we get M k SS = Finally, we can modify () into (9). Uk+ If m = 2 in (9), then we obtain the following identities: If we replace k by k + in (5) and use U k+2 = P U k+ QU k. (4) U k U k+ P U k U 2k = U k (2U k+ P U k ), (5) U 2k+ = U 2 k+ QU 2 k. (6) QU k, then we obtain U 2k+2 = U k+ (P U k+ 2QU k ). (7)
4 INTEGERS: 8 (28) 4 Now using (5), (6), and (7) we can present an algorithm for computing two terms of {U k (P, Q)} with the indices N and N +. We need four temporary memories: u, u 2, U, U 2. In fact, the number of temporary memories can be reduced by eliminating u 2. Algorithm omputing the Lucas sequence {U k (P, Q)} Input: N = P m i= b i2 i, (b m = ) P, Q Output: U N, U N+ : U ; U 2 P 2: for j from m 2 to by do 3: u U ; u 2 U 2 4: if b j = then 5: U u 2 2 Qu 2 ; U 2 u 2 (P u 2 2Qu ) 6: else if 7: U u (2u 2 P u ); U 2 u 2 2 Qu 2 8: end if 9: end for : return U, U 2 Such a computational method was discussed by Reiter in [4]. Previously [4], it was proposed for the Fibonacci numbers. Suppose we have computed U N, U N+ by Algorithm, then with the help of (8) we get W N. Using W N+ = BU N+ AQU N we get W N+. Thus, in the general case, to compute the terms U N, U N+ and W N, W N+ we need 3m multiplications 2, where m = blog 2 Nc +. But when Q = or more generally Q = a 2, we can slightly transform Algorithm so that we need only 2m multiplications. Indeed, when Q =, we replace the expression u 2 2 u 2 by (u 2 u )(u 2 + u ) at steps 5, 7. When Q = a 2, we use the formula u 2 2 Qu 2 = (u 2 au )(u 2 + au ). 2.. omparison With Other Existing Algorithms urrently, the main algorithm [] for quick computation of the Lucas sequence terms U N, V N uses the following properties: V 2k+ = V k+ V k P Q k, V 2k = V 2 k 2Q k, U 2k+ = U k+ V k Q k, U 2k = U k V k. (8) When Q = ±, the computation of U N and V N requires 3m multiplications in the worst case (N is odd), and 2m in the best case (N is a power of two). When Q 6= ± and without any assumption about N, this algorithm needs less than 4m multiplications but not less than 3m. We see that Algorithm is more e cient 2 We imply that P, Q are not large. So multiplications that involve them are similar to additions.
5 INTEGERS: 8 (28) 5 in most cases, but there is an important case when the algorithm o ered in [] is better. This is so when we need to compute the term V N (P, ) or V N (P, ). For N = 2 s (2d + ) the computation of V N (P, ) by the algorithm in [] requires 2blog 2 (2d + )c + s multiplications while Algorithm needs 2blog 2 (2d + )c + 2s. So in applications such as Lucas-based cryptosystem [2] and Lucas-Lehmer-Risel primality test [5], it is preferable to use the algorithm o ered in []. Now we compare Algorithm with Fiduccia s algorithm. The characteristic polynomial is g(x) = x 2 P x + Q. To compute x N mod g(x), Fiduccia s algorithm uses the classical method of repeating squaring. For an arbitrary linear polynomial h(x) = u x + u 2, we have h 2 (x) mod g(x) = u (2u 2 P u )x + u 2 2 Qu 2. As is seen above, we can use formulas (5) and (6) for modular polynomial squarings. Therefore, Algorithm, together with the formula (8), is one way of implementing Fiduccia s algorithm for second-order linear recurrences, where the explicit formulas for modular polynomial squarings are used. 3. omputation of Third-order Linear Recurrences We will follow the notation for third-order linear recurrences according to [3]. The sequences {X k (p, q, r)}, {Y k (p, q, r)}, and {Z k (p, q, r)} are defined recursively by f k+3 = pf k+2 + qf k+ + rf k, (9) with the initial values X =, X =, X 2 =, Y =, Y =, Y 2 =, Z =, Z =, Z 2 =. Similar to (6), we X k+2 Y k+2 Z k+2 X k+ Y k+ Z k+ A = M k S, where M p q r A, S A. X k Y k Z k (2) Lemma 2. Let the sequence {W k (a, a, a 2 ; p, q, r)} be defined by the relation W k+3 = pw k+2 + qw k+ + rw k, (2) with the initial values W = a, W = a, W 2 = a 2. Then W k = a 2 X k + (a q + a r)x k + a rx k 2, (22) W k = (a 2 a p a q)x k + (a a p)x k+ + a X k+2. (23)
6 INTEGERS: 8 (28) 6 Proof. We W k+2 W k+ A = M a 2 a A = a 2 M A + a M A + a M A W k a = a X k+2 X k+ A + a M q A + a M r A X k = a X k+2 X k+ A + (a q + a X k+ X k A + a M k r A X k X k a 2X k+2 + (a q + a r)x k+ + a rx k a 2 X k+ + (a q + a r)x k + a rx k A. (24) a 2 X k + (a q + a r)x k + a rx k 2 So we obtain (22). With the help of X k 2 = (X k+ px k qx k )/r and X k = (X k+2 px k+ qx k )/r we get (23). By Lemma 2 we get the following: Y k = qx k + rx k 2, (25) Z k = rx k, (26) Y k = X k+ px k, (27) Z k = X k+2 px k+ qx k. (28) Theorem 2. Let {X k (p, q, r)} be the third-order linear recurrence sequence with the initial values X =, X =, X 2 =. X mk+2 X mk+ A X m k+2 qx k+ + rx k rx k+ X k+ X k+2 px k+ rx k X k+2 X k+ A. X mk X k X k+ px k X k+2 px k+ qx k X k (29) Proof. According to (2), we X mk+2 X mk+ A = M A = M k X k+2 X k+ A. (3) X mk Using (25) (28) we eliminate Y k, Y k+, Y k+2, Z k, Z k+, Z k+2 from M k. This may be done in such a way that M k will contain only X k, X k+, X k+2. We obtain M k X k+2 qx k+ + rx k rx k+ X k+ X k+2 px k+ rx k A. (3) X k X k+ px k X k+2 px k+ qx k Finally, we can modify (3) into (29). X k
7 INTEGERS: 8 (28) 7 If we put m = 2 in (29), then we get the following formulas: X 2k+2 =X 2 k+2 + X k+ (qx k+ + 2rX k ), (32) X 2k+ =rx 2 k + X k+ (2X k+2 px k+ ), (33) X 2k =X 2 k+ + X k (2X k+2 2pX k+ qx k ). (34) Remark. It is clear that X k+ (P, Q, ) = U k (P, Q). Therefore, if we put r = and q = Q in these formulas and subtract from all indices, then up to the substitution of U for X we obtain the identities for second-order recurrences. Remark. If we calculate the remainder (c x 2 + c 2 x + c 3 ) 2 mod x 3 px 2 qx r, (35) then we obtain the formulas similar to (but not the same as) (32) (34) for squaring of quadratic polynomials modulo g(x) = x 3 px 2 qx r. They can be used in Fiduccia s algorithm for computing third-order recurrences. To get an algorithm for computing X N, X N+, X N+2 similar to the binary exponentiation we need to be able to compute X 2k, X 2k+, X 2k+2, X 2k+3 using X k, X k+, X k+2. So we need another formula that helps us to compute X 2k+3. It can be obtained from (33) if we replace k by k + and use X k+3 = px k+2 + qx k+ + rx k. It is as follows: X 2k+3 = rx 2 k+ + X k+2 (px k+2 + 2qX k+ + 2rX k ). (36) Now we present an algorithm based on the formulas (32) use six temporary memories. (34), (36). We need to Algorithm 2 omputing the third-order linear recurrence {X k (p, q, r)} Input: N = P m i= b i2 i, (b m = ) p, q, r Output: X N, X N+, X N+2 : X ; X 2 ; X 3 p 2: for j from m 2 to by do 3: x X ; x 2 X 2 ; x 3 X 3 4: if b j = then 5: X rx 2 + x 2 (2x 3 px 2 ); X 2 x x 2 (qx 2 + 2rx ); X 3 rx x 3 (px 3 + 2qx 2 + 2rx ) 6: else if 7: X x x (2x 3 2px 2 qx ); X 2 rx 2 + x 2 (2x 3 px 2 ); X 3 x x 2 (qx 2 + 2rx ) 8: end if 9: end for : return X, X 2, X 3
8 INTEGERS: 8 (28) 8 We will imply that multiplications by p, q, r can be simulated by additions. Then algorithm 2 needs 3m multiplications and 3m squarings. At the end of this section, we refer to some applications that use computation of remote terms of third-order linear recurrence sequences; see [, 3, 6, 7]. 4. omputation of Fourth-order Linear Recurrences Since this section is similar to the previous one, we give only the main formulas and the final algorithm. The fourth-order linear recurrence {W k (a, a, a 2, a 3 ; p, p, p 2, p 3 )} is defined recursively by f k+4 = p f k+3 + p f k+2 + p 2 f k+ + p 3 f k, (37) with the initial values W = a, W = a, W 2 = a 2, W 3 = a 3. Denote the sequence {W k (,,, ; p, p, p 2, p 3 )} by {X k (p, p, p 2, p 3 )}. The formulas, which can be obtained by the matrix method, are: W k =a 3 X k + (a p 3 + a p 2 + a 2 p )X k + (a p 3 + a 2 p 2 )X k 2 + a 2 p 3 X k 3, (38) W k =(a 3 a 2 p a p a p 2 )X k + (a 2 a p a p )X k+ + (a a p )X k+2 + a X k+3. (39) We will use W k (a, a, a 2, a 3 ) instead of W k (a, a, a 2, a 3 ; p, p, p 2, p 3 ). By (38), (39), and (37) we obtain the following W k (,,, ) = p X k + p 2 X k 2 + p 3 X k 3, (4) W k (,,, ) = p 2 X k + p 3 X k 2, (4) W k (,,, ) = p 3 X k, (42) W k (,,, ) = p X k + X k+, (43) W k (,,, ) = p X k p X k+ + X k+2, (44) W k (,,, ) = p 2 X k p X k+ p X k+2 + X k+3. (45) For convenience, we use the notation i W k for W k (a, a, a 2, a 3 ) with only one nonzero a i =. Then by the matrix method we get X mk+3 X mk+2 X mk+ X mk X 2 k+3 W k+3 W k+3 W k+3 A = BX 2 k+2 W k+2 W k+2 W X 2 k+ W k+ W k+ W k+ A X 2 k W k W k W k m X k+3 BX X k+ X k A. (46)
9 INTEGERS: 8 (28) 9 With the help of (4) (45) we transform the matrix in (46) and obtain X k+3 p X k+2 + p 2 X k+ + p 3 X k p 2 X k+2 + p 3 X k+ p 3 X k+2 BX k+2 X k+3 p X k+2 p 2 X k+ + p 3 X k p 3 X X k+ X k+2 p X k+ X k+3 p X k+2 p X k+ p 3 X k A. X k X k+ p X k X k+2 p X k+ p X k R 4,4 (47) Here, R 4,4 = X k+3 p X k+2 p X k+ p 2 X k. If we put m = 2 in (46), then after simplification we get the following formulas: X 2k+3 =X 2 k+3 + X k+2 (p X k+2 + 2p 2 X k+ + 2p 3 X k ) + p 3 X 2 k+, (48) X 2k+2 =X k+2 (2X k+3 p X k+2 ) + X k+ (p 2 X k+ + 2p 3 X k ), (49) X 2k+ =X 2 k+2 + X k+ (2X k+3 2p X k+2 p X k+ ) + p 3 X 2 k, (5) X 2k =X k+ (2X k+2 p X k+ ) + X k (2X k+3 2p X k+2 2p X k+ p 2 X k ). (5) We also need the formula for X 2k+4. It can be obtained from (49) if we replace k by k + and use (37) for X k+4. It is as follows: X 2k+4 = X k+3 (p X k+3 +2p X k+2 +2p 2 X k+ +2p 3 X k )+X k+2 (p 2 X k+2 +2p 3 X k+ ). (52) Algorithm 3 omputing the fourth-order linear recurrence {X k (p, p, p 2, p 3 )} Input: N = P m i= b i2 i, (b m = ) p, p, p 2, p 3 Output: X N, X N+, X N+2, X N+3 : X ; X 2 ; X 3 ; X 4 p 2: for j from m 2 to by do 3: x X ; x 2 X 2 ; x 3 X 3 ; x 4 X 4 4: if b j = then 5: X x x 2 (2x 4 2p x 3 p x 2 ) + p 3 x 2 ; X 2 x 3 (2x 4 p x 3 ) + x 2 (p 2 x 2 + 2p 3 x ); X 3 x x 3 (p x 3 + 2p 2 x 2 + 2p 3 x ) + p 3 x 2 2; X 4 x 4 (p x 4 + 2p x 3 + 2p 2 x 2 + 2p 3 x ) + x 3 (p 2 x 3 + 2p 3 x 2 ) 6: else if 7: X x 2 (2x 3 p x 2 ) + x (2x 4 2p x 3 2p x 2 p 2 x ); X 2 x x 2 (2x 4 2p x 3 p x 2 ) + p 3 x 2 ; X 3 x 3 (2x 4 p x 3 ) + x 2 (p 2 x 2 + 2p 3 x ); X 4 x x 3 (p x 3 + 2p 2 x 2 + 2p 3 x ) + p 3 x 2 2 8: end if 9: end for : return X, X 2, X 3, X 4
10 INTEGERS: 8 (28) As is seen from the algorithm, we need 6m multiplications and 4m squarings to compute the terms X N, X N+, X N+2, X N+3. Here, as in the previous section, we count only big multiplications. 5. omputation of Linear Recurrence Sequences of Any Order Let {W k (a,..., a n ; p... p n )} be an nth-order linear recurrence defined by the relation f k+n = P n i= p if k+n i, with the initial values W i = a i ( apple i apple n ). Let {X k (p,..., p n )} be the sequence that is derived from {W k } if a n = and the other a i =. Using the matrix method as in Lemma 2 and by mathematical induction we get the following formulas! nx Xj W k = a n X k + p j a n 2 i X k j+i, (53) W k = nx j= j= i= nxj 2 a n j i= a n j 2 i p i! X k+j. (54) If we put n = 4 in these formulas, then we obtain (38) and (39). Repeating the arguments of the previous section we get the matrix formula n X 2k+n X 2 n k+n W 3 k+n W k+n... W k+n X k+n X 2k+ A = B n X 2 n k+ W 3 k+ W k+... W k+ X k+ A. n X 2k X 2 n k W 3 k W k... W k X k (55) Here, as above, i W k denotes W k (a,..., a n ) with only one nonzero a i =. Let R = (r i,j ) be the matrix from (55). It has a special form, see (29) and (47). Note that if we know two rows of the matrix R which have numbers of di erent parity, then we can get the other rows. For example, we assume we know a formula which relates X 2k+` to X k+i ( apple i apple n ), in other words we know the (n `)th row. If we replace k by k + and use X k+n = P n i= p ix k+n i, then we get the formula for X 2k+`+2 that corresponds to the (n ` 2)th row. Repeating this procedure we obtain all rows with numbers of the same parity as the parity of the (n `)th row. Thus, to get all formulas that will be used in the algorithm, we need to know formulas for X 2k, X 2k+. For the elements of R using (53), (54) we obtain ( P j 2 X k+n (i j) l= r i,j = p lx k+n 2 l (i j), if i j, P n l=j p (56) lx k+n 2 l (i j), if i < j.
11 INTEGERS: 8 (28) Also, from the two last rows in (55) we obtain the formulas which relate X 2k, X 2k+ to X k+i ( apple i apple n ). These formulas are of the same form as (5), (5). X 2k = exk+(n 2 )/2 + bvc k+dve++i p 2i+e X k+bvc i 2 i= X k+bvc i 2iX+e j= p j X k+dve+i j A, (57) X 2k+ = p n Xk 2 + ( e)xk+n/2 2 + dve X 2i Xe X k+dve k+bvc+2+i p 2i+ e X k+dve i 2 p j X k+bvc++i i= j= j A. (58) Here, e = n mod 2 and v = n/2. The scheme for computing the terms of {W k (a,..., a n ; p,..., p n )} is: (i) Using X k+n = P n i= p ix k+n i and repeating the replacement of k by k + in (57), (58) without removing brackets, we obtain the formulas for X 2k+i ( apple i apple n). These formulas determine the rules of transition from the terms X k+i ( apple i apple n ) to X 2k+i ( apple i apple n ) and also to X 2k++i ( apple i apple n ). (ii) By using these formulas we obtain an algorithm for computing {X k } that is similar to Algorithm 3. (iii) To get the value W N, we need to use (54) after we have computed X N+i ( apple i apple n ) by the algorithm in (ii). (iv) In order to obtain W N+ we use the recurrence relation to get X N+n from X N+i ( apple i apple n ) and use (54). Remark. To compute the N th term of an nth-order linear recurrence we need n(n + )/2 log 2 N multiplications 3. Indeed, when n is even, the formulas for X 2k+2i ( apple i apple n/2) contain n/2 multiplications, 4 and for X 2k+2i+ ( apple i apple n/2 ) contain n/2 + multiplications. It is easy to see that each step of the algorithm needs n/2 formulas of the first type and n/2 formulas of the second type. Then, to compute X 2k+i ( apple i apple n ) or X 2k++i ( apple i apple n ) using X k+i ( apple i apple n ) we need n(n + )/2 multiplications. Thus, computing X N+i ( apple i apple n ) needs n(n+)/2 log 2 N multiplications. Since (54) does not contain big multiplications, the above statement is proved for even n. The proof for odd n by analogous. We implemented the above scheme in Wolfram Mathematica. An implementation is available at The main function AnyOrderRecurrence[a, p, N] returns W N (a,..., a n ; p,..., p n ), where N is a positive integer and a, p are strings of length n. 3 We use such a complexity model that multiplications involving p i are similar to additions. 4 Since they were derived from (57) without removing brackets.
12 INTEGERS: 8 (28) 2 Acknowledgments. The author is very grateful to A. Bostan for pointing to the reference [5] and for the evidence that our algorithm is one particular way of implementing Fiduccia s algorithm, where modular polynomial squarings are hardcoded. References [] W.W. Adams, haracterizing pseudoprimes for third-order linear recurrences, Math. omp (987), -5. [2] D. Bleichenbacher, W. Bosma, A.K. Lenstra, Some remarks on Lucas-based cryptosystems, in: Annual International ryptology onference, Springer, Berlin, Heidelberg, 995, [3] G.H. ho, N. Koo, E. Ha, S. Kwon, New cube root algorithm based on the third order linear recurrence relations in finite fields, Des. odes ryptogr (25), [4] E.W. Dijkstra, In honour of Fibonacci, in: Program onstruction. Lecture Notes in omputer Science 69, ed. F.L. Bauer et al., Springer, Berlin, Heidelberg, 979, [5].M. Fiduccia, An e cient formula for linear recurrences, SIAM J. omput. 4. (985), 6-2. [6] G. Gong, A. Hassan, H. Wu, and A. Yousse, An E cient Algorithm for Exponentiation in DH key Exchange and DSA in ubic Extension Fields, Faculty of Mathematics, University of Waterloo, 22. [7] G. Gong, and L. Harn, Public-key cryptosystems based on cubic finite field extensions, IEEE Trans. Inform. Theory 45.7 (999), [8] D. Gries, G. Levin, omputing Fibonacci numbers (and similarly defined functions) in log time, Inform. Process. Lett..2 (98), [9] A.F. Horadam, Basic properties of a certain generalized sequence of numbers, Fibonacci Quart. (965) 3.3, [] A.F. Horadam, Special properties of the sequence W n(a, b; p, q), Fibonacci Quart. 5.4 (967), [] M. Joye and J.-J. Quisquater, E cient computation of full Lucas sequences, Electronics Letters 32.6 (996), [2] J..P. Miller, D.S. Brown, An algorithm for evaluation of remote terms in a linear recurrence sequence, omput. J. 9.2 (966), [3] S. Rabinowitz, Algorithmic manipulation of third-order linear recurrences, Fibonacci Quart. 34 (996), [4].A. Reiter, Exact Horadam numbers with a hebyshevish accent, Vector 6 (999), [5] E.L. Roettger, H.. Williams, and R.K. Guy, Some primality tests that eluded Lucas, Des. odes ryptogr (25), [6] Z.H. Sun, Linear recursive sequences and the powers of matrices, Fibonacci Quart (2),
A New Algorithm to Compute Terms in Special Types of Characteristic Sequences
A New Algorithm to Compute Terms in Special Types of Characteristic Sequences Kenneth J. Giuliani 1 and Guang Gong 2 1 Dept. of Mathematical and Computational Sciences University of Toronto at Mississauga
More informationArithmetic properties of lacunary sums of binomial coefficients
Arithmetic properties of lacunary sums of binomial coefficients Tamás Mathematics Department Occidental College 29th Journées Arithmétiques JA2015, July 6-10, 2015 Arithmetic properties of lacunary sums
More informationMath 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction
Math 4 Summer 01 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If
More informationDividing Polynomials: Remainder and Factor Theorems
Dividing Polynomials: Remainder and Factor Theorems When we divide one polynomial by another, we obtain a quotient and a remainder. If the remainder is zero, then the divisor is a factor of the dividend.
More informationSubquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases
1 Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases H. Fan and M. A. Hasan March 31, 2007 Abstract Based on a recently proposed Toeplitz
More informationMore Hodge-Podge Pseudoprimes
More Hodge-Podge Pseudoprimes Eric Roettger Mount Royal University Based on joint work with: Richard Guy and Hugh Williams eroettger@mtroyal.ca March 2017 Eric Roettger (MRU) More Hodge-Podge Pseudoprimes
More informationLimits at Infinity. Horizontal Asymptotes. Definition (Limits at Infinity) Horizontal Asymptotes
Limits at Infinity If a function f has a domain that is unbounded, that is, one of the endpoints of its domain is ±, we can determine the long term behavior of the function using a it at infinity. Definition
More informationMath 312/ AMS 351 (Fall 17) Sample Questions for Final
Math 312/ AMS 351 (Fall 17) Sample Questions for Final 1. Solve the system of equations 2x 1 mod 3 x 2 mod 7 x 7 mod 8 First note that the inverse of 2 is 2 mod 3. Thus, the first equation becomes (multiply
More informationTHE GENERALIZED TRIBONACCI NUMBERS WITH NEGATIVE SUBSCRIPTS
#A3 INTEGERS 14 (014) THE GENERALIZED TRIBONACCI NUMBERS WITH NEGATIVE SUBSCRIPTS Kantaphon Kuhapatanakul 1 Dept. of Mathematics, Faculty of Science, Kasetsart University, Bangkok, Thailand fscikpkk@ku.ac.th
More informationFast Polynomial Multiplication
Fast Polynomial Multiplication Marc Moreno Maza CS 9652, October 4, 2017 Plan Primitive roots of unity The discrete Fourier transform Convolution of polynomials The fast Fourier transform Fast convolution
More informationq-counting hypercubes in Lucas cubes
Turkish Journal of Mathematics http:// journals. tubitak. gov. tr/ math/ Research Article Turk J Math (2018) 42: 190 203 c TÜBİTAK doi:10.3906/mat-1605-2 q-counting hypercubes in Lucas cubes Elif SAYGI
More informationSUMS OF SECOND ORDER LINEAR RECURRENCES THOMAS MCKENZIE AND SHANNON OVERBAY
SUMS OF SECOND ORDER LINEAR RECURRENCES THOMAS MCKENZIE AND SHANNON OVERBAY Abstract. This paper examines second order linear homogeneous recurrence relations with coefficients in finite rings. The first
More informationAlgebra Review 2. 1 Fields. A field is an extension of the concept of a group.
Algebra Review 2 1 Fields A field is an extension of the concept of a group. Definition 1. A field (F, +,, 0 F, 1 F ) is a set F together with two binary operations (+, ) on F such that the following conditions
More informationThe generalized order-k Fibonacci Pell sequence by matrix methods
Journal of Computational and Applied Mathematics 09 (007) 33 45 wwwelseviercom/locate/cam The generalized order- Fibonacci Pell sequence by matrix methods Emrah Kilic Mathematics Department, TOBB University
More informationModular Multiplication in GF (p k ) using Lagrange Representation
Modular Multiplication in GF (p k ) using Lagrange Representation Jean-Claude Bajard, Laurent Imbert, and Christophe Nègre Laboratoire d Informatique, de Robotique et de Microélectronique de Montpellier
More informationCullen Numbers in Binary Recurrent Sequences
Cullen Numbers in Binary Recurrent Sequences Florian Luca 1 and Pantelimon Stănică 2 1 IMATE-UNAM, Ap. Postal 61-3 (Xangari), CP 58 089 Morelia, Michoacán, Mexico; e-mail: fluca@matmor.unam.mx 2 Auburn
More informationEx. Here's another one. We want to prove that the sum of the cubes of the first n natural numbers is. n = n 2 (n+1) 2 /4.
Lecture One type of mathematical proof that goes everywhere is mathematical induction (tb 147). Induction is essentially used to show something is true for all iterations, i, of a sequence, where i N.
More informationOutline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials
Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields
More informationF. T. HOWARD AND CURTIS COOPER
SOME IDENTITIES FOR r-fibonacci NUMBERS F. T. HOWARD AND CURTIS COOPER Abstract. Let r 1 be an integer. The r-generalized Fibonacci sequence {G n} is defined as 0, if 0 n < r 1; G n = 1, if n = r 1; G
More informationMath Assignment 11
Math 2280 - Assignment 11 Dylan Zwick Fall 2013 Section 8.1-2, 8, 13, 21, 25 Section 8.2-1, 7, 14, 17, 32 Section 8.3-1, 8, 15, 18, 24 1 Section 8.1 - Introduction and Review of Power Series 8.1.2 - Find
More informationRoots and Coefficients Polynomials Preliminary Maths Extension 1
Preliminary Maths Extension Question If, and are the roots of x 5x x 0, find the following. (d) (e) Question If p, q and r are the roots of x x x 4 0, evaluate the following. pq r pq qr rp p q q r r p
More informationGeneralized hyper-bent functions over GF(p)
Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G
More informationGenerating Functions (Revised Edition)
Math 700 Fall 06 Notes Generating Functions (Revised Edition What is a generating function? An ordinary generating function for a sequence (a n n 0 is the power series A(x = a nx n. The exponential generating
More information9 MODULARITY AND GCD PROPERTIES OF GENERALIZED FIBONACCI NUMBERS
#A55 INTEGERS 14 (2014) 9 MODULARITY AND GCD PROPERTIES OF GENERALIZED FIBONACCI NUMBERS Rigoberto Flórez 1 Department of Mathematics and Computer Science, The Citadel, Charleston, South Carolina rigo.florez@citadel.edu
More informationON QUADRAPELL NUMBERS AND QUADRAPELL POLYNOMIALS
Hacettepe Journal of Mathematics and Statistics Volume 8() (009), 65 75 ON QUADRAPELL NUMBERS AND QUADRAPELL POLYNOMIALS Dursun Tascı Received 09:0 :009 : Accepted 04 :05 :009 Abstract In this paper we
More informationEnumerating Distinct Chessboard Tilings and Generalized Lucas Sequences Part I
Enumerating Distinct Chessboard Tilings and Generalized Lucas Sequences Part I Daryl DeFord Washington State University January 28, 2013 Roadmap 1 Problem 2 Symmetry 3 LHCCRR as Vector Spaces 4 Generalized
More informationLegendre s Equation. PHYS Southern Illinois University. October 18, 2016
Legendre s Equation PHYS 500 - Southern Illinois University October 18, 2016 PHYS 500 - Southern Illinois University Legendre s Equation October 18, 2016 1 / 11 Legendre s Equation Recall We are trying
More informationON EXPLICIT FORMULAE AND LINEAR RECURRENT SEQUENCES. 1. Introduction
ON EXPLICIT FORMULAE AND LINEAR RECURRENT SEQUENCES R. EULER and L. H. GALLARDO Abstract. We notice that some recent explicit results about linear recurrent sequences over a ring R with 1 were already
More informationOn Boolean functions which are bent and negabent
On Boolean functions which are bent and negabent Matthew G. Parker 1 and Alexander Pott 2 1 The Selmer Center, Department of Informatics, University of Bergen, N-5020 Bergen, Norway 2 Institute for Algebra
More informationThe Advantage Testing Foundation Olympiad Solutions
The Advantage Testing Foundation 015 Olympiad Problem 1 Prove that every positive integer has a unique representation in the form d i i, where k is a nonnegative integer and each d i is either 1 or. (This
More informationChapter 2 Formulas and Definitions:
Chapter 2 Formulas and Definitions: (from 2.1) Definition of Polynomial Function: Let n be a nonnegative integer and let a n,a n 1,...,a 2,a 1,a 0 be real numbers with a n 0. The function given by f (x)
More information1.2. Indices. Introduction. Prerequisites. Learning Outcomes
Indices 1.2 Introduction Indices, or powers, provide a convenient notation when we need to multiply a number by itself several times. In this Section we explain how indices are written, and state the rules
More informationA CRITERION FOR POLYNOMIALS TO BE CONGRUENT TO THE PRODUCT OF LINEAR POLYNOMIALS (mod p) ZHI-HONG SUN
A CRITERION FOR POLYNOMIALS TO BE CONGRUENT TO THE PRODUCT OF LINEAR POLYNOMIALS (mod ) ZHI-HONG SUN Deartment of Mathematics, Huaiyin Teachers College, Huaian 223001, Jiangsu, P. R. China e-mail: hyzhsun@ublic.hy.js.cn
More informationFermat s Little Theorem. Fermat s little theorem is a statement about primes that nearly characterizes them.
Fermat s Little Theorem Fermat s little theorem is a statement about primes that nearly characterizes them. Theorem: Let p be prime and a be an integer that is not a multiple of p. Then a p 1 1 (mod p).
More informationSubquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation
Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation M A Hasan and C Negre Abstract We study Dickson bases for binary field representation Such representation
More informationMATH 324 Summer 2011 Elementary Number Theory. Notes on Mathematical Induction. Recall the following axiom for the set of integers.
MATH 4 Summer 011 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If
More informationPublic Key Encryption
Public Key Encryption 3/13/2012 Cryptography 1 Facts About Numbers Prime number p: p is an integer p 2 The only divisors of p are 1 and p s 2, 7, 19 are primes -3, 0, 1, 6 are not primes Prime decomposition
More informationMA/CSSE 473 Day 05. Factors and Primes Recursive division algorithm
MA/CSSE 473 Day 05 actors and Primes Recursive division algorithm MA/CSSE 473 Day 05 HW 2 due tonight, 3 is due Monday Student Questions Asymptotic Analysis example: summation Review topics I don t plan
More informationTransformations Preserving the Hankel Transform
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol 10 (2007), Article 0773 Transformations Preserving the Hankel Transform Christopher French Department of Mathematics and Statistics Grinnell College Grinnell,
More informationPUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include
PUTNAM TRAINING POLYNOMIALS (Last updated: December 11, 2017) Remark. This is a list of exercises on polynomials. Miguel A. Lerma Exercises 1. Find a polynomial with integral coefficients whose zeros include
More informationParity of the Number of Irreducible Factors for Composite Polynomials
Parity of the Number of Irreducible Factors for Composite Polynomials Ryul Kim Wolfram Koepf Abstract Various results on parity of the number of irreducible factors of given polynomials over finite fields
More informationDiophantine equations for second order recursive sequences of polynomials
Diophantine equations for second order recursive sequences of polynomials Andrej Dujella (Zagreb) and Robert F. Tichy (Graz) Abstract Let B be a nonzero integer. Let define the sequence of polynomials
More informationA matrix over a field F is a rectangular array of elements from F. The symbol
Chapter MATRICES Matrix arithmetic A matrix over a field F is a rectangular array of elements from F The symbol M m n (F ) denotes the collection of all m n matrices over F Matrices will usually be denoted
More informationIntroduction to Lucas Sequences
A talk given at Liaoning Normal Univ. (Dec. 14, 017) Introduction to Lucas Sequences Zhi-Wei Sun Nanjing University Nanjing 10093, P. R. China zwsun@nju.edu.cn http://math.nju.edu.cn/ zwsun Dec. 14, 017
More informationWILLIAM LOWELL PUTNAM MATHEMATICAL COMPETITION. (3k(k + 1) + 1), for n 1.
Problem A1. Find the sum n (3k(k + 1) + 1), for n 1. k=0 The simplest way to solve this problem is to use the fact that the terms of the sum are differences of consecutive cubes: 3k(k + 1) + 1 = 3k 2 +
More informationMoreover this binary operation satisfies the following properties
Contents 1 Algebraic structures 1 1.1 Group........................................... 1 1.1.1 Definitions and examples............................. 1 1.1.2 Subgroup.....................................
More informationComparison of Virginia s College and Career Ready Mathematics Performance Expectations with the Common Core State Standards for Mathematics
Comparison of Virginia s College and Career Ready Mathematics Performance Expectations with the Common Core State Standards for Mathematics February 17, 2010 1 Number and Quantity The Real Number System
More informationProblem Set 5 Solutions
Problem Set 5 Solutions Section 4.. Use mathematical induction to prove each of the following: a) For each natural number n with n, n > + n. Let P n) be the statement n > + n. The base case, P ), is true
More informationQUOTIENTS OF FIBONACCI NUMBERS
QUOTIENTS OF FIBONACCI NUMBERS STEPHAN RAMON GARCIA AND FLORIAN LUCA Abstract. There have been many articles in the Monthly on quotient sets over the years. We take a first step here into the p-adic setting,
More informationOn the indecomposability of polynomials
On the indecomposability of polynomials Andrej Dujella, Ivica Gusić and Robert F. Tichy Abstract Applying a combinatorial lemma a new sufficient condition for the indecomposability of integer polynomials
More informationGrade 11/12 Math Circles Rational Points on an Elliptic Curves Dr. Carmen Bruni November 11, Lest We Forget
Faculty of Mathematics Waterloo, Ontario N2L 3G1 Centre for Education in Mathematics and Computing Grade 11/12 Math Circles Rational Points on an Elliptic Curves Dr. Carmen Bruni November 11, 2015 - Lest
More informationLecture notes: Algorithms for integers, polynomials (Thorsten Theobald)
Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) 1 Euclid s Algorithm Euclid s Algorithm for computing the greatest common divisor belongs to the oldest known computing procedures
More informationHomework 8 Solutions to Selected Problems
Homework 8 Solutions to Selected Problems June 7, 01 1 Chapter 17, Problem Let f(x D[x] and suppose f(x is reducible in D[x]. That is, there exist polynomials g(x and h(x in D[x] such that g(x and h(x
More informationDiophantine triples in a Lucas-Lehmer sequence
Annales Mathematicae et Informaticae 49 (01) pp. 5 100 doi: 10.33039/ami.01.0.001 http://ami.uni-eszterhazy.hu Diophantine triples in a Lucas-Lehmer sequence Krisztián Gueth Lorand Eötvös University Savaria
More informationIntroduction to Algorithms 6.046J/18.401J/SMA5503
Introduction to Algorithms 6.046J/8.40J/SMA5503 Lecture 3 Prof. Piotr Indyk The divide-and-conquer design paradigm. Divide the problem (instance) into subproblems. 2. Conquer the subproblems by solving
More informationLucas Lehmer primality test - Wikipedia, the free encyclopedia
Lucas Lehmer primality test From Wikipedia, the free encyclopedia In mathematics, the Lucas Lehmer test (LLT) is a primality test for Mersenne numbers. The test was originally developed by Edouard Lucas
More informationCHAPTER 10: POLYNOMIALS (DRAFT)
CHAPTER 10: POLYNOMIALS (DRAFT) LECTURE NOTES FOR MATH 378 (CSUSM, SPRING 2009). WAYNE AITKEN The material in this chapter is fairly informal. Unlike earlier chapters, no attempt is made to rigorously
More informationGENERALIZED FIBONACCI AND LUCAS NUMBERS OF THE FORM wx 2 AND wx 2 1
Bull. Korean Math. Soc. 51 (2014), No. 4, pp. 1041 1054 http://dx.doi.org/10.4134/bkms.2014.51.4.1041 GENERALIZED FIBONACCI AND LUCAS NUMBERS OF THE FORM wx 2 AND wx 2 1 Ref ik Kesk in Abstract. Let P
More informationNotes on generating functions in automata theory
Notes on generating functions in automata theory Benjamin Steinberg December 5, 2009 Contents Introduction: Calculus can count 2 Formal power series 5 3 Rational power series 9 3. Rational power series
More informationEGYPTIAN FRACTIONS WITH EACH DENOMINATOR HAVING THREE DISTINCT PRIME DIVISORS
#A5 INTEGERS 5 (205) EGYPTIAN FRACTIONS WITH EACH DENOMINATOR HAVING THREE DISTINCT PRIME DIVISORS Steve Butler Department of Mathematics, Iowa State University, Ames, Iowa butler@iastate.edu Paul Erdős
More information3. Coding theory 3.1. Basic concepts
3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,
More informationRANK AND PERIOD OF PRIMES IN THE FIBONACCI SEQUENCE. A TRICHOTOMY
RANK AND PERIOD OF PRIMES IN THE FIBONACCI SEQUENCE. A TRICHOTOMY Christian Ballot Université de Caen, Caen 14032, France e-mail: ballot@math.unicaen.edu Michele Elia Politecnico di Torino, Torino 10129,
More informationk-pell, k-pell-lucas and Modified k-pell Numbers: Some Identities and Norms of Hankel Matrices
International Journal of Mathematical Analysis Vol. 9, 05, no., 3-37 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/0.988/ijma.05.4370 k-pell, k-pell-lucas and Modified k-pell Numbers: Some Identities
More informationa 11 x 1 + a 12 x a 1n x n = b 1 a 21 x 1 + a 22 x a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 11 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,, a n, b are given real
More informationLecture 2. Fundamentals of the Analysis of Algorithm Efficiency
Lecture 2 Fundamentals of the Analysis of Algorithm Efficiency 1 Lecture Contents 1. Analysis Framework 2. Asymptotic Notations and Basic Efficiency Classes 3. Mathematical Analysis of Nonrecursive Algorithms
More information(Inv) Computing Invariant Factors Math 683L (Summer 2003)
(Inv) Computing Invariant Factors Math 683L (Summer 23) We have two big results (stated in (Can2) and (Can3)) concerning the behaviour of a single linear transformation T of a vector space V In particular,
More informationExplicit Factorizations of Cyclotomic and Dickson Polynomials over Finite Fields
Southern Illinois University Carbondale OpenSIUC Articles and Preprints Department of Mathematics 2007 Explicit Factorizations of Cyclotomic and Dickson Polynomials over Finite Fields Robert W. Fitzgerald
More informationEXAMPLES OF PROOFS BY INDUCTION
EXAMPLES OF PROOFS BY INDUCTION KEITH CONRAD 1. Introduction In this handout we illustrate proofs by induction from several areas of mathematics: linear algebra, polynomial algebra, and calculus. Becoming
More informationTheoretical Cryptography, Lecture 13
Theoretical Cryptography, Lecture 13 Instructor: Manuel Blum Scribe: Ryan Williams March 1, 2006 1 Today Proof that Z p has a generator Overview of Integer Factoring Discrete Logarithm and Quadratic Residues
More informationG. Sburlati GENERALIZED FIBONACCI SEQUENCES AND LINEAR RECURRENCES
Rend. Sem. Mat. Univ. Pol. Torino - Vol. 65, 3 (2007) G. Sburlati GENERALIZED FIBONACCI SEQUENCES AND LINEAR RECURRENCES Abstract. We analyze the existing relations among particular classes of generalized
More informationJournal of Number Theory
Journal of Number Theory 130 (2010) 1737 1749 Contents lists available at ScienceDirect Journal of Number Theory www.elsevier.com/locate/jnt A binary linear recurrence sequence of composite numbers Artūras
More informationA Horadam-based pseudo-random number generator
A Horadam-based pseudo-random number generator Item type Authors Citation DOI Publisher Journal Meetings and Proceedings Bagdasar, Ovidiu; Chen, Minsi Bagdasar, O. and Chen, M. (4) 'A Horadam-based pseudo-random
More information198 VOLUME 46/47, NUMBER 3
LAWRENCE SOMER Abstract. Rotkiewicz has shown that there exist Fibonacci pseudoprimes having the forms p(p + 2), p(2p 1), and p(2p + 3), where all the terms in the products are odd primes. Assuming Dickson
More informationMATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences.
MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences. Congruences Let n be a postive integer. The integers a and b are called congruent modulo n if they have the same
More informationSeries Solutions. 8.1 Taylor Polynomials
8 Series Solutions 8.1 Taylor Polynomials Polynomial functions, as we have seen, are well behaved. They are continuous everywhere, and have continuous derivatives of all orders everywhere. It also turns
More informationLecture Note 3: Polynomial Interpolation. Xiaoqun Zhang Shanghai Jiao Tong University
Lecture Note 3: Polynomial Interpolation Xiaoqun Zhang Shanghai Jiao Tong University Last updated: October 24, 2013 1.1 Introduction We first look at some examples. Lookup table for f(x) = 2 π x 0 e x2
More informationEQUATIONS WHOSE ROOTS ARE T I E nth POWERS OF T I E ROOTS OF A GIVEN CUBIC EQUATION
EQUATIONS WHOSE ROOTS ARE T I E nth POWERS OF T I E ROOTS OF A GIVEN CUBIC EQUATION N. A, DRAiMand MARJORIE BICKNELL Ventura, Calif, and Wilcox High School, Santa Clara, Calif. Given the cubic equation
More informationMATH 361: NUMBER THEORY FOURTH LECTURE
MATH 361: NUMBER THEORY FOURTH LECTURE 1. Introduction Everybody knows that three hours after 10:00, the time is 1:00. That is, everybody is familiar with modular arithmetic, the usual arithmetic of the
More informationSection 0.2 & 0.3 Worksheet. Types of Functions
MATH 1142 NAME Section 0.2 & 0.3 Worksheet Types of Functions Now that we have discussed what functions are and some of their characteristics, we will explore different types of functions. Section 0.2
More informationFinite Fields. Mike Reiter
1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements
More informationMEMORIAL UNIVERSITY OF NEWFOUNDLAND
MEMORIAL UNIVERSITY OF NEWFOUNDLAND DEPARTMENT OF MATHEMATICS AND STATISTICS Section 5. Math 090 Fall 009 SOLUTIONS. a) Using long division of polynomials, we have x + x x x + ) x 4 4x + x + 0x x 4 6x
More informationEfficient Key Agreement and Signature Schemes Using Compact Representations in GF (p 10 )
Efficient Key Agreement and Signature Schemes Using Compact Representations in GF (p 10 ) Kenneth J. Giuliani 1 and Guang Gong 2 1 Dept. of Combinatorics and Optimization University of Waterloo Waterloo,
More informationAlgorithm efficiency analysis
Algorithm efficiency analysis Mădălina Răschip, Cristian Gaţu Faculty of Computer Science Alexandru Ioan Cuza University of Iaşi, Romania DS 2017/2018 Content Algorithm efficiency analysis Recursive function
More informationSumming Symbols in Mutual Recurrences
Summing Symbols in Mutual Recurrences Berkeley R Churchill 1 and Edmund A Lamagna 2 1 University of California, Santa Barbara, CA, USA Department of Mathematics 2 University of Rhode Island, Kingston,
More informationExplicit solution of a class of quartic Thue equations
ACTA ARITHMETICA LXIV.3 (1993) Explicit solution of a class of quartic Thue equations by Nikos Tzanakis (Iraklion) 1. Introduction. In this paper we deal with the efficient solution of a certain interesting
More informationComputational Number Theory. Adam O Neill Based on
Computational Number Theory Adam O Neill Based on http://cseweb.ucsd.edu/~mihir/cse207/ Secret Key Exchange - * Is Alice Ka Public Network Ka = KB O KB 0^1 Eve should have a hard time getting information
More informationELEMENTARY LINEAR ALGEBRA
ELEMENTARY LINEAR ALGEBRA K R MATTHEWS DEPARTMENT OF MATHEMATICS UNIVERSITY OF QUEENSLAND First Printing, 99 Chapter LINEAR EQUATIONS Introduction to linear equations A linear equation in n unknowns x,
More informationWeek 9-10: Recurrence Relations and Generating Functions
Week 9-10: Recurrence Relations and Generating Functions April 3, 2017 1 Some number sequences An infinite sequence (or just a sequence for short is an ordered array a 0, a 1, a 2,..., a n,... of countably
More information1. Introduction Definition 1.1. Let r 1 be an integer. The r-generalized Fibonacci sequence {G n } is defined as
SOME IDENTITIES FOR r-fibonacci NUMBERS F. T. HOWARD AND CURTIS COOPER Abstract. Let r 1 be an integer. The r-generalized Fibonacci sequence {G n} is defined as 8 >< 0, if 0 n < r 1; G n = 1, if n = r
More informationLocal Moves and Gordian Complexes, II
KYUNGPOOK Math. J. 47(2007), 329-334 Local Moves and Gordian Complexes, II Yasutaka Nakanishi Department of Mathematics, Faculty of Science, Kobe University, Rokko, Nada-ku, Kobe 657-8501, Japan e-mail
More informationWeek 15-16: Combinatorial Design
Week 15-16: Combinatorial Design May 8, 2017 A combinatorial design, or simply a design, is an arrangement of the objects of a set into subsets satisfying certain prescribed properties. The area of combinatorial
More informationComplexity Analysis of a Fast Modular Multiexponentiation Algorithm
Complexity Analysis of a Fast Modular Multiexponentiation Algorithm Haimin Jin 1,, Duncan S. Wong, Yinlong Xu 1 1 Department of Computer Science University of Science and Technology of China China jhm113@mail.ustc.edu.cn,
More informationFIXED POINTS OF MORPHISMS AMONG BINARY GENERALIZED PSEUDOSTANDARD WORDS
#A21 INTEGERS 18 (2018) FIXED POINTS OF MORPHISMS AMONG BINARY GENERALIZED PSEUDOSTANDARD WORDS Tereza Velká Department of Mathematics, Faculty of Nuclear Sciences and Physical Engineering, Czech Technical
More informationLargest Values of the Stern Sequence, Alternating Binary Expansions and Continuants
1 3 47 6 3 11 Journal of Integer Sequences, Vol. 0 (017), Article 17..8 Largest Values of the Stern Sequence, Alternating Binary Expansions Continuants Rol Paulin Max-Planck-Institut für Mathematik Vivatsgasse
More information201-1A5-MT - Mathematics Summer 2015 HOMEWORK 2 Deadline : Sunday, August 30, 2015 at 12 :30.
01-1A5-MT - Mathematics Summer 015 HOMEWORK Deadline : Sunday, August 30, 015 at 1 :30. Instructions : The assignment consists of five questions, each worth 0 points. Only hardcopy submissions of your
More informationTHE p-adic VALUATION OF LUCAS SEQUENCES
THE p-adic VALUATION OF LUCAS SEQUENCES CARLO SANNA Abstract. Let (u n) n 0 be a nondegenerate Lucas sequence with characteristic polynomial X 2 ax b, for some relatively prime integers a and b. For each
More informationInformation Theory. Lecture 7
Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible
More informationAlgebra. Modular arithmetic can be handled mathematically by introducing a congruence relation on the integers described in the above example.
Coding Theory Massoud Malek Algebra Congruence Relation The definition of a congruence depends on the type of algebraic structure under consideration Particular definitions of congruence can be made for
More informationMATH 2400 LECTURE NOTES: POLYNOMIAL AND RATIONAL FUNCTIONS. Contents 1. Polynomial Functions 1 2. Rational Functions 6
MATH 2400 LECTURE NOTES: POLYNOMIAL AND RATIONAL FUNCTIONS PETE L. CLARK Contents 1. Polynomial Functions 1 2. Rational Functions 6 1. Polynomial Functions Using the basic operations of addition, subtraction,
More informationDiophantine quadruples and Fibonacci numbers
Diophantine quadruples and Fibonacci numbers Andrej Dujella Department of Mathematics, University of Zagreb, Croatia Abstract A Diophantine m-tuple is a set of m positive integers with the property that
More information