reader is comfortable with the meaning of expressions such as # g, f (g) >, and their
|
|
- Pamela May
- 5 years ago
- Views:
Transcription
1 The Abelian Hidden Subgroup Problem Stephen McAdam Department of Mathematics University of Texas at Austin Introduction: The general Hidden Subgroup Problem is as follos. Let G be a knon finite group. Let H be an unknon subgroup of G. Suppose there is a set S and a function f : G S such that for g, k ε G, f(g) = f(k) if and only if g and k are in the same coset of H. (We say f separates cosets.) The question is to find a method of using f to determining hat H is, significantly faster than naïve methods. The most naïve method is to compare every f(g) to f(identity). Then g ill be in H exactly hen equality holds. Of course, standard facts about group theory, such as LaGrange s theorem, can clearly be used to speed that up somehat, but not really significantly. These notes outline ho quantum computations can be used to attack the problem in the case that G is Abelian. Later, e ill discuss Kiteav s reduction of the discrete log problem to the Abelian hidden subgroup problem. We ill also discuss the oft made statement that the factorization problem is a special case of the Abelian hidden subgroup problem, seeing that it is true if e modify our definition slightly. Of the fe quantum algorithm s I have learned, the one discussed here is the easiest, and so ould be a good place for a beginner to start. Hoever, for a true beginner, I ould strongly recommend first reading section 2 of [M], hich gives a general introduction to the physics and notation relevant to quantum computing. If one follos that by then reading this, and then reading the rest of [M], and finally reading [M3] (the most elaborate quantum algorithm I kno), the reader ill have learned everything I kno about the subject (and ill no doubt realize ho little that is). These notes are not complete. They present the parts that I find prettiest, namely, a revie of group characters, the group Fourier transform, and the actual quantum computation. They do not discuss the efficiency of the method. These notes are adapted from [L], hich discusses the details missing here, and also discusses hat progress has been made on the non-abelian case. Our computations ill on the complex inner-product space having the set of symbols { g, s> g ε G, s ε S} as an orthonormal bases. The inner product ill be the standard one. Recall, a unit vector in such an inner product space is called a state, and (mathematical) states accurately represent actual (physical) states of a collection of qubits. (We ill assume the reader is comfortable ith the meaning of expressions such as # g, f (g) >, and their relation to physical reality.)
2 BRIEF OUTLINE (details later): Let G be Abelian. Group character theory defines a subgroup H " that is determined by H. If H is knon, H " can be found. Of course, e do not kno H. Hoever, the quantum computations e ill present allo us to find H " directly. Knoing H ", e can then find H " ". We ill prove that H " " = H, and so be done. Well, actually, it is a bit more complicated. Each run of the computer ill be guarantied to produce an element of H ", all possibilities being equally likely to appear. We must collect a set of such elements, and hope that they constitute a generating set for H ". If so, using them, e can find H. (See [L] for discussions of the efficiency of finding a generating set for H ", and a method of using such to find H.) Of course, e need matters to be in a computational form. For instance, e ill assume G = Z N Z N2 Z N (recalling that any finite Abelian group is isomorphic to such). That allos us to use a register in the computer to input an element g of G, using the standard base 2 method. (Example: If (3 mod 5, mod 4) ε Z 5 Z 4, that element could be expressed as (0,,, 0 ), the first 0 representing 3, and the last 0 representing, here the first part has three places, since > 2 2. What this does is encode Z 5 Z 4 as a subset of Z ) We ill also assume a second register of the computer can be used to deal ith f(g), hich means e need to be able to (efficiently) identify S ith a subset of Z 2 s, for some s. (If, say s = 3, and G = Z 5 Z 4, e ould need qubits in our computer.) Finally, e must assume the function f can be efficiently computed. Our computer ill have to registers, the first dealing ith the g ε G, the second dealing ith the s ε S. Our computer program ill involve three steps. Near the end of section 2 of [M], it is shon that there is a quantum gate that converts # g,0 > to # g, f (g) >. Therefore, that conversion is an alloable quantum calculation, and is the middle one of our three steps. It is the only one of the three that deals ith both registers simultaneously. The first and last steps in our program only deal ith the first register. Actually, both those steps are the same, namely, applying the group Fourier transform. In order to introduce that transform, e must first remind the reader of the theory of (irreducible) characters of a finite Abelian group. (The knoledgeable reader can skip ahead.) Definition: An irreducible character of the Abelian group G is a homomorphism from G to the multiplicative group of nonzero complex numbers. (Whenever e use the ord character, it ill be understood to refer to an irreducible character of G.) G ill denote the set of all such characters. G is easily made into a group. The identity is the character that sends each element of G to. The inverse of χ sends g to the inverse of χ(g). The operation is function multiplication. 2
3 Since G is a group under addition, if χ is a character and g, h ε G, then χ(g + h) = χ(g)χ(h). Thus, for n an integer, e have χ(ng) = (χ(g)) n. If it happens that ng = 0, then = χ(0) = χ(ng) = (χ(g)) n, and so χ(g) is an n-th root of unity. (In particular, χ(g) is an n-th root of unity for n the order of g.) Notation: We have G = Z N Z N2 Z N. For a = (a, a 2,, a ) and b = (b, b 2, b ) in G (and treating the a j and b j as integers beteen 0 and N j ), define χ a (b) to be " exp(2πia j b j /N j ). j= (A) Lemma: The map a χ a is a group isomorphism beteen G and G. Proof: It is straightforard to see that χ a is a character. No let χ be any character. For j, let B j ε G be the -tuple consisting entirely of zeros except for the j-th position in hich there is a. No N j B j = 0, and so χ(b j ), being an N j -th root of unity, has the form exp(2πia j /N j ) for some integer a j beteen 0 and N j. Since (b, b 2,, b ) = b B + b 2 B b B W, e easily see that χ = χ a, for a = (a, a 2,, a ). Thus G = {χ a a ε G}, and so our map is onto. Furthermore, it is easily verified that it is a group homomorphism. No if χ a is the identity of G, then χ a (B j ) =. As it also equals exp(2πia j /N j ), e must have N j a j, so that a j is the zero of Z Nj. As that holds for j, e must have a = 0 in G. We therefore see that the kernel of our map is {0}, and e are done. (B) Lemma: χ a (b) = χ b (a). Also, χ -a (b) = " a (b) (ith the overbar denoting complex conjugation). Proof: The first statement is immediate from the definition. As for the second, χ -a (b) = " exp(-2πia j b j /N j ) = # exp(2"ia j b j /N j ) = " a (b). j= j= (C) Lemma: Let a,c ε G. Then $ " a (b)" c (b) equals 0 unless a = c, in hich case it equals G. b#g Proof: $ " a (b)" c (b) = # ((" exp(2πia j b j /N j ))( exp(2"ic j b j /N j b#g b"g j= j= # )) = # ((" exp(2πia j b j /N j ))( " exp(-2πic j b j /N j )). Letting d j = a j c j, that becomes b"g j= j= 3
4 # (( b"g " exp(2πid j /N j )) b j) = j= # b "Z N # b 2 "Z N2 # (( b "Z N j= " exp(2πid j /N j )) b j) = " ( j= # (exp(2πid j /N j ) b j). If N j divides d j, then b j "Z N j # (exp(2πid j /N j ) b j = N j. Otherise, it is a b j "Z N j geometric series summing to " (exp(2#id j /N j ))N j " exp(2#id j /N j ), hich equals 0, since the numerator is 0 but the denominator is not. Therefore, $ " a (b)" c (b) = 0 unless N j divides d j for j, in hich case it equals d j for j, exactly hen a = c. b#g " N j = G. Hoever, since d j = a j c j is in Z N j, e see that N j divides j= Remark: (C) is called the first orthogonality relation, and holds for the irreducible characters of non-abelian groups as ell. Since the definition of an irreducible character is harder for the non-abelian case, the proof is somehat harder. See [I, Chapter 2]. (D) Corollary: $ " a (b) equals 0 unless a = 0, in hich case it equals G. b#g Proof: This is just the special case of (C) in hich c = 0 (since χ 0 is identically ). We previously mentioned that the first and last steps of our program ill be an application of the group Fourier transform to the first register (that register being used to deal ith states hich are linear combinations of basic states k> for k ε G). Notation: Let H(G) be the complex inner-product space having the set of symbols { k> k ε G} as an orthonormal bases. Definition: The Fourier transform of G is the operator on H(G) hich takes the basis element k> to $ " g (k) g >. g#g 4
5 (E) Lemma: F is a unitary operator (and so applying it constitutes an alloable quantum computation). Proof: We must sho that {F( k>) k ε G} is an orthonormal bases of H(G). For k, h ε G, the inner product of f( h>) and f( k>) is $ " g (k)" g (h) = (by (B)) $ " k (g)" h (g). g#g By (C), that is 0 unless h = k, in hich case it is. The lemma follos (linear independence using a standard argument). g#g The next lemma is not strictly required, but is of interest. (F) Lemma: For k ε G, F(F( k>)) = -k>. Proof: F(F( k>)) = $ " g (k)f( g > ) = g#g $ " g (k)[ g#g %" #h (g) #h > ] = #h$g %[%" g (k)" #h (g))] #h > = (using (B)) #h$g g$g %[%" k (g)" h (g)] #h > = -k> (using (C)). #h$g g$g Our brief outline said that e ill find H by first finding H ". We revie that subgroup. Definition: Let H be a subgroup of G. Then H " = {g ε G χ g (h) = for all h ε H} = Ker χ h over all h ε H. (The last equality, by (B), makes it clear that H " is a subgroup of G). (G) Lemma: H " = G/H. Proof: We ill sho more than hat is stated, but e only need the statement. If g ε H ", then clearly H Ker χ g. Therefore, the map γ g defined on G/H by γ g (a + H) = χ g (a) is ell defined. No γ g is easily seen to be a homomorphism into the multiplicative group of nonzero complex numbers. That is, it is a character of G/H. Therefore, the map Γ sending g ε H " to γ g is a map from H " to G /H. 5
6 We claim Γ is a homomorphism. For g, k ε H ", Γ(g + k) = γ g+k sends a + H to χ g+k (a) = χ g (a)χ k (a), and so does Γ(g)Γ(k). We claim that Γ is one-to-one. Suppose g ε H " is in the kernel of Γ. Then for all a + H, e have χ g (a) = γ g (a + H) =. This is true for all a ε G, and so χ g = χ 0. By (A), g = 0. We claim that Γ is onto. Pick some γ ε G /H. Define χ on G by saying χ(a) = γ(a + H). Clearly χ is a character of G, and so χ = χ g for some g ε G. Hoever, clearly H Ker χ, and so g ε H ". Thus γ = γ g = Γ(g). We no see that Γ is an isomorphism. In particular, H " = G /H. Hoever, by (A), e already kno G /H = G/H, and so e are done. Notation: For H a subgroup of G, let H> = # h > (hich is a state). (H) Lemma: If H is a subgroup of G, then F( H>) = H " >. Proof: F( H>) = # F( h > ) = # [ $ " t (h) t > ] = t#g t"g # ( " t (h) h#h $ ) t>. No χ t is a character of G. Hoever, hen restricted to H, it is obviously also a character of H. Therefore, by (D), $ " t (h) is 0 unless χ t restricted to H is identically, in hich case that sum equals H. Hoever, χ t restricted to H is identically exactly hen t is in H. Therefore, e have h#h F( H>) = $ H t> = (using G) t"h # H " $ t > = H " >. t"h # We give to proofs of the next corollary. (I) Corollary: If H is a subgroup of G, then H " " = H. Proof #: The definition of H " shos H H " ". By to applications of (G), e have H " " = G / H " = G /( G / H ) = H. Proof #2: By (H), F(F( H>)) = H " " > = H "" $ k >. Hoever, by (F), e also have k"h ## 6
7 F(F(H)) = # F(F( h > )) = $ "h > = h#h # h >. Since all the k> and h> are part of the same bases of our vector space H(G), the equality of these to linear combinations implies they are identical, and e are done. Notation: For t ε G, let τ t be the operator hich sends the basis element g> to t+g>. (Clearly that operator permutes the canonical orthonormal basis elements of H(G), and so is unitary.) Also, let φ t be the operator hich multiplies the basis element g> of H(G) by χ g (t). (As the norm of χ g (t) is, this operator is also unitary.) Finally, let T be a transversal for the subgroup H of G (i.e., T is a set of coset representatives). (J) Lemma: For t ε G, e have Fτ t = φ t F. Proof: One can easily verify that both sides send the basis vector g> of H(G) to $ " k (t + g) k >, (using that χ k (t) χ k (g) = χ k (t+g)). k#g We are no ready to beginning shoing ho to program the computer to produce equally likely random elements of H ". (K) The Program: We begin ith the computer in the state 0,0>. We then apply F to the first register, hich is easily seen to result in the state # g,0 >. As explained earlier, there is a quantum gate that converts the above state to the state # g, f (g) >. Since f separates cosets, e kno that for t ε T and h ε H, f(t + h) = f(t). Therefore, (using that G = T H ) our previous state can be ritten as # ( # t + h >) f (t) > = t"t # ( # $ ( h >)) f (t) > = t t"t # (τ t ( t"t # h > )) f(t)> = # (τ t ( H>)) f(t)>. We next apply F to t"t 7
8 the first register. Using (J), e see the result is # (φ t F( H>)) f(t)>, hich by (H) equals t"t # (φ t ( H " >)) f(t)> = # (φ t ( $ k > )) f(t)>. Using the definition of φ t and t"t t"t H " the fact that (G) shos H " = T, this last state equals k#h " # ( %" k (t) k > ) f(t)> = t"t %" k (t) k, f (t) >. At this point, let us mention that since f separates cosets, f takes t#t,k#h $ distinct values on distinct members of T. Thus, the various k, f(t)> are H " T = T 2 distinct states. Since the norm of χ k (t) is, if %" k (t) k, f (t) > is read, all of the states t#t,k#h $ k, f(t)> (ith k ε H ", t ε T) have an equally likely chance (namely / T 2 ) of appearing. Also, any such k appears in exactly T such states, and so each k ε H " has a chance of exactly / T of being read from the first register. Therefore, e produce a random element of H ", all equally likely. k#h $ Remark: There is a subtlety in the above mathematics that might be overlooked. Let us illuminate it. At the second step, e ent from the state # g,0 > to the state # g, f (g) >. Superficially, that appears to leave the first register unaffected. Hoever, the step actually has a profound affect on the first register, since it entangles it ith the second register. If one reads the second register of # g,0 >, one ill assuredly get 0, and the first register ill remain in the state # g >. Hoever, if one reads the second register of # g, f (g) >, one ill get some choice of f(g). Suppose g is in the coset t + H (ith t ε T). Then by entanglement, the first register ill be in the state # g >. Our process had three steps, the first and last being the application of F to the first register. We are discussing the middle step. Suppose it as left out. Then e ould merely start ith 0, 0>, and apply F tice to the first register. By (F), e ould end up back at 0, 0>. It is the middle step, the entangling step, hich orks the magic. (Entanglement is thoroughly examined in [M4], and perhaps too thoroughly in [M2].) g"t + H 8
9 The rest of the procedure consists of repeating (K) many times, each time getting a random element of H ". No [L, Theorem D, appendix D] states that if n + " log K #elements are chosen at random from a finite group K, then the probability they generate K exceeds /2 n. We ish to apply that to K = H ". Hoever, not knoing H ", e instead use n + " log #. For adequately large n, e ill almost certainly have a generating set for H ". Next, [L, p. 23] shos ho to use that generating set to successively find random elements of H. Again, e take n + log " # of them, since e do not kno H. DISCRETE LOG PROBLEM: Let p be prime, and let b be a primitive root for p. Given x, it is easy to find c such that c b x mod p. Hoever, given c it is very hard to find x ith b x c mod p. That is called the discrete log problem. The x b x mod p function is an example of a one-ay function, and such functions are prime candidates for use in cryptography. Indeed, El Gamel encryption makes use of the difficulty of finding x given c. In [S], along ith his famous quantum factorization algorithm, Shor gives a lesser mentioned but equally interesting quantum algorithm for solving the discrete log problem. (It is also exhibited in [M].) Here, e give a solution to the discrete log problem due to Kiteav [K]. It is accomplished by converting the discrete log problem into an Abelian hidden subgroup problem. (L) Let b be a primitive root of the prime p and suppose p does not divide c. We ish to find x ith b x c mod p. Let G = Z p- " Z p-. Let f be the function from G to S = U p, the multiplicative group of units mod p, defined by f(u, v) = b u c v mod p. No f is easily seen to be a group homomorphism from G to U p, and its kernel is H = { (u, v ) f(u, v) = mod p}. One easily sees that f separates cosets of H, the hidden subgroup e seek. Suppose an element (u, v) of H has been found. Then since b x " c mod p, e have " b u c v " b u+vx mod p. As b is a primitive root for p, e have u + vx " 0 mod p -. For each choice of v in {0,, 2,, p 2}, there is one choice of u making that congruence true. Many of the v in that set are relatively prime to p. Assuming that is so for our v, e see x " -uv - mod p, and e are done. (Note that e did not need to find a generating set for H. Finding v - from v is easy via the Euclidean algorithm.) Remark: Applying the Abelian hidden subgroup algorithm to Z p- " Z p- ould require using the Fourier transform of that group. I do not kno ho efficient that is, nor am I interested enough to try to learn. A more interested reader can find some discussion of such matters in [L]. FACTORING: One often sees claims that factorization can be reduced to the Abelian hidden subgroup problem. That appears to be correct under a eaker version of the hidden subgroup problem, as e no discuss. Suppose e ish to factor n (not a prime poer). An incorrect approach ould be to say that e can rite n = kh ith GCD(k, h) =. Thus Z n Z k Z h, and e ish to find the hidden subgroup Z k 0 of Z n. The problem here is that e do not have any coset separating f. Without the additional information given by f, our task is exactly as hard as finding a factor of n. 9
10 We must find an approach that incorporates some useful f. Pick a random b ith < b < n, and use the Euclidean algorithm to quickly find GCD(b, n). If the GCD exceeds, it is a non-trivial factor of n. The more likely case is that GCD equals. If so, let r (unknon) be the order of b mod n in the group of units of Z n. Since r divides φ(n), let H = {0, r, 2r,, (φ(n)/r )r} Z φ(n) = G. H is our hidden subgroup. Is there an f? Yes! For x Z φ(n), let f(x) = b x mod n. We then have f(x) = f(y) IFF b x b y mod n IFF r x y IFF x and y are in the same coset of H. Suppose e could find H. Actually, e do not have to find all of H; a fe random elements of H ill probably suffice to factor n, as e no explain. First of all, e hope that r is even. If the process e are about to explain fails to factor n ithin a fairly small number of tries, e can guess that for the b e selected, r is probably odd. In that case, e ill pick a ne b, and try again. (Exercise: Sho that at least half of all b have an even r. Consider n as a product of prime poers, and use that prime poers have primitive roots.) Assuming r is even, suppose e have managed to find some h in H. Then h = rk ith 0 k φ(n)/r. Claim: There is a good chance that GCD(b h/2, n) is a non-trivial factor of n. If k is even, then r h/2, and e easily see that GCD equals n, and e fail. Hoever, if k is odd, then r does not divide h/2, and so e kno that b h/2 is not congruent to mod n. Thus GCD(b h/2, n) < n. Therefore, e must sho there is a good chance that GCD is bigger than. No b h/2 = (b r/2 ) k has b r/2 as a factor. Thus, it ill suffice to sho there is a good chance that GCD(b r/2, n) >. In fact, the ell-knon exponential factorization method (see [M, section ] or many textbooks) shos the chance of that last GCD being greater than is at least ½. Within a fe tries for b and h, e should be able to factor n. Hoever, e cannot use the Abelian hidden subgroup algorithm described above to find elements of H. That algorithm assumes that G is knon. Our G = Z φ(n) is not knon. We do not kno φ(n). What e have is a variant of the hidden subgroup problem (as defined at the start of this paper). We have an unknon G, and unknon H, and a knon f. EXAMPLE: Suppose e do not kno the factorization of 2, but are told by an oracle that φ(2) = 2. Since GCD(2, 2) =, e try letting b = 2. We kno that the order of 2 mod 2 (= r, unknon) ill divide 2, and so the multiples of r (taken mod 2) ill constitute a hidden subgroup H of Z 2. We also kno the function f(x) = 2 x mod 2 is a coset separating function for H. (Note that f(5) =, since 2 5 mod 2.) Thus, the algorithm given above can be used to find H. Notice that at the end of the second step of the algorithm (the entangling step), the computer ill be in the state ( 0, > +, 2> + 2, 4> + 3, 8> + 4, 6> + 5, > 2 + 6, > + 7, 2> + 8, 4> + 9, 8> + 0, 6> +, >). (Notice the to cycles of second entries, each of length 6.) With a small amount of luck, the algorithm ould soon tell us that H = {0, 6}, from hich e ould learn that the order of r is 6. No using the exponential factorization 0
11 technique, e cross our fingers and find GCD(2 6/2, 2). It is 7, and so e have found a factor of 2. REMARK: In the special case here n = pq is the product of to distinct primes, since n - ϕ(n) + = p + q, if e kno ϕ(n), e ould have pq and p + q, and so could easily factor n. But hat if the oracle is closed for remodeling, and e do not kno hat φ(2) equals? Shor s famous algorithm ([S], [M]) deals ith that problem. Since 2 9 = 52 is the first poer of 2 larger than 2 2, it orks ith Z 52. (That modulus is manageably small, yet big enough to give a high probability of success to Shor s method.) We also use the function f(x) = 2 x mod 2, but no for all x in Z 52. Hoever, f is not a coset separating function. We sa above that f gives cycles of length 6, and so ere it a coset separating function, there ould have to be 6 cosets, so that the subgroup they came from ould have to have size 52/6 = /6. But that is not an integer. Instead, one step of Shor s algorithm has the computer in the state (/ 52 )[ 0, > +, 2> + 2, 4> + 3, 8> + 4, 6> + 5, > + 6, > + 7, 2> + 8, 4> + 9, 8> + 0, 6> +, > + 2, > + 3, 2> + 4, 4> + 5, 8> + 6, 6> + 7, > , > + 505, 2> + 506, 4> + 507, 8> + 508, 6> + 509, > + 50, > + 5, 2>]. (There are 85 complete cycles, and 2/6 of another cycle.) Suppose e no read the second register, and get (for example) 2. That means the first register goes into the state (/ 86 )[ > + 7> + 3> > + 5>] = 84 (/ 86 )" 6i + >. (We hope to find the 6 = r.) Shor then applies a Fourier transform, i= 0 and ends ith a state having the property that hen read, has a good chance of producing a number t such that t/52 is a good approximation to a number of the form k/r. The theory of continued fractions allos us to find r, (ith luck, the right r). We apply exponential factorization ith r. If e fail to factor 2, e kno e got the rong r. With luck, a fe tries gives us the right r, namely 6. Remark: It has been said that Shor s algorithm is a special case of the hidden subgroup problem. Although there are similarities, perhaps it ould be better to say both are examples of hidden cycle problems. In [K], Kiteav introduces a ne idea, hich gives an alternate factorization algorithm, ith some similarities to Shor s. (See [M3].) Hoever, there are aspects of [K] that I do not yet understand.
12 REFERENCES [I] I. M. Isaacs, Character theory of finite groups, Dover Publications, inc. [K] A. Y. Kiteav, Quantum measurements and the Abelian stabilizer problem, arxiv:quant-ph/95026v, November 20, 995 [L] C. Lomont, The hidden subgroup problem revie and open problems, raxiv:quant-ph/04037v, November 4, 2004 [M] S. McAdam, Shor s algorithms,.ma.utexas.edu/users/mcadam [M2] S. McAdam, Entanglement,.ma.utexas.edu/users/mcadam [M3] S. McAdam, Eigenvalues and Kiteav s factoring algorithm,.ma.utexas.edu/users/mcadam [M4] S. McAdam, Unkonoable Matters, American Mathematical Monthly, 9 (4) 202, [S] P. Shor, Polynomial time algorithms for prime factorization and discrete logarithms on a quantum computer, available at xxx.lanl.gov/abs/quant-ph/
An Analog Analogue of a Digital Quantum Computation
An Analog Analogue of a Digital Quantum Computation arxiv:quant-ph/9612026v1 6 Dec 1996 Edard Farhi Center for Theoretical Physics Massachusetts Institute of Technology Cambridge, MA 02139 Sam Gutmann
More informationQuantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem
Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted
More informationMathematics for Cryptography
Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1
More informationGroups and Symmetries
Groups and Symmetries Definition: Symmetry A symmetry of a shape is a rigid motion that takes vertices to vertices, edges to edges. Note: A rigid motion preserves angles and distances. Definition: Group
More informationShor s Prime Factorization Algorithm
Shor s Prime Factorization Algorithm Bay Area Quantum Computing Meetup - 08/17/2017 Harley Patton Outline Why is factorization important? Shor s Algorithm Reduction to Order Finding Order Finding Algorithm
More informationCHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum
CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction
More informationCYCLICITY OF (Z/(p))
CYCLICITY OF (Z/(p)) KEITH CONRAD 1. Introduction For each prime p, the group (Z/(p)) is cyclic. We will give seven proofs of this fundamental result. A common feature of the proofs that (Z/(p)) is cyclic
More informationCONSEQUENCES OF THE SYLOW THEOREMS
CONSEQUENCES OF THE SYLOW THEOREMS KEITH CONRAD For a group theorist, Sylow s Theorem is such a basic tool, and so fundamental, that it is used almost without thinking, like breathing. Geoff Robinson 1.
More informationA Generalization of a result of Catlin: 2-factors in line graphs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(2) (2018), Pages 164 184 A Generalization of a result of Catlin: 2-factors in line graphs Ronald J. Gould Emory University Atlanta, Georgia U.S.A. rg@mathcs.emory.edu
More informationABSTRACT ALGEBRA 1, LECTURES NOTES 5: SUBGROUPS, CONJUGACY, NORMALITY, QUOTIENT GROUPS, AND EXTENSIONS.
ABSTRACT ALGEBRA 1, LECTURES NOTES 5: SUBGROUPS, CONJUGACY, NORMALITY, QUOTIENT GROUPS, AND EXTENSIONS. ANDREW SALCH 1. Subgroups, conjugacy, normality. I think you already know what a subgroup is: Definition
More informationShor Factorization Algorithm
qitd52 Shor Factorization Algorithm Robert B. Griffiths Version of 7 March 202 References: Mermin = N. D. Mermin, Quantum Computer Science (Cambridge University Press, 2007), Ch. 3 QCQI = M. A. Nielsen
More informationDirichlet s Theorem. Martin Orr. August 21, The aim of this article is to prove Dirichlet s theorem on primes in arithmetic progressions:
Dirichlet s Theorem Martin Orr August 1, 009 1 Introduction The aim of this article is to prove Dirichlet s theorem on primes in arithmetic progressions: Theorem 1.1. If m, a N are coprime, then there
More informationORDERS OF ELEMENTS IN A GROUP
ORDERS OF ELEMENTS IN A GROUP KEITH CONRAD 1. Introduction Let G be a group and g G. We say g has finite order if g n = e for some positive integer n. For example, 1 and i have finite order in C, since
More informationChapter 4. Characters and Gauss sums. 4.1 Characters on finite abelian groups
Chapter 4 Characters and Gauss sums 4.1 Characters on finite abelian groups In what follows, abelian groups are multiplicatively written, and the unit element of an abelian group A is denoted by 1 or 1
More informationLECTURE NOTES IN CRYPTOGRAPHY
1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic
More informationDefinitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations
Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of
More informationName: Solutions Final Exam
Instructions. Answer each of the questions on your own paper. Be sure to show your work so that partial credit can be adequately assessed. Put your name on each page of your paper. 1. [10 Points] All of
More informationNOTES ON FINITE FIELDS
NOTES ON FINITE FIELDS AARON LANDESMAN CONTENTS 1. Introduction to finite fields 2 2. Definition and constructions of fields 3 2.1. The definition of a field 3 2.2. Constructing field extensions by adjoining
More informationRepresentation Theory. Ricky Roy Math 434 University of Puget Sound
Representation Theory Ricky Roy Math 434 University of Puget Sound May 2, 2010 Introduction In our study of group theory, we set out to classify all distinct groups of a given order up to isomorphism.
More informationy(x) = x w + ε(x), (1)
Linear regression We are ready to consider our first machine-learning problem: linear regression. Suppose that e are interested in the values of a function y(x): R d R, here x is a d-dimensional vector-valued
More informationALGEBRA I (LECTURE NOTES 2017/2018) LECTURE 9 - CYCLIC GROUPS AND EULER S FUNCTION
ALGEBRA I (LECTURE NOTES 2017/2018) LECTURE 9 - CYCLIC GROUPS AND EULER S FUNCTION PAVEL RŮŽIČKA 9.1. Congruence modulo n. Let us have a closer look at a particular example of a congruence relation on
More informationMATH 326: RINGS AND MODULES STEFAN GILLE
MATH 326: RINGS AND MODULES STEFAN GILLE 1 2 STEFAN GILLE 1. Rings We recall first the definition of a group. 1.1. Definition. Let G be a non empty set. The set G is called a group if there is a map called
More informationTeddy Einstein Math 4320
Teddy Einstein Math 4320 HW4 Solutions Problem 1: 2.92 An automorphism of a group G is an isomorphism G G. i. Prove that Aut G is a group under composition. Proof. Let f, g Aut G. Then f g is a bijective
More informationPRACTICE FINAL MATH , MIT, SPRING 13. You have three hours. This test is closed book, closed notes, no calculators.
PRACTICE FINAL MATH 18.703, MIT, SPRING 13 You have three hours. This test is closed book, closed notes, no calculators. There are 11 problems, and the total number of points is 180. Show all your work.
More informationMa/CS 6a Class 4: Primality Testing
Ma/CS 6a Class 4: Primality Testing By Adam Sheffer Reminder: Euler s Totient Function Euler s totient φ(n) is defined as follows: Given n N, then φ n = x 1 x < n and GCD x, n = 1. In more words: φ n is
More informationSome practice problems for midterm 2
Some practice problems for midterm 2 Kiumars Kaveh November 14, 2011 Problem: Let Z = {a G ax = xa, x G} be the center of a group G. Prove that Z is a normal subgroup of G. Solution: First we prove Z is
More informationBloom Filters and Locality-Sensitive Hashing
Randomized Algorithms, Summer 2016 Bloom Filters and Locality-Sensitive Hashing Instructor: Thomas Kesselheim and Kurt Mehlhorn 1 Notation Lecture 4 (6 pages) When e talk about the probability of an event,
More informationSolutions to odd-numbered exercises Peter J. Cameron, Introduction to Algebra, Chapter 3
Solutions to odd-numbered exercises Peter J. Cameron, Introduction to Algebra, Chapter 3 3. (a) Yes; (b) No; (c) No; (d) No; (e) Yes; (f) Yes; (g) Yes; (h) No; (i) Yes. Comments: (a) is the additive group
More informationTHE JOHNS HOPKINS UNIVERSITY Faculty of Arts and Sciences FINAL EXAM - FALL SESSION ADVANCED ALGEBRA I.
THE JOHNS HOPKINS UNIVERSITY Faculty of Arts and Sciences FINAL EXAM - FALL SESSION 2006 110.401 - ADVANCED ALGEBRA I. Examiner: Professor C. Consani Duration: take home final. No calculators allowed.
More informationQIP Note: On the Quantum Fourier Transform and Applications
QIP ote: On the Quantum Fourier Transform and Applications Ivan Damgård 1 Introduction This note introduces Fourier transforms over finite Abelian groups, and shows how this can be used to find the period
More informationMath 306 Topics in Algebra, Spring 2013 Homework 7 Solutions
Math 306 Topics in Algebra, Spring 203 Homework 7 Solutions () (5 pts) Let G be a finite group. Show that the function defines an inner product on C[G]. We have Also Lastly, we have C[G] C[G] C c f + c
More informationPh 219b/CS 219b. Exercises Due: Wednesday 22 February 2006
1 Ph 219b/CS 219b Exercises Due: Wednesday 22 February 2006 6.1 Estimating the trace of a unitary matrix Recall that using an oracle that applies the conditional unitary Λ(U), Λ(U): 0 ψ 0 ψ, 1 ψ 1 U ψ
More informationLecture 11: Number Theoretic Assumptions
CS 6903 Modern Cryptography April 24, 2008 Lecture 11: Number Theoretic Assumptions Instructor: Nitesh Saxena Scribe: Robert W.H. Fisher 1 General 1.1 Administrative Homework 3 now posted on course website.
More informationPrimes in arithmetic progressions
(September 26, 205) Primes in arithmetic progressions Paul Garrett garrett@math.umn.edu http://www.math.umn.edu/ garrett/ [This document is http://www.math.umn.edu/ garrett/m/mfms/notes 205-6/06 Dirichlet.pdf].
More informationLecture 8: Finite fields
Lecture 8: Finite fields Rajat Mittal IIT Kanpur We have learnt about groups, rings, integral domains and fields till now. Fields have the maximum required properties and hence many nice theorems can be
More informationQuizzes for Math 401
Quizzes for Math 401 QUIZ 1. a) Let a,b be integers such that λa+µb = 1 for some inetegrs λ,µ. Prove that gcd(a,b) = 1. b) Use Euclid s algorithm to compute gcd(803, 154) and find integers λ,µ such that
More informationCHARACTERS OF FINITE ABELIAN GROUPS (SHORT VERSION)
CHARACTERS OF FINITE ABELIAN GROUPS (SHORT VERSION) KEITH CONRAD 1. Introduction The theme we will study is an analogue on finite abelian groups of Fourier analysis on R. A Fourier series on the real line
More informationChapter 3. Rings. The basic commutative rings in mathematics are the integers Z, the. Examples
Chapter 3 Rings Rings are additive abelian groups with a second operation called multiplication. The connection between the two operations is provided by the distributive law. Assuming the results of Chapter
More informationCosets and Lagrange s theorem
Cosets and Lagrange s theorem These are notes on cosets and Lagrange s theorem some of which may already have been lecturer. There are some questions for you included in the text. You should write the
More informationLecture 15: The Hidden Subgroup Problem
CS 880: Quantum Information Processing 10/7/2010 Lecture 15: The Hidden Subgroup Problem Instructor: Dieter van Melkebeek Scribe: Hesam Dashti The Hidden Subgroup Problem is a particular type of symmetry
More information5 Group theory. 5.1 Binary operations
5 Group theory This section is an introduction to abstract algebra. This is a very useful and important subject for those of you who will continue to study pure mathematics. 5.1 Binary operations 5.1.1
More informationA PROOF OF BURNSIDE S p a q b THEOREM
A PROOF OF BURNSIDE S p a q b THEOREM OBOB Abstract. We prove that if p and q are prime, then any group of order p a q b is solvable. Throughout this note, denote by A the set of algebraic numbers. We
More informationStat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, Metric Spaces
Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, 2013 1 Metric Spaces Let X be an arbitrary set. A function d : X X R is called a metric if it satisfies the folloing
More informationMath 249B. Geometric Bruhat decomposition
Math 249B. Geometric Bruhat decomposition 1. Introduction Let (G, T ) be a split connected reductive group over a field k, and Φ = Φ(G, T ). Fix a positive system of roots Φ Φ, and let B be the unique
More informationMath 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille
Math 429/581 (Advanced) Group Theory Summary of Definitions, Examples, and Theorems by Stefan Gille 1 2 0. Group Operations 0.1. Definition. Let G be a group and X a set. A (left) operation of G on X is
More informationits image and kernel. A subgroup of a group G is a non-empty subset K of G such that k 1 k 1
10 Chapter 1 Groups 1.1 Isomorphism theorems Throughout the chapter, we ll be studying the category of groups. Let G, H be groups. Recall that a homomorphism f : G H means a function such that f(g 1 g
More informationQuantum algorithms for computing short discrete logarithms and factoring RSA integers
Quantum algorithms for computing short discrete logarithms and factoring RSA integers Martin Ekerå, Johan Håstad February, 07 Abstract In this paper we generalize the quantum algorithm for computing short
More informationQuadratic reciprocity and the Jacobi symbol Stephen McAdam Department of Mathematics University of Texas at Austin
Quadratic reciprocity and the Jacobi symbol Stephen McAdam Department of Mathematics University of Texas at Austin mcadam@math.utexas.edu Abstract: We offer a proof of quadratic reciprocity that arises
More informationGraph isomorphism, the hidden subgroup problem and identifying quantum states
1 Graph isomorphism, the hidden subgroup problem and identifying quantum states Pranab Sen NEC Laboratories America, Princeton, NJ, U.S.A. Joint work with Sean Hallgren and Martin Rötteler. Quant-ph 0511148:
More informationbe any ring homomorphism and let s S be any element of S. Then there is a unique ring homomorphism
21. Polynomial rings Let us now turn out attention to determining the prime elements of a polynomial ring, where the coefficient ring is a field. We already know that such a polynomial ring is a UFD. Therefore
More informationFactorization in Polynomial Rings
Factorization in Polynomial Rings Throughout these notes, F denotes a field. 1 Long division with remainder We begin with some basic definitions. Definition 1.1. Let f, g F [x]. We say that f divides g,
More informationMA554 Assessment 1 Cosets and Lagrange s theorem
MA554 Assessment 1 Cosets and Lagrange s theorem These are notes on cosets and Lagrange s theorem; they go over some material from the lectures again, and they have some new material it is all examinable,
More informationStab(t) = {h G h t = t} = {h G h (g s) = g s} = {h G (g 1 hg) s = s} = g{k G k s = s} g 1 = g Stab(s)g 1.
1. Group Theory II In this section we consider groups operating on sets. This is not particularly new. For example, the permutation group S n acts on the subset N n = {1, 2,...,n} of N. Also the group
More informationD-MATH Algebra I HS 2013 Prof. Brent Doran. Solution 3. Modular arithmetic, quotients, product groups
D-MATH Algebra I HS 2013 Prof. Brent Doran Solution 3 Modular arithmetic, quotients, product groups 1. Show that the functions f = 1/x, g = (x 1)/x generate a group of functions, the law of composition
More informationCS 6815: Lecture 4. September 4, 2018
XS = X s... X st CS 685: Lecture 4 Instructor: Eshan Chattopadhyay Scribe: Makis Arsenis and Ayush Sekhari September 4, 208 In this lecture, we will first see an algorithm to construct ɛ-biased spaces.
More informationExtra exercises for algebra
Extra exercises for algebra These are extra exercises for the course algebra. They are meant for those students who tend to have already solved all the exercises at the beginning of the exercise session
More informationMATH 25 CLASS 21 NOTES, NOV Contents. 2. Subgroups 2 3. Isomorphisms 4
MATH 25 CLASS 21 NOTES, NOV 7 2011 Contents 1. Groups: definition 1 2. Subgroups 2 3. Isomorphisms 4 1. Groups: definition Even though we have been learning number theory without using any other parts
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT
Quantum algorithms (CO 78, Winter 008) Prof. Andrew Childs, University of Waterloo LECTURE : Quantum circuits and the abelian QFT This is a course on quantum algorithms. It is intended for graduate students
More information2) e = e G G such that if a G 0 =0 G G such that if a G e a = a e = a. 0 +a = a+0 = a.
Chapter 2 Groups Groups are the central objects of algebra. In later chapters we will define rings and modules and see that they are special cases of groups. Also ring homomorphisms and module homomorphisms
More informationMa/CS 6a Class 4: Primality Testing
Ma/CS 6a Class 4: Primality Testing By Adam Sheffer Send anonymous suggestions and complaints from here. Email: adamcandobetter@gmail.com Password: anonymous2 There aren t enough crocodiles in the presentations
More informationISOMORPHISMS KEITH CONRAD
ISOMORPHISMS KEITH CONRAD 1. Introduction Groups that are not literally the same may be structurally the same. An example of this idea from high school math is the relation between multiplication and addition
More informationTheorem 5.3. Let E/F, E = F (u), be a simple field extension. Then u is algebraic if and only if E/F is finite. In this case, [E : F ] = deg f u.
5. Fields 5.1. Field extensions. Let F E be a subfield of the field E. We also describe this situation by saying that E is an extension field of F, and we write E/F to express this fact. If E/F is a field
More informationAlgebra SEP Solutions
Algebra SEP Solutions 17 July 2017 1. (January 2017 problem 1) For example: (a) G = Z/4Z, N = Z/2Z. More generally, G = Z/p n Z, N = Z/pZ, p any prime number, n 2. Also G = Z, N = nz for any n 2, since
More informationUC Berkeley Department of Electrical Engineering and Computer Sciences. EECS 126: Probability and Random Processes
UC Berkeley Department of Electrical Engineering and Computer Sciences EECS 26: Probability and Random Processes Problem Set Spring 209 Self-Graded Scores Due:.59 PM, Monday, February 4, 209 Submit your
More informationFactoring Algorithms Pollard s p 1 Method. This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors.
Factoring Algorithms Pollard s p 1 Method This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors. Input: n (to factor) and a limit B Output: a proper factor of
More informationSection III.15. Factor-Group Computations and Simple Groups
III.15 Factor-Group Computations 1 Section III.15. Factor-Group Computations and Simple Groups Note. In this section, we try to extract information about a group G by considering properties of the factor
More information18.702: Quiz 1 Solutions
MIT MATHEMATICS 18.702: Quiz 1 Solutions February 28 2018 There are four problems on this quiz worth equal value. You may quote without proof any result stated in class or in the assigned reading, unless
More informationTHE MINIMAL POLYNOMIAL AND SOME APPLICATIONS
THE MINIMAL POLYNOMIAL AND SOME APPLICATIONS KEITH CONRAD. Introduction The easiest matrices to compute with are the diagonal ones. The sum and product of diagonal matrices can be computed componentwise
More informationφ(xy) = (xy) n = x n y n = φ(x)φ(y)
Groups 1. (Algebra Comp S03) Let A, B and C be normal subgroups of a group G with A B. If A C = B C and AC = BC then prove that A = B. Let b B. Since b = b1 BC = AC, there are a A and c C such that b =
More informationFrom the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem
From the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem Curtis Bright December 9, 011 Abstract In Quantum Computation and Lattice Problems [11] Oded Regev presented the first known connection
More informationis an isomorphism, and V = U W. Proof. Let u 1,..., u m be a basis of U, and add linearly independent
Lecture 4. G-Modules PCMI Summer 2015 Undergraduate Lectures on Flag Varieties Lecture 4. The categories of G-modules, mostly for finite groups, and a recipe for finding every irreducible G-module of a
More informationCHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS
CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS INTRODUCTION David D. Bennink, Center for NDE Anna L. Pate, Engineering Science and Mechanics Ioa State University Ames, Ioa 50011 In any ultrasonic
More information3 - Vector Spaces Definition vector space linear space u, v,
3 - Vector Spaces Vectors in R and R 3 are essentially matrices. They can be vieed either as column vectors (matrices of size and 3, respectively) or ro vectors ( and 3 matrices). The addition and scalar
More information120A LECTURE OUTLINES
120A LECTURE OUTLINES RUI WANG CONTENTS 1. Lecture 1. Introduction 1 2 1.1. An algebraic object to study 2 1.2. Group 2 1.3. Isomorphic binary operations 2 2. Lecture 2. Introduction 2 3 2.1. The multiplication
More informationSection 15 Factor-group computation and simple groups
Section 15 Factor-group computation and simple groups Instructor: Yifan Yang Fall 2006 Outline Factor-group computation Simple groups The problem Problem Given a factor group G/H, find an isomorphic group
More informationBivariate Uniqueness in the Logistic Recursive Distributional Equation
Bivariate Uniqueness in the Logistic Recursive Distributional Equation Antar Bandyopadhyay Technical Report # 629 University of California Department of Statistics 367 Evans Hall # 3860 Berkeley CA 94720-3860
More informationPh 219b/CS 219b. Exercises Due: Wednesday 11 February 2009
1 Ph 219b/CS 219b Exercises Due: Wednesday 11 February 2009 5.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the
More informationLecture 6: Finite Fields
CCS Discrete Math I Professor: Padraic Bartlett Lecture 6: Finite Fields Week 6 UCSB 2014 It ain t what they call you, it s what you answer to. W. C. Fields 1 Fields In the next two weeks, we re going
More informationLecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya
BBM 205 Discrete Mathematics Hacettepe University http://web.cs.hacettepe.edu.tr/ bbm205 Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya Resources: Kenneth Rosen,
More informationShor s Algorithm. Polynomial-time Prime Factorization with Quantum Computing. Sourabh Kulkarni October 13th, 2017
Shor s Algorithm Polynomial-time Prime Factorization with Quantum Computing Sourabh Kulkarni October 13th, 2017 Content Church Thesis Prime Numbers and Cryptography Overview of Shor s Algorithm Implementation
More informationNumber Theory. Final Exam from Spring Solutions
Number Theory. Final Exam from Spring 2013. Solutions 1. (a) (5 pts) Let d be a positive integer which is not a perfect square. Prove that Pell s equation x 2 dy 2 = 1 has a solution (x, y) with x > 0,
More informationMMSE Equalizer Design
MMSE Equalizer Design Phil Schniter March 6, 2008 [k] a[m] P a [k] g[k] m[k] h[k] + ṽ[k] q[k] y [k] P y[m] For a trivial channel (i.e., h[k] = δ[k]), e kno that the use of square-root raisedcosine (SRRC)
More informationBasic elements of number theory
Cryptography Basic elements of number theory Marius Zimand By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a k for some integer k. Notation
More informationThe Probability of Pathogenicity in Clinical Genetic Testing: A Solution for the Variant of Uncertain Significance
International Journal of Statistics and Probability; Vol. 5, No. 4; July 2016 ISSN 1927-7032 E-ISSN 1927-7040 Published by Canadian Center of Science and Education The Probability of Pathogenicity in Clinical
More informationBasic elements of number theory
Cryptography Basic elements of number theory Marius Zimand 1 Divisibility, prime numbers By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a
More information0 Sets and Induction. Sets
0 Sets and Induction Sets A set is an unordered collection of objects, called elements or members of the set. A set is said to contain its elements. We write a A to denote that a is an element of the set
More informationMath 250: Higher Algebra Representations of finite groups
Math 250: Higher Algebra Representations of finite groups 1 Basic definitions Representations. A representation of a group G over a field k is a k-vector space V together with an action of G on V by linear
More informationThe Symmetric Groups
Chapter 7 The Symmetric Groups 7. Introduction In the investigation of finite groups the symmetric groups play an important role. Often we are able to achieve a better understanding of a group if we can
More informationLecture 4: Elementary Quantum Algorithms
CS 880: Quantum Information Processing 9/13/010 Lecture 4: Elementary Quantum Algorithms Instructor: Dieter van Melkebeek Scribe: Kenneth Rudinger This lecture introduces several simple quantum algorithms.
More informationQuantum LDPC Codes Derived from Combinatorial Objects and Latin Squares
Codes Derived from Combinatorial Objects and s Salah A. Aly & Latin salah at cs.tamu.edu PhD Candidate Department of Computer Science Texas A&M University November 11, 2007 Motivation for Computers computers
More informationModern Algebra I. Circle the correct answer; no explanation is required. Each problem in this section counts 5 points.
1 2 3 style total Math 415 Please print your name: Answer Key 1 True/false Circle the correct answer; no explanation is required. Each problem in this section counts 5 points. 1. Every group of order 6
More information20 Group Homomorphisms
20 Group Homomorphisms In Example 1810(d), we have observed that the groups S 4 /V 4 and S 3 have almost the same multiplication table They have the same structure In this paragraph, we study groups with
More informationCOS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008
COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008 In the previous lecture, e ere introduced to the SVM algorithm and its basic motivation
More informationAnswers to Final Exam
Answers to Final Exam MA441: Algebraic Structures I 20 December 2003 1) Definitions (20 points) 1. Given a subgroup H G, define the quotient group G/H. (Describe the set and the group operation.) The quotient
More informationTransposition as a permutation: a tale of group actions and modular arithmetic
Transposition as a permutation: a tale of group actions and modular arithmetic Jeff Hooper Franklin Mendivil Department of Mathematics and Statistics Acadia University Abstract Converting a matrix from
More informationLECTURE 2. Hilbert Symbols
LECTURE 2 Hilbert Symbols Let be a local field over Q p (though any local field suffices) with char() 2. Note that this includes fields over Q 2, since it is the characteristic of the field, and not the
More informationx by so in other words ( )
Math 210B. Norm and trace An interesting application of Galois theory is to help us understand properties of two special constructions associated to field extensions, the norm and trace. If L/k is a finite
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 10 February 19, 2013 CPSC 467b, Lecture 10 1/45 Primality Tests Strong primality tests Weak tests of compositeness Reformulation
More informationClassical simulations of non-abelian quantum Fourier transforms
Classical simulations of non-abelian quantum Fourier transforms Diploma Thesis Juan Bermejo Vega December 7, 2011 Garching First reviewer: Prof. Dr. J. Ignacio Cirac Second reviewer: Prof. Dr. Alejandro
More information6 Cosets & Factor Groups
6 Cosets & Factor Groups The course becomes markedly more abstract at this point. Our primary goal is to break apart a group into subsets such that the set of subsets inherits a natural group structure.
More information