Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q

Size: px
Start display at page:

Download "Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q"

Transcription

1 Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon Padebon, Gemany alexx@uni-padebon.de Abstact. We conside RSA-type schemes with modulus N = p q fo 2. We pesent two new attacks fo small secet exponent d. Both appoaches ae applications of Coppesmith s method fo solving modula univaiate polynomial equations [5]. Fom these new attacks we diectly deive patial key exposue attacks, i.e. attacks when the secet exponent is not necessaily small but when a faction of the secet key bits is known to the attacke. Inteestingly, all of these attacks wok fo public exponents e of abitay size. Additionally, we pesent patial key exposue attacks fo the value d p = d mod p 1 which is used in CRT-vaiants like Takagi s scheme [11]. Ou esults show that RSA-type schemes that use moduli of the fom N = p q ae moe susceptible to attacks that leak bits of the secet key than the oiginal RSA scheme. Keywods: N = p q, Coppesmith s method, Patial Key Exposue Attacks 1 Intoduction We investigate attacks on cyptogaphic schemes that use public moduli of the fom N = p q fo some constant > 1. Moduli of this type have ecently been used in diffeent cyptogaphic designs. Fujioke, Okamoto and Uchiyama [6] pesented an electonic cash scheme using a modulus N = p 2 q. Futhemoe, Okamoto and Uchiyama [10] designed an elegant public-key cypto scheme that is povably as secue as factoing a modulus N = p 2 q. A fast CRT-RSA vaiant using moduli of the fom N = p q was intoduced by Takagi [11] in The lage one chooses in Takagi s scheme, the moe efficient is the scheme fo a fixed bit-size of the modulus N. Conside an RSA-type scheme with public key (N, e), whee N = p q fo some fixed > 1 and p, q ae of the same bit-size. The secet key d satisfies ed = 1 mod φ(n), whee φ(n) is Eule s totient function. We denote by φ(n) the multiplicative goup of invetible integes modulo φ(n). In 1999, Boneh, Dufee and Howgave-Gaham [3] showed that schemes with moduli of the fom N = p q ae moe susceptible to attacks that leak bits of p than the oiginal RSA-scheme. Using Coppesmith s method fo solving

2 univaiate modula equations [5], they showed that it suffices to know a faction 1 of +1 of the MSBs of p to facto the modulus. It is an inteesting task, whethe schemes with N = p q ae also moe susceptible to attacks that leak bits of the secet exponent d. In most side-channel attack scenaios (see fo instance [7, 8]), it is moe easonable to assume that an advesay gains knowledge of a faction of the secet key bits than knowledge of the pime facto bits. Intuitively, one should expect that cypto-systems with moduli of the fom N = p q, > 1 ae moe vulneable to secet key attacks than the oiginal RSAscheme, since fo a fixed bit-size of N the amount of secet infomation encoded in the pime factos is smalle than in RSA. Hence, these schemes should be moe susceptible to small secet key attacks like the Wiene attack [12] and the Boneh-Dufee attack [1]. Likewise, these schemes should be moe susceptible to so-called patial key exposue attacks that use the knowledge of a faction of the secet key bits like the Boneh-Dufee-Fankel attack [2] and the Blöme-May attack [4]. In contast to this intuition, it was stated in the wok of Takagi [11] that RSA-type schemes with N = p q seem to be less vulneable to attacks fo small decyption exponents d than the oiginal RSA-scheme. Namely, Takagi showed a genealized Wiene-bound of d N 1 2(+1). Howeve, we intoduce two attacks with impoved bounds fo the size of d. Both new attacks ae applications of Coppesmith s method fo solving modula univaiate polynomial equations [5]. Ou fist attack diectly uses the esults of Boneh, Dufee and Howgave- Gaham [2] fo factoing N = p q. It yields an impoved bound of d N (+1) 2 fo 2. Let us compae the esults fo = 2: Takagi equies that d N 1 6 wheeas ou new method woks wheneve d N 2 9. Ou second method makes use of Coppesmith s method in the univaiate case and leads to the bound d N ( 1 +1 ) = N (+1) 2 fo 2. Inteestingly in contast to the pevious bounds, this new bound conveges to N fo gowing instead of conveging to 1. It impoves upon ou fist attack fo all paamete choices 3: The second attack equies that d N 1 4 in the case = 3 compaed to d N 3 16 fo ou fist method. Thus, ou fist attack is only supeio to the othe methods in the case = 2. On the othe hand, moduli of the fom N = p 2 q ae fequently used in cyptogaphy and theefoe they epesent one of the most impotant cases. Inteestingly, the new attacks fo small decyption exponents d have two new featues which the oiginal Wiene attack and the Boneh-Dufee attack do not possess: One cannot counteact the new attacks by choosing lage public exponents e, since the attacks ae independent of the value of e. In compaison, the Wiene bound d N 1 4 and the Boneh-Dufee bound d N equie

3 that e < φ(n). It is known that the attacks cannot be applied fo any size of d if e > N 1.5 o e > N 1.875, espectively. The new attacks immediately imply a patial key exposue attack fo d with known most significant bits (MSBs). Namely, it makes no diffeence in the attacks whethe the most significant bits of d ae zeo (and thus d is a small decyption exponent) o ae known to the attacke. In contast, Wiene s attack and the Boneh-Dufee attack fo small decyption exponents do not wok when the MSB s ae non-zeo but known. In addition, the new attacks also povide patial key exposue attacks fo known least significant bits (LSBs). Using the fist attack, we ae able to pove that a faction of 1 of the MSBs o LSBs of d ( + 1) 2 suffice to find the factoization of N = p q. The second attack yields patial key exposue attacks that equie only a faction of 4 of the MSBs o LSBs of d ( + 1) 2 in ode to facto N. The esulting patial key exposue attacks shae the same popety as the undelying attacks fo small decyption exponents d: They do not ely on the size of the public exponent e. Note that all patial key exposue attacks mentioned in the liteatue [2, 4] ae dependent on e and do not wok fo abitay e φ(n). The new methods ae the fist patial key exposue attacks that wok fo all public exponents e. The eason that all fome attacks on RSA-type schemes depend on the size of e is that they all compute the paamete k in the RSA key equation ed 1 = kφ(n). In contast, ou new attacks do not equie the computation of k. Thus, k must not be a small paamete and hence the paametes e and d can be inceased (theeby inceasing k) without affecting the usability of the attacks. The eason that ou new attacks do not equie the diect computation of k is mainly that fo moduli N = p q the goup ode of the multiplicative goup Z N is φ(n) = p 1 (p 1)(q 1). Thus fo 2, φ(n) and N shae the common divisos p and p 1, espectively, and this can be used in the attacks by constucting polynomials with small oots modulo p (ou fist attack) and modulo p 1 (ou second attack), espectively. But looking at the equation ed 1 = kφ(n) modulo p (espectively modulo p 1 ) emoves the unknown paamete k. We want to point out that these new attacks ae nomally not a theat to Takagi s scheme [11]. Since Takagi s CRT-decyption pocess only makes use of the values d p = d mod p 1 and d q = d mod q 1, it suffices to choose an d which satisfies ed = 1 mod (p 1)(q 1). Fo this kind of public-key/secet-key pai (e, d), ou pevious attacks do not apply. Even wose, nomally one would not even stoe the value of d but only the values of d p and d q fo the decyption

4 pocess. Theefoe, it is easonable to assume that an attacke may only get bits of d p o d q. Hence, it is an inteesting task to deive patial key exposue attacks fo known bits of d p (espectively d q ). We show that the patial key exposue attacks of Blöme and May [4] fo moduli N = pq genealize to the case N = p q. Inteestingly, the esults ae again much bette fo > 1. Namely, we pesent attacks that need only a faction of of the MSBs o LSBs of d p when the public exponent e is small. This shows that Takagi s scheme is also moe susceptible to attacks that leak bits of d p than nomal CRT-RSA. The pape is oganized as follows: In Section 2, we eview Coppesmith s method fo modula univaiate polynomial equations [5]. Hee, we intoduce a efomulation of Coppesmith s oginal theoem that unifies all known applications (see [2 5]) of the method in the univaiate case. As an example, we deive the esult of Boneh, Dufee and Howgave-Gaham [3] fo factoing N = p q as a diect application of Coppesmith s theoem. The fist attack fo small d and the coesponding patial key exposue attacks ae pesented in Section 3. In Section 4, we descibe ou second attack. The patial key exposue attacks fo d p ae pesented in Section 5. 2 Coppesmith s method and the esult of BDH Let us ecall Coppesmith s theoem fo solving modula univaiate polynomial equations [5]. Hee, we give the theoem in a slightly moe geneal fom than oiginally stated. Howeve, one can pove the theoem in a completely analogous way to the easoning in the oiginal poof of Coppesmith. We give the details of the poof in the full vesion of the pape. Theoem 1 (Coppesmith) Let N be an intege of unknown factoization, which has a diviso b N β. Let f b (x) be an univaiate, monic polynomial of degee δ. Futhemoe, let c N be a function that is uppe-bounded by a polynomial in log N. Then we can find all solutions x 0 fo the equation f b (x) = 0 mod b with in time polynomial in (log N, δ). x 0 c N N β2 δ Coppemith fomulated Theoem 1 fo the special case whee N = b. Then the bound fo the solutions becomes x 0 c N N 1 δ. Howeve, the above fomulation of Coppesmith s theoem has some advantages: Fo instance, it is not had to see that the esult of Boneh, Dufee and Howgave-Gaham [3] fo factoing N = p q with known bits is a diect application of Theoem 1 using the polynomial f p (x) = (x + p). In fact, the following theoem is stated in the oiginal wok of Boneh, Dufee and Howgave-Gaham fo the special case k = 1, but we fomulate it in a slightly moe geneal way, since we will use this genealization in Section 3.

5 Theoem 2 (BDH) Let N = p q, whee is a known constant and p, q ae of the same bit-size. Let k be an (unknown) intege that is not a multiple of p 1 q. Suppose we know an intege p with kp p N (+1) 2. Then N can be factoed in polynomial time. Let us intepet the esult of Theoem 2. In ode to facto N it suffices to find an intege p which is within the ange N (+1) 2 of some multiple of p (which is not a multiple of N). In the following section, we pesent ou fist new attack that constucts an intege p with the above popety wheneve d is sufficiently small. 3 The attack modulo p We pesent ou fist attack fo small decyption exponents d and aftewads extend this appoach to patial key exposue attacks. Theoem 3 Let N = p q, whee 2 is a known constant and p, q ae pimes of the same bit-size. Let (e, d) φ(n) be the public-key/secet-key pai satisfying ed = 1 mod φ(n). Suppose that d N (+1) 2. Then N can be factoed in pobabilistic polynomial time. Poof: We know that φ(n) = p 1 (p 1)(q 1) and theefoe the key pai (e, d) satisfies the equation ed 1 = kp 1 (p 1)(q 1) fo some k. (1) Let E be the invese of e modulo N, i.e. Ee = 1 + cn fo some c. If E does not exist then gcd(e, N) must be a non-tivial diviso of N. Note that each possible non-tivial diviso p s, p s q o q (1 s ) does immediately yield the complete factoization of N: p s can be easily factoed by guessing s and taking the s th oot ove the integes. On the othe hand, p s q yields N p s q = p s which educes this case to the pevious one. Similaly, q gives us p. Hence, let us assume wlog that the invese E of e modulo N exists. Multiplying equation (1) by E leads to d E = (Ekp 2 (p 1)(q 1) cp 1 qd)p. Thus, E is a multiple of p up to an additive eo of d N (+1) 2. In ode to apply Theoem 2, it emains to show that the expession Ekp 2 (p 1)(q 1) cp 1 qd is not a multiple of p 1 q. Since p 1 q divides the second tem, this is equivalent

6 to show that Ek(p 1)(q 1) is not a multiple of pq. By assumption, we have gcd(e, N) = 1 and thus it emains to pove that pq does not divide k(p 1)(q 1). Assume k(p 1)(q 1) = c pq fo some c. Then equation (1) simplifies to ed 1 = c N. On the othe hand we know that ee 1 = cn. Combining both equalities we obtain that d = E mod N. Since d, E < N we have d = E even ove. It is a well-known fact that the knowledge of the secet key d yields the factoization of N in pobabilistic polynomial time (see fo instance [9], Chapte 4.6.1). We biefly summaize ou factoization algoithm. (Mod p)-attack fo small d using a modulus N = p q INPUT: N (+1) 2. (N, e), whee N = p q and ed = 1 mod φ(n) fo some d 1. Compute E = e 1 mod N. If the computation of E fails, output p, q. 2. Run the algoithm of Theoem 2 on input E. If the algoithm s output is p, q then EXIT. 3. Othewise set d = E and un a pobabilistic factoization algoithm on input (N, e, d). OUTPUT: p, q Since evey step of the algoithm uns in (pobabilistic) polynomial time, this concludes the poof of the theoem. Theoem 3 gives us a polynomial time factoing algoithm wheneve a cetain amount of the MSBs of d ae zeo. The following coollay shows how the poof of Theoem 3 can be easily genealized such that the esult does not only hold if the MSBs of d ae zeo but instead if they ae known to the attacke. This gives as a patial key exposue attack fo known MSBs with an analogous bound. Coollay 4 (MSB) Let N = p q, whee 2 is a known constant and p, q ae pimes of the same bit-size. Let (e, d) φ(n) be the public-key/secet-key pai satisfying ed = 1 mod φ(n). Given d such that d d N (+1) 2. Then N can be factoed in pobabilistic polynomial time. Poof: The key-pai (e, d) satisfies the equality e(d d) + e d 1 = kp 1 (p 1)(q 1) fo some k.

7 Let E = e 1 mod N, i.e. Ee = 1 + cn fo some c. If E does not exist, we obtain the factoization of N. Multiplying the above equation by E yields (d d) + E(e d 1) = (Ekp 2 (p 1)(q 1) cp 1 q(d d))p. Thus, E(e d 1) is a multiple of p up to an additive eo of d d N The est of the poof is completely analogous to the poof of Theoem 3. (+1) 2 (+1) 2. Coollay 4 implies that one has to know oughly a faction of 1 of the MSBs of d fo ou patial key exposue attack. We can also deive a patial key exposue attack fo known LSBs with an analogous bound. Coollay 5 (LSB) Let N = p q, whee 2 is a known constant and p, q ae pimes of the same bit-size. Let (e, d) φ(n) be the public-key/secet-key pai satisfying ed = 1 mod φ(n). Given d 0, M with d = d 0 mod M and M N 1 (+1) 2. Then N can be factoed in pobabilistic polynomial time. Poof: Let us wite d = d 1 M + d 0, wee the unknown d 1 satisfies d 1 = d d0 N M N (+1) 2. We have the key equation ed 1 M + ed 0 1 = kp 1 (p 1)(q 1) fo some k. M < Multiply the equation by E = (em) 1 mod N. We see that E(ed 0 1) is a multiple of p up to an additive eo of d 1 < N (+1) 2. The est of the poof is analogous to the poof of Theoem 3. 4 Attack modulo p 1 Ou fist attack applied Theoem 2 which in tun uses a polynomial with small oots modulo p. In ou second attack we will constuct a polynomial with a small oot modulo p 1 and diectly apply Coppesmith s method in the univaiate case (Theoem 1). This appoach yields bette esults than the fist one wheneve 3. Theoem 6 Let N = p q, whee 2 is a known constant and p, q ae pimes of the same bit-size. Let (e, d) φ(n) be the public-key/secet-key pai satisfying ed = 1 mod φ(n). Suppose that d N ( 1 +1 ) 2. Then N can be factoed in pobabilistic polynomial time.

8 Poof: The key pai (e, d) satisfies the equation ed 1 = kp 1 (p 1)(q 1) fo some k. Let E be the invese of e modulo N, i.e. Ee = 1 + cn fo some c N. In the case that E does not exist, gcd(e, N) yields the complete factoization of N as shown in the poof of Theoem 3. Multiplying ou equation by E leads to d E = (Ek(p 1)(q 1) cdpq)p 1. This gives us a simple univaiate polynomial f p 1(x) = x E with the oot x 0 = d modulo p 1. Thus, we have a polynomial f p 1 of degee δ = 1 with a oot x 0 modulo p 1. In ode to apply Theoem 1, we have to find a lowe bound fo p 1 in tems of N. Since p and q ae of the same bit-size, we know that p 1 2 q. Hence p 1 = N pq N 2p. This gives us 2 p 1 ( ) N N Thus, we can choose β = log N and apply Theoem 1 with the paamete choice β, δ and c N = 4. We can find all oots x 0 that ae in absolute value smalle than 4N β2 δ = 4N ( 1 +1 )2 2( 1) (+1) log N + 1 log 2 N 4N ( 1 +1 )2 2 log N = N ( 1 +1 )2. Hence, we obtain the value x 0 = d. We can un a pobabilistic factoization algoithm on input (N, e, d) in ode to obtain the factoization of N in expected polynomial time. Remak 7 Anothe (deteministic) polynomial time method to find the factoization of N could be the computation of gcd(ed 1, N). Since ed 1 = kp 1 (p 1)(q 1), the computation yields a non-tivial diviso of N iff pq does not divide k(p 1)(q 1), which is unlikely to happen. As shown in the poof of Theoem 3, a non-tivial diviso of N eveals the complete factoization of the modulus. So in pactice, one might ty this altenative gcd-method fist and if it fails, one applies a pobabilistic algoithm on the key-pai (N, e, d). Let us summaize ou new factoization algoithm.

9 (Mod p )-attack fo small d using a modulus N = p q INPUT: (N, e), whee N = p q and ed = 1 mod φ(n) fo some d N ( 1 +1 ) Compute E = e 1 mod N. If E does not exist, compute gcd(e, N) and output p, q. 2. Apply the algoithm of Theoem 1 on input N, f p 1 = x E, β = log N and c N = 2. This gives us the value d. 3. If the computation gcd(ed 1, N) yields the factoization, EXIT. 4. Run a pobabilistic factoization algoithm on input (N, e, d). OUTPUT: p, q Evey step of the algoithm can be computed in pobabilistic polynomial time, which concludes the poof of Theoem 6 Simila to the fist attack (the (Mod p)-attack) fo small decyption exponent d, we can also easily deive patial key exposue attacks fo the new attack of Theoem 6. The poof of Theoem 6 shows that in ode to find the factoization of N, it suffice to find a linea, univaiate polynomial f p 1(x) = x + c with a oot x 0, x 0 N ( 1 +1 ) 2 modulo p 1. We will show that this equiement is satisfied in the following patial key exposue attacks. Instead of using small decyption exponents d < N ( 1 +1 ) 2 = N 1 4 (+1) 2, the attacke has to know a faction of oughly N in ode to succeed. 4 (+1) 2 of the bits of Coollay 8 (MSB) Let N = p q, whee 2 is a known constant and p, q ae pimes of the same bit-size. Let (e, d) φ(n) be the public-key/secet-key pai satisfying ed = 1 mod φ(n). Given d with d d N ( 1 +1 ) 2. Then N can be factoed in pobabilistic polynomial time. Poof: We know that e(d d) + e d 1 = 0 mod φ(n), and φ(n) is a multiple of p 1. Multiply the equation by E = e 1 mod N, which gives us the desied linea polynomial f p 1(x) = x + E(e d 1)

10 with the small oot x 0 = d d, x 0 N ( 1 +1 ) 2 modulo p 1. The est of the poof is analogous to the poof of Theoem 6. In a simila fashion, we deive a patial key exposue attack fo known LSBs. Coollay 9 (LSB) Let N = p q, whee 2 is a known constant and p, q ae pimes of the same bit-size. Let (e, d) φ(n) be the public-key/secet-key pai satisfying ed = 1 mod φ(n). Given d 0, M with d = d 0 mod M and M N 4 (+1) 2. Then N can be factoed in pobabilistic polynomial time. Poof: d 1 < N M Let us wite d = d 1 M + d 0. Then the unknown paamete satisfies 1 N( +1 ) 2. Fo the key-pai (e, d) we have e(d 1 M + d 0 ) 1 = 0 mod φ(n), whee φ(n) is a multiple of p 1. Multiplying this equation by E = (em) 1 modulo N gives us the desied linea polynomial f p 1(x) = x + E(ed 0 1) with the small oot d 1 modulo p 1. The est of the poof is analogous to the poof of Theoem 6. 5 Patial Key Exposue Attacks fo d = d modulo p 1 The patial key exposue attacks that we conside in this section fo moduli N = p q can be consideed as a genealization of the esults of Blöme and May [4]. The attacks ae an application of the theoem of Boneh, Dufee and Howgave-Gaham (Theoem 2). We deive simple patial key exposue attacks fo small public exponents e in both cases: known MSBs and known LSBs. The new attacks ae a theat to schemes that use CRT-decoding (fo instance Takagi s scheme [11]) in combination with small public exponents. Let us state ou LSB-attack. Theoem 10 Let N = p q, whee 1 is a known constant and p, q ae pimes of the same bit-size. Let e be the public key and let d p satisfy ed p = 1 mod p 1. Given d 0, M with d 0 = d p mod M and M 2N 1 (+1) 2. Then N can be factoed in time e poly(log(n)).

11 Poof: Let us conside the RSA key equation ed p 1 = k(p 1) fo some k. Since d p < (p 1), we obtain the inequality k < e. Let us wite d p = d 1 M + d 0. We can bound the unknown d 1 by d 1 < p M N (+1) 2. Ou equation above can be ewitten as ed 1 M + ed 0 + k 1 = kp. Compute the invese E of em modulo N, i.e. EeM = 1 + cn fo some c. If E does not exist, we obtain fom gcd(em, N) the complete factoization of N as shown in Theoem 3. Multiplying ou equation with E leaves us with d 1 + E(ed 0 + k 1) = (Ek cp 1 qd 1 )p. (+1) 2. Thus, E(ed 0 + k 1) is a multiple of p up to some additive eo d 1 N Since the paamete k is unknown, we have to do a bute foce seach fo k in the inteval [1, e). In ode to apply Theoem 2, it emains to show that the tem (Ek cp 1 qd 1 ) is not a multiple of p 1 q. This is equivalent to the condition that p 1 q does not divide Ek, but we know that gcd(e, N) = 1 and thus p 1 q must not divide k. But p 1 q cannot divide k in the case e p 1 q and othewise we can easily check the condition by computing gcd(k, N) fo evey possible k. The algoithm of Theoem 2 yields the factoization of N fo the coect guess of k. We biefly summaize ou factoization algoithm. Algoithm LSB-Attack fo d and moduli N = p q INPUT: (N, e), whee N = p q and d p satisfies ed p = 1 mod p 1 d 0, M with d 0 = d p mod M and M 2N 1 (+1) 2 1. Compute E = (em) 1 mod N. If the computation of E fails, find the factos p, q of N using gcd(em, N). 2. FOR k = 1 TO e (a) If gcd(k, N) > 1 find the factos p, q. (b) Run the algoithm of Theoem 2 on input E(ed 0 + k 1). If the algoithm s output is p, q then EXIT. OUTPUT: p, q The unning time of the algoithm is e poly(log N), which concludes the poof. Note that ou method fom Theoem 10 is polynomial time fo public exponents of the size poly(log(n)) and equies only a 1 (+1) 2 -faction of the bits (in

12 tems of the size of N), which is a faction of the bits of d p. The following theoem gives us a simila esult fo patial key exposue attacks with known MSBs, but in contast the method is polynomial time fo all public exponents e < N (+1) 2. We show that an appoximation of d p up to N (+1) 2 α suffices to find the factoization of N. Note that d p is of size oughly N Hence in the case α = 0, 1 a faction of +1 (+1) = 1 2 (+1) of the bits is enough (in tems of the size of 2 N). Theoem 11 Let N = p q, whee 1 is a known constant and p, q ae pimes of the same bit-size. Let e = N α, α [0, (+1) ] be the public key and let 2 d p satisfy ed p = 1 mod p 1. Given d with d p d N (+1) 2 α. Then N can be factoed in polynomial time. Poof: We know that ed p 1 = k(p 1) fo some k, with k < e. The tem e d is an appoximation of kp up to an additive eo of kp e d = e(d p d) + k 1 e(d p d) + k 1 N (+1) 2 + N α 2N (+1) 2. Thus, one of the tems e d ± N (+1) 2 satisfies the bound of Theoem 2. Note that the algoithm of Theoem 2 can be applied since k < e < N (+1) 2 and thus k cannot be a multiple of p 1 q = Ω(N +1 ). Let us biefly summaize the factoization algoithm. MSB-Attack fo d and moduli N = p q INPUT: (N, e), whee N = p q and d p satisfies ed p = 1 mod p 1 d with d p d N (+1) 2 α, whee α = log N (e). 1. Compute p = e d. 2. Run the algoithm of Theoem 2 on input p+n (+1) 2. If the algoithm s output is p, q then EXIT. 3. Othewise un the algoithm of Theoem 2 on input p N (+1) 2. OUTPUT: p, q The algoithm uns in time polynomial in log(n), which concludes the poof.

13 Refeences 1. D. Boneh, G. Dufee, Cyptanalysis of RSA with pivate key d less than N 0.292, IEEE Tans. on Infomation Theoy, Vol. 46(4), D. Boneh, G. Dufee, Y. Fankel, An attack on RSA given a small faction of the pivate key bits, Advances in Cyptology - AsiaCypt 98, Lectue Notes in Compute Science Vol. 1514, Spinge-Velag, pp , D. Boneh, G. Dufee, and N. Howgave-Gaham, Factoing N = p q fo lage, Advances in Cyptology - Cypto 99, Lectue Notes in Compute Science Vol. 1666, Spinge-Velag, pp , J. Blöme, A. May, New Patial Key Exposue Attacks on RSA, Advances in Cyptology - Cypto 2003, Lectue Notes in Compute Science Vol. 2729, pp , Spinge Velag, D. Coppesmith, Small solutions to polynomial equations and low exponent vulneabilities, Jounal of Cyptology, Vol. 10(4), pp , A. Fujioke, T. Okamoto, Miyaguchi, ESIGN: An Efficient Digital Signatue Implementation fo Smatcads, Advances in Cyptology - Euocypt 91, Lectue Notes in Compute Science Vol. 547, Spinge Velag, pp , P. Koche, Timing attacks on implementations of Diffie-Hellman, RSA, DSS and othe systems, Advances in Cyptology - Cypto 96, Lectue Notes in Compute Science Vol. 1109, Spinge Velag, pp , P. Koche, J. Jaffe and B. Jun, Diffeential powe analysis, Advances in Cyptology Cypto 99, Lectue Notes in Compute Science Vol. 1666, Spinge Velag, pp , D. Stinson, Cyptogaphy Theoy and Pactice, Second Edition, CRC Pess, T. Okamoto, S. Uchiyama, A new public key cyptosystem as secue as factoing, Advances in Cyptology - Euocypt 98, Lectue Notes in Compute Science Vol. 1403, Spinge Velag, pp , T. Takagi, Fast RSA-type cyptosystem modulo p k q, Advances in Cyptology - Cypto 98, Lectue Notes in Compute Science Vol. 1462,Spinge-Velag, pp , M. Wiene, Cyptanalysis of shot RSA secet exponents, IEEE Tansactions on Infomation Theoy, Vol. 36, pp , 1998.

New Finding on Factoring Prime Power RSA Modulus N = p r q

New Finding on Factoring Prime Power RSA Modulus N = p r q Jounal of Mathematical Reseach with Applications Jul., 207, Vol. 37, o. 4, pp. 404 48 DOI:0.3770/j.issn:2095-265.207.04.003 Http://jme.dlut.edu.cn ew Finding on Factoing Pime Powe RSA Modulus = p q Sadiq

More information

Chapter 3: Theory of Modular Arithmetic 38

Chapter 3: Theory of Modular Arithmetic 38 Chapte 3: Theoy of Modula Aithmetic 38 Section D Chinese Remainde Theoem By the end of this section you will be able to pove the Chinese Remainde Theoem apply this theoem to solve simultaneous linea conguences

More information

Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference

Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference Impoved Factoing Attacks on Multi-Pime RSA with Small Pime Diffeence Mengce Zheng 1,2, Nobou Kunihio 2, and Honggang Hu 1 1 Univesity of Science and Technology of China, China mengce.zheng@gmail.com 2

More information

Journal of Inequalities in Pure and Applied Mathematics

Journal of Inequalities in Pure and Applied Mathematics Jounal of Inequalities in Pue and Applied Mathematics COEFFICIENT INEQUALITY FOR A FUNCTION WHOSE DERIVATIVE HAS A POSITIVE REAL PART S. ABRAMOVICH, M. KLARIČIĆ BAKULA AND S. BANIĆ Depatment of Mathematics

More information

Surveillance Points in High Dimensional Spaces

Surveillance Points in High Dimensional Spaces Société de Calcul Mathématique SA Tools fo decision help since 995 Suveillance Points in High Dimensional Spaces by Benad Beauzamy Januay 06 Abstact Let us conside any compute softwae, elying upon a lage

More information

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22 C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.

More information

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic.

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic. Chapte 9 Pimitive Roots 9.1 The multiplicative goup of a finite fld Theoem 9.1. The multiplicative goup F of a finite fld is cyclic. Remak: In paticula, if p is a pime then (Z/p) is cyclic. In fact, this

More information

arxiv: v1 [math.co] 4 May 2017

arxiv: v1 [math.co] 4 May 2017 On The Numbe Of Unlabeled Bipatite Gaphs Abdullah Atmaca and A Yavuz Ouç axiv:7050800v [mathco] 4 May 207 Abstact This pape solves a poblem that was stated by M A Haison in 973 [] This poblem, that has

More information

Lecture 25: Pairing Based Cryptography

Lecture 25: Pairing Based Cryptography 6.897 Special Topics in Cyptogaphy Instucto: Ran Canetti May 5, 2004 Lectue 25: Paiing Based Cyptogaphy Scibe: Ben Adida 1 Intoduction The field of Paiing Based Cyptogaphy has exploded ove the past 3 yeas

More information

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity Constuction and Analysis of Boolean Functions of 2t + 1 Vaiables with Maximum Algebaic Immunity Na Li and Wen-Feng Qi Depatment of Applied Mathematics, Zhengzhou Infomation Engineeing Univesity, Zhengzhou,

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

Enumerating permutation polynomials

Enumerating permutation polynomials Enumeating pemutation polynomials Theodoulos Gaefalakis a,1, Giogos Kapetanakis a,, a Depatment of Mathematics and Applied Mathematics, Univesity of Cete, 70013 Heaklion, Geece Abstact We conside thoblem

More information

Some RSA-based Encryption Schemes with Tight Security Reduction

Some RSA-based Encryption Schemes with Tight Security Reduction Some RSA-based Encyption Schemes with Tight Secuity Reduction Kaou Kuosawa 1 and Tsuyoshi Takagi 2 1 Ibaaki Univesity, 4-12-1 Nakanausawa, Hitachi, Ibaaki, 316-8511, Japan kuosawa@cis.ibaaki.ac.jp 2 Technische

More information

Fixed Argument Pairing Inversion on Elliptic Curves

Fixed Argument Pairing Inversion on Elliptic Curves Fixed Agument Paiing Invesion on Elliptic Cuves Sungwook Kim and Jung Hee Cheon ISaC & Dept. of Mathematical Sciences Seoul National Univesity Seoul, Koea {avell7,jhcheon}@snu.ac.k Abstact. Let E be an

More information

EM Boundary Value Problems

EM Boundary Value Problems EM Bounday Value Poblems 10/ 9 11/ By Ilekta chistidi & Lee, Seung-Hyun A. Geneal Desciption : Maxwell Equations & Loentz Foce We want to find the equations of motion of chaged paticles. The way to do

More information

Vanishing lines in generalized Adams spectral sequences are generic

Vanishing lines in generalized Adams spectral sequences are generic ISSN 364-0380 (on line) 465-3060 (pinted) 55 Geomety & Topology Volume 3 (999) 55 65 Published: 2 July 999 G G G G T T T G T T T G T G T GG TT G G G G GG T T T TT Vanishing lines in genealized Adams spectal

More information

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013 AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the

More information

Multiple Criteria Secretary Problem: A New Approach

Multiple Criteria Secretary Problem: A New Approach J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and

More information

Solution to HW 3, Ma 1a Fall 2016

Solution to HW 3, Ma 1a Fall 2016 Solution to HW 3, Ma a Fall 206 Section 2. Execise 2: Let C be a subset of the eal numbes consisting of those eal numbes x having the popety that evey digit in the decimal expansion of x is, 3, 5, o 7.

More information

10/04/18. P [P(x)] 1 negl(n).

10/04/18. P [P(x)] 1 negl(n). Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the

More information

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

Introduction Common Divisors. Discrete Mathematics Andrei Bulatov

Introduction Common Divisors. Discrete Mathematics Andrei Bulatov Intoduction Common Divisos Discete Mathematics Andei Bulatov Discete Mathematics Common Divisos 3- Pevious Lectue Integes Division, popeties of divisibility The division algoithm Repesentation of numbes

More information

A Multivariate Normal Law for Turing s Formulae

A Multivariate Normal Law for Turing s Formulae A Multivaiate Nomal Law fo Tuing s Fomulae Zhiyi Zhang Depatment of Mathematics and Statistics Univesity of Noth Caolina at Chalotte Chalotte, NC 28223 Abstact This pape establishes a sufficient condition

More information

Compactly Supported Radial Basis Functions

Compactly Supported Radial Basis Functions Chapte 4 Compactly Suppoted Radial Basis Functions As we saw ealie, compactly suppoted functions Φ that ae tuly stictly conditionally positive definite of ode m > do not exist The compact suppot automatically

More information

Probablistically Checkable Proofs

Probablistically Checkable Proofs Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol

More information

NOTE. Some New Bounds for Cover-Free Families

NOTE. Some New Bounds for Cover-Free Families Jounal of Combinatoial Theoy, Seies A 90, 224234 (2000) doi:10.1006jcta.1999.3036, available online at http:.idealibay.com on NOTE Some Ne Bounds fo Cove-Fee Families D. R. Stinson 1 and R. Wei Depatment

More information

On a quantity that is analogous to potential and a theorem that relates to it

On a quantity that is analogous to potential and a theorem that relates to it Su une quantité analogue au potential et su un théoème y elatif C R Acad Sci 7 (87) 34-39 On a quantity that is analogous to potential and a theoem that elates to it By R CLAUSIUS Tanslated by D H Delphenich

More information

Duality between Statical and Kinematical Engineering Systems

Duality between Statical and Kinematical Engineering Systems Pape 00, Civil-Comp Ltd., Stiling, Scotland Poceedings of the Sixth Intenational Confeence on Computational Stuctues Technology, B.H.V. Topping and Z. Bittna (Editos), Civil-Comp Pess, Stiling, Scotland.

More information

Moment-free numerical approximation of highly oscillatory integrals with stationary points

Moment-free numerical approximation of highly oscillatory integrals with stationary points Moment-fee numeical appoximation of highly oscillatoy integals with stationay points Sheehan Olve Abstact We pesent a method fo the numeical quadatue of highly oscillatoy integals with stationay points.

More information

Measure Estimates of Nodal Sets of Polyharmonic Functions

Measure Estimates of Nodal Sets of Polyharmonic Functions Chin. Ann. Math. Se. B 39(5), 08, 97 93 DOI: 0.007/s40-08-004-6 Chinese Annals of Mathematics, Seies B c The Editoial Office of CAM and Spinge-Velag Belin Heidelbeg 08 Measue Estimates of Nodal Sets of

More information

Fractional Zero Forcing via Three-color Forcing Games

Fractional Zero Forcing via Three-color Forcing Games Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that

More information

Lecture 28: Convergence of Random Variables and Related Theorems

Lecture 28: Convergence of Random Variables and Related Theorems EE50: Pobability Foundations fo Electical Enginees July-Novembe 205 Lectue 28: Convegence of Random Vaiables and Related Theoems Lectue:. Kishna Jagannathan Scibe: Gopal, Sudhasan, Ajay, Swamy, Kolla An

More information

working pages for Paul Richards class notes; do not copy or circulate without permission from PGR 2004/11/3 10:50

working pages for Paul Richards class notes; do not copy or circulate without permission from PGR 2004/11/3 10:50 woking pages fo Paul Richads class notes; do not copy o ciculate without pemission fom PGR 2004/11/3 10:50 CHAPTER7 Solid angle, 3D integals, Gauss s Theoem, and a Delta Function We define the solid angle,

More information

Absorption Rate into a Small Sphere for a Diffusing Particle Confined in a Large Sphere

Absorption Rate into a Small Sphere for a Diffusing Particle Confined in a Large Sphere Applied Mathematics, 06, 7, 709-70 Published Online Apil 06 in SciRes. http://www.scip.og/jounal/am http://dx.doi.og/0.46/am.06.77065 Absoption Rate into a Small Sphee fo a Diffusing Paticle Confined in

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL

CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL U.P.B. Sci. Bull. Seies A, Vol. 80, Iss.3, 018 ISSN 13-707 CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL Sasengali ABDYMANAPOV 1,

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Mach 6, 013 Abstact To study how balanced o unbalanced a maximal intesecting

More information

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution Statistics Reseach Lettes Vol. Iss., Novembe Cental Coveage Bayes Pediction Intevals fo the Genealized Paeto Distibution Gyan Pakash Depatment of Community Medicine S. N. Medical College, Aga, U. P., India

More information

Hua Xu 3 and Hiroaki Mukaidani 33. The University of Tsukuba, Otsuka. Hiroshima City University, 3-4-1, Ozuka-Higashi

Hua Xu 3 and Hiroaki Mukaidani 33. The University of Tsukuba, Otsuka. Hiroshima City University, 3-4-1, Ozuka-Higashi he inea Quadatic Dynamic Game fo Discete-ime Descipto Systems Hua Xu 3 and Hioai Muaidani 33 3 Gaduate School of Systems Management he Univesity of suuba, 3-9- Otsua Bunyo-u, oyo -0, Japan xuhua@gssm.otsua.tsuuba.ac.jp

More information

ON SPARSELY SCHEMMEL TOTIENT NUMBERS. Colin Defant 1 Department of Mathematics, University of Florida, Gainesville, Florida

ON SPARSELY SCHEMMEL TOTIENT NUMBERS. Colin Defant 1 Department of Mathematics, University of Florida, Gainesville, Florida #A8 INTEGERS 5 (205) ON SPARSEL SCHEMMEL TOTIENT NUMBERS Colin Defant Depatment of Mathematics, Univesity of Floida, Gainesville, Floida cdefant@ufl.edu Received: 7/30/4, Revised: 2/23/4, Accepted: 4/26/5,

More information

SPECTRAL SEQUENCES. im(er

SPECTRAL SEQUENCES. im(er SPECTRAL SEQUENCES MATTHEW GREENBERG. Intoduction Definition. Let a. An a-th stage spectal (cohomological) sequence consists of the following data: bigaded objects E = p,q Z Ep,q, a diffeentials d : E

More information

Do Managers Do Good With Other People s Money? Online Appendix

Do Managers Do Good With Other People s Money? Online Appendix Do Manages Do Good With Othe People s Money? Online Appendix Ing-Haw Cheng Haison Hong Kelly Shue Abstact This is the Online Appendix fo Cheng, Hong and Shue 2013) containing details of the model. Datmouth

More information

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix Jounal of Sciences, Islamic Republic of Ian (): - () Univesity of Tehan, ISSN - http://sciencesutaci Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matix H Ahsani

More information

Liquid gas interface under hydrostatic pressure

Liquid gas interface under hydrostatic pressure Advances in Fluid Mechanics IX 5 Liquid gas inteface unde hydostatic pessue A. Gajewski Bialystok Univesity of Technology, Faculty of Civil Engineeing and Envionmental Engineeing, Depatment of Heat Engineeing,

More information

QIP Course 10: Quantum Factorization Algorithm (Part 3)

QIP Course 10: Quantum Factorization Algorithm (Part 3) QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse

More information

Lifting Private Information Retrieval from Two to any Number of Messages

Lifting Private Information Retrieval from Two to any Number of Messages Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu

More information

3.1 Random variables

3.1 Random variables 3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated

More information

PROBLEM SET #1 SOLUTIONS by Robert A. DiStasio Jr.

PROBLEM SET #1 SOLUTIONS by Robert A. DiStasio Jr. POBLM S # SOLUIONS by obet A. DiStasio J. Q. he Bon-Oppenheime appoximation is the standad way of appoximating the gound state of a molecula system. Wite down the conditions that detemine the tonic and

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Septembe 5, 011 Abstact To study how balanced o unbalanced a maximal intesecting

More information

arxiv: v2 [math.ag] 4 Jul 2012

arxiv: v2 [math.ag] 4 Jul 2012 SOME EXAMPLES OF VECTOR BUNDLES IN THE BASE LOCUS OF THE GENERALIZED THETA DIVISOR axiv:0707.2326v2 [math.ag] 4 Jul 2012 SEBASTIAN CASALAINA-MARTIN, TAWANDA GWENA, AND MONTSERRAT TEIXIDOR I BIGAS Abstact.

More information

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

Conservative Averaging Method and its Application for One Heat Conduction Problem

Conservative Averaging Method and its Application for One Heat Conduction Problem Poceedings of the 4th WSEAS Int. Conf. on HEAT TRANSFER THERMAL ENGINEERING and ENVIRONMENT Elounda Geece August - 6 (pp6-) Consevative Aveaging Method and its Application fo One Heat Conduction Poblem

More information

Gradient-based Neural Network for Online Solution of Lyapunov Matrix Equation with Li Activation Function

Gradient-based Neural Network for Online Solution of Lyapunov Matrix Equation with Li Activation Function Intenational Confeence on Infomation echnology and Management Innovation (ICIMI 05) Gadient-based Neual Netwok fo Online Solution of Lyapunov Matix Equation with Li Activation unction Shiheng Wang, Shidong

More information

ONE-POINT CODES USING PLACES OF HIGHER DEGREE

ONE-POINT CODES USING PLACES OF HIGHER DEGREE ONE-POINT CODES USING PLACES OF HIGHER DEGREE GRETCHEN L. MATTHEWS AND TODD W. MICHEL DEPARTMENT OF MATHEMATICAL SCIENCES CLEMSON UNIVERSITY CLEMSON, SC 29634-0975 U.S.A. E-MAIL: GMATTHE@CLEMSON.EDU, TMICHEL@CLEMSON.EDU

More information

2 S. Gao and M. A. Shokollahi opeations in Fq, and usually we will use the \Soft O" notation to ignoe logaithmic factos: g = O(n) ~ means that g = O(n

2 S. Gao and M. A. Shokollahi opeations in Fq, and usually we will use the \Soft O notation to ignoe logaithmic factos: g = O(n) ~ means that g = O(n Computing Roots of Polynomials ove Function Fields of Cuves Shuhong Gao 1 and M. Amin Shokollahi 2 1 Depatment of Mathematical Sciences, Clemson Univesity, Clemson, SC 29634 USA 2 Bell Labs, Rm. 2C-353,

More information

On the integration of the equations of hydrodynamics

On the integration of the equations of hydrodynamics Uebe die Integation de hydodynamischen Gleichungen J f eine u angew Math 56 (859) -0 On the integation of the equations of hydodynamics (By A Clebsch at Calsuhe) Tanslated by D H Delphenich In a pevious

More information

A Backward Identification Problem for an Axis-Symmetric Fractional Diffusion Equation

A Backward Identification Problem for an Axis-Symmetric Fractional Diffusion Equation Mathematical Modelling and Analysis Publishe: Taylo&Fancis and VGTU Volume 22 Numbe 3, May 27, 3 32 http://www.tandfonline.com/tmma https://doi.og/.3846/3926292.27.39329 ISSN: 392-6292 c Vilnius Gediminas

More information

Quasi-Randomness and the Distribution of Copies of a Fixed Graph

Quasi-Randomness and the Distribution of Copies of a Fixed Graph Quasi-Randomness and the Distibution of Copies of a Fixed Gaph Asaf Shapia Abstact We show that if a gaph G has the popety that all subsets of vetices of size n/4 contain the coect numbe of tiangles one

More information

Math 124B February 02, 2012

Math 124B February 02, 2012 Math 24B Febuay 02, 202 Vikto Gigoyan 8 Laplace s equation: popeties We have aleady encounteed Laplace s equation in the context of stationay heat conduction and wave phenomena. Recall that in two spatial

More information

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland)

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland) Syntactical content of nite appoximations of patial algebas 1 Wikto Batol Inst. Matematyki, Uniw. Waszawski, 02-097 Waszawa (Poland) batol@mimuw.edu.pl Xavie Caicedo Dep. Matematicas, Univ. de los Andes,

More information

When two numbers are written as the product of their prime factors, they are in factored form.

When two numbers are written as the product of their prime factors, they are in factored form. 10 1 Study Guide Pages 420 425 Factos Because 3 4 12, we say that 3 and 4 ae factos of 12. In othe wods, factos ae the numbes you multiply to get a poduct. Since 2 6 12, 2 and 6 ae also factos of 12. The

More information

A Comparison and Contrast of Some Methods for Sample Quartiles

A Comparison and Contrast of Some Methods for Sample Quartiles A Compaison and Contast of Some Methods fo Sample Quatiles Anwa H. Joade and aja M. Latif King Fahd Univesity of Petoleum & Mineals ABSTACT A emainde epesentation of the sample size n = 4m ( =, 1, 2, 3)

More information

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES AGU Intenational Jounal of Science and Technology A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES Ritu Ahuja Depatment of Mathematics Khalsa College fo Women, Civil Lines, Ludhiana-141001, Punjab, (India)

More information

Goodness-of-fit for composite hypotheses.

Goodness-of-fit for composite hypotheses. Section 11 Goodness-of-fit fo composite hypotheses. Example. Let us conside a Matlab example. Let us geneate 50 obsevations fom N(1, 2): X=nomnd(1,2,50,1); Then, unning a chi-squaed goodness-of-fit test

More information

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let

More information

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM Poceedings of the ASME 2010 Intenational Design Engineeing Technical Confeences & Computes and Infomation in Engineeing Confeence IDETC/CIE 2010 August 15-18, 2010, Monteal, Quebec, Canada DETC2010-28496

More information

QUANTUM ALGORITHMS IN ALGEBRAIC NUMBER THEORY

QUANTUM ALGORITHMS IN ALGEBRAIC NUMBER THEORY QUANTU ALGORITHS IN ALGEBRAIC NUBER THEORY SION RUBINSTEIN-SALZEDO Abstact. In this aticle, we discuss some quantum algoithms fo detemining the goup of units and the ideal class goup of a numbe field.

More information

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the

More information

Lecture 18: Graph Isomorphisms

Lecture 18: Graph Isomorphisms INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will

More information

KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS

KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS Jounal of Applied Analysis Vol. 14, No. 1 2008), pp. 43 52 KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS L. KOCZAN and P. ZAPRAWA Received Mach 12, 2007 and, in evised fom,

More information

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension Intenational Mathematical Foum, 3, 2008, no. 16, 763-776 Functions Defined on Fuzzy Real Numbes Accoding to Zadeh s Extension Oma A. AbuAaqob, Nabil T. Shawagfeh and Oma A. AbuGhneim 1 Mathematics Depatment,

More information

arxiv: v1 [math.nt] 12 May 2017

arxiv: v1 [math.nt] 12 May 2017 SEQUENCES OF CONSECUTIVE HAPPY NUMBERS IN NEGATIVE BASES HELEN G. GRUNDMAN AND PAMELA E. HARRIS axiv:1705.04648v1 [math.nt] 12 May 2017 ABSTRACT. Fo b 2 and e 2, let S e,b : Z Z 0 be the function taking

More information

JENSEN S INEQUALITY FOR DISTRIBUTIONS POSSESSING HIGHER MOMENTS, WITH APPLICATION TO SHARP BOUNDS FOR LAPLACE-STIELTJES TRANSFORMS

JENSEN S INEQUALITY FOR DISTRIBUTIONS POSSESSING HIGHER MOMENTS, WITH APPLICATION TO SHARP BOUNDS FOR LAPLACE-STIELTJES TRANSFORMS J. Austal. Math. Soc. Se. B 40(1998), 80 85 JENSEN S INEQUALITY FO DISTIBUTIONS POSSESSING HIGHE MOMENTS, WITH APPLICATION TO SHAP BOUNDS FO LAPLACE-STIELTJES TANSFOMS B. GULJAŠ 1,C.E.M.PEACE 2 and J.

More information

On the Poisson Approximation to the Negative Hypergeometric Distribution

On the Poisson Approximation to the Negative Hypergeometric Distribution BULLETIN of the Malaysian Mathematical Sciences Society http://mathusmmy/bulletin Bull Malays Math Sci Soc (2) 34(2) (2011), 331 336 On the Poisson Appoximation to the Negative Hypegeometic Distibution

More information

Chapter Introduction to Finite Element Methods

Chapter Introduction to Finite Element Methods Chapte 1.4 Intoduction to Finite Element Methods Afte eading this chapte, you should e ale to: 1. Undestand the asics of finite element methods using a one-dimensional polem. In the last fifty yeas, the

More information

Contact impedance of grounded and capacitive electrodes

Contact impedance of grounded and capacitive electrodes Abstact Contact impedance of gounded and capacitive electodes Andeas Hödt Institut fü Geophysik und extateestische Physik, TU Baunschweig The contact impedance of electodes detemines how much cuent can

More information

Brief summary of functional analysis APPM 5440 Fall 2014 Applied Analysis

Brief summary of functional analysis APPM 5440 Fall 2014 Applied Analysis Bief summay of functional analysis APPM 5440 Fall 014 Applied Analysis Stephen Becke, stephen.becke@coloado.edu Standad theoems. When necessay, I used Royden s and Keyzsig s books as a efeence. Vesion

More information

Berkeley Math Circle AIME Preparation March 5, 2013

Berkeley Math Circle AIME Preparation March 5, 2013 Algeba Toolkit Rules of Thumb. Make sue that you can pove all fomulas you use. This is even bette than memoizing the fomulas. Although it is best to memoize, as well. Stive fo elegant, economical methods.

More information

Model and Controller Order Reduction for Infinite Dimensional Systems

Model and Controller Order Reduction for Infinite Dimensional Systems IT J. Eng. Sci., Vol. 4, No.,, -6 Model and Contolle Ode Reduction fo Infinite Dimensional Systems Fatmawati,*, R. Saagih,. Riyanto 3 & Y. Soehayadi Industial and Financial Mathematics Goup email: fatma47@students.itb.ac.id;

More information

A New Design of Binary MDS Array Codes with Asymptotically Weak-Optimal Repair

A New Design of Binary MDS Array Codes with Asymptotically Weak-Optimal Repair IEEE TRANSACTIONS ON INFORMATION THEORY 1 A New Design of Binay MDS Aay Codes with Asymptotically Weak-Optimal Repai Hanxu Hou, Membe, IEEE, Yunghsiang S. Han, Fellow, IEEE, Patick P. C. Lee, Senio Membe,

More information

Physics 221 Lecture 41 Nonlinear Absorption and Refraction

Physics 221 Lecture 41 Nonlinear Absorption and Refraction Physics 221 Lectue 41 Nonlinea Absoption and Refaction Refeences Meye-Aendt, pp. 97-98. Boyd, Nonlinea Optics, 1.4 Yaiv, Optical Waves in Cystals, p. 22 (Table of cystal symmeties) 1. Intoductoy Remaks.

More information

COORDINATE TRANSFORMATIONS - THE JACOBIAN DETERMINANT

COORDINATE TRANSFORMATIONS - THE JACOBIAN DETERMINANT COORDINATE TRANSFORMATIONS - THE JACOBIAN DETERMINANT Link to: phsicspages home page. To leave a comment o epot an eo, please use the auilia blog. Refeence: d Inveno, Ra, Intoducing Einstein s Relativit

More information

MATH 415, WEEK 3: Parameter-Dependence and Bifurcations

MATH 415, WEEK 3: Parameter-Dependence and Bifurcations MATH 415, WEEK 3: Paamete-Dependence and Bifucations 1 A Note on Paamete Dependence We should pause to make a bief note about the ole played in the study of dynamical systems by the system s paametes.

More information

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany Relating Banching Pogam Size and omula Size ove the ull Binay Basis Matin Saueho y Ingo Wegene y Ralph Wechne z y B Infomatik, LS II, Univ. Dotmund, 44 Dotmund, Gemany z ankfut, Gemany sauehof/wegene@ls.cs.uni-dotmund.de

More information

Encapsulation theory: radial encapsulation. Edmund Kirwan *

Encapsulation theory: radial encapsulation. Edmund Kirwan * Encapsulation theoy: adial encapsulation. Edmund Kiwan * www.edmundkiwan.com Abstact This pape intoduces the concept of adial encapsulation, wheeby dependencies ae constained to act fom subsets towads

More information

Scattering in Three Dimensions

Scattering in Three Dimensions Scatteing in Thee Dimensions Scatteing expeiments ae an impotant souce of infomation about quantum systems, anging in enegy fom vey low enegy chemical eactions to the highest possible enegies at the LHC.

More information

Lecture 8 - Gauss s Law

Lecture 8 - Gauss s Law Lectue 8 - Gauss s Law A Puzzle... Example Calculate the potential enegy, pe ion, fo an infinite 1D ionic cystal with sepaation a; that is, a ow of equally spaced chages of magnitude e and altenating sign.

More information

Temporal-Difference Learning

Temporal-Difference Learning .997 Decision-Making in Lage-Scale Systems Mach 17 MIT, Sping 004 Handout #17 Lectue Note 13 1 Tempoal-Diffeence Leaning We now conside the poblem of computing an appopiate paamete, so that, given an appoximation

More information

COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS

COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS Pogess In Electomagnetics Reseach, PIER 73, 93 105, 2007 COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS T.-X. Song, Y.-H. Liu, and J.-M. Xiong School of Mechanical Engineeing

More information

arxiv: v1 [physics.pop-ph] 3 Jun 2013

arxiv: v1 [physics.pop-ph] 3 Jun 2013 A note on the electostatic enegy of two point chages axiv:1306.0401v1 [physics.pop-ph] 3 Jun 013 A C Tot Instituto de Física Univesidade Fedeal do io de Janeio Caixa Postal 68.58; CEP 1941-97 io de Janeio,

More information

arxiv: v1 [physics.gen-ph] 18 Aug 2018

arxiv: v1 [physics.gen-ph] 18 Aug 2018 Path integal and Sommefeld quantization axiv:1809.04416v1 [physics.gen-ph] 18 Aug 018 Mikoto Matsuda 1, and Takehisa Fujita, 1 Japan Health and Medical technological college, Tokyo, Japan College of Science

More information

Energy Levels Of Hydrogen Atom Using Ladder Operators. Ava Khamseh Supervisor: Dr. Brian Pendleton The University of Edinburgh August 2011

Energy Levels Of Hydrogen Atom Using Ladder Operators. Ava Khamseh Supervisor: Dr. Brian Pendleton The University of Edinburgh August 2011 Enegy Levels Of Hydogen Atom Using Ladde Opeatos Ava Khamseh Supeviso: D. Bian Pendleton The Univesity of Edinbugh August 11 1 Abstact The aim of this pape is to fist use the Schödinge wavefunction methods

More information

Stress Intensity Factor

Stress Intensity Factor S 47 Factue Mechanics http://imechanicaog/node/7448 Zhigang Suo Stess Intensity Facto We have modeled a body by using the linea elastic theoy We have modeled a cack in the body by a flat plane, and the

More information

Physics 2B Chapter 22 Notes - Magnetic Field Spring 2018

Physics 2B Chapter 22 Notes - Magnetic Field Spring 2018 Physics B Chapte Notes - Magnetic Field Sping 018 Magnetic Field fom a Long Staight Cuent-Caying Wie In Chapte 11 we looked at Isaac Newton s Law of Gavitation, which established that a gavitational field

More information

On the global uniform asymptotic stability of time-varying dynamical systems

On the global uniform asymptotic stability of time-varying dynamical systems Stud. Univ. Babeş-Bolyai Math. 59014), No. 1, 57 67 On the global unifom asymptotic stability of time-vaying dynamical systems Zaineb HajSalem, Mohamed Ali Hammami and Mohamed Mabouk Abstact. The objective

More information

Asymptotically Lacunary Statistical Equivalent Sequence Spaces Defined by Ideal Convergence and an Orlicz Function

Asymptotically Lacunary Statistical Equivalent Sequence Spaces Defined by Ideal Convergence and an Orlicz Function "Science Stays Tue Hee" Jounal of Mathematics and Statistical Science, 335-35 Science Signpost Publishing Asymptotically Lacunay Statistical Equivalent Sequence Spaces Defined by Ideal Convegence and an

More information

On a generalization of Eulerian numbers

On a generalization of Eulerian numbers Notes on Numbe Theoy and Discete Mathematics Pint ISSN 1310 513, Online ISSN 367 875 Vol, 018, No 1, 16 DOI: 10756/nntdm018116- On a genealization of Euleian numbes Claudio Pita-Ruiz Facultad de Ingenieía,

More information

Design and Analysis of Password-Based Key Derivation Functions

Design and Analysis of Password-Based Key Derivation Functions Design and Analysis of Passwod-Based Key Deivation Functions Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science City Univesity of Hong Kong Kowloon, Hong Kong Email: csfyao@cityu.edu.hk

More information

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra Poceedings of the 006 IASME/SEAS Int. Conf. on ate Resouces, Hydaulics & Hydology, Chalkida, Geece, May -3, 006 (pp7-) Analytical Solutions fo Confined Aquifes with non constant Pumping using Compute Algeba

More information