Algorithms for Solving Linear Differential Equations with Rational Function Coefficients
|
|
- Beverly Mills
- 5 years ago
- Views:
Transcription
1 Algorithms for Solving Linear Differential Equations with Rational Function Coefficients Erdal Imamoglu Department of Mathematics Florida State University May 25, / 37
2 1 Introduction 2 Formal Solutions, Exponents 3 Quotient Method 4 Integral Bases 5 Applications 2 / 37
3 Introduction Closed form solutions of differential equations are solutions that can be written in terms of well-studied functions (exponential, logarithmic, Airy, Bessel, Whittaker, hypergeometric,...). There are powerful algorithms for some type of closed form solutions. We are interested to find hypergeometric solutions. Hypergeometric solutions are common, but current solvers in computer algebra systems often fail to find such solutions. 3 / 37
4 Introduction Consider the second order linear differential equation L inp (y) = 0 where L inp = A A 1 + A 0 Q(x)[ ] ( = d ) dx A hypergeometric solution of L inp is a solution of the form ( ) (r0 S(x) = exp r dx 2F 1 (a 1, a 2 ; b 1 ; f) + r 1 2F 1(a 1, a 2 ; b 1 ; f) ) where f, r, r 0, r 1 Q(x), a 1, a 2, b 1 Q. We are interested in finding such solutions of a given regular singular L inp Q(x)[ ]. 4 / 37
5 Introduction There is also a conjecture about hypergeometric solutions. Conjecture (van Hoeij, Kunwar) Every second order globally bounded equation has a hypergeometric solution or an algebraic solution. A globally bounded equation is a differential equation which (after a simple scaling) admits a Convergent Integer power Series solution (CIS solution). Example (Franel Numbers, OEIS A000172) sequence = 1, 2, 10, 56, 346, 2252, 15184, ,... y(x) = x + 10 x x x x L inp = x (1 + x) (8 x 1) 2 + ( 24 x x 1 ) + (2 + 8 x) ( 1 1 y(x) = 1 2 x 2F 1 3, 2 3 ; 1; 27 x 2 ) (1 2 x) 3 5 / 37
6 Introduction Question How can we find hypergeometric solutions of second order regular singular differential operators? There are powerful algorithms for specific tasks: Fang, van Hoeij (2012) Kunwar, van Hoeij (2013) Kunwar (2014) van Hoeij, Vidunas (2015) We want to develop a general algorithm. 6 / 37
7 Introduction Contributions We have developed two (heuristic) effective algorithms to find hypergeometric solutions (if they exist) of second order regular singular differential operators in Q(x)[ ]. One of our algorithms is the most general algorithm in the literature. We have developed fast algorithms to simplify n-th order regular singular differential operators in Q(x)[ ]. Simplifying Solving. 7 / 37
8 Introduction Value to the Scientific Society Hypergeometric solutions are common in physics and combinatorics. Our implementations have been already used by physicists. Example Feynman Diagrams. One of our algorithms simplify a differential operator to another operator which is easier to solve (Simplifying Solving). Example A 3rd order operator. 8 / 37
9 1 Introduction 2 Formal Solutions, Exponents 3 Quotient Method 4 Integral Bases 5 Applications 9 / 37
10 Formal Solutions, Exponents Let L inp = A A 1 + A 0 Q(x)[ ]. s Q is a singularity if it is a root of A 2, or a pole A 1 or A 0. s is a regular singularity if A 1 A 2 (x s) 1, A 0 A 2 (x s) 0 are analytic at s. L inp is regular singular if it has only regular singularities. Formal solutions of L inp at x = s: y 1 = (x s) e 1 ( ) y 2 = (x s) e 2 ( ) + ky 1 log(x s) (k might be 0) Exponents of L inp at x = s: e 1, e 2. Exponent-difference: (L inp, s) = e 1 e / 37
11 1 Introduction 2 Formal Solutions, Exponents 3 Quotient Method 4 Integral Bases 5 Applications 11 / 37
12 Quotient Method Special Case Let L inp Q(x)[ ] with ord(l inp ) = 2. Assume that we want to find hypergeometric solutions this form: ( ) exp r dx 2F 1 (a 1, a 2 ; b 1 ; f) (f, r Q(x), a 1, a 2, b 1 Q) If they exist, then there exists a GHDO such that because L B = 2 + b 1 (a 1 + a 2 + 1) a 1a 2 x(1 x) x(1 x) Q(x)[ ] L B f C M r E L inp 2F 1 (a 1, a 2 ; b 1 ; x) f C 2 F 1 (a 1, a 2 ; b 1 ; f) r E ( exp ) r dx 2F 1 (a 1, a 2 ; b 1 ; f) 12 / 37
13 Quotient Method Problem We know L inp, we do not know L B (i.e., a 1, a 2, b 1 ), f, r. Assume that we have a (right) candidate L B. Then L B f C M r E L inp. We can compute formal solutions y i of L B and Y i of L inp at a non-removable singularity (order of formal solutions = a). ( ) y i (x) f C y i (f(x)) r E Y i (x) = exp r dx y i (f(x)) (i = 1, 2) Let q(x) = y 1(x) y 2 (x), Q(x) = Y 1(x) Y 2 (x). This gives us q(f(x)) = c Q(x) where c is an unknown constant, so f(x) q 1 (c Q(x)) mod x a 13 / 37
14 Quotient Method Problem We do not know c. Idea Choose a suitable prime l and compute f(x) q 1 (c Q(x)) mod (x a, l) and try c = 1,..., l 1. For each c try rational function reconstruction to find f F l (x). If this succeeds for at least one c, then try l-adic Hensel lifting and rational number reconstruction to find f Q(x). f Compute M s.t. L B C M r E L inp and find r (there is a formula). Problem We do not know L B (i.e., a 1, a 2, b 1 Q). 14 / 37
15 Quotient Method Question How to find candidates for L B (i.e., a 1, a 2, b 1 Q)? α 0 = 1 b 1, α 1 = b 1 a 1 a 2, α = a 2 a 1. Assume that L B f C M r E L inp. L B L inp singularities 0, 1, s 1,..., s r exponent-differences α 0, α 1, α (L inp, s 1 ),..., (L inp, s r ) { a } α 0, α 1, α kb : a {1, (L inp, s i )}, 1 b d f, 1 k a f where d f = deg(f) and a f = [Q(x, f) : Q(x)]. We have a bound on d f and we consider a f 2. Problem This set might have too many elements. 15 / 37
16 Quotient Method Theorem (Special Case of Riemann-Hurwitz Formula for DEs) If f : X P 1 and L B f C M r E L inp, then 2 + (1 (L inp, s i )) = d f 2 + a s f i where d f = deg(f) and a f = [C(x, f) : C(x)]. i {0,1, } (1 α i ) This formula eliminates vast majority of the candidates: { a } α 0, α 1, α kb : a {1, (L inp, s i )}, 1 b d f, 1 k a f 16 / 37
17 Quotient Method Algorithm Outline (find 2f1) - Compute candidates L B s (if any). - Compute quotients of formal solutions at a non-removable singularity. - Use modular reduction, Hensel lifting, rational reconstruction to find f (if any). - Find r. - Return a basis of hypergeometric solutions (if they exist) or an empty list. Algorithm find 2f1 is very effective to find solutions of type ( ) (r0 exp r dx 2F 1 (a 1, a 2 ; b 1 ; f) + r 1 2F 1(a 1, a 2 ; b 1 ; f) ) where r 1 = 0. Question What if r 1 0? Idea Simplifying Solving 17 / 37
18 1 Introduction 2 Formal Solutions, Exponents 3 Quotient Method 4 Integral Bases 5 Applications 18 / 37
19 Integral Bases Example (Simplifying Solving) Consider the following number field Q[x]/(f 1 ) where f 1 = 98818x x x x x x We can reduce this to Q[x]/(f 1 ) = Q[x]/(f 2 ) where f 2 = x 6 5x 4 21x 3 12x 2. Key step to find an isomorphic number field is computation of an integral basis. 19 / 37
20 Integral Bases Let A = {f Q[x] f is irreducible}. f 1 f 2 Q[x]/(f 1 ) = Q[x]/(f 2 ) (f 1, f 2 Q[x]) Goal Given f 1, find f 2 A with small bit-size such that f 1 f 2. f 2 = a standard form of f 1 Solution POLRED algorithm (Cohen and Diaz Y Diaz, 1991). - Compute a basis for the algebraic integers of Q[x]/(f 1 ). - Apply LLL (Lenstra, Lenstra, and Lovasz, 1982) to this basis. Application Reduce computations in Q[x]/(f 1 ) to computations in Q[x]/(f 2 ). 20 / 37
21 Integral Bases Let D = Q(x)[ ] and A = {L D L is irreducible}. L 1 L 2 D/DL 1 = D/DL2 as D-modules (L 1, L 2 D) Goal Given L 1, find L 2 A with small bit-size such that L 1 L 2. L 2 = a standard form of L 1 Solution Idea Imitate POLRED. Application Reduce solving L 1 with many apparent singularities to solving L 2 with few apparent singularities. 21 / 37
22 Integral Bases Computation of integral bases for (algebraic) number fields (algebraic) function fields are well studied: Trager (1984) Cohen and Diaz Y Diaz (1991) van Hoeij (1994) de Jong (1998) Montes (1999) van Hoeij and Stillman (2015) Differential analogue of integral bases is new (Kauers and Koutschan, 2015). We give an integral basis algorithm that is much faster. In addition, we normalize the basis at infinity, which is the analogue of phase 2 in POLRED. 22 / 37
23 Integral Bases L C(x)[ ] be regular singular. L has a basis of formal solutions at x = s in the form { y = t νs s P i t i x s, if s s t s = if s = i=0 where ν s C and P i C[log (t s )] with deg(p i ) < ord(l) and P x, The valuation of y at x = s is v s (y) = Re(ν s ) 23 / 37
24 Integral Bases Fix L C(x)[ ], ord(l) = n, and let G C(x)[ ]. G is called integral for L at s if v s (G) = inf{v s (G(y)) y is a solution of L at x = s} 0 G is called integral for L if v s (G) 0 for all s C. Consider the C[x]-module O L O L = {G C(x)[ ] G is integral for L and ord(g) < n} A basis of O L is called an (global) integral basis for L. 24 / 37
25 Integral Bases Let L C(x)[ ], ord(l) = n, and P C[x]. The set {b 1,..., b n } is a local integral basis for L at P when { A1 b A } n b n A i, B i C[x] and gcd(p, B i ) = 1 B 1 B n = {G G is integral for L at every root of P } A local integral basis at a finite singularity s C is the local integral basis at P = x s. 25 / 37
26 Integral Bases Question How to compute a local integral basis for an operator at one point? Theorem {b 1,..., b n } is a local integral basis for L C(x)[ ] at x = 0 1 i, j {1,..., n} we have v 0 (b i (y j )) 0 (y j = a solution of L at x = 0) and 2 (c 1,..., c n ) C n \ (0,..., 0) there exists j {1,..., n} such that v 0 ((c 1 b c n b n )(y j )) < 1 26 / 37
27 Integral Bases Let L inp Q(x)[ ] be regular singular. Algorithm Outline (local basis at 0) - Compute v j = v 0 (y j ) of the all formal solutions y j of L inp at x = 0. - Let m = min(v j ). - Let b 1 = x m 0. - For i from 2 to n do: 1 Let b i = x b i 1 2 Make the ansatz A = 1 x (u 1 b u i 1 b i 1 + b i ). 3 Evaluate A(y j ) and equate coefficients of the non-integral terms to 0. 4 If there is a solution, find it, update b i = A and return to Step 2. - Return b 1,..., b n. 27 / 37
28 Integral Bases Improvements (Apparent singularities and algebraic singularities) 1 Apparent Singularities A local integral basis at an apparent singularity is given by {b 1 = e 1,..., b n = en } If e i ord(l inp ), then b i = Rem( e i, L inp ). Our implementation only checks for apparent singularities of the most common type where e 1, e 2,..., e n 1, e n = 0, 1,..., n 2, n 28 / 37
29 Integral Bases 2 Algebraic Singularities Let s be an algebraic singularity with minimal polynomial P. We compute a local integral basis {b 1,..., b n } for L at x = s. We want to scale b i in such a way that - {c 1 b 1,..., c n b n } is still an integral basis at x = s, - {c 1 b 1,..., c n b n } have valuations 1 at all roots of P x s. Let for i = 1,..., n and then c i = will be a local integral basis at P. ( P ) vs(b1 )+i x s {Tr(c 1 b 1 ),..., Tr(c n b n )} 29 / 37
30 Integral Bases Let L inp Q(x)[ ] be regular singular. Algorithm Outline (global integral basis) - Let P sing be polynomial whose roots are singularities of L inp. - For each irreducible factor P of P sing, compute a local integral bases for L inp at P. - Combine all local integral bases to form a global integral basis for L inp. 30 / 37
31 Integral Bases Timings Comparison of timings of Kauers and Koutschan s integral basis algorithm and our integral basis algorithm (in seconds) on a computer with a 2.5 GHZ Intel Core i5-3210m CPU and 8 GB RAM. Example Kauers-Koutschan Our algorithm > > > > / 37
32 Integral Bases Now, we know how to compute a global integral basis for L inp. We have control on finite singularities of L inp. Question What about the point x =? Normalization Let L inp C(x)[ ] with ord(l inp ) = n. The set {b 1,..., b n } is called normalized at s, if r i C(x) such that {r 1 b 1,..., r n b n } is a local integral basis for L inp at s. We want to normalize a global integral basis at x =. Normalization of an integral basis at x = for an algebraic function was introduced (Trager, 1984). 32 / 37
33 Integral Bases Let L inp Q(x)[ ] be regular singular and let be a global integral basis for L inp. {B 1,..., B n } Algorithm Outline (normalization at infinity) - Compute a local integral basis {b 1,..., b n } at. - Compute change of basis matrix and follow Trager s method. Basis elements of a normalized integral basis for L inp gives us gauge transformations to simplify L inp (to simplify it to its standard form). Example Linp[9]. 33 / 37
34 1 Introduction 2 Formal Solutions, Exponents 3 Quotient Method 4 Integral Bases 5 Applications 34 / 37
35 Applications Lets return to our problems: 1 Simplify a given differential operator (Simplifying Solving). 2 Find hypergeometric solutions (generalize find 2f1). 1 Simplify a given differential operator: Goal Given L 1, find L 2 with small bit-size such that L 1 is gauge equivalent to L 2. Solution Idea Imitate POLRED. Solution standard forms algorithm: - Compute a normalized integral basis for L 1. - If necessary, search for a better basis element to simplify L / 37
36 Applications 2 Generalize find 2f1: Let L inp Q(x)[ ] be a second order regular singular operator. We want to find hypergeometric solutions of L inp of the form ( ) (r0 exp r dx 2F 1 (a 1, a 2 ; b 1 ; f) + r 1 2F 1(a 1, a 2 ; b 1 ; f) ) Algorithm Outline (hypergeometricsols) - Try find 2f1. - If find 2f1 returns an empty list, use standard forms to simplify L inp to another operator L inp. - Feed find 2f1 with L inp. - If find 2f1 solves L inp, then obtain solutions of L inp from solutions of L inp. 36 / 37
37 Thank You Thanks to my advisor Mark van Hoeij for his continuous support, encouragement, and friendship. Thanks to the members of my committee for their time and efforts. 37 / 37
Closed Form Solutions
Closed Form Solutions Mark van Hoeij 1 Florida State University ISSAC 2017 1 Supported by NSF 1618657 1 / 26 What is a closed form solution? Example: Solve this equation for y = y(x). y = 4 x 3 (1 x) 2
More informationClosed Form Solutions
Closed Form Solutions Mark van Hoeij 1 Florida State University Slides of this talk: www.math.fsu.edu/ hoeij/issac2017.pdf 1 Supported by NSF 1618657 1 / 29 What is a closed form solution? Example: Solve
More informationFLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES THIRD ORDER A-HYPERGEOMETRIC FUNCTIONS WEN XU
FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES THIRD ORDER A-HYPERGEOMETRIC FUNCTIONS By WEN XU A Dissertation submitted to the Department of Mathematics in partial fulfillment of the requirements
More informationDifferential Equations with a Convergent Integer power Series Solution
Differential Equations with a Convergent Integer power Series Solution Mark van Hoeij AMC Conference TU/e (Algebra Meetkunde and Computation) July 3, 2014 Notations Let y Q[[x]] and suppose that 1 y has
More informationSolutions of linear ordinary differential equations in terms of special functions
Solutions of linear ordinary differential equations in terms of special functions Manuel Bronstein ManuelBronstein@sophiainriafr INRIA Projet Café 004, Route des Lucioles, BP 93 F-0690 Sophia Antipolis
More informationFactoring univariate polynomials over the rationals
Factoring univariate polynomials over the rationals Tommy Hofmann TU Kaiserslautern November 21, 2017 Tommy Hofmann Factoring polynomials over the rationals November 21, 2017 1 / 31 Factoring univariate
More informationTHE FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCE SOLVING LINEAR DIFFERENTIAL EQUATIONS IN TERMS OF HYPERGEOMETRIC FUNCTIONS BY 2-DESCENT
THE FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCE SOLVING LINEAR DIFFERENTIAL EQUATIONS IN TERMS OF HYPERGEOMETRIC FUNCTIONS BY 2-DESCENT By TINGTING FANG A Dissertation submitted to the Department
More informationGenerating Subfields
Generating Subfields joint with Marc van Hoeij, Andrew Novocin Jürgen Klüners Universität Paderborn Number Theory Conference, Bordeaux, 14th January 2013 Jürgen Klüners (Universität Paderborn) Generating
More informationThe following can also be obtained from this WWW address: the papers [8, 9], more examples, comments on the implementation and a short description of
An algorithm for computing the Weierstrass normal form Mark van Hoeij Department of mathematics University of Nijmegen 6525 ED Nijmegen The Netherlands e-mail: hoeij@sci.kun.nl April 9, 1995 Abstract This
More informationComputer Algebra: General Principles
Computer Algebra: General Principles For article on related subject see SYMBOL MANIPULATION. Computer algebra is a branch of scientific computation. There are several characteristic features that distinguish
More informationFinding Hyperexponential Solutions of Linear ODEs by Numerical Evaluation
Finding Hyperexponential Solutions of Linear ODEs by Numerical Evaluation Fredrik Johansson* 1 Manuel Kauers* 1 Marc Mezzarobba* 1,2 *RISC-Linz ISSAC 2013, Boston, MA 1 Supported by the Austrian Science
More informationBasic Algorithms in Number Theory
Basic Algorithms in Number Theory Algorithmic Complexity... 1 Basic Algorithms in Number Theory Francesco Pappalardi Discrete Logs, Modular Square Roots & Euclidean Algorithm. July 20 th 2010 Basic Algorithms
More informationAF:Small: Linear Differential Equations with a Convergent Integer Series Solution, Project Description
AF:Small: Linear Differential Equations with a Convergent Integer Series Solution, Project Description Mark van Hoeij September 1, 2013 August 31, 2016 1 Introduction The topic in the PI s current grant
More informationThe complexity of factoring univariate polynomials over the rationals
The complexity of factoring univariate polynomials over the rationals Mark van Hoeij Florida State University ISSAC 2013 June 26, 2013 Papers [Zassenhaus 1969]. Usually fast, but can be exp-time. [LLL
More informationNumber Theory, Algebra and Analysis. William Yslas Vélez Department of Mathematics University of Arizona
Number Theory, Algebra and Analysis William Yslas Vélez Department of Mathematics University of Arizona O F denotes the ring of integers in the field F, it mimics Z in Q How do primes factor as you consider
More informationIntegration of Rational Functions by Partial Fractions
Title Integration of Rational Functions by MATH 1700 MATH 1700 1 / 11 Readings Readings Readings: Section 7.4 MATH 1700 2 / 11 Rational functions A rational function is one of the form where P and Q are
More informationMA22S3 Summary Sheet: Ordinary Differential Equations
MA22S3 Summary Sheet: Ordinary Differential Equations December 14, 2017 Kreyszig s textbook is a suitable guide for this part of the module. Contents 1 Terminology 1 2 First order separable 2 2.1 Separable
More informationHyperelliptic curves
1/40 Hyperelliptic curves Pierrick Gaudry Caramel LORIA CNRS, Université de Lorraine, Inria ECC Summer School 2013, Leuven 2/40 Plan What? Why? Group law: the Jacobian Cardinalities, torsion Hyperelliptic
More informationIntegration of Rational Functions by Partial Fractions
Title Integration of Rational Functions by Partial Fractions MATH 1700 December 6, 2016 MATH 1700 Partial Fractions December 6, 2016 1 / 11 Readings Readings Readings: Section 7.4 MATH 1700 Partial Fractions
More informationSolving Sparse Rational Linear Systems. Pascal Giorgi. University of Waterloo (Canada) / University of Perpignan (France) joint work with
Solving Sparse Rational Linear Systems Pascal Giorgi University of Waterloo (Canada) / University of Perpignan (France) joint work with A. Storjohann, M. Giesbrecht (University of Waterloo), W. Eberly
More informationHow might we evaluate this? Suppose that, by some good luck, we knew that. x 2 5. x 2 dx 5
8.4 1 8.4 Partial Fractions Consider the following integral. 13 2x (1) x 2 x 2 dx How might we evaluate this? Suppose that, by some good luck, we knew that 13 2x (2) x 2 x 2 = 3 x 2 5 x + 1 We could then
More informationThe Riemann Hypothesis for Function Fields
The Riemann Hypothesis for Function Fields Trevor Vilardi MthSc 952 1 Function Fields Let F = F q be the finite field with q elements (q is a prime power). Definiton 1. Let K/F (x) be an extension of F.
More informationMATH 431 PART 2: POLYNOMIAL RINGS AND FACTORIZATION
MATH 431 PART 2: POLYNOMIAL RINGS AND FACTORIZATION 1. Polynomial rings (review) Definition 1. A polynomial f(x) with coefficients in a ring R is n f(x) = a i x i = a 0 + a 1 x + a 2 x 2 + + a n x n i=0
More informationCOMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162
COMPUTER ARITHMETIC 13/05/2010 cryptography - math background pp. 1 / 162 RECALL OF COMPUTER ARITHMETIC computers implement some types of arithmetic for instance, addition, subtratction, multiplication
More informationSolving Third Order Linear Differential Equations in Terms of Second Order Equations
Solving Third Order Linear Differential Equations in Terms of Second Order Equations Mark van Hoeij (Florida State University) ISSAC 2007 Talk presented by: George Labahn (University of Waterloo) Notations.
More informationEach is equal to CP 1 minus one point, which is the origin of the other: (C =) U 1 = CP 1 the line λ (1, 0) U 0
Algebraic Curves/Fall 2015 Aaron Bertram 1. Introduction. What is a complex curve? (Geometry) It s a Riemann surface, that is, a compact oriented twodimensional real manifold Σ with a complex structure.
More informationFast algorithms for polynomials and matrices Part 6: Polynomial factorization
Fast algorithms for polynomials and matrices Part 6: Polynomial factorization by Grégoire Lecerf Computer Science Laboratory & CNRS École polytechnique 91128 Palaiseau Cedex France 1 Classical types of
More informationElliptic curves over function fields 1
Elliptic curves over function fields 1 Douglas Ulmer and July 6, 2009 Goals for this lecture series: Explain old results of Tate and others on the BSD conjecture over function fields Show how certain classes
More informationPart III. x 2 + y 2 n mod m
Part III Part III In this, the final part of the course, we will introduce the notions of local and global viewpoints of number theory, which began with the notion of p-adic numbers. (p as usual denote
More informationAn Algorithm for computing Isomorphisms of Algebraic Function Fields
An Algorithm for computing Isomorphisms of Algebraic Function Fields F. Hess Technical University of Berlin, Faculty II, Institute of Mathematics, Secr. MA8-1, Straße des 17. Juni 136, 10623 Berlin, Germany
More informationFinding all Bessel type solutions for Linear Differential Equations with Rational Function Coefficients
Finding all essel type solutions or Linear Dierential Equations with Rational Function Coeicients Mark van Hoeij & Quan Yuan Florida State University, Tallahassee, FL 06-07, USA hoeij@math.su.edu & qyuan@math.su.edu
More informationHurwitz Number Fields David P. Roberts, U. of Minnesota, Morris Akshay Venkatesh, Stanford University
Hurwitz Number Fields David P. Roberts, U. of innesota, orris Akshay Venkatesh, Stanford University Notation: NF m (P) is the set of isomorphism classes of degree m number fields ramified only within P
More informationModular polynomials and isogeny volcanoes
Modular polynomials and isogeny volcanoes Andrew V. Sutherland February 3, 010 Reinier Bröker Kristin Lauter Andrew V. Sutherland (MIT) Modular polynomials and isogeny volcanoes 1 of 9 Isogenies An isogeny
More informationComputing a Lower Bound for the Canonical Height on Elliptic Curves over Q
Computing a Lower Bound for the Canonical Height on Elliptic Curves over Q John Cremona 1 and Samir Siksek 2 1 School of Mathematical Sciences, University of Nottingham, University Park, Nottingham NG7
More informationSection III.6. Factorization in Polynomial Rings
III.6. Factorization in Polynomial Rings 1 Section III.6. Factorization in Polynomial Rings Note. We push several of the results in Section III.3 (such as divisibility, irreducibility, and unique factorization)
More informationThe function graphed below is continuous everywhere. The function graphed below is NOT continuous everywhere, it is discontinuous at x 2 and
Section 1.4 Continuity A function is a continuous at a point if its graph has no gaps, holes, breaks or jumps at that point. If a function is not continuous at a point, then we say it is discontinuous
More informationFebruary 1, 2005 INTRODUCTION TO p-adic NUMBERS. 1. p-adic Expansions
February 1, 2005 INTRODUCTION TO p-adic NUMBERS JASON PRESZLER 1. p-adic Expansions The study of p-adic numbers originated in the work of Kummer, but Hensel was the first to truly begin developing the
More informationModern Computer Algebra
Modern Computer Algebra JOACHIM VON ZUR GATHEN and JURGEN GERHARD Universitat Paderborn CAMBRIDGE UNIVERSITY PRESS Contents Introduction 1 1 Cyclohexane, cryptography, codes, and computer algebra 9 1.1
More informationMahler measure as special values of L-functions
Mahler measure as special values of L-functions Matilde N. Laĺın Université de Montréal mlalin@dms.umontreal.ca http://www.dms.umontreal.ca/~mlalin CRM-ISM Colloquium February 4, 2011 Diophantine equations
More information6x 3 12x 2 7x 2 +16x 7x 2 +14x 2x 4
2.3 Real Zeros of Polynomial Functions Name: Pre-calculus. Date: Block: 1. Long Division of Polynomials. We have factored polynomials of degree 2 and some specific types of polynomials of degree 3 using
More information1 The Fundamental Theorem of Arithmetic. A positive integer N has a unique prime power decomposition. Primality Testing. and. Integer Factorisation
1 The Fundamental Theorem of Arithmetic A positive integer N has a unique prime power decomposition 2 Primality Testing Integer Factorisation (Gauss 1801, but probably known to Euclid) The Computational
More informationone eciently recover the entire key? There is no known method for doing so. Furthermore, the common belief is that no such ecient algorithm exists. Th
Exposing an RSA Private Key Given a Small Fraction of its Bits Dan Boneh Glenn Durfee y Yair Frankel dabo@cs.stanford.edu gdurf@cs.stanford.edu yfrankel@cs.columbia.edu Stanford University Stanford University
More informationIntroduction to Arithmetic Geometry Fall 2013 Lecture #2 09/10/2013
18.78 Introduction to Arithmetic Geometry Fall 013 Lecture # 09/10/013.1 Plane conics A conic is a plane projective curve of degree. Such a curve has the form C/k : ax + by + cz + dxy + exz + fyz with
More informationarithmetic properties of weighted catalan numbers
arithmetic properties of weighted catalan numbers Jason Chen Mentor: Dmitry Kubrak May 20, 2017 MIT PRIMES Conference background: catalan numbers Definition The Catalan numbers are the sequence of integers
More informationERIC LARSON AND LARRY ROLEN
PROGRESS TOWARDS COUNTING D 5 QUINTIC FIELDS ERIC LARSON AND LARRY ROLEN Abstract. Let N5, D 5, X) be the number of quintic number fields whose Galois closure has Galois group D 5 and whose discriminant
More informationComputing modular polynomials with the Chinese Remainder Theorem
Computing modular polynomials with the Chinese Remainder Theorem Andrew V. Sutherland Massachusetts Institute of Technology ECC 009 Reinier Bröker Kristin Lauter Andrew V. Sutherland (MIT) Computing modular
More informationZEROS OF SPARSE POLYNOMIALS OVER LOCAL FIELDS OF CHARACTERISTIC p
ZEROS OF SPARSE POLYNOMIALS OVER LOCAL FIELDS OF CHARACTERISTIC p BJORN POONEN 1. Statement of results Let K be a field of characteristic p > 0 equipped with a valuation v : K G taking values in an ordered
More informationElliptic Curves, Factorization, and Cryptography
Elliptic Curves, Factorization, and Cryptography Brian Rhee MIT PRIMES May 19, 2017 RATIONAL POINTS ON CONICS The following procedure yields the set of rational points on a conic C given an initial rational
More informationCOMPUTING ARITHMETIC PICARD-FUCHS EQUATIONS JEROEN SIJSLING
COMPUTING ARITHMETIC PICARD-FUCHS EQUATIONS JEROEN SIJSLING These are the extended notes for a talk given at the Fields Institute on August 24th, 2011, about my thesis work with Frits Beukers at the Universiteit
More informationAN EXPOSITION OF THE RIEMANN ROCH THEOREM FOR CURVES
AN EXPOSITION OF THE RIEMANN ROCH THEOREM FOR CURVES DOMINIC L. WYNTER Abstract. We introduce the concepts of divisors on nonsingular irreducible projective algebraic curves, the genus of such a curve,
More informationALGORITHMS FOR ALGEBRAIC CURVES
ALGORITHMS FOR ALGEBRAIC CURVES SUMMARY OF LECTURE 7 I consider the problem of computing in Pic 0 (X) where X is a curve (absolutely integral, projective, smooth) over a field K. Typically K is a finite
More informationEfficient Experimental Mathematics for Lattice Path Combinatorics
1/45 Efficient Experimental Mathematics for Lattice Path Combinatorics Alin Bostan based on joint works with M. Bousquet-Mélou, F. Chyzak, M. van Hoeij, M. Kauers, S. Melczer, L. Pech, K. Raschel, B. Salvy
More informationComputing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring
Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics University of Paderborn 33102 Paderborn,
More informationHomework 8 Solutions to Selected Problems
Homework 8 Solutions to Selected Problems June 7, 01 1 Chapter 17, Problem Let f(x D[x] and suppose f(x is reducible in D[x]. That is, there exist polynomials g(x and h(x in D[x] such that g(x and h(x
More informationComputing the Monodromy Group of a Plane Algebraic Curve Using a New Numerical-modular Newton-Puiseux Algorithm
Computing the Monodromy Group of a Plane Algebraic Curve Using a New Numerical-modular Newton-Puiseux Algorithm Poteaux Adrien XLIM-DMI UMR CNRS 6172 Université de Limoges, France SNC'07 University of
More informationSection September 6, If n = 3, 4, 5,..., the polynomial is called a cubic, quartic, quintic, etc.
Section 2.1-2.2 September 6, 2017 1 Polynomials Definition. A polynomial is an expression of the form a n x n + a n 1 x n 1 + + a 1 x + a 0 where each a 0, a 1,, a n are real numbers, a n 0, and n is a
More informationExact Arithmetic on a Computer
Exact Arithmetic on a Computer Symbolic Computation and Computer Algebra William J. Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 21 September 2010
More informationx 9 or x > 10 Name: Class: Date: 1 How many natural numbers are between 1.5 and 4.5 on the number line?
1 How many natural numbers are between 1.5 and 4.5 on the number line? 2 How many composite numbers are between 7 and 13 on the number line? 3 How many prime numbers are between 7 and 20 on the number
More informationChapter Two The transcendence of e and π.
Chapter Two The transcendence of e and π. The fantasy calculation at the end of the last lecture, a fantasy because the linear combination of the intermediate series I n did not vanish it is a positive
More informationFinite Fields. Mike Reiter
1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements
More informationAn Approach to Hensel s Lemma
Irish Math. Soc. Bulletin 47 (2001), 15 21 15 An Approach to Hensel s Lemma gary mcguire Abstract. Hensel s Lemma is an important tool in many ways. One application is in factoring polynomials over Z.
More informationElliptic Curves Spring 2013 Lecture #12 03/19/2013
18.783 Elliptic Curves Spring 2013 Lecture #12 03/19/2013 We now consider our first practical application of elliptic curves: factoring integers. Before presenting the elliptic curve method (ECM) for factoring
More informationA Course in Computational Algebraic Number Theory
Henri Cohen 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. A Course in Computational Algebraic Number Theory Springer
More informationQuadratic reciprocity (after Weil) 1. Standard set-up and Poisson summation
(December 19, 010 Quadratic reciprocity (after Weil Paul Garrett garrett@math.umn.edu http://www.math.umn.edu/ garrett/ I show that over global fields k (characteristic not the quadratic norm residue symbol
More informationAbsolute Values and Completions
Absolute Values and Completions B.Sury This article is in the nature of a survey of the theory of complete fields. It is not exhaustive but serves the purpose of familiarising the readers with the basic
More informationChapter 6 Randomization Algorithm Theory WS 2012/13 Fabian Kuhn
Chapter 6 Randomization Algorithm Theory WS 2012/13 Fabian Kuhn Randomization Randomized Algorithm: An algorithm that uses (or can use) random coin flips in order to make decisions We will see: randomization
More informationLast week we looked at limits generally, and at finding limits using substitution.
Math 1314 ONLINE Week 4 Notes Lesson 4 Limits (continued) Last week we looked at limits generally, and at finding limits using substitution. Indeterminate Forms What do you do when substitution gives you
More informationMathematical Foundations of Cryptography
Mathematical Foundations of Cryptography Cryptography is based on mathematics In this chapter we study finite fields, the basis of the Advanced Encryption Standard (AES) and elliptical curve cryptography
More informationEqual Compositions of Rational Functions
Equal Compositions of Rational Functions Kenz Kallal, Matthew Lipman, Felix Wang Mentors: Thao Do and Professor Michael Zieve Fifth Annual MIT-PRIMES Conference May 17, 2015 THE PROBLEMS A rational function
More informationFault Tolerance & Reliability CDA Chapter 2 Cyclic Polynomial Codes
Fault Tolerance & Reliability CDA 5140 Chapter 2 Cyclic Polynomial Codes - cylic code: special type of parity check code such that every cyclic shift of codeword is a codeword - for example, if (c n-1,
More informationClass invariants by the CRT method
Class invariants by the CRT method Andreas Enge Andrew V. Sutherland INRIA Bordeaux-Sud-Ouest Massachusetts Institute of Technology ANTS IX Andreas Enge and Andrew Sutherland Class invariants by the CRT
More informationAbsolute Factorization
Absolute Factorization 1 Linear Traces factoring a polynomial in two variables 2 Adjacent Minors an example from algebraic statistics 3 Changing Coordinates avoiding wrong factorizations 4 Monodromy Actions
More information9. Integral Ring Extensions
80 Andreas Gathmann 9. Integral ing Extensions In this chapter we want to discuss a concept in commutative algebra that has its original motivation in algebra, but turns out to have surprisingly many applications
More informationA field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties:
Byte multiplication 1 Field arithmetic A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: F is an abelian group under addition, meaning - F is closed under
More informationMATH 115, SUMMER 2012 LECTURE 12
MATH 115, SUMMER 2012 LECTURE 12 JAMES MCIVOR - last time - we used hensel s lemma to go from roots of polynomial equations mod p to roots mod p 2, mod p 3, etc. - from there we can use CRT to construct
More informationMath 10860, Honors Calculus 2
Math 10860, Honors Calculus 2 Worksheet/Information sheet on partial fractions March 8 2018 This worksheet (or rather, information sheet with a few questions) takes you through the method of partial fractions
More informationElliptic curves over Q p
Rosa Winter rwinter@math.leidenuniv.nl Elliptic curves over Q p Bachelor thesis, August 23, 2011 Supervisor: Drs. R. Pannekoek Mathematisch Instituut, Universiteit Leiden Contents Introduction 3 1 The
More informationExercise Sheet 3 - Solutions
Algebraic Geometry D-MATH, FS 2016 Prof. Pandharipande Exercise Sheet 3 - Solutions 1. Prove the following basic facts about algebraic maps. a) For f : X Y and g : Y Z algebraic morphisms of quasi-projective
More informationExercises for algebraic curves
Exercises for algebraic curves Christophe Ritzenthaler February 18, 2019 1 Exercise Lecture 1 1.1 Exercise Show that V = {(x, y) C 2 s.t. y = sin x} is not an algebraic set. Solutions. Let us assume that
More informationPrimary Decomposition
Primary Decomposition p. Primary Decomposition Gerhard Pfister pfister@mathematik.uni-kl.de Departement of Mathematics University of Kaiserslautern Primary Decomposition p. Primary Decomposition:References
More informationSimplifying Rational Expressions and Functions
Department of Mathematics Grossmont College October 15, 2012 Recall: The Number Types Definition The set of whole numbers, ={0, 1, 2, 3, 4,...} is the set of natural numbers unioned with zero, written
More informationFactoring Algorithms Pollard s p 1 Method. This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors.
Factoring Algorithms Pollard s p 1 Method This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors. Input: n (to factor) and a limit B Output: a proper factor of
More informationName: MAT 444 Test 4 Instructor: Helene Barcelo April 19, 2004
MAT 444 Test 4 Instructor: Helene Barcelo April 19, 004 Name: You can take up to hours for completing this exam. Close book, notes and calculator. Do not use your own scratch paper. Write each solution
More informationAn Efficient Algorithm for Computing Parametric Multivariate Polynomial GCD
An Efficient Algorithm for Computing Parametric Multivariate Polynomial GCD Dong Lu Key Laboratory of Mathematics Mechanization Academy of Mathematics and Systems Science, CAS Joint work with Deepak Kapur,
More informationMathematics 136 Calculus 2 Everything You Need Or Want To Know About Partial Fractions (and maybe more!) October 19 and 21, 2016
Mathematics 36 Calculus 2 Everything You Need Or Want To Know About Partial Fractions (and maybe more!) October 9 and 2, 206 Every rational function (quotient of polynomials) can be written as a polynomial
More informationOutline of the Seminar Topics on elliptic curves Saarbrücken,
Outline of the Seminar Topics on elliptic curves Saarbrücken, 11.09.2017 Contents A Number theory and algebraic geometry 2 B Elliptic curves 2 1 Rational points on elliptic curves (Mordell s Theorem) 5
More informationPART II: Research Proposal Algorithms for the Simplification of Algebraic Formulae
Form 101 Part II 6 Monagan, 195283 PART II: Research Proposal Algorithms for the Simplification of Algebraic Formulae 1 Research Area Computer algebra (CA) or symbolic computation, as my field is known
More informationQuadratic reciprocity (after Weil) 1. Standard set-up and Poisson summation
(September 17, 010) Quadratic reciprocity (after Weil) Paul Garrett garrett@math.umn.edu http://www.math.umn.edu/ garrett/ I show that over global fields (characteristic not ) the quadratic norm residue
More information8.4 Partial Fractions
8.4 1 8.4 Partial Fractions Consider the following integral. (1) 13 2x x 2 x 2 dx How might we evaluate this? Suppose that, by some good luck, we knew that (2) 13 2x x 2 x 2 = 3 x 2 5 x+1 We could then
More informationTowards High Performance Multivariate Factorization. Michael Monagan. This is joint work with Baris Tuncer.
Towards High Performance Multivariate Factorization Michael Monagan Center for Experimental and Constructive Mathematics Simon Fraser University British Columbia This is joint work with Baris Tuncer. To
More informationComputing Characteristic Polynomials of Matrices of Structured Polynomials
Computing Characteristic Polynomials of Matrices of Structured Polynomials Marshall Law and Michael Monagan Department of Mathematics Simon Fraser University Burnaby, British Columbia, Canada mylaw@sfu.ca
More informationChapter 8. P-adic numbers. 8.1 Absolute values
Chapter 8 P-adic numbers Literature: N. Koblitz, p-adic Numbers, p-adic Analysis, and Zeta-Functions, 2nd edition, Graduate Texts in Mathematics 58, Springer Verlag 1984, corrected 2nd printing 1996, Chap.
More informationHypersurfaces and the Weil conjectures
Hypersurfaces and the Weil conjectures Anthony J Scholl University of Cambridge 13 January 2010 1 / 21 Number theory What do number theorists most like to do? (try to) solve Diophantine equations x n +
More informationAutomatic Proofs of Identities: Beyond A=B
Bruno.Salvy@inria.fr FPSAC, Linz, July 20, 2009 Joint work with F. Chyzak and M. Kauers 1 / 28 I Introduction 2 / 28 Examples of Identities: Definite Sums, q-sums, Integrals n k=0 + 0 1 2πi n=0 ( ) H n
More informationBon anniversaire Marc!
Bon anniversaire Marc! The full counting function of Gessel walks is algebraic Alin Bostan (INRIA) joint work with Manuel Kauers (INRIA/RISC) Journées GECKO/TERA 2008 Context: restricted lattice walks
More informationImproving NFS for the discrete logarithm problem in non-prime nite elds
Improving NFS for the discrete logarithm problem in non-prime nite elds Razvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, Francois Morain Institut national de recherche en informatique et en automatique
More informationCombinatorial Enumeration. Jason Z. Gao Carleton University, Ottawa, Canada
Combinatorial Enumeration Jason Z. Gao Carleton University, Ottawa, Canada Counting Combinatorial Structures We are interested in counting combinatorial (discrete) structures of a given size. For example,
More informationInteger factorization, part 1: the Q sieve. D. J. Bernstein
Integer factorization, part 1: the Q sieve D. J. Bernstein Sieving small integers 0 using primes 3 5 7: 1 3 3 4 5 5 6 3 7 7 8 9 3 3 10 5 11 1 3 13 14 7 15 3 5 16 17 18 3 3 19 0 5 etc. Sieving and 611 +
More informationHurwitz Number Fields David P. Roberts University of Minnesota, Morris. 1. Context coming from mass formulas
Hurwitz Number Fields David P. Roberts University of Minnesota, Morris. Context coming from mass formulas. Sketch of definitions and key properties. A full Hurwitz number field with Galois group A 5 and
More informationA heuristic quasi-polynomial algorithm for discrete logarithm in small characteristic
ECC, Chennai October 8, 2014 A heuristic quasi-polynomial algorithm for discrete logarithm in small characteristic Razvan Barbulescu 1 Pierrick Gaudry 2 Antoine Joux 3 Emmanuel Thomé 2 IMJ-PRG, Paris Loria,
More information