Logarithm Cartesian authentication codes

Size: px
Start display at page:

Download "Logarithm Cartesian authentication codes"

Transcription

1 Informaton and Computaton Logarthm Cartesan authentcaton codes T.W. Sze, a S. Chanson, a C. Dng, a T. Helleseth, b and M.G. Parker b, a Department of Computer Scence, Hong Kong Unversty of Scence and Technology, Clear Water Bay, Kowloon, Chna b Department of Informatcs, Unversty of Bergen, 52 Bergen, Norway Receved 13 December 21; revsed 4 March 22 Abstract Chanson, Dng and Salomaa have recently constructed several classes of authentcaton codes usng certan classes of functons. In ths paper, we further extend that work by constructng two classes of Cartesan authentcaton codes usng the logarthm functons. The codes constructed here nvolve the theory of cyclotomy and are better than a subclass of Helleseth Johansson s codes and Berbrauer s codes n terms of the maxmum success probablty wth respect to the substtuton attack. 23 Elsever Scence USA. All rghts reserved. Keywords: Authentcaton codes; Cryptography; Cyclotomy 1. Introducton Authentcaton codes were consdered n 1974 by Glbert and Sloane [5]. In the model of authentcaton theory descrbed by Smmons [11], there are three partcpants: a transmtter, a recever, and an opponent. The transmtter wants to send nformaton to the recever through a publc channel whch s subject to actve attacks, whle the opponent wants to deceve the recever. Wthout observng any message from the transmtter to the recever, the opponent mpersonates the transmtter by sendng hs message to the recever, causng the recever to accept a fraudulent message as authentc. Ths s called the mpersonaton attack, and we use P d to denote the opponent s maxmum success probablty wth respect to ths attack. Havng observed one message from the transmtter to the recever, the opponent Correspondng author. Fax: E-mal addresses: szetszwo@cs.ust.hk T.W. Sze, chanson@cs.ust.hk S. Chanson, cdng@cs.ust.hk C. Dng, torh@.ub.no T. Helleseth, Matthew.Parker@.ub.no M.G. Parker /3/$ - see front matter 23 Elsever Scence USA. All rghts reserved. do:1.116/s

2 94 T.W. Sze et al. / Informaton and Computaton replaces the orgnal message wth hs own message. Ths s called the substtuton attack, and we use P d1 to denote the opponent s maxmum success probablty wth respect to ths attack. To protect aganst these attacks, the transmtter and the recever share a secret key, whch s used n an authentcaton code. In ths model there s only one recever, and t s the model consdered n ths paper. For multrecever authentcaton codes, the reader s referred to [4,7,9,1]. A systematc Cartesan authentcaton code s a code n whch the source state.e., the plantext s concatenated wth an authentcator also called a tag to form a message whch s sent va a channel. Such a code s a 5-tuple S,E,M,T,f, where S s the set of source states, E s the set of keys, and T s the set of authentcators, M s the set of all possble messages, and f : S E T s the authentcaton mappng. Each functon f,es called an encodng rule. When the transmtter wants to send the nformaton s S usng a key e E, whch s secretly shared wth the recever, he transmts the message m s, t, where t fs,e T s the tag authentcator. When the recever receves the message m s, t, he checks ts authentcty by verfyng whether t fs,eor not usng the secret key e E. If the equalty holds, the message s regarded as authentc and s accepted. Otherwse the message s rejected. Combnatoral desgns have been successfully used to construct certan optmal authentcaton codes [8,12]. Certan algebrac curves gve also very good authentcaton codes [1,13]. Chanson, Dng and Salomaa [2] have recently presented two constructons of authentcaton codes usng certan classes of functons. Some of ther codes are optmal. In ths paper, usng the framework of [2] we construct authentcaton codes wth logarthm functons. The authentcaton codes constructed n ths paper are better than a subclass of Helleseth Johansson s codes and Berbrauer s codes n terms of the success probablty P d1 wth respect to the substtuton attack. 2. The frst class of Cartesan authentcaton codes based on logarthm functons Let F be a mappng from A to B, where A, + and B, + are fnte abelan groups. The frst constructon of [2] gves authentcaton codes S,E,T,f, 1 where the set of source states s S, + A, +, the set of keys E, + A, +, the tag space s T, + B, +, and the authentcaton mappng f from S E to T s defned by fs,e Fs + e, e A. It s assumed that there s a probablty dstrbuton on both the source state space and the key space. In ths constructon, the keys and the source states are equally lkely. The message space M S T, whch depends totally on S and T. As for the code of 1, the two decepton probabltes are gven n the followng theorem [2], whose proof s ncluded here for completeness. Theorem 1. Let S, + and T, + be fnte abelan groups, and let F be a mappng from S to T.Then for the authentcaton code S,E,T,fof 1 defned above, we have F 1 t P d max. t T S

3 P d1 max max s S,t FS T.W. Sze et al. / Informaton and Computaton s /s,t F 1 t s F 1 t s F 1 t, where FSs the mage of S under the mappng F. Proof. In an mpersonaton attack, the opponent wants to generate a new message m s,t by choosng a source state s and an e E and computng t Fs + e. The new message m s then nserted nto the channel. Ths attack s successful f and only f Fs + e t. We now need to compute the probablty PrF s + e t. Note that the keys and source states are equprobable. We have P d max s,t max s,t max t T {e E : t fs,e} {e E} F 1 t s E F 1 t. v In a substtuton attack, the opponent observed a message m s, t and replaces t wth another message m s,t, where s/ s. Snce the keys and source states are equprobable, the probablty of success of the substtuton attack s P d1 max max {e E : t fs,e,t fs,e} s S,t FS s /s,t {e E : t fs,e} max max F 1 t s F 1 t s s S,t FS s /s,t F 1 t. Wth the framework above, several classes of authentcaton codes were constructed by Chanson, Dng and Salomaa [2]. Ther codes were based on several classes of functons. In ths paper, we use some types of logarthm functons to construct a new class of authentcaton codes. Throughout ths paper we defne Z d {, 1,...,d 1}. It s known that P d P d1 for all systematc Cartesan authentcaton codes [12]. To descrbe authentcaton codes based on the logarthm functons, we make use of the theory of cyclotomy. Let GFq be a fnte feld, and let q 1 dl. For a prmtve element α of GFq, defne D d,q α d, the multplcatve group generated by α d,and D d,q α D d,q for 1, 2,...,d 1. The D d,q are called cyclotomc classes of order d. The cyclotomc numbers of order d wth respect to GFq are defned as, j d D d,q + 1 D d,q j. Clearly, there are at most d 2 dfferent cyclotomc numbers of order d [3]. To prove propertes of the authentcaton codes dealt wth n the followng sectons, for each j Z d we defne

4 96 T.W. Sze et al. / Informaton and Computaton { C d,q D d,q j j f 1 j d 1, D d,q {} f j. 2 Theorem 2. Let q 1 dl, where d 2 and l are postve ntegers. Set S GF q and T Z d. Defne Fx log α x mod d, where log α. Then for the authentcaton code S,E,T,fof 1, we have S q, E q, T d and P d 1 d + d 1 dq, dmax, j d q 1 + d P d max t T { d max,j d +1, f d odd, P d1 d max,d +2 q+, max,j d+1, f d even. Proof. By the defnton of Fx,wehaveF 1 D d,q {} and F 1 D d,q for each Z d \{}. It then follows from Theorem 1 that F 1 t S 1 + q 1/d q 1 d + d 1 dq. F 1 t F 1 t +a To prove the nequaltes for P d1, we need to determne, where / a GFq. Let F 1 t a 1 D d,q, t / mod d and t / mod d. By Lemma 5 n Appendx A, we have F 1 F 1 + a C d,q C d,q + a F 1 d + 1 d, d + D d,q {a, a}, q + d 1 F 1 t F 1 + a C d,q t C d,q + a F 1 t d d, t + d + D d,q t {a}, q 1 F 1 F 1 t + a C d,q C d,q t + a F 1 d + 1 d t +, d + D d,q t { a}, q + d 1

5 F 1 t F 1 t + a F 1 t T.W. Sze et al. / Informaton and Computaton C d,q t C d,q t + a d dt +, t + d. q 1 By Theorem 1 and Lemma 5 n Appendx A, F 1 P d1 max max t s F 1 t s s S,t FS s /s,t F 1 t d, d + D d,q d,t+ d + D t d,q max a/,t / mod d,t / mod d d t+, d + D t d,q { max d, d + 2 q + d 1,dmax, j d + 1 q 1 {a, a} q+, {a}, { a} q+, dt +,t+ d }. If q 1/d s odd, we prove that D d,q {a, a} 1. 3 If l q 1/d s even, then 1 α dl/2, where α s the prmtve element used to defne the cyclotomc classes. Hence 1 D d,q. On the other hand, f 1 D d,q, then there s a postve nteger k<lsuch that 1 α dk. Hence 1 α 2dk and thus 2k mod l. It follows that l s even. Thus 1 D d,q f and only f l s even. Hence f q 1/d s odd, we have { P d1 max d max, j d + 1,d max, j } d + 1 q + d 1 q 1 d max, j d + 1. q 1 It s obvous that dmax, j d P d1. q 1 + d Ths completes the proof. For the authentcaton codes of Theorem 2, the success probablty of mpersonaton P d s essentally 1/d when d s small compared to q. The probablty of successful substtuton P d1 s bounded below and

6 98 T.W. Sze et al. / Informaton and Computaton above by the maxmum cyclotomc number of order d. In general t s hard to determne the maxmum cyclotomc number of order d for large d. The codes descrbed n Theorem 2 do contan very good codes, as gven n the followng theorem. Theorem 3. Let q p 2s and d p s 1. Then the code of Theorem 2 has parameters S p 2s, E p 2s, T p s 1 and P d 1 p s 1 + ps 2 p 2s p s 1, 3 p s +1, f p 2 3 P d1 p s +1, f p odd, and ps + 1 / mod 3, 4 p s +2, f p odd, and ps + 1 mod 3. Proof. To prove ths theorem, we frst show that, j d 2 for any par, j. To ths end, we consder the number of solutons u, v to the equaton α j α du 1 + α α dv, 4 where, j d 1 and u, v p s.defne l p s + 1, a α, b α j. Then t follows from 4 that 1 + aα dv p s +1 b p s +1, whch gves a α dv a ps +1 b ps +1 α dv + a ps. Note that the equaton ax a ps +1 b ps +1 x + a ps 5 has at most two solutons. Hence, j d 2. If p 2, then l p s + 1 must be odd. It then follows from Theorem 2 that P d1 p 3 s +1. If p s + 1 / mod 3, we clam that, d 1. In ths case we have, j,. So5 becomes x 2 + x + 1. If x α dv / 1 s a soluton of x 2 + x + 1, then v/ andx 3 1 x 1x 2 + x + 1. Hence x 3 α 3dv 1 and 3 dvdes l p s + 1. Ths s contrary to the assumpton that p s + 1 / mod 3. Hence n the case p s + 1 / mod 3, x 2 + x + 1 has at most one soluton x 1. It then follows agan from Theorem 2 that P d1 p 3 s +1. If p s + 1 mod 3, t follows from the fact, j d 2 and Theorem 2 that P d1 p 4 s +2. Ths completes the proof. The class of codes of Theorem 3 are the best among all the codes descrbed n Theorem 2, because at least one cyclotomc number of order d must be 2. Ths s justfed by one of the followng two formulas [3]:

7 T.W. Sze et al. / Informaton and Computaton A m h, m d l n h, where 1, h mod d, l even n h 1, l d/2 mod d, l odd, otherwse. B h h, m d l k m, where { 1, f m mod d; k m, otherwse Comparson wth Helleseth Johansson s codes We now compare the codes of Theorem 3 wth a subclass of codes constructed by Helleseth and Johansson [6]. They constructed a class of codes wth parameters and S r md D/p, E r m+n, T r n 6 P d 1 r n, 7 P d1 1 r n + D 1, r m where r s a power of a prme p,andd 1sannteger. For the two codes to be comparable, we need to set m n s, r p>2, and D 2. Then the subclass of codes constructed by Helleseth and Johansson have parameters S p 2s, E p 2s, T p s 8 and P d 1 p s, 9 P d 1 1 p s + 1 p s. Note that the tag space of the subclass of codes constructed by Helleseth and Johansson has one more element than the codes n Theorem 3. So max{p d,p d1 }P d1 for the former should be smaller than that for the latter. However, f p s 4, we have 1 + p s p s p s 2 3ps + p s p s + 2 p s p s >. + 2 Hence from Table 1 the codes of Theorem 3 are better than the subclass of codes constructed by Helleseth and Johansson. Note that whle the parameters of Helleseth Johansson s codes are more flexble, the two code constructon schemes are comparable only when the above mentoned condtons are satsfed.

8 1 T.W. Sze et al. / Informaton and Computaton Table 1 Comparson of a subclass of Helleseth Johansson s codes wth those n Theorem 3 Parameters S E T max{p d,p d1 }P d1 Subclass of HJ s codes p 2s p 2s p s 1+ p s p s Codes n Theorem 3 p 2s p 2s p s p s 3. The second class of authentcaton codes based on the logarthm functon Let F be a mappng from A to B, where A, + and B, + are fnte abelan groups. The second constructon of [2] gves authentcaton codes S,E,T,f, 1 where the set of source states s S, + A, +, the set of keys E, + A B,+, the tag space s T, + B, +, and the authentcaton mappng f from S E to T s defned by fs,e a,e b Fs + e a + e b, e a,e b A B. In ths constructon, all keys and all state sources are equally lkely. Hence, the number of keys encodng rules s equal to the number of messages, whle n the frst constructon gven n Secton 2 the number of keys encodng rules s much smaller. Ths constructon of systematc authentcaton codes s qute general. The key task s to search for functons that gve good authentcaton codes wthn the framework of ths constructon. In ths secton, we use some logarthm functons to construct another class of authentcaton codes. Theorem 4. Let q 1 dl, where d and l are postve ntegers and q s a power of an odd prme. Set S GF q and T Z d. Defne Fx log α x mod d, where log α. Then for the code S,E,T,fof 1, we have and S q, E qd, T d P d 1 d, P d1 1 d + 2 qd 1 d + qd l even and d even or l odd and d mod 4, otherwse. Proof. By Theorem 1, {e E t fs,e} P d max s S,t fs,e {e E} {e a,e b t Fs + e a + e b } max s S,t fs,e A B

9 T.W. Sze et al. / Informaton and Computaton P d1 A A B 1 d. max max s S,t fs,e s /s,t fs,e max max s S,t fs,e s /s,t fs,e max s S,t fs,e max s /s,t fs,e max a/,b b Z d C d,q b {e E t fs,e,t fs,e} {e E t fs,e} {e a,e b t Fs + e a + e b,t Fs + e a + e b } A [ e b Z d C d,q t e b s C d,q t e b s ] + a C d,q q b+b /q, where a s s/, a 1 D 2,q, b t e b and b t t. Case 1: b mod d, by Lemmas 5 and 7, P d1 max a/ C d,q + a C d,q + b Z d \{} C d,q b + a C d,q b max, d + D d,q a/ {a, a} + + b,+ b d /q b Z d \{} max d,q D a/ {a, a} + + b,+ b d /q b Z d max d,q D a/ {a, a} + b,b d /q b Z d [ ] D d,q max {a, a} + l 1 /q a/ { l+1 q l q for dl 2 mod d, otherwse. Case 2: b mod d /, by Lemmas 5 and 7 n the Appendx A, [ P d1 max C d,q a/,b + a C d,q b + C d,q b + a C d,q + C d,q b + a C d,q b+b ]/q b Z d \{, b} /q

10 12 T.W. Sze et al. / Informaton and Computaton [ max, + b d + D d,q a/,b b {a} + b, d b,+ b + b d ]/q max b Z d \{, b} a/,b max a/,b D d,q b D d,q b [ D d,q max a/,b b To maxmze D d,q b and so a D d,q D d,q 2 {a} + {a} + {a} + D d,q b D d,q b D d,q b {a} + D d,q b b+ 2.For a D d,q b D d,q b { a} { a} + + b,+ b + b d /q b Z d { a} + b,b+ b d /q b Z d ] { a} + l /q. { a}, wthout loss of generalty, assume a D d,q b. 1, we consder the equaton b b + q 1 mod d 2 whch s equvalent to 2b dl mod d. 2 We now check whether ths equaton has a soluton. Case 1: l even and d even. In ths case b d/2 s a soluton. Case 2: l even and d odd. In ths case there s no soluton. Case 3: l odd and d mod 4. In ths case b d/4 s a soluton. Case 4: l odd and d 2 mod 4. In ths case there s no soluton. Note that q 1 dl, and the two cases d odd and l odd cannot happen at the same tme. Thus l+2 l even and d even P d1 q or l odd and d mod 4, otherwse. l+1 q All the values of P d1 n Case 2 are greater than or equal to the values of P d1 n Case 1. By substtutng q dl + 1, the theorem s proved Comparson wth another class of codes descrbed n [6] There are authentcaton codes wth parameters [6] S r m, E r m+n S T, T r n 11 and

11 T.W. Sze et al. / Informaton and Computaton P d P d1 1 r n. These codes are usually constructed by usng lnear functons n a natural way. For these codes we have gcd S, T r mnm,n / 1. However, for the codes of Theorem 4 we have gcd S, T 1, and the correspondng P d1 s slghtly bgger than T 1. Under the condton of 12, t may be proved that no code wth P d P d1 r 1 n exsts, because orthogonal arrays wth correspondng parameters may not exst. Hence the parameters of 11 are of dfferent types compared wth those n Theorem 4. On the other hand, the code constructon n Theorem 4 uses the logarthm functon Comparson wth Berbrauer s codes We now compare the codes of Theorem 4 wth Berbrauer s codes [1]. Berbrauer employed the composton method to geometry codes and obtaned an authentcaton code wth the followng parameters: and S r s1+rs t, E r 2s+t, T r t 13 P d 1 r t, P d 1 2 r t, 14 where r s a power of a prme p,ands t are natural numbers. In order for the codes to be comparable to the codes of Theorem 4 we set s t. Then 13 and 14 become S q 2t, E q 3t, T q t 15 and P d 1 q t 1 T, P d1 2 q t 1 T + 1 S. 16 In ths case we have E S T. For the code of Theorem 4, we have also E S T and P d T 1. But the success probablty of the substtuton attack on the code of Theorem 4 s P d1 l + 2 q < 1 d + 2 q 1 T + 1 S /2. Thus n the case that S > 2 T, the code of Theorem 4 s better than the subclass of codes of [1] n the specal case s t. Note that the codes of Theorem 4 are comparable wth only ths subclass of Berbrauer s codes due to restrctons on the code parameters.

12 14 T.W. Sze et al. / Informaton and Computaton Conclusons In ths paper wthn the framework of Chanson, Dng and Salomaa [2], we presented two classes of systematc authentcaton codes usng the theory of cyclotomy and the logarthm functon. In all the cases that the codes are comparable, our codes are better than Helleseth Johansson s codes and also Berbrauer s codes. Wth the known relatons between unversal hash famles and authentcaton codes [13,14], the authentcaton codes descrbed n ths paper may be used to construct unversal hash famles. The parameters of the authentcaton codes descrbed n Theorem 2 are flexble n that d could be any proper dvsor of q 1. However, d must be chosen carefully n order to get good authentcaton codes. For example, f q p 2s and d p s + 1, the code s bad n the sense that P d1 s qute large. Thus the codes of Theorem 2 contan both good and bad codes. A class of very good authentcaton codes based on algebrac curves were constructed by Xng, Wang and Lam [13]. Unfortunately the codes descrbed n ths paper cannot be compared wth the Xng Wang Lam codes because ther parameters are not comparable. Acknowledgments The authors thank both referees for ther constructve comments and suggestons that greatly mproved ths paper. Appendx A. Several auxlary results Recall that q 1 dl and that D d,q are the cyclotomc classes of order d. Also recall the defnton of C d,q n 2. The followng lemma s useful n the proof of Theorem 2. Lemma 5. Let a/, where a 1 D d,q,t / mod d and t / mod d. Then C d,q + a C d,q, d + D d,q {a, a}, C d,q + a C d,q t, + t d + D d,q t {a}, C d,q t + a C d,q + t, d + D d,q t { a}, C d,q t + a C d,q t + t, + t d. Proof. + a C d,q C d,q D d,q {}+a D d,q {} D d,q + a D d,q + D d,q {a, a} a 1 D d,q + 1 a 1 D d,q + D d,q {a, a}, d + D d,q {a, a}.

13 T.W. Sze et al. / Informaton and Computaton The remanng parts are proved smlarly. The Gaussan perods η of order d,, 1,...,d 1, are defned as follows: η ξ c, c D d,q where ξ s a complex qth root of unty. The followng results are well known, but we nclude a proof for the sake of completeness. To smplfy the notatons, we use, j to denote, j d, whch s the cyclotomc number of order d. Lemma 6. For cyclotomc numbers and Gaussan perods of order d, we have the followng: A η 1. B η η +k h k, hη +h + lθ k, where { 1 f l s even and k, or l s odd and k d/2, θ k otherwse. C h k, h l θ k. { l D qk,h 2 + η η +k η +h f l s even, l 2 + η η +k η +h+d/2 f l s odd. Proof. A By defnton, η B By defnton, η η +k c D d,q c D d,q h c D d,q ξ c c Z q ω c+u u D d,q +k u D d,q +k ω c[1+uc 1 ] k, hη +h + lθ k, ξ c 1 where θ k s1f 1 D d,q k and otherwse, mplyng the condton on θ k as defned above. C The expresson h k, h equals the number of tmes an element n Dd,q k s followed by an element n some D d,q h.snced d,q k contans l elements and the only element not n any D d,q h s, t follows that the sum equals l except when 1 snd d,q k, n whch case the sum equals l 1.

14 16 T.W. Sze et al. / Informaton and Computaton D Let h h f l s even and h h + d/2fl s odd. Then, from A, B and C, we obtan η η +k η +h a a a a a a k, aη +a + lθ k η +h a k, a η +a η +h lθ k k, a η u η u+h a lθ k k, a k, a u u b h a,bη u+b + lθ h a lθ k h a,b 1 + dlθ h a lθ k b k, a l θ h a 1 + dlθ h a lθ k k, adl + 1θ h a l lθ k q k, aθ h a l θ k l lθ k a l 2 + q k, aθ h a a l 2 + qk,h whch completes the proof. The next lemma gves a very nce and perhaps surprsng formula for the summatons u u, u + k, whch turn out to be ndependent of the ndvdual cyclotomc numbers. It plays an mportant role n provng Theorem 4. Lemma 7. Let q 1 dl and let q be an odd prme. Then { l 1 f k, u, u + k l f k/. u Proof. Let k k f l s even and k k + d/2fl s odd. By defnton, and the prevous lemmas, t follows that:

15 T.W. Sze et al. / Informaton and Computaton q u, u + kl 2 d + η η +u η +u+k u u q 1l + q 1l + q 1l + η u η t η q 1l + t η h η +u η +u+k η t η t+k h k,hη t+h + lθ k k,h η t+h dlθ k t q 1l + 1 k,h 1 q 1θ k h q 1l + l θ k q 1θ k ql θ k. Dvdng both sdes by q and usng the defnton of θ k prove ths lemma. References [1] J. Berbrauer, Unversal hashng and geometrc codes, Desgns, Codes, and Cryptography [2] S. Chanson, C. Dng, A. Salomaa, Cartesan authentcaton codes from functons wth optmal nonlnearty, Theoretcal Computer Scence [3] T.W. Cusck, C. Dng, A. Renvall, n: Stream Cphers and Number Theory, North-Holland Mathematcal Lbrary, vol. 55, North-Holland/Elsever, Amsterdam, [4] Y. Desmedt, Y. Frankel, M. Yung, Mult-sender network securty: effcent authentcated multcast/feedback, n: Proceedngs of IEEE Infocom 92, 1992, pp [5] E.N. Glbert, F.J. MacWllams, N.J.A. Sloane, Codes whch detect decepton, Bell System Techn. Journal [6] T. Helleseth, T. Johansson, Unversal hash functons from exponental sums over fnte felds and Galos rngs, n: Advances n Cryptology Crypto 96, Lecture Notes n Computer Scence, vol. 119, Sprnger, New York, [7] K. Kurosawa, S. Obana, Characterzaton of k, n mult-recever authentcaton, n: Informaton Securty and Prvacy: Proceedngs of ACISP 97, Lecture Notes n Computer Scence, vol. 127, Sprnger, New York, 1997, pp [8] R.S. Rees, D.R. Stnson, Combnatoral characterzatons of authentcaton codes II, Desgn, Codes, and Cryptography [9] R. Safav-Nan, H. Wang, New results on mult-recever authentcaton codes, n: Advances n Cryptology: Proceedngs of Eurocrypt 98, Lecture Notes n Computer Scence, vol. 143, Sprnger, New York, 1998, pp [1] R. Safav-Nan, H. Wang, Mult-recever authentcaton codes: models, bounds, constructons, and extensons, Informaton and Computaton

16 18 T.W. Sze et al. / Informaton and Computaton [11] G.J. Smmons, Authentcaton theory/codng theor, n: Advances n Cryptology: Proceedngs of Crypto 84, Lecture Notes n Computer Scence, vol. 196, Sprnger, New York, 1985, pp [12] D.R. Stnson, Combnatoral characterzatons of authentcaton codes, Desgns, Codes, and Cryptography [13] C. Xng, H. Wang, K.Y. Lam, Constructon of authentcaton codes from algebrac curves over fnte felds, IEEE Transactons on Informaton Theory [14] M.N. Wegman, J.L. Carter, New hash functons and ther use n authentcaton and set equalty, Journal of Computer and System Scences

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Hash functions : MAC / HMAC

Hash functions : MAC / HMAC Hash functons : MAC / HMAC Outlne Message Authentcaton Codes Keyed hash famly Uncondtonally Secure MACs Ref: D Stnson: Cryprography Theory and Practce (3 rd ed), Chap 4. Unversal hash famly Notatons: X

More information

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

SL n (F ) Equals its Own Derived Group

SL n (F ) Equals its Own Derived Group Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu

More information

Differential Polynomials

Differential Polynomials JASS 07 - Polynomals: Ther Power and How to Use Them Dfferental Polynomals Stephan Rtscher March 18, 2007 Abstract Ths artcle gves an bref ntroducton nto dfferental polynomals, deals and manfolds and ther

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

On quasiperfect numbers

On quasiperfect numbers Notes on Number Theory and Dscrete Mathematcs Prnt ISSN 1310 5132, Onlne ISSN 2367 8275 Vol. 23, 2017, No. 3, 73 78 On quasperfect numbers V. Sva Rama Prasad 1 and C. Suntha 2 1 Nalla Malla Reddy Engneerng

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product 12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA Here s an outlne of what I dd: (1) categorcal defnton (2) constructon (3) lst of basc propertes (4) dstrbutve property (5) rght exactness (6) localzaton

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Introduction to Algorithms

Introduction to Algorithms Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

Provable Security Signatures

Provable Security Signatures Provable Securty Sgnatures UCL - Louvan-la-Neuve Wednesday, July 10th, 2002 LIENS-CNRS Ecole normale supéreure Summary Introducton Sgnature FD PSS Forkng Lemma Generc Model Concluson Provable Securty -

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

arxiv: v1 [math.co] 1 Mar 2014

arxiv: v1 [math.co] 1 Mar 2014 Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest

More information

Randić Energy and Randić Estrada Index of a Graph

Randić Energy and Randić Estrada Index of a Graph EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 5, No., 202, 88-96 ISSN 307-5543 www.ejpam.com SPECIAL ISSUE FOR THE INTERNATIONAL CONFERENCE ON APPLIED ANALYSIS AND ALGEBRA 29 JUNE -02JULY 20, ISTANBUL

More information

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41, The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson

More information

ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION

ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION Advanced Mathematcal Models & Applcatons Vol.3, No.3, 2018, pp.215-222 ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EUATION

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

The internal structure of natural numbers and one method for the definition of large prime numbers

The internal structure of natural numbers and one method for the definition of large prime numbers The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

Restricted divisor sums

Restricted divisor sums ACTA ARITHMETICA 02 2002) Restrcted dvsor sums by Kevn A Broughan Hamlton) Introducton There s a body of work n the lterature on varous restrcted sums of the number of dvsors of an nteger functon ncludng

More information

Complete subgraphs in multipartite graphs

Complete subgraphs in multipartite graphs Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G

More information

Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes

Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes Informaton-Theoretc Tmed-Release Securty: Key-Agreement, Encrypton, and Authentcaton Codes Yohe Watanabe, Takenobu Seto, Junj Shkata Graduate School of Envronment and Informaton Scences, Yokohama Natonal

More information

Random Partitions of Samples

Random Partitions of Samples Random Parttons of Samples Klaus Th. Hess Insttut für Mathematsche Stochastk Technsche Unverstät Dresden Abstract In the present paper we construct a decomposton of a sample nto a fnte number of subsamples

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Anti-van der Waerden numbers of 3-term arithmetic progressions.

Anti-van der Waerden numbers of 3-term arithmetic progressions. Ant-van der Waerden numbers of 3-term arthmetc progressons. Zhanar Berkkyzy, Alex Schulte, and Mchael Young Aprl 24, 2016 Abstract The ant-van der Waerden number, denoted by aw([n], k), s the smallest

More information

Bernoulli Numbers and Polynomials

Bernoulli Numbers and Polynomials Bernoull Numbers and Polynomals T. Muthukumar tmk@tk.ac.n 17 Jun 2014 The sum of frst n natural numbers 1, 2, 3,..., n s n n(n + 1 S 1 (n := m = = n2 2 2 + n 2. Ths formula can be derved by notng that

More information

Modelli Clamfim Equazione del Calore Lezione ottobre 2014

Modelli Clamfim Equazione del Calore Lezione ottobre 2014 CLAMFIM Bologna Modell 1 @ Clamfm Equazone del Calore Lezone 17 15 ottobre 2014 professor Danele Rtell danele.rtell@unbo.t 1/24? Convoluton The convoluton of two functons g(t) and f(t) s the functon (g

More information

Linear Approximation with Regularization and Moving Least Squares

Linear Approximation with Regularization and Moving Least Squares Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information

VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES

VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES BÂRZĂ, Slvu Faculty of Mathematcs-Informatcs Spru Haret Unversty barza_slvu@yahoo.com Abstract Ths paper wants to contnue

More information

A Simple Research of Divisor Graphs

A Simple Research of Divisor Graphs The 29th Workshop on Combnatoral Mathematcs and Computaton Theory A Smple Research o Dvsor Graphs Yu-png Tsao General Educaton Center Chna Unversty o Technology Tape Tawan yp-tsao@cuteedutw Tape Tawan

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

Applied Mathematics Letters

Applied Mathematics Letters Appled Matheatcs Letters 2 (2) 46 5 Contents lsts avalable at ScenceDrect Appled Matheatcs Letters journal hoepage: wwwelseverco/locate/al Calculaton of coeffcents of a cardnal B-splne Gradr V Mlovanovć

More information

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

18.781: Solution to Practice Questions for Final Exam

18.781: Solution to Practice Questions for Final Exam 18.781: Soluton to Practce Questons for Fnal Exam 1. Fnd three solutons n postve ntegers of x 6y = 1 by frst calculatng the contnued fracton expanson of 6. Soluton: We have 1 6=[, ] 6 6+ =[, ] 1 =[,, ]=[,,

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

On the average number of divisors of the sum of digits of squares

On the average number of divisors of the sum of digits of squares Notes on Number heory and Dscrete Mathematcs Prnt ISSN 30 532, Onlne ISSN 2367 8275 Vol. 24, 208, No. 2, 40 46 DOI: 0.7546/nntdm.208.24.2.40-46 On the average number of dvsors of the sum of dgts of squares

More information

The Pseudoblocks of Endomorphism Algebras

The Pseudoblocks of Endomorphism Algebras Internatonal Mathematcal Forum, 4, 009, no. 48, 363-368 The Pseudoblocks of Endomorphsm Algebras Ahmed A. Khammash Department of Mathematcal Scences, Umm Al-Qura Unversty P.O.Box 796, Makkah, Saud Araba

More information

REGULAR POSITIVE TERNARY QUADRATIC FORMS. 1. Introduction

REGULAR POSITIVE TERNARY QUADRATIC FORMS. 1. Introduction REGULAR POSITIVE TERNARY QUADRATIC FORMS BYEONG-KWEON OH Abstract. A postve defnte quadratc form f s sad to be regular f t globally represents all ntegers that are represented by the genus of f. In 997

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

TAIL BOUNDS FOR SUMS OF GEOMETRIC AND EXPONENTIAL VARIABLES

TAIL BOUNDS FOR SUMS OF GEOMETRIC AND EXPONENTIAL VARIABLES TAIL BOUNDS FOR SUMS OF GEOMETRIC AND EXPONENTIAL VARIABLES SVANTE JANSON Abstract. We gve explct bounds for the tal probabltes for sums of ndependent geometrc or exponental varables, possbly wth dfferent

More information

Ballot Paths Avoiding Depth Zero Patterns

Ballot Paths Avoiding Depth Zero Patterns Ballot Paths Avodng Depth Zero Patterns Henrch Nederhausen and Shaun Sullvan Florda Atlantc Unversty, Boca Raton, Florda nederha@fauedu, ssull21@fauedu 1 Introducton In a paper by Sapounaks, Tasoulas,

More information

Genericity of Critical Types

Genericity of Critical Types Genercty of Crtcal Types Y-Chun Chen Alfredo D Tllo Eduardo Fangold Syang Xong September 2008 Abstract Ely and Pesk 2008 offers an nsghtful characterzaton of crtcal types: a type s crtcal f and only f

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

A Note on Bound for Jensen-Shannon Divergence by Jeffreys

A Note on Bound for Jensen-Shannon Divergence by Jeffreys OPEN ACCESS Conference Proceedngs Paper Entropy www.scforum.net/conference/ecea- A Note on Bound for Jensen-Shannon Dvergence by Jeffreys Takuya Yamano, * Department of Mathematcs and Physcs, Faculty of

More information

Fixed points of IA-endomorphisms of a free metabelian Lie algebra

Fixed points of IA-endomorphisms of a free metabelian Lie algebra Proc. Indan Acad. Sc. (Math. Sc.) Vol. 121, No. 4, November 2011, pp. 405 416. c Indan Academy of Scences Fxed ponts of IA-endomorphsms of a free metabelan Le algebra NAIME EKICI 1 and DEMET PARLAK SÖNMEZ

More information

Section 8.3 Polar Form of Complex Numbers

Section 8.3 Polar Form of Complex Numbers 80 Chapter 8 Secton 8 Polar Form of Complex Numbers From prevous classes, you may have encountered magnary numbers the square roots of negatve numbers and, more generally, complex numbers whch are the

More information

Appendix for Causal Interaction in Factorial Experiments: Application to Conjoint Analysis

Appendix for Causal Interaction in Factorial Experiments: Application to Conjoint Analysis A Appendx for Causal Interacton n Factoral Experments: Applcaton to Conjont Analyss Mathematcal Appendx: Proofs of Theorems A. Lemmas Below, we descrbe all the lemmas, whch are used to prove the man theorems

More information

ELASTIC WAVE PROPAGATION IN A CONTINUOUS MEDIUM

ELASTIC WAVE PROPAGATION IN A CONTINUOUS MEDIUM ELASTIC WAVE PROPAGATION IN A CONTINUOUS MEDIUM An elastc wave s a deformaton of the body that travels throughout the body n all drectons. We can examne the deformaton over a perod of tme by fxng our look

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

where a is any ideal of R. Lemma 5.4. Let R be a ring. Then X = Spec R is a topological space Moreover the open sets

where a is any ideal of R. Lemma 5.4. Let R be a ring. Then X = Spec R is a topological space Moreover the open sets 5. Schemes To defne schemes, just as wth algebrac varetes, the dea s to frst defne what an affne scheme s, and then realse an arbtrary scheme, as somethng whch s locally an affne scheme. The defnton of

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

LECTURE 9 CANONICAL CORRELATION ANALYSIS

LECTURE 9 CANONICAL CORRELATION ANALYSIS LECURE 9 CANONICAL CORRELAION ANALYSIS Introducton he concept of canoncal correlaton arses when we want to quantfy the assocatons between two sets of varables. For example, suppose that the frst set of

More information

MATH 829: Introduction to Data Mining and Analysis The EM algorithm (part 2)

MATH 829: Introduction to Data Mining and Analysis The EM algorithm (part 2) 1/16 MATH 829: Introducton to Data Mnng and Analyss The EM algorthm (part 2) Domnque Gullot Departments of Mathematcal Scences Unversty of Delaware Aprl 20, 2016 Recall 2/16 We are gven ndependent observatons

More information

Statistical Inference. 2.3 Summary Statistics Measures of Center and Spread. parameters ( population characteristics )

Statistical Inference. 2.3 Summary Statistics Measures of Center and Spread. parameters ( population characteristics ) Ismor Fscher, 8//008 Stat 54 / -8.3 Summary Statstcs Measures of Center and Spread Dstrbuton of dscrete contnuous POPULATION Random Varable, numercal True center =??? True spread =???? parameters ( populaton

More information

An efficient algorithm for multivariate Maclaurin Newton transformation

An efficient algorithm for multivariate Maclaurin Newton transformation Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Character Degrees of Extensions of PSL 2 (q) and SL 2 (q)

Character Degrees of Extensions of PSL 2 (q) and SL 2 (q) Character Degrees of Extensons of PSL (q) and SL (q) Donald L. Whte Department of Mathematcal Scences Kent State Unversty, Kent, Oho 444 E-mal: whte@math.kent.edu July 7, 01 Abstract Denote by S the projectve

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Chowla s Problem on the Non-Vanishing of Certain Infinite Series and Related Questions

Chowla s Problem on the Non-Vanishing of Certain Infinite Series and Related Questions Proc. Int. Conf. Number Theory and Dscrete Geometry No. 4, 2007, pp. 7 79. Chowla s Problem on the Non-Vanshng of Certan Infnte Seres and Related Questons N. Saradha School of Mathematcs, Tata Insttute

More information

A New Refinement of Jacobi Method for Solution of Linear System Equations AX=b

A New Refinement of Jacobi Method for Solution of Linear System Equations AX=b Int J Contemp Math Scences, Vol 3, 28, no 17, 819-827 A New Refnement of Jacob Method for Soluton of Lnear System Equatons AX=b F Naem Dafchah Department of Mathematcs, Faculty of Scences Unversty of Gulan,

More information

Week 2. This week, we covered operations on sets and cardinality.

Week 2. This week, we covered operations on sets and cardinality. Week 2 Ths week, we covered operatons on sets and cardnalty. Defnton 0.1 (Correspondence). A correspondence between two sets A and B s a set S contaned n A B = {(a, b) a A, b B}. A correspondence from

More information

Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-bit Block and n-bit Key

Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-bit Block and n-bit Key Cryptanalyss of Some Double-Block-Length Hash Modes of Block Cphers wth n-bt Block and n-bt Key Deukjo Hong and Daesung Kwon Abstract In ths paper, we make attacks on DBL (Double-Block-Length) hash modes

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

where a is any ideal of R. Lemma Let R be a ring. Then X = Spec R is a topological space. Moreover the open sets

where a is any ideal of R. Lemma Let R be a ring. Then X = Spec R is a topological space. Moreover the open sets 11. Schemes To defne schemes, just as wth algebrac varetes, the dea s to frst defne what an affne scheme s, and then realse an arbtrary scheme, as somethng whch s locally an affne scheme. The defnton of

More information

Canonical transformations

Canonical transformations Canoncal transformatons November 23, 2014 Recall that we have defned a symplectc transformaton to be any lnear transformaton M A B leavng the symplectc form nvarant, Ω AB M A CM B DΩ CD Coordnate transformatons,

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

Convexity preserving interpolation by splines of arbitrary degree

Convexity preserving interpolation by splines of arbitrary degree Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete

More information