Reconstructing Chemical Reaction Networks by Solving Boolean Polynomial Systems

Size: px
Start display at page:

Download "Reconstructing Chemical Reaction Networks by Solving Boolean Polynomial Systems"

Transcription

1 Reconstructing Chemical Reaction Networks by Solving Boolean Polynomial Systems Chenqi Mou Wei Niu LMIB-School of Mathematics École Centrale Pékin and Systems Science Beihang University, Beijing , China chenqi.mou, December 12, 2013 Nanning, China

2 The problem Chemical reaction networks

3 The problem Chemical reaction networks

4 The problem Chemical reaction networks

5 The problem Chemical reaction networks

6 Reconstructing Chemical Reaction Networks Chemical reaction networks

7 Why this problem? S- and R-graphs: easier for detecting Can the same S- and R-graphs lead to different SR-graphs? What do these SR-graphs mean?

8 Why this problem? S- and R-graphs: easier for detecting Can the same S- and R-graphs lead to different SR-graphs? What do these SR-graphs mean? CRR (Compound-Reaction-Reconstruction) problem [Fagerberg et. al. 2013] Existence / NP-hard / SAT, SMT, ILP

9 Why this problem? S- and R-graphs: easier for detecting Can the same S- and R-graphs lead to different SR-graphs? What do these SR-graphs mean? CRR (Compound-Reaction-Reconstruction) problem [Fagerberg et. al. 2013] Existence / NP-hard / SAT, SMT, ILP = CRR + problem: all the potential SR-graphs

10 Why Polynomial System Solving (PoSSo)? CRR problem Existence Hilbert s Nullstellensatz NP-hardness PoSSo is also NP-hard [Garey & Johnson 1979] SAT, SMT, ILP Polynomial system solvers

11 Why Polynomial System Solving (PoSSo)? CRR problem Existence Hilbert s Nullstellensatz NP-hardness PoSSo is also NP-hard [Garey & Johnson 1979] SAT, SMT, ILP Polynomial system solvers All the solutions feasible natural Complexity: Worst: doubly exponential (in #var) [Mayr & Meyer 1982] Dedicated complexity (structured): bidegree (1,1) [Faugère, Safey El Din, Spaenlehauer 2010]

12 Matrix representation R: a reaction = Input species: I(R); Output species: O(R); SR-graph two Boolean matrices

13 Matrix representation R: a reaction = Input species: I(R); Output species: O(R); SR-graph two Boolean matrices E m n { such that 1, Si I(R E i,k := k ) 0, Otherwise P n m { such that 1, Sj O(R P k,j := k ) 0, Otherwise On the Complexity of Reconstructing Chemical Reaction Networks 3 A R1 C R2 E B D F FIGURE 1. A directed hypergraph, consisting of two reactions {R1, R2} and six chemical species {A, B,..., F}. Hyperarc R1 has t(r1) = {A, B} and h(r1) = {C, D}, hyperarc R2 has t(r2) = {C} and h(r2) = {E, F }.

14 Matrix representation S-graphs: Boolean matrix S m m such that { 1, Rk s.t. S S i,j := i I(R k ) and S j O(R k ) 0, Otherwise R-graphs: Boolean matrix R n n such that { 1, Si s.t. S R k,l := i O(R k ) and S i I(R k ) 0, Otherwise

15 Matrix representation S-graphs: Boolean matrix S m m such that { 1, Rk s.t. S S i,j := i I(R k ) and S j O(R k ) 0, Otherwise R-graphs: Boolean matrix R n n such that { 1, Si s.t. S R k,l := i O(R k ) and S i I(R k ) 0, Otherwise Input: S, R = Output: E, P CRR: existence of E and P CRR + : all the possible E and P

16 Relationship S, R, E, and P S i,j = (E i,k P k,j ), R k,l = (P k,i E i,l ). k=1,...,n i=1,...,m Direct translation to PoSSo problem Background Boolean polynomial ring F 2 [E 1,1,..., E m,n, P 1,1,..., P n,m ] x y = x y and x y = x + y + x y Boolean polynomial system

17 Structure S i,j = k=1,...,n (E i,k P k,j ) x y = x y and x y = x + y + x y S i,j = 1 = 1 polynomial equation (degree 2n; variable 2n) = of type s (or r if R i,j = 1) S i,j = 0 = n bivariate quadratic equations = of type 0

18 Structure S i,j = k=1,...,n (E i,k P k,j ) x y = x y and x y = x + y + x y S i,j = 1 = 1 polynomial equation (degree 2n; variable 2n) = of type s (or r if R i,j = 1) S i,j = 0 = n bivariate quadratic equations = of type 0 Structure (p and q: #zeros in S and R) type 0: np + mq type s: m 2 p type r: n 2 q #Solutions #Variables = overdefined

19 PoSSo Methods Gröbner bases [Buchberger 1965, Faugère 1999, 2002] triangular sets [Wang 2001, Moreno Maza 2000, Gao & Huang 2012] XL (overdefined) e.g., [Ars et. al. 2004] Polynomial system = in a better form = solutions Complexity (Gröbner bases): Salvy 2004] O( ( n+d reg n Over F 2 : add the field equations (x 2 k + x k = 0). ) ω)[bardet, Faugère,

20 PoSSo Implementation Gröbner bases: Buchberger algorithm: almost in all Computer Algebra Systems F 4, F 5 : FGb, MAGMA... = MAGMA: optimization for over F 2 (since V2.15) Triangular sets: Epsilon, RegularChains (in Maple)...

21 Randomly generated S and R MAGMA V (F 4 implementation) = V2.20 (released yesterday, F 4 updated) m, n P Density (%) #Var #F Time #Solutions / / / > 1000 unknown / / / > 1000 unknown / / / / /

22 Remarks on the experiments General one: no optimization is made for CRR: (1) Experimentally, not comparable to SMT / SAT in efficiency (with optimization) (2) Problem generation (VS CNF generation) There exist instances with more than 1 solution (not trivial) For real-world examples (Biology): size (m, n 40), sparsity 98%

23 Future work Structure = simplify the problem / dedicated algorithm Complexity analyses: better? CRR: NP-hardness by PoSSo?

On the chordality of polynomial sets in triangular decomposition in top-down style

On the chordality of polynomial sets in triangular decomposition in top-down style On the chordality of polynomial sets in triangular decomposition in top-down style Chenqi Mou joint work with Yang Bai LMIB School of Mathematics and Systems Science Beihang University, China ISSAC 2018,

More information

On the Existence of Semi-Regular Sequences

On the Existence of Semi-Regular Sequences On the Existence of Semi-Regular Sequences Sergio Molina 1 joint work with T. J. Hodges 1 J. Schlather 1 Department of Mathematics University of Cincinnati DIMACS, January 2015 Sergio Molina (UC) Semi-Regular

More information

A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems

A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae PKC 2015, March 30 - April 1, Maryland, USA 2 Summary

More information

Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers 1

Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers 1 Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers 1 Xiao-Shan Gao and Zhenyu Huang Key Laboratory of Mathematics Mechanization

More information

Résolution de systèmes polynomiaux structurés et applications en Cryptologie

Résolution de systèmes polynomiaux structurés et applications en Cryptologie Résolution de systèmes polynomiaux structurés et applications en Cryptologie Pierre-Jean Spaenlehauer University of Western Ontario Ontario Research Center for Computer Algebra Magali Bardet, Jean-Charles

More information

Hybrid Approach : a Tool for Multivariate Cryptography

Hybrid Approach : a Tool for Multivariate Cryptography Hybrid Approach : a Tool for Multivariate Cryptography Luk Bettale, Jean-Charles Faugère and Ludovic Perret INRIA, Centre Paris-Rocquencourt, SALSA Project UPMC, Univ. Paris 06, LIP6 CNRS, UMR 7606, LIP6

More information

MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis

MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis Johannes Buchmann 1, Jintai Ding 2, Mohamed Saied Emam Mohamed 1, and Wael Said Abd Elmageed Mohamed 1 1 TU Darmstadt, FB Informatik

More information

Efficient Haplotype Inference with Boolean Satisfiability

Efficient Haplotype Inference with Boolean Satisfiability Efficient Haplotype Inference with Boolean Satisfiability Joao Marques-Silva 1 and Ines Lynce 2 1 School of Electronics and Computer Science University of Southampton 2 INESC-ID/IST Technical University

More information

On Implementing the Symbolic Preprocessing Function over Boolean Polynomial Rings in Gröbner Basis Algorithms Using Linear Algebra

On Implementing the Symbolic Preprocessing Function over Boolean Polynomial Rings in Gröbner Basis Algorithms Using Linear Algebra On Implementing the Symbolic Preprocessing Function over Boolean Polynomial Rings in Gröbner Basis Algorithms Using Linear Algebra Yao Sun a, Zhenyu Huang a, Dongdai Lin a, Dingkang Wang b a SKLOIS, Institute

More information

Gröbner Bases in Public-Key Cryptography

Gröbner Bases in Public-Key Cryptography Gröbner Bases in Public-Key Cryptography Ludovic Perret SPIRAL/SALSA LIP6, Université Paris 6 INRIA ludovic.perret@lip6.fr ECRYPT PhD SUMMER SCHOOL Emerging Topics in Cryptographic Design and Cryptanalysis

More information

Solving Polynomial Systems over Finite Fields: Algorithms, Implementation and Applications

Solving Polynomial Systems over Finite Fields: Algorithms, Implementation and Applications Solving Polynomial Systems over Finite Fields: Algorithms, Implementation and Applications Chenqi Mou To cite this version: Chenqi Mou. Solving Polynomial Systems over Finite Fields: Algorithms, Implementation

More information

Change of Ordering for Regular Chains in Positive Dimension

Change of Ordering for Regular Chains in Positive Dimension Change of Ordering for Regular Chains in Positive Dimension X. Dahan, X. Jin, M. Moreno Maza, É. Schost University of Western Ontario, London, Ontario, Canada. École polytechnique, 91128 Palaiseau, France.

More information

Reverse engineering using computational algebra

Reverse engineering using computational algebra Reverse engineering using computational algebra Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4500, Spring 2015 M. Macauley (Clemson)

More information

Algebraic Proof Systems

Algebraic Proof Systems Algebraic Proof Systems Pavel Pudlák Mathematical Institute, Academy of Sciences, Prague and Charles University, Prague Fall School of Logic, Prague, 2009 2 Overview 1 a survey of proof systems 2 a lower

More information

MathCheck2: Combining SAT and CAS Presentation at Applications of Computer Algebra 2016 Kassel, Germany

MathCheck2: Combining SAT and CAS Presentation at Applications of Computer Algebra 2016 Kassel, Germany MathCheck2: Combining SAT and CAS Presentation at Applications of Computer Algebra 2016 Kassel, Germany Curtis Bright, Vijay Ganesh, Albert Heinle, Ilias Kotsireas, Saeed Nejati, Krzysztof Czarnecki University

More information

arxiv: v1 [cs.sc] 29 Jul 2009

arxiv: v1 [cs.sc] 29 Jul 2009 An Explicit Construction of Gauss-Jordan Elimination Matrix arxiv:09075038v1 [cssc] 29 Jul 2009 Yi Li Laboratory of Computer Reasoning and Trustworthy Computing, University of Electronic Science and Technology

More information

Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL

Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Mohamed Saied Emam Mohamed 1, Jintai Ding 2, and Johannes Buchmann 1 1 TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt,

More information

Matrices: 2.1 Operations with Matrices

Matrices: 2.1 Operations with Matrices Goals In this chapter and section we study matrix operations: Define matrix addition Define multiplication of matrix by a scalar, to be called scalar multiplication. Define multiplication of two matrices,

More information

Jean-Charles Faugère

Jean-Charles Faugère ECC 2011 The 15th workshop on Elliptic Curve Cryptography INRIA, Nancy, France Solving efficiently structured polynomial systems and Applications in Cryptology Jean-Charles Faugère Joint work with: L Huot

More information

Multivariate Public Key Cryptography or Why is there a rainbow hidden behind fields full of oil and vinegar?

Multivariate Public Key Cryptography or Why is there a rainbow hidden behind fields full of oil and vinegar? Multivariate Public Key Cryptography or Why is there a rainbow hidden behind fields full of oil and vinegar? Christian Eder, Jean-Charles Faugère and Ludovic Perret Seminar on Fundamental Algorithms, University

More information

Algebraic Aspects of Symmetric-key Cryptography

Algebraic Aspects of Symmetric-key Cryptography Algebraic Aspects of Symmetric-key Cryptography Carlos Cid (carlos.cid@rhul.ac.uk) Information Security Group Royal Holloway, University of London 04.May.2007 ECRYPT Summer School 1 Algebraic Techniques

More information

Complex Hadamard matrices and 3-class association schemes

Complex Hadamard matrices and 3-class association schemes Complex Hadamard matrices and 3-class association schemes Akihiro Munemasa 1 1 Graduate School of Information Sciences Tohoku University (joint work with Takuya Ikuta) June 26, 2013 The 30th Algebraic

More information

New Directions in Multivariate Public Key Cryptography

New Directions in Multivariate Public Key Cryptography New Directions in Shuhong Gao Joint with Ray Heindl Clemson University The 4th International Workshop on Finite Fields and Applications Beijing University, May 28-30, 2010. 1 Public Key Cryptography in

More information

The Graph Isomorphism Problem and the Module Isomorphism Problem. Harm Derksen

The Graph Isomorphism Problem and the Module Isomorphism Problem. Harm Derksen The Graph Isomorphism Problem and the Module Isomorphism Problem Harm Derksen Department of Mathematics Michigan Center for Integrative Research in Critical Care University of Michigan Partially supported

More information

Gröbner Bases. Applications in Cryptology

Gröbner Bases. Applications in Cryptology Gröbner Bases. Applications in Cryptology Jean-Charles Faugère INRIA, Université Paris 6, CNRS with partial support of Celar/DGA FSE 20007 - Luxembourg E cient Goal: how Gröbner bases can be used to break

More information

MA2501 Numerical Methods Spring 2015

MA2501 Numerical Methods Spring 2015 Norwegian University of Science and Technology Department of Mathematics MA2501 Numerical Methods Spring 2015 Solutions to exercise set 3 1 Attempt to verify experimentally the calculation from class that

More information

Computational complexity and some Graph Theory

Computational complexity and some Graph Theory Graph Theory Lars Hellström January 22, 2014 Contents of todays lecture An important concern when choosing the algorithm to use for something (after basic requirements such as correctness and stability)

More information

A remarkable representation of the Clifford group

A remarkable representation of the Clifford group A remarkable representation of the Clifford group Steve Brierley University of Bristol March 2012 Work with Marcus Appleby, Ingemar Bengtsson, Markus Grassl, David Gross and Jan-Ake Larsson Outline Useful

More information

On the Complexity of the Hybrid Approach on HFEv-

On the Complexity of the Hybrid Approach on HFEv- On the Complexity of the Hybrid Approach on HFEv- Albrecht Petzoldt National Institute of Standards and Technology, Gaithersburg, Maryland, USA albrecht.petzoldt@gmail.com Abstract. The HFEv- signature

More information

Solving Multivariate Polynomial Systems

Solving Multivariate Polynomial Systems Solving Multivariate Polynomial Systems Presented by: Bo-Yin Yang work with Lab of Yang and Cheng, and Charles Bouillaguet, ENS Institute of Information Science and TWISC, Academia Sinica Taipei, Taiwan

More information

A (short) survey on signature-based Gröbner Basis Algorithms

A (short) survey on signature-based Gröbner Basis Algorithms A (short) survey on signature-based Gröbner Basis Algorithms Christian Eder, Jean-Charles Faugère, John Perry and Bjarke Hammersholt Roune ACA 2014, New York, US July 10, 2014 1 / 16 How to detect zero

More information

Phase Transition in a System of Random Sparse Boolean Equations

Phase Transition in a System of Random Sparse Boolean Equations 5.1 Phase Transition in a System of Random Sparse Boolean Equations 33 Phase Transition in a System of Random Sparse Boolean Equations Thorsten Ernst Schilling and Pavol Zajac University of Bergen, KAIVT

More information

SMT Nonlinear Real Arithmetic and Computer Algebra: a Dialog

SMT Nonlinear Real Arithmetic and Computer Algebra: a Dialog SMT Nonlinear Real Arithmetic and Computer Algebra: a Dialogue of the Deaf? James 1 University of Bath J.H.@bath.ac.uk 23 July 2017 1 Thanks to EU H2020-FETOPEN-2016-2017-CSA project SC 2 (712689) and

More information

ACI-matrices all of whose completions have the same rank

ACI-matrices all of whose completions have the same rank ACI-matrices all of whose completions have the same rank Zejun Huang, Xingzhi Zhan Department of Mathematics East China Normal University Shanghai 200241, China Abstract We characterize the ACI-matrices

More information

The F 4 Algorithm. Dylan Peifer. 9 May Cornell University

The F 4 Algorithm. Dylan Peifer. 9 May Cornell University The F 4 Algorithm Dylan Peifer Cornell University 9 May 2017 Gröbner Bases History Gröbner bases were introduced in 1965 in the PhD thesis of Bruno Buchberger under Wolfgang Gröbner. Buchberger s algorithm

More information

Complexity (Pre Lecture)

Complexity (Pre Lecture) Complexity (Pre Lecture) Dr. Neil T. Dantam CSCI-561, Colorado School of Mines Fall 2018 Dantam (Mines CSCI-561) Complexity (Pre Lecture) Fall 2018 1 / 70 Why? What can we always compute efficiently? What

More information

Discrete Optimization 2010 Lecture 10 P, N P, and N PCompleteness

Discrete Optimization 2010 Lecture 10 P, N P, and N PCompleteness Discrete Optimization 2010 Lecture 10 P, N P, and N PCompleteness Marc Uetz University of Twente m.uetz@utwente.nl Lecture 9: sheet 1 / 31 Marc Uetz Discrete Optimization Outline 1 N P and co-n P 2 N P-completeness

More information

Groebner Bases in Boolean Rings. for Model Checking and. Applications in Bioinformatics

Groebner Bases in Boolean Rings. for Model Checking and. Applications in Bioinformatics Groebner Bases in Boolean Rings for Model Checking and Applications in Bioinformatics Quoc-Nam Tran, Ph.D. Professor of Computer Science Lamar University Invited Talk at CMU on October 8, 2010 Outline

More information

CS20a: NP completeness. NP-complete definition. Related properties. Cook's Theorem

CS20a: NP completeness. NP-complete definition. Related properties. Cook's Theorem CS20a: NP completeness Cook s theorem SAT is an NP-complete problem http://www.cs.caltech.edu/courses/cs20/a/ December 2, 2002 1 NP-complete definition A problem is in NP if it can be solved by a nondeterministic

More information

Comparison between XL and Gröbner Basis Algorithms

Comparison between XL and Gröbner Basis Algorithms Comparison between XL and Gröbner Basis Algorithms Gwénolé Ars 1, Jean-Charles Faugère 2, Hideki Imai 3, Mitsuru Kawazoe 4, and Makoto Sugita 5 1 IRMAR, University of Rennes 1 Campus de Beaulieu 35042

More information

Comp487/587 - Boolean Formulas

Comp487/587 - Boolean Formulas Comp487/587 - Boolean Formulas 1 Logic and SAT 1.1 What is a Boolean Formula Logic is a way through which we can analyze and reason about simple or complicated events. In particular, we are interested

More information

Graph structure in polynomial systems: chordal networks

Graph structure in polynomial systems: chordal networks Graph structure in polynomial systems: chordal networks Pablo A. Parrilo Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Massachusetts Institute of Technology

More information

Advanced Algebra II 1 st Semester Exam Review

Advanced Algebra II 1 st Semester Exam Review dname Advanced Algebra II 1 st Semester Exam Review Chapter 1A: Number Sets & Solving Equations Name the sets of numbers to which each number belongs. 1. 34 2. 525 3. 0.875 4. Solve each equation. Check

More information

Introduction to Solving Combinatorial Problems with SAT

Introduction to Solving Combinatorial Problems with SAT Introduction to Solving Combinatorial Problems with SAT Javier Larrosa December 19, 2014 Overview of the session Review of Propositional Logic The Conjunctive Normal Form (CNF) Modeling and solving combinatorial

More information

Inderjit Dhillon The University of Texas at Austin

Inderjit Dhillon The University of Texas at Austin Inderjit Dhillon The University of Texas at Austin ( Universidad Carlos III de Madrid; 15 th June, 2012) (Based on joint work with J. Brickell, S. Sra, J. Tropp) Introduction 2 / 29 Notion of distance

More information

Solving the Hamiltonian Cycle problem using symbolic determinants

Solving the Hamiltonian Cycle problem using symbolic determinants Solving the Hamiltonian Cycle problem using symbolic determinants V. Ejov, J.A. Filar, S.K. Lucas & J.L. Nelson Abstract In this note we show how the Hamiltonian Cycle problem can be reduced to solving

More information

Reverse engineering using computational algebra

Reverse engineering using computational algebra Reverse engineering using computational algebra Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4500, Fall 2016 M. Macauley (Clemson)

More information

CS 246 Review of Linear Algebra 01/17/19

CS 246 Review of Linear Algebra 01/17/19 1 Linear algebra In this section we will discuss vectors and matrices. We denote the (i, j)th entry of a matrix A as A ij, and the ith entry of a vector as v i. 1.1 Vectors and vector operations A vector

More information

Complexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München

Complexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München Complexity Theory Jörg Kreiker Chair for Theoretical Computer Science Prof. Esparza TU München Summer term 2010 Lecture 4 NP-completeness Recap: relations between classes EXP PSPACE = NPSPACE conp NP conp

More information

From Satisfiability to Linear Algebra

From Satisfiability to Linear Algebra From Satisfiability to Linear Algebra Fangzhen Lin Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Technical Report August 2013 1 Introduction

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017 U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017 Scribed by Luowen Qian Lecture 8 In which we use spectral techniques to find certificates of unsatisfiability

More information

Today. Few Comments. PCP Theorem, Simple proof due to Irit Dinur [ECCC, TR05-046]! Based on some ideas promoted in [Dinur- Reingold 04].

Today. Few Comments. PCP Theorem, Simple proof due to Irit Dinur [ECCC, TR05-046]! Based on some ideas promoted in [Dinur- Reingold 04]. Today Few Comments PCP Theorem, Simple proof due to Irit Dinur [ECCC, TR05-046]! Based on some ideas promoted in [Dinur- Reingold 04]. Remarkably simple novel proof. Leads to new quantitative results too!

More information

NP-Hardness reductions

NP-Hardness reductions NP-Hardness reductions Definition: P is the class of problems that can be solved in polynomial time, that is n c for a constant c Roughly, if a problem is in P then it's easy, and if it's not in P then

More information

A survey of algebraic attacks against stream ciphers

A survey of algebraic attacks against stream ciphers A survey of algebraic attacks against stream ciphers Frederik Armknecht NEC Europe Ltd. Network Laboratories frederik.armknecht@netlab.nec.de Special semester on Gröbner bases and related methods, May

More information

On the Complexity of Gröbner Basis Computation for Regular and Semi-Regular Systems

On the Complexity of Gröbner Basis Computation for Regular and Semi-Regular Systems On the Complexity of Gröbner Basis Computation for Regular and Semi-Regular Systems Bruno.Salvy@inria.fr Algorithms Project, Inria Joint work with Magali Bardet & Jean-Charles Faugère September 21st, 2006

More information

Graph structure in polynomial systems: chordal networks

Graph structure in polynomial systems: chordal networks Graph structure in polynomial systems: chordal networks Pablo A. Parrilo Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Massachusetts Institute of Technology

More information

Algebraic Analysis of Bifurcation and Limit Cycles for Biological Systems

Algebraic Analysis of Bifurcation and Limit Cycles for Biological Systems Algebraic Analysis of Bifurcation and Limit Cycles for Biological Systems Wei Niu 1 and Dongming Wang 2,1 1 Laboratoire d Informatique de Paris 6, Université Pierre et Marie Curie CNRS, 104 avenue du Président

More information

Sparse Boolean equations and circuit lattices

Sparse Boolean equations and circuit lattices Sparse Boolean equations and circuit lattices Igor Semaev Department of Informatics, University of Bergen, Norway igor@ii.uib.no Abstract. A system of Boolean equations is called sparse if each equation

More information

Lecture 4: Products of Matrices

Lecture 4: Products of Matrices Lecture 4: Products of Matrices Winfried Just, Ohio University January 22 24, 2018 Matrix multiplication has a few surprises up its sleeve Let A = [a ij ] m n, B = [b ij ] m n be two matrices. The sum

More information

SOLVING VIA MODULAR METHODS

SOLVING VIA MODULAR METHODS SOLVING VIA MODULAR METHODS DEEBA AFZAL, FAIRA KANWAL, GERHARD PFISTER, AND STEFAN STEIDEL Abstract. In this article we present a parallel modular algorithm to compute all solutions with multiplicities

More information

Generalized critical values and testing sign conditions

Generalized critical values and testing sign conditions Generalized critical values and testing sign conditions on a polynomial Mohab Safey El Din. Abstract. Let f be a polynomial in Q[X 1,..., X n] of degree D. We focus on testing the emptiness of the semi-algebraic

More information

An Algorithm to Determine the Clique Number of a Split Graph. In this paper, we propose an algorithm to determine the clique number of a split graph.

An Algorithm to Determine the Clique Number of a Split Graph. In this paper, we propose an algorithm to determine the clique number of a split graph. An Algorithm to Determine the Clique Number of a Split Graph O.Kettani email :o_ket1@yahoo.fr Abstract In this paper, we propose an algorithm to determine the clique number of a split graph. Introduction

More information

Complexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München

Complexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München Complexity Theory Jörg Kreiker Chair for Theoretical Computer Science Prof. Esparza TU München Summer term 2010 Lecture 6 conp Agenda conp the importance of P vs. NP vs. conp neither in P nor NP-complete:

More information

Teaching Commutative Algebra and Algebraic Geometry. Geometry using Computer Algebra Systems

Teaching Commutative Algebra and Algebraic Geometry. Geometry using Computer Algebra Systems Teaching Commutative Algebra and Algebraic Geometry using Computer Algebra Systems Department of Mathematics, Simon Fraser University British Columbia, CANADA Computer Algebra in Education ACA 2012, Sofia,

More information

Counting Zeros over Finite Fields with Gröbner Bases

Counting Zeros over Finite Fields with Gröbner Bases Counting Zeros over Finite Fields with Gröbner Bases Sicun Gao May 17, 2009 Contents 1 Introduction 2 2 Finite Fields, Nullstellensatz and Gröbner Bases 5 2.1 Ideals, Varieties and Finite Fields........................

More information

ICALP g Mingji Xia

ICALP g Mingji Xia : : ICALP 2010 g Institute of Software Chinese Academy of Sciences 2010.7.6 : 1 2 3 Matrix multiplication : Product of vectors and matrices. AC = e [n] a ec e A = (a e), C = (c e). ABC = e,e [n] a eb ee

More information

BOOLEAN TENSOR FACTORIZATIONS. Pauli Miettinen 14 December 2011

BOOLEAN TENSOR FACTORIZATIONS. Pauli Miettinen 14 December 2011 BOOLEAN TENSOR FACTORIZATIONS Pauli Miettinen 14 December 2011 BACKGROUND: TENSORS AND TENSOR FACTORIZATIONS X BACKGROUND: TENSORS AND TENSOR FACTORIZATIONS C X A B BACKGROUND: BOOLEAN MATRIX FACTORIZATIONS

More information

CHAPTER 6. Direct Methods for Solving Linear Systems

CHAPTER 6. Direct Methods for Solving Linear Systems CHAPTER 6 Direct Methods for Solving Linear Systems. Introduction A direct method for approximating the solution of a system of n linear equations in n unknowns is one that gives the exact solution to

More information

an efficient procedure for the decision problem. We illustrate this phenomenon for the Satisfiability problem.

an efficient procedure for the decision problem. We illustrate this phenomenon for the Satisfiability problem. 1 More on NP In this set of lecture notes, we examine the class NP in more detail. We give a characterization of NP which justifies the guess and verify paradigm, and study the complexity of solving search

More information

Oriented covers of the triangular graphs

Oriented covers of the triangular graphs Oriented covers of the triangular graphs Akihiro Munemasa Tohoku University (joint work with Keiji Ito) March 30, 2018 Beijing Normal University A. Munemasa Triangular graphs March 30, 2018 1 / 23 Contents

More information

Incidence Structures Related to Difference Sets and Their Applications

Incidence Structures Related to Difference Sets and Their Applications aòµ 05B30 ü èµ Æ Òµ 113350 Æ Æ Ø Ø K8: 'u8'é(9ùa^ = Ø K8: Incidence Structures Related to Difference Sets and Their Applications úôœææ Æ Ø ž

More information

Designing rotating schedules by using Gröbner bases

Designing rotating schedules by using Gröbner bases Designing rotating schedules by using Gröbner bases Raúl Falcón 1, David Canca 1, Eva Barrena 2 1 University of Seville (Spain) 2 CIRRELT and HEC Montréal (Canada) {rafalgan, dco}@us.es, eva.barrena-algara@hec.ca

More information

arxiv: v3 [cs.sc] 3 May 2013

arxiv: v3 [cs.sc] 3 May 2013 On the Complexity of Computing Gröbner Bases for Quasi-Homogeneous Systems arxiv:1301.5612v3 [cs.sc] 3 May 2013 Jean-Charles Faugère * Jean-Charles.Faugere@inria.fr ABSTRACT Mohab Safey El Din * Mohab.Safey@lip6.fr

More information

EXPLORING THE COMPLEXITY OF THE INTEGER IMAGE PROBLEM IN THE MAX-ALGEBRA

EXPLORING THE COMPLEXITY OF THE INTEGER IMAGE PROBLEM IN THE MAX-ALGEBRA EXPLORING THE COMPLEXITY OF THE INTEGER IMAGE PROBLEM IN THE MAX-ALGEBRA MARIE MACCAIG Abstract. We investigate the complexity of the problem of finding an integer vector in the max-algebraic column span

More information

Sparse analysis Lecture II: Hardness results for sparse approximation problems

Sparse analysis Lecture II: Hardness results for sparse approximation problems Sparse analysis Lecture II: Hardness results for sparse approximation problems Anna C. Gilbert Department of Mathematics University of Michigan Sparse Problems Exact. Given a vector x R d and a complete

More information

1. Introduction Recap

1. Introduction Recap 1. Introduction Recap 1. Tractable and intractable problems polynomial-boundness: O(n k ) 2. NP-complete problems informal definition 3. Examples of P vs. NP difference may appear only slightly 4. Optimization

More information

Geometry of Gaussoids

Geometry of Gaussoids Geometry of Gaussoids Bernd Sturmfels MPI Leipzig and UC Berkeley p 3 p 13 p 23 a 12 3 p 123 a 23 a 13 2 a 23 1 a 13 p 2 p 12 a 12 p p 1 Figure 1: With The vertices Tobias andboege, 2-faces ofalessio the

More information

An application of regular chain theory to the study of limit cycles

An application of regular chain theory to the study of limit cycles International Journal of Bifurcation and Chaos c World Scientific Publishing Company An application of regular chain theory to the study of limit cycles Changbo Chen Department of Computer Science, University

More information

Solving Parametric Polynomial Systems by RealComprehensiveTriangularize

Solving Parametric Polynomial Systems by RealComprehensiveTriangularize Solving Parametric Polynomial Systems by RealComprehensiveTriangularize Changbo Chen 1 and Marc Moreno Maza 2 1 Chongqing Key Laboratory of Automated Reasoning and Cognition, Chongqing Institute of Green

More information

Analysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields

Analysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields Nonlinear Phenomena in Complex Systems, vol. 17, no. 3 (2014), pp. 278-283 Analysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields N. G. Kuzmina and E. B. Makhovenko Saint-Petersburg

More information

On the complexity of polynomial system solving

On the complexity of polynomial system solving Bruno Grenet LIX École Polytechnique partly based on a joint work with Pascal Koiran & Natacha Portier XXVèmes rencontres arithmétiques de Caen Île de Tatihou, June 30. July 4., 2014 Is there a (nonzero)

More information

WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE

WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE JEFFREY B. FARR AND ROMAN PEARCE Abstract. We comment on the implementation of various algorithms in multivariate polynomial theory. Specifically, we describe

More information

Linear Algebra. Matrices Operations. Consider, for example, a system of equations such as x + 2y z + 4w = 0, 3x 4y + 2z 6w = 0, x 3y 2z + w = 0.

Linear Algebra. Matrices Operations. Consider, for example, a system of equations such as x + 2y z + 4w = 0, 3x 4y + 2z 6w = 0, x 3y 2z + w = 0. Matrices Operations Linear Algebra Consider, for example, a system of equations such as x + 2y z + 4w = 0, 3x 4y + 2z 6w = 0, x 3y 2z + w = 0 The rectangular array 1 2 1 4 3 4 2 6 1 3 2 1 in which the

More information

Isomorphism of Polynomials : New Results

Isomorphism of Polynomials : New Results Isomorphism of Polynomials : New Results Charles Bouillaguet, Jean-Charles Faugère 2,3, Pierre-Alain Fouque and Ludovic Perret 3,2 Ecole Normale Supérieure {charles.bouillaguet, pierre-alain.fouque}@ens.fr

More information

MXL2 : Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy

MXL2 : Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy MXL2 : Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy Mohamed Saied Emam Mohamed 1, Wael Said Abd Elmageed Mohamed 1, Jintai Ding 2, and Johannes Buchmann 1 1 TU Darmstadt, FB

More information

1 Approximate Counting by Random Sampling

1 Approximate Counting by Random Sampling COMP8601: Advanced Topics in Theoretical Computer Science Lecture 5: More Measure Concentration: Counting DNF Satisfying Assignments, Hoeffding s Inequality Lecturer: Hubert Chan Date: 19 Sep 2013 These

More information

Computations Modulo Regular Chains

Computations Modulo Regular Chains Computations Modulo Regular Chains Xin Li, Marc Moreno Maza and Wei Pan (University of Western Ontario) ISSAC 2009, Seoul July 30, 2009 Background A historical application of the resultant is to compute

More information

Counting and Gröbner Bases

Counting and Gröbner Bases J. Symbolic Computation (2001) 31, 307 313 doi:10.1006/jsco.2000.1575 Available online at http://www.idealibrary.com on Counting and Gröbner Bases K. KALORKOTI School of Computer Science, University of

More information

On Polynomial Systems Arising from a Weil Descent

On Polynomial Systems Arising from a Weil Descent On Polynomial Systems Arising from a Weil Descent Christophe Petit and Jean-Jacques Quisquater UCL Crypto Group, Université catholique de Louvain Place du Levant 3 1348 Louvain-la-Neuve (Belgium) christophe.petit@uclouvain.be,

More information

On Fulton s Algorithm for Computing Intersection Multiplicities

On Fulton s Algorithm for Computing Intersection Multiplicities On Fulton s Algorithm for Computing Intersection Multiplicities Steffen Marcus 1 Marc Moreno Maza 2 Paul Vrbik 2 1 University of Utah 2 University of Western Ontario March 9, 2012 1/35 Overview Let f 1,...,f

More information

Solving a Binary Puzzle

Solving a Binary Puzzle Math.Comput.Sci. (2017) 11:515 526 DOI 10.1007/s11786-017-0322-4 Mathematics in Computer Science Solving a Binary Puzzle Putranto H. Utomo Rusydi H. Makarim Received: 7 December 2016 / Revised: 13 March

More information

Solving Quadratic Equations with XL on Parallel Architectures

Solving Quadratic Equations with XL on Parallel Architectures Solving Quadratic Equations with XL on Parallel Architectures Cheng Chen-Mou 1, Chou Tung 2, Ni Ru-Ben 2, Yang Bo-Yin 2 1 National Taiwan University 2 Academia Sinica Taipei, Taiwan Leuven, Sept. 11, 2012

More information

Determine the size of an instance of the minimum spanning tree problem.

Determine the size of an instance of the minimum spanning tree problem. 3.1 Algorithm complexity Consider two alternative algorithms A and B for solving a given problem. Suppose A is O(n 2 ) and B is O(2 n ), where n is the size of the instance. Let n A 0 be the size of the

More information

Groebner Bases, Toric Ideals and Integer Programming: An Application to Economics. Tan Tran Junior Major-Economics& Mathematics

Groebner Bases, Toric Ideals and Integer Programming: An Application to Economics. Tan Tran Junior Major-Economics& Mathematics Groebner Bases, Toric Ideals and Integer Programming: An Application to Economics Tan Tran Junior Major-Economics& Mathematics History Groebner bases were developed by Buchberger in 1965, who later named

More information

Week 15-16: Combinatorial Design

Week 15-16: Combinatorial Design Week 15-16: Combinatorial Design May 8, 2017 A combinatorial design, or simply a design, is an arrangement of the objects of a set into subsets satisfying certain prescribed properties. The area of combinatorial

More information

arxiv: v3 [cs.sc] 21 Oct 2016

arxiv: v3 [cs.sc] 21 Oct 2016 On the Efficiency of Solving Boolean Polynomial Systems with the Characteristic Set Method Zhenyu Huang, Yao Sun, Dongdai Lin SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences,

More information

Lecture 24 : Even more reductions

Lecture 24 : Even more reductions COMPSCI 330: Design and Analysis of Algorithms December 5, 2017 Lecture 24 : Even more reductions Lecturer: Yu Cheng Scribe: Will Wang 1 Overview Last two lectures, we showed the technique of reduction

More information

Determinants of Partition Matrices

Determinants of Partition Matrices journal of number theory 56, 283297 (1996) article no. 0018 Determinants of Partition Matrices Georg Martin Reinhart Wellesley College Communicated by A. Hildebrand Received February 14, 1994; revised

More information

A new perspective on long range SU(N) spin models

A new perspective on long range SU(N) spin models A new perspective on long range SU(N) spin models Thomas Quella University of Cologne Workshop on Lie Theory and Mathematical Physics Centre de Recherches Mathématiques (CRM), Montreal Based on work with

More information