Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm
|
|
- Penelope Marshall
- 6 years ago
- Views:
Transcription
1 110 Cryptanalyss of a Publc-key Cryptosystem Usng Lattce Bass Reducton Algorthm Roohallah Rastagh 1, Hamd R. Dall Oskoue 2 1,2 Department of Electrcal Engneerng, Aeronautcal Unversty of Snce & Technology, Tehran, Iran Abstract In ths paper, we proposed a new attack aganst Hwang et al. s cryptosystem. Ths cryptosystem uses a super-ncreasng sequence as prvate key and the authors nvestgate a new algorthm called permutaton combnaton algorthm to enhance densty of knapsack to avod the low-densty attack. Sattar J. Aboud [Aboud j. Sattar, An mproved knapsack publc key cryptography system, Internatonal Journal of Internet Technology and Secured Transactons, Vol.3 (3), pp , 2011] used Shamr s attack on the basc Merkle-Hellman cryptosystem to break ths cryptosystem. Due to use of Lenstera s nteger programmng, Lagaras showed that Shamr s attack s neffcent n practce; So, Aboud s attack s mpractcal too. In ths paper, we ntroduce a drect attack aganst Hwang et al. s cryptosystem based on Lattce bass reducton algorthms. By computng complexty of propose attack, we show that unlke Aboud s cryptanalyss, our cryptanalyss s more effcent and practcable. Key words: Knapsack-type cryptosystem, LLL-lattce bass reducton algorthm, smultaneous Dophantne approxmaton, Cryptanalyss. 1. Introducton The frst knapsack-type publc key cryptosystem (PKC) was ntroduced by Merkle and Hellman[12]. Snce ts proposal, knapsack-type PKC had been wdely studed and many knapsack PKCs were developed. However, almost all knapsack cryptosystems were shown nsecure n that they are vulnerable to some known attacks, such as low densty attack [2,8], orthogonal lattce attack [15],.... Nowadays, we reconsder knapsack publc key cryptography because Shor [17] showed that nteger factorzaton and dscrete logarthm problems can be easly solved by usng quantum computers. Therefore, tradtonal publc key cryptosystem based on the two problems cannot be used to provde prvacy protectons any longer and publc key cryptosystems secure n quantum computng envronments are needed to be developed. The knapsack problem s NP-complete [14]. Hence, we can desgn cryptosystems based on the knapsack problem n order to resst quantum attacks. On the other hand, although the underlyng problem s NP-complete, but some of the knapsack cryptosystems such as Merkle-Hellman [16], Chor-Rvest [18], was broken due to the specal structure of the prvate key and the mathematcal way that publc key (publc knapsack) was bult from the prvate key. M. S. Hwang et al. [6] ntroduced a new knapsack type publc key cryptosystem n Ths cryptosystem s based on basc Merkel-Hellman knapsack cryptosystem [12] and uses a super-ncreasng sequence as prvate key. They nvestgate a new algorthm called permutaton combnaton algorthm. By explotng ths algorthm, the authors attempted to enhance densty of knapsack to avod the low-densty attack. Hwang et al. knapsack-type cryptosystem was attacked by Aboud [1]. Aboud s attack s based on Shamr s attack [16] on the basc Merkle- Hellman cryptosystem. Lagaras [9] showed due to use of Lenstera s nteger programmng, Shamr s attack s neffcent n practce, so, Aboud s attack s not practcable. In ths paper, we use LLL-lattce bass reducton algorthm for analyss Hwang et al. s knapsack-type cryptosystem. The LLL-lattce bass reducton algorthm s a crucal component n many number-theoretc algorthms. It s useful for solvng certan knapsack (subset sum) problems, and has been used for cryptanalyzeng publc-key encrypton schemes whch are based on the subset sum problem. We show that because of the specal structure n the key generaton stage, we can use the LLL-lattce bass reducton algorthm for cryptanalyzeng Hwang et al. s cryptosystem and obtan equvalent prvate keys (superncreasng sequences). The rest of ths paper s organzed as follows: In the followng secton, we brefly explan some mathematcal background. These concepts are useful for understandng the securty analyss of the Hwang et al. s cryptosystem. Then, n Secton 3, we revew Hwang et al. s knapsack cryptosystem. New cryptanalyss of ths cryptosystem wll be dscussed n Secton 4 and n secton 5, we compute the computatonal complexty of the proposed attack.
2 Mathematcal Background In ths secton, we recall some concepts about the subsetsum problem and lattce theory. These concepts are useful to understand the securty analyss of the Hwang et al. s cryptosystem. The subset sum problem s stated as follows: Defnton1. (Subset sum problem (SSP)). A set of postve ntegers ( a1, a2,, a n ) and postve nteger s s gven. Whether there s a subset of the a s that ther sum equal to s. That s equvalent to determne whether there are varables x {0,1}, 1 n such that n x. a = s = 1 The Subset sum problem s a partcular case of the 0-1 knapsack problem. The subset sum problem has been proven to be NP-complete. The computatonal verson of the subset sum problem s NP-hard [13]. Defnton2. (super-ncreasng sequence). ) The sequence ( a1, a2,, a n ) of postve ntegers s a super-ncreasng 1 sequence, f a > j= 1 a j for all 2. There s an effcent greedy algorthm to solve the subset sum problem f the a are a super-ncreasng sequence: Just subtract the largest possble value from s and repeat. Algorthm1 effcently solves the subset sum problem for super-ncreasng sequences n the polynomal tme. Algorthm1:Solvng a super-ncreasng subset sum problem INPUT: super-ncreasng sequence ( a1, a2,, a n ) and an nteger s whch s the sum of a subset of the a s. OUTPUT: ( x1, x2,, x n ) where x {0,1}, such that n = 1 a. x s =. 1. n 2. Whle 1 do the followng: 2.2. If s a then x 1 and s s a Otherwse x Return( ( x1, x2,, x n ) ). Knapsack publc-key encrypton schemes are based on the subset sum problem, whch s NP-complete. The basc dea s to select an nstance of the subset sum problem that s easy to solve, and then to dsguse t as an nstance of the general subset sum problem whch s hopefully dffcult to solve. The orgnal knapsack set can serve as the prvate key, whle the transformed knapsack set serves as the publc key. Defnton3. Let =(,,..., ) and =(,,..., ) be two vectors n R. The nner product of and s the real number <,> = Defnton4. Let =(,,..., ) be a vector n R. The l norm (or Eucld norm) of s the real number y = < y, y > = y + y + + y n The sup norm, maxmum norm or l norm s: We can show that = max,,, Defnton5. Let {,,, } be a set of lnearly ndependent vectors n R ( ). The set of all nteger lnear combnatons of,,, s called a lattce of dmenson; that s m L = l f : l Z. = 1 The vectors,,, are called a bass for the lattce. Defnton6. (Gram-Schmdt orthogonalzaton). Let {,,, } be an arbtrary bass of R. Defne the vectors,1 nductvely by =, Where, =,, for 1. In partcular =. We wll call,,, the Gram-Schmdt orthogonal bass of {,,, } and the together, form the Gram-Schmdt orthogonalzaton of {,,, }. A lattce can have many dfferent bases. A bass consstng of vectors of relatvely small lengths s called reduced. The followng defnton provdes a useful noton of a reduced bass, and s based on the Gram-Schmdt orthogonalzaton procedure.
3 112 Defnton7. Let,,, R be lnearly ndependent and,,, the correspondng Gram-Schmdt orthogonal bass. Then {,,, } s reduced f for 1 <. So we have 2 = The bass {,,, } s sad to be reduced (more precsely, Lovász-reduced) f, 1 2, 1 < (where, denotes the absolute value of, ), and, 1<<. The LLL-lattce bass reducton algorthm s a crucal component n many number-theoretc algorthms such as smultaneous Dophantne approxmaton Problem. It s useful for solvng certan subset sum problems, and has been used for cryptanalyzeng publc-key encrypton schemes whch are based on the subset sum problem. Algorthm2[13]: LLL-lattce bass reducton algorthm INPUT: a bass{,,, } for a lattce n R,. OUTPUT: a reduced bass for. 1., <, >. 2. For from 2 to do the followng: For from 1 to 1, set, <, >/ and,. 2.3 <, > Execute subroutne (, 1) to possbly update some,. 5. If <(,) then do the followng: 5.1 Set μ μ,, +,, /, / and. 5.2 Exchange and. 5.3 If >2 then exchange, and, for =1,2,, For =+1,+2,,: Set,,,,, and, t+μ, μ,. 5.5 (2, 1). 5.6 Go to step 4. Otherwse, for = 2, 3,,1, execute (,), and fnally set If then go to step 4. Otherwse, return {,,, }. (,): If, >1/2 then do the followng: ,,. 2. For from 1 to 1, set,,,. 3.,,. The LLL-lattce bass reducton algorthm s a polynomaltme algorthm for fndng a reduced bass, gven a bass for a lattce. Theorem1. Let Z be a lattce wth bass {,,, }, and let R, 2 be such that for =1,2,...,. Then the number of arthmetc operatons needed by Algorthm2 s ( ), on ntegers of sze ( ) bts, whch s polynomal tme. Proof: see [11]. Lemma 1. Let,,, be a LLL reduced bass of a ratonal lattce Q and,,, be ts Gram- Schmdt orthogonalzaton. Then Proof: see [5]. ()=. Defnton8. (Smultaneous Dophantne Approxmaton Problem). Let,,, R and let >0. Let N be an nteger such that. The smultaneous dophantne approxmaton problem s to fnd (,,, ) Z such that 0< and / / for all 1. A major applcaton of algorthm2 s to gve an algorthm to compute the ntegers (,,, ) n Defnton8. In practce, the real numbers,,, are gven to some decmal precson (and so are ratonal numbers wth coeffcents of some sze). The sze of an nstance of the smultaneous Dophantne approxmaton s the sum of the bt lengths of the numerator and denomnator of the gven approxmatons to the, together wth the bt length of the representaton of and. Let be a bound on the absolute value of all numerators and denomnators of the.the computatonal task s to fnd a soluton (,,, ) n tme whch s polynomal n, log(), log(1/) and logq.
4 113 Theorem2. (Solvng the smultaneous Dophantne approxmaton problem). Let,,, Q be gven as ratonal numbers wth numerator and denomnator bounded n absolute value by. Let 0<<1. One can compute n polynomal tme ntegers (,,, ) such that 0<<2 ()/ () and / / for all 1. Proof: A general proof of ths theorem s gven n [7] but we ntroduce dfferent and smple proof. Let = 2 ()/ and Q be the lattce by the rows,, Q of the matrx / The dmenson s +1 and the determnant s /= 2 ()/. The entres of the lattce are ratos of ntegers wth absolute value bounded by {, ()/ }. Note that the lattce does not have a bass wth entres n Z, but rather n Q. The LLL algorthm appled to, outputs a non-zero vector =(,, )=(/,,,, ). If s the smallest vector found by the LLL-algorthm, then from defnton7, we have By multplyng together the +1 above nequalty, we have Hence, () ()/ 2 / ( ) /() From lemma 1, we know that ()= and so 2 / () /() =2 / 2 / =<1. If =0 then =(0,,,, ) wth some 0 and so 1, hence 0. Wthout loss of generalty, >0. Snce and <<1 t follows that /<<1 (where =/= ) and so 0<</=2 ()/ (). Smlarly, for other, 2 we have and so / / for 1. Theorem3. If we use LLL algorthm for solvng Smultaneous Dophantne Approxmaton Problem, then the computatonal complexty of the problem s ( { (), + (1/)} ), whch s polynomal tme. Proof: See [7]. 3. Hwang Et Al. s Cryptosystem Hwang et al. s cryptosystem s based on the basc Merkle- Hellman knapsack cryptosystem. 3.1 Key Generaton: Each user chooses a super-ncreasng sequence (,,, ) as secret key..e. > (=1,2,,1360). Choose a large prme as modulus such that >, two modular multplers and such that (,)=1, and. =1. Each user transfers super-ncreasng sequence =(,,, ) nto a pseudorandom sequence =(,,, ) as follows: =., (1 1360) (1) The publc key s (,,, ) and the prvate key s {(,,, ),,,}. They presented a permutaton combnaton algorthm and used ths algorthm to ensure the securty of the cryptosystem. By explotng ths algorthm, they attempted to enhance densty of knapsack to avod the low-densty attack [2, 8]. The permutaton algorthm s as follows: 1. Defne an orgnal sequence ={,,,,,,,, }. 2. Recombne all the elements of the orgnal sequence whch obtan (! 1) sequences,..., (!). The sequences (=1,2,,! 1) are defned as follows: ={,,,,,,,, } ={,,,,,,,, }! ={,,,,,, } 3. Suppose we can compute for 1! 1. can be wrtten as = ( )!, 0. Each sequence has an own correspondng value called the
5 114 factoral carry value, {,,.,, }. Usng the factoral carry value, we can effcently obtan any sequence wth the followng algorthm. Algorthm 3: permutaton combnaton algorthm INPUT: =(,,, ) and ntegers. OUTPUT: =(,,, ). = ( )!. For 1 do f = 0 then = ; else { for (1 ) do = }; Return (,,, ). For nstance, generate the orgnal vector 0 = (,,,,,). Fnd the result of : 100=0 5!+4 4!+0 3!+2 2!+0 1!+0 then = (,,,,,). 3.2 Encrypton: For encrypt the message, the sender executes the followng steps: 1. Select a hash functon whose dgest s 1024 bts and compute the dgest of as = (). 2. Compute = 170! 3. Compute the factoral carry value ={,,, } of where = 169!+ 168!+ + 0! 4. Dvde the publc key vector =(,,, ) nto 8 subset publc key vectors. Each subset publc key vector has 170 elements. ={(,,, ),...,(,,, )}. 5. Recombne each subset publc key vector usng ={,,, } by means of the permutaton combnaton Algorthm. Then chooses the frst 128 elements n each subset publc key vector. Thus, the sender obtan 1024 elements = (,,, ). 6. The message s dvded nto {,,, }. Each (=1,2,,) s a 1024-bt message: ={,,,, } 7. The correspondng cphertext s gven as the product of =(,,, ) and (= 1,2,,). =,, 1. The cphertext s ={,..., } and sends (, ) to the recever. 3.3 Decrypton: Recever after recevng (, ), executes the followng steps to derve from and : 1. Compute the factoral carry value ={,,, } of where = 169!+ 168!+, Dvde hs/her secret key vector =(,,, ) nto 8 subset publc key vectors. Each key vector has 170 elements. = {(,,, ),...,(,,, )}. 3. Recombne each subset publc key vector usng ={,,, } by means of the Permutaton Combnaton Algorthm. Then chooses the frst 128 elements n each subset publc key vector. The recever obtan 1024 elements =(,,, ). However =(,,, ) s stll a superncreasng sequence. 5. Dvde nto ={,..., }. Each (=1,2,,) s a 1024-bt cphertext. 6. Compute = = ( = ( =, ), ), for =1,2,,. So we have =,. Snce > we have =,. Hence, the recever can solves these super-ncreasng knapsack problems wth algorthm1 and obtans, for and 1. Therefore, we can recover orgnal message ={,,, } where ={,,,, }. Aboud attacked ths cryptosystem by usng Shamr s attack [16] on the basc Merkle-Hellman cryptosystem. As we sad, Lagaras n [9] showed Shamr s attack s neffcent n practce, so Aboud s attack s not practcable.
6 Our Proposed Attack In ths secton, we present our attack aganst the Hwang et al. s knapsack cryptosystem. The frst step n the attack s notcng that the gven knapsack problem = (wth publc weghts (,,..., ) and target ) can be transformed nto nfntely many dfferent easy knapsack problems wth super-ncreasng weghts (,,..., ) and target. Ths was ndependently observed by Eer-Lagger [4] and Desmedt-Vanderwalle-Govaerts [3]. Ther result can be summarzed n the followng lemma. Let (,,, ) be the prvate super-ncreasng sequence, (,,..., ) be the Correspondng publc key such that =. and, be defned as n secton 3. Let =, so we have =.. Lemma 2. There exsts an >0 such that f s ratonal wth <, then the weghts (,,..., ) where = for =1,..., are super-ncreasng. Our attack conssts of three steps: n step1, we can use LLL-lattce bass reducton algorthm for fndng a superncreasng sequence =(,,, ) that s very close to super-ncreasng sequence =(,,, ). In step2 and step3 we use super-ncreasng sequence = (,,, ) and publc cphertext (, ) for recover the plantext. Step1: In the general form, equaton (1) can be wrtten as follows: =., 1. Where (,,, ) s the publc key and (,,, ) s the prvate key. Let = where 1 <. We have =. =.,1 (2) Ths means that for 1, there exsts some ntegers such that and 0 <. Hence, = 0 / / = /. (3) Snce (,,, ) s a super-ncreasng sequence, so 2 and wth > we have 0 </2 Hence 0 / / <1/ 2. In partcular, the rght sde of / / <1/( 2 ) s very small. Hence, we can assume / /. (4) From equaton (4), If we take = and =, then / s very close to / and from lemma 2, the postve ntegers = for 1 are a superncreasng sequence (note that s are publc and obvous). Subtractng the case =1 of equaton (3) from the -th gves and so, for 2, = = = < =2 < (5) Snce s publc, It remans to compute the nteger such that equaton (5) holds, gven only the ntegers,,...,. Another way to wrte equaton (5) s <,2. (6) and one sees that the problem s precsely smultaneous Dophantne approxmaton. From theorem2, We can solve the smultaneous Dophantne approxmaton n the polynomal tme and fnd a value for. We now set = and = (note that s publc) and computes = for 1 to obtan the sequence (,,..., ), as we sad ths s a super-ncreasng sequence. We then compute = ( ) for any challenge cphertext. Snce (,,..., ) s super-ncreasng sequence, we can solve an easy knapsack problem = wth algorthm1 and therefore the orgnal message bts,1 are recovered. Let =2 ()/ and =/. We can use LLL-lattce bass reducton for solve equaton (5) (smultaneous Dophantne approxmaton) and hence, the value of = s determnd. Consder the lattce () wth dmenson +1 and bass matrx 0 0 =
7 IJCSI Internatonal Journal of Computer Scence Issues, Vol. 9, Issue 5, No 1, September where 0<<1 and 1<<. LLL-lattce bass reducton algorthm can be appled to the lattce () to output a relatvely short vector =( 1, 2,, ), whch can be used to approxmate the smultaneous Dophantne approxmaton problem. Snce (), there exst ntegers,,, such that =(,,, ) =(,,,, ) where (,,, ) s the publc key. After computng =(,,, ) wth LLL-lattce bass reducton algorthm, we can compute from equaton =. Wth the par (, )=(, ), we now compute ntegers =., 1 n whch form lemma 2, ths s a super-ncreasng sequence. We can use ths sequence n place of to prvate key (,,, ). Step2: We can eavesdrop publc cphertext (, ) from nsecure channel and hence we can compute factoral carry value ={,,, } of where = 169!+ 168!+ + 0! wth the followng algorthm. Algorthm4: compute the factoral carry value of nteger INPUT: ntegers, such that <!. OUTPUT: {,,..., } such that 0 and = ( )! for =1 to do ()! (+1 )! 3. Return "{,,..., }" Step3: We dvde super-ncreasng sequence (,,, ) (whch s computed n step1) nto 8 subset publc key vectors: = {(,,, ), (,,, ), (,,, )}. and recombne each subset publc key vector usng factoral carry value =(,,, ) (whch s computed n step2) by means of the permutaton combnaton algorthm. Smlar Hwang et al. s cryptosystem, we can choose frst 128 elements n each subset publc key vector. Then, we wll obtan 1024 elements (,,, ). Wth computed par (, ) from step1, frst compute = and then dvde nto ={,..., }. Each,1 s a 1024-bt message. Now, snce (,,, ) s super-ncreasng sequence, we can use algorthm1 for solve the followng superncreasng subset sum problems: =, =, (7) =, and recover message bts ={,,,, },1 to obtan the orgnal message ={,,, } for any challenge cphertext (, ). 5. Performance Analyss of Attack As we see n secton 4, n step1, we need to fnd a par of ntegers (, ) such that / s very close to / (where = ( ) and are parts of the prvate key and (,,, ) s publc key). As we showed, we can take = where s publc. So we need to fnd a value for =. In step2, we can use algorthm4 for fnd the factoral carry value ={,,, } of the publc value. In step3, we need one modular multplcaton for compute and (1024 ) subtracton to solve equaton (7) wth algorthm1 for recover the orgnal message = {,,, } from any challenge cphertext (, ). Hence, the more dffcult and mportant part of attack s step1. In step1, we used smultaneous Dophantne approxmaton problem for fndng the value of =. So we need to compute the computatonal complexty of smultaneous Dophantne approxmaton problem. complexty of ths problem s gven n theorem3 where take ( { (), + (1/)} ) bt operatons, whch s polynomal tme. Consequently, the proposed attack s polynomal tme and practcable.
8 Concluson We consdered cryptanalyss of a knapsack-type publc key cryptosystem. Ths cryptosystem uses a combnaton permutaton algorthm n the encrypton phase to avod the low densty attack by keepng the densty hgh. Ths cryptosystem s vulnerable to LLL-lattce bass reducton algorthm, snce t uses a super-ncreasng sequence as a prvate key and attempt to hde ths sequence wth modular multplcaton for constructng the publc key. But as we showed, the modular multplcaton cannot hde the superncreasng sequence. To avod ths attack we can choose another easy knapsack problem that s not a superncreasng sequence or we do not use modular multplcaton for producng the publc key from the prvate key. References [1] Aboud j. Sattar, An mproved knapsack publc key cryptography system, Internatonal Journal of Internet Technology and Secured Transactons, Vol.3 (3), pp , [2] M. J. Coster, B. A. LaMaccha, A. M. Odlyzko, and C. P. Schnorr, An mproved low-densty subset sum algorthm, n Advances n Cryptology, EUROCRYPT 91, Lecture Notes n Computer Scence, vol. 547, pp , [3] Y. G. Desmedt, J. P. Vandewalle, and R. J. M. Govaerts, A crtcal analyss of the securty of knapsack publc-key algorthms, IEEE Transactons on Informaton Theory, vol.it-30(4), pp , July [4] R. Eer and H. Lagger, Trapdoors n knapsack cryptosystems, (In T. Beth, edtor), Advances n Cryptology Proceedngs of CRYPTO 82, Lecture Notes n Computer Scence, vol.149, pp , Sprnger- Verlag, [5] S. Galbrath, Mathematcs of Publc Key Cryptography, verson 0.2. Avalable n: [6] M. S. Hwang, C. C. Lee, and S. F. Tzeng, A New Knapsack Publc-Key Cryptosystem Based on Permutaton Combnaton Algorthm, Internatonal Journal of Appled Mathematcs and Computer Scences vol. 5; 1, pp , Wnter [7] J.C. Lagaras, The computatonal complexty of smultaneous dophantne approxmaton problems, SIAM Journal of Computng vol.14, pp , [8] J. C. Lagaras and A. M. Odlyzko, Solvng low-densty subset sum problems, J. Ass. Comput. Much. vol. 32, no. 1, pp Jan [9] J. C. Lagaras, Performance Analyss of Shamr s Attack on the Basc Merkle-Hellman Knapsack Publc Key Cryptosystem, Proc. 11th Intern. Colloquum on Automata, Languages and Programmng (ICALP), Lecture Notes n Computer Scence, vol. 172, pp , Sprnger-Verlag, Berln, [10] H. W. Lenstra, Jr, Integer programmng wth a fxed number of varables, Report (Second verson), Unversty of Amsterdam, November [11] K. Lenstra, H. W. Lenstra Jr., and L. Lovász, Factorng Polynomals wth ratonal coeffcents, Math. Ann., vol.261, pp , [12] R. Merkle and M. E. Hellman, Hdng nformaton and sgnatures n trapdoor knapsack, IEEE Trans. Inform. Theory, vol. IT-24, pp , Sept [13] Menezes, P. van Oorschot and S. Vanstone, Handbook of Appled Cryptography. CRC Press, [14] R. Mchael, and S. Davd, Computers and Intractablty: A gude to the theory of NP-completeness. W. H. Freeman & Co., San Francsco, [15] P. Nguyen, J. Stern, Merkle-Hellman revsted: A cryptanalyss of the Qu-Vanstone cryptosystem based on group factorzatons, n: Proceedngs of Crypto'97, LNCS, vol. 1294, pp , Sprnger-Verlag, [16] Shamr, A Polynomal-tme Algorthm for Breakng the Basc Merkle-Hellman Cryptosystem, Proceedngs of the IEEE Symposum on Foundatons of Computer Scence, New York, pp , [17] P.W. Shor, Polynomal-tme algorthms for prme factorzaton and dscrete logarthms on a quantum computer, SIAM Journal of Computng, vol. 26, pp , [18] S. Vaudenay, Cryptanalyss of the Chor-Rvest cryptosystem, Advances n Cryptology CRYPTO 98, LNCSe, vol. 1462, pp , Sprnger- Verlag, Berln, Roohallah Rastagh has receved hs BSc degree n electrcal engneerng and MSc degrees n secure communcaton from the Aeronautcal Unversty of snce and Technology, Iran n 2003 and 2010, respectvely. Hs research nterests nclude cryptology especally desgn and analyze of publckey cryptography. Hamd Reza Dall Oskoue receved hs BSc and MSc degrees n electrcal engneerng from the Unversty of Aeronautcal Scence & Technology and the Trabat Modares Unversty, Iran n 2002 and 2004, respectvely. He obtaned hs PhD degree n electrcal engneerng from Trabat Modares Unversty, Tehran, Iran. He then joned the Unversty of Aeronautcal Scence & Technology, Tehran, Iran, as an assstant professor n 2006, hs research areas are Communcaton, Radar,Mcrowave component, Antenna and wave propagaton. Dr. Oskoue has served as a revewer for a number of journals and conferences.
Lecture 2: Gram-Schmidt Vectors and the LLL Algorithm
NYU, Fall 2016 Lattces Mn Course Lecture 2: Gram-Schmdt Vectors and the LLL Algorthm Lecturer: Noah Stephens-Davdowtz 2.1 The Shortest Vector Problem In our last lecture, we consdered short solutons to
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationCryptanalysis of pairing-free certificateless authenticated key agreement protocol
Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen
More informationSpeeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence
More informationAttacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction
Attacks on RSA The Rabn Cryptosystem Semantc Securty of RSA Cryptology, Tuesday, February 27th, 2007 Nls Andersen Square Roots modulo n Complexty Theoretc Reducton Factorng Algorthms Pollard s p 1 Pollard
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationThe internal structure of natural numbers and one method for the definition of large prime numbers
The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract
More informationA Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition
(IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationThe Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL
The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp
More informationMath 261 Exercise sheet 2
Math 261 Exercse sheet 2 http://staff.aub.edu.lb/~nm116/teachng/2017/math261/ndex.html Verson: September 25, 2017 Answers are due for Monday 25 September, 11AM. The use of calculators s allowed. Exercse
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationExample: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,
The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson
More informationErrors for Linear Systems
Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch
More informationA PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS
HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,
More informationn α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0
MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector
More informationSome Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM
Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s
More informationFinding Primitive Roots Pseudo-Deterministically
Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms
More informationCalculation of time complexity (3%)
Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More information2.3 Nilpotent endomorphisms
s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms
More informationA new Approach for Solving Linear Ordinary Differential Equations
, ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of
More informationThe L(2, 1)-Labeling on -Product of Graphs
Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh
More informationU.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016
U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More informationAn efficient algorithm for multivariate Maclaurin Newton transformation
Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,
More informationComputing Correlated Equilibria in Multi-Player Games
Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,
More informationThe Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationNUMERICAL DIFFERENTIATION
NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the
More informationCryptanalysis of Threshold Proxy Signature Schemes 1)
MM Research Preprnts, 226 233 MMRC, AMSS, Academa Snca No. 23, December 24 Cryptanalyss of Threshold Proxy Sgnature Schemes 1) Zuo-Wen Tan and Zhuo-Jun Lu Key Laboratory of Mathematcs Mechanzaton Insttute
More information5 The Rational Canonical Form
5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces
More informationFormulas for the Determinant
page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use
More informationNotes on Frequency Estimation in Data Streams
Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to
More informationLecture 3. Ax x i a i. i i
18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest
More informationSection 3.6 Complex Zeros
04 Chapter Secton 6 Comple Zeros When fndng the zeros of polynomals, at some pont you're faced wth the problem Whle there are clearly no real numbers that are solutons to ths equaton, leavng thngs there
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationThe Expectation-Maximization Algorithm
The Expectaton-Maxmaton Algorthm Charles Elan elan@cs.ucsd.edu November 16, 2007 Ths chapter explans the EM algorthm at multple levels of generalty. Secton 1 gves the standard hgh-level verson of the algorthm.
More informationStanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011
Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected
More informationCOS 521: Advanced Algorithms Game Theory and Linear Programming
COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton
More informationMEM 255 Introduction to Control Systems Review: Basics of Linear Algebra
MEM 255 Introducton to Control Systems Revew: Bascs of Lnear Algebra Harry G. Kwatny Department of Mechancal Engneerng & Mechancs Drexel Unversty Outlne Vectors Matrces MATLAB Advanced Topcs Vectors A
More information8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars
More informationLecture 12: Discrete Laplacian
Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly
More informationConvexity preserving interpolation by splines of arbitrary degree
Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017
U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that
More informationKernel Methods and SVMs Extension
Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general
More informationLecture 10: May 6, 2013
TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,
More informationYong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 )
Kangweon-Kyungk Math. Jour. 4 1996), No. 1, pp. 7 16 AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS Yong Joon Ryang Abstract. The optmzaton problems wth quadratc constrants often
More informationLecture 5 Decoding Binary BCH Codes
Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture
More informationFeature Selection: Part 1
CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?
More informationImproved Integral Cryptanalysis of FOX Block Cipher 1
Improved Integral Cryptanalyss of FOX Block Cpher 1 Wu Wenlng, Zhang Wentao, and Feng Dengguo State Key Laboratory of Informaton Securty, Insttute of Software, Chnese Academy of Scences, Bejng 100080,
More informationA Hybrid Variational Iteration Method for Blasius Equation
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method
More informationInner Product. Euclidean Space. Orthonormal Basis. Orthogonal
Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,
More informationa b a In case b 0, a being divisible by b is the same as to say that
Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :
More information= = = (a) Use the MATLAB command rref to solve the system. (b) Let A be the coefficient matrix and B be the right-hand side of the system.
Chapter Matlab Exercses Chapter Matlab Exercses. Consder the lnear system of Example n Secton.. x x x y z y y z (a) Use the MATLAB command rref to solve the system. (b) Let A be the coeffcent matrx and
More informationPost-quantum Key Exchange Protocol Using High Dimensional Matrix
Post-quantum Key Exchange Protocol Usng Hgh Dmensonal Matrx Rchard Megrelshvl I. J. Tbls State Unversty rchard.megrelshvl@tsu.ge Melksadeg Jnkhadze Akak Tseretel State Unversty Kutas, Georga mn@yahoo.com
More informationLinear Approximation with Regularization and Moving Least Squares
Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...
More informationProvable Security Signatures
Provable Securty Sgnatures UCL - Louvan-la-Neuve Wednesday, July 10th, 2002 LIENS-CNRS Ecole normale supéreure Summary Introducton Sgnature FD PSS Forkng Lemma Generc Model Concluson Provable Securty -
More informationMMA and GCMMA two methods for nonlinear optimization
MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons
More informationLecture 10 Support Vector Machines II
Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed
More informationSL n (F ) Equals its Own Derived Group
Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu
More informationGeneralized Linear Methods
Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationSection 8.3 Polar Form of Complex Numbers
80 Chapter 8 Secton 8 Polar Form of Complex Numbers From prevous classes, you may have encountered magnary numbers the square roots of negatve numbers and, more generally, complex numbers whch are the
More informationRecover plaintext attack to block ciphers
Recover plantext attac to bloc cphers L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Abstract In ths paper, we wll present an estmaton for the upper-bound of the amount of 16-bytes plantexts for Englsh
More informationTime-Varying Systems and Computations Lecture 6
Tme-Varyng Systems and Computatons Lecture 6 Klaus Depold 14. Januar 2014 The Kalman Flter The Kalman estmaton flter attempts to estmate the actual state of an unknown dscrete dynamcal system, gven nosy
More informationSingular Value Decomposition: Theory and Applications
Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real
More informationCHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE
CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng
More informationA New Refinement of Jacobi Method for Solution of Linear System Equations AX=b
Int J Contemp Math Scences, Vol 3, 28, no 17, 819-827 A New Refnement of Jacob Method for Soluton of Lnear System Equatons AX=b F Naem Dafchah Department of Mathematcs, Faculty of Scences Unversty of Gulan,
More informationMaximizing the number of nonnegative subsets
Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum
More informationarxiv: v1 [cs.cr] 22 Oct 2018
CRYPTOGRAPHIC ANALYSIS OF THE MODIFIED MATRIX MODULAR CRYPTOSYSTEM arxv:181109876v1 [cscr] 22 Oct 2018 VITALIĬ ROMAN KOV Abstract We show that the Modfed Matrx Modular Cryptosystem proposed by SK Rososhek
More informationLECTURE 9 CANONICAL CORRELATION ANALYSIS
LECURE 9 CANONICAL CORRELAION ANALYSIS Introducton he concept of canoncal correlaton arses when we want to quantfy the assocatons between two sets of varables. For example, suppose that the frst set of
More informationA CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS
Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs
More informationWeek 5: Neural Networks
Week 5: Neural Networks Instructor: Sergey Levne Neural Networks Summary In the prevous lecture, we saw how we can construct neural networks by extendng logstc regresson. Neural networks consst of multple
More informationOn the Repeating Group Finding Problem
The 9th Workshop on Combnatoral Mathematcs and Computaton Theory On the Repeatng Group Fndng Problem Bo-Ren Kung, Wen-Hsen Chen, R.C.T Lee Graduate Insttute of Informaton Technology and Management Takmng
More informationHomework Notes Week 7
Homework Notes Week 7 Math 4 Sprng 4 #4 (a Complete the proof n example 5 that s an nner product (the Frobenus nner product on M n n (F In the example propertes (a and (d have already been verfed so we
More informationOn the Multicriteria Integer Network Flow Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013
ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run
More informationMath 217 Fall 2013 Homework 2 Solutions
Math 17 Fall 013 Homework Solutons Due Thursday Sept. 6, 013 5pm Ths homework conssts of 6 problems of 5 ponts each. The total s 30. You need to fully justfy your answer prove that your functon ndeed has
More informationVARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES
VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES BÂRZĂ, Slvu Faculty of Mathematcs-Informatcs Spru Haret Unversty barza_slvu@yahoo.com Abstract Ths paper wants to contnue
More informationMin Cut, Fast Cut, Polynomial Identities
Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.
More informationThe Study of Teaching-learning-based Optimization Algorithm
Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute
More informationModule 9. Lecture 6. Duality in Assignment Problems
Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept
More informationA new construction of 3-separable matrices via an improved decoding of Macula s construction
Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula
More informationDISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization
DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.
More informationDynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence)
/24/27 Prevew Fbonacc Sequence Longest Common Subsequence Dynamc programmng s a method for solvng complex problems by breakng them down nto smpler sub-problems. It s applcable to problems exhbtng the propertes
More informationCryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-bit Block and n-bit Key
Cryptanalyss of Some Double-Block-Length Hash Modes of Block Cphers wth n-bt Block and n-bt Key Deukjo Hong and Daesung Kwon Abstract In ths paper, we make attacks on DBL (Double-Block-Length) hash modes
More informationNumerical Heat and Mass Transfer
Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and
More informationCommunication Complexity 16:198: February Lecture 4. x ij y ij
Communcaton Complexty 16:198:671 09 February 2010 Lecture 4 Lecturer: Troy Lee Scrbe: Rajat Mttal 1 Homework problem : Trbes We wll solve the thrd queston n the homework. The goal s to show that the nondetermnstc
More informationNorms, Condition Numbers, Eigenvalues and Eigenvectors
Norms, Condton Numbers, Egenvalues and Egenvectors 1 Norms A norm s a measure of the sze of a matrx or a vector For vectors the common norms are: N a 2 = ( x 2 1/2 the Eucldean Norm (1a b 1 = =1 N x (1b
More informationMath Review. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University
Math Revew CptS 223 dvanced Data Structures Larry Holder School of Electrcal Engneerng and Computer Scence Washngton State Unversty 1 Why do we need math n a data structures course? nalyzng data structures
More informationOn the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros
Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong
More informationComments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards
Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com
More informationThe Degrees of Nilpotency of Nilpotent Derivations on the Ring of Matrices
Internatonal Mathematcal Forum, Vol. 6, 2011, no. 15, 713-721 The Degrees of Nlpotency of Nlpotent Dervatons on the Rng of Matrces Homera Pajoohesh Department of of Mathematcs Medgar Evers College of CUNY
More informationOn quasiperfect numbers
Notes on Number Theory and Dscrete Mathematcs Prnt ISSN 1310 5132, Onlne ISSN 2367 8275 Vol. 23, 2017, No. 3, 73 78 On quasperfect numbers V. Sva Rama Prasad 1 and C. Suntha 2 1 Nalla Malla Reddy Engneerng
More information8.6 The Complex Number System
8.6 The Complex Number System Earler n the chapter, we mentoned that we cannot have a negatve under a square root, snce the square of any postve or negatve number s always postve. In ths secton we want
More informationNumerical Properties of the LLL Algorithm
Numercal Propertes of the LLL Algorthm Frankln T. Luk a and Sanzheng Qao b a Department of Mathematcs, Hong Kong Baptst Unversty, Kowloon Tong, Hong Kong b Dept. of Computng and Software, McMaster Unv.,
More information