Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences

Size: px
Start display at page:

Download "Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences"

Transcription

1 Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences Srinivas Vivek University of Luxembourg, Luxembourg C. E. Veni Madhavan Deartment of Comuter Science and Automation, Indian Institute of Science, Bangalore, India Abstract The Cubic Sieve Method for solving the Discrete Logarithm Problem in rime elds requires a nontrivial solution to the Cubic Sieve Congruence (CSC) x 3 y 2 z (mod ), where is a given rime number. A nontrivial solution must also satisfy x 3 y 2 z and 1 x, y, z < α, where α is a given real number such that 1 < α 1. The CSC roblem is to nd an ecient 3 2 algorithm to obtain a nontrivial solution to CSC. CSC can be arametrized as x v 2 z (mod ) and y v 3 z (mod ). In this aer, we give a deterministic olynomial-time (O(ln 3 ) bitoerations) algorithm to determine, for a given v, a nontrivial solution to CSC, if one exists. Previously it took Õ(α ) time in the worst case to determine this. We relate the CSC roblem to the ga roblem of fractional art sequences, where we need to determine the non-negative integers N satisfying the fractional art inequality {θn} < φ (θ and φ are given real numbers). The corresondence between the CSC roblem and the ga roblem is that determining the arameter z in the former roblem corresonds to determining N in the latter roblem. We also show in the α = 1 case of CSC that for a certain class of rimes the CSC roblem can be solved 2 ( ) ( ) deterministically in Õ 1 3 time comared to the revious best of Õ 2 1. It is emirically observed that about one out of three rimes is covered by the above class. Key words: comutational number theory, crytanalysis, Diohantine equation, discrete logarithm roblem, fractional art sequence 1991 MSC: [2010] 11D79, 11Y16, 11Y50 Prerint submitted to Journal of Symbolic Comutation October 18, 2013

2 1. Introduction The Cubic Sieve is a variant of the Index Calculus Method for the Discrete Logarithm Problem (DLP) in elds of rime order Coersmith et al. (1986); Das (1999); Das and Veni Madhavan (2005); Lenstra and Lenstra Jr. (1990); Menezes et al. (1997); Schirokauer et al. (1996). It was rst roosed in Coersmith et al. (1986). Working of the cubic sieve method requires a nontrivial solution (in ositive integers) to a Diohantine equation called the Cubic Sieve Congruence (CSC, for short) x 3 y 2 z (mod ), where is a given rime number. A nontrivial solution to CSC must satisfy x 3 y 2 z (mod ), x 3 y 2 z, 1 x, y, z < α, (1) where α is a given real number that satises 1 3 < α 1 2. Henceforth the above equation will be referred to as CSC (1). Note that CSC (1) cannot be satised if 1 x, y, z 1 3. When x, y, and z are of the order O( α ), then the heuristic exected running time of [ the cubic sieve is L γ = 1 2, c = 2α ] ( = ex (c + o(1)) (ln ) γ (ln ln ) 1 γ), where ln denotes the natural logarithm of. Hence smaller values of α lead to faster running times. It is imortant to note that this estimate of the running time of cubic sieve does not take into account the time required for nding a nontrivial solution to CSC. Therefore, an imortant oen roblem concerning the cubic sieve method is to develo an ecient algorithm to determine a nontrivial solution to CSC, given and α. We shall refer to this roblem as the CSC roblem. The Number Field Sieve is the current best algorithm for DLP in rime elds with the ) 1 ] 3. Hence the cubic sieve method is mostly [ 1 heuristic exected running time of L 3, ( 64 9 of theoretical interest to crytograhy. Aart from the crytograhic connection, the CSC roblem is a challenging roblem in comutational number theory and is interesting in its own right. Some attemts to solve this roblem have been made in Das (1999); Das and Veni Madhavan (2005); Maitra et al. (2009). Recently, the arametrization x v 2 z (mod ) and y v 3 z (mod ) (Equation (2)) was introduced by Maitra et. al. Maitra et al. (2009). In this aer, we make further rogress towards nding an ecient algorithm for the CSC roblem by showing that we can determine in deterministic olynomial time whether a solution to CSC (Equation (2)) exists for a given v (1 v < ). If one exists, we show that we can also comute it eciently. Previously, the only way to determine this was to check all the values of z from 1 to α. We were able to accomlish this by relating the above roblem to the ga roblem of fractional art sequences Slater (1950, 1967). As a consequence, we show in the α = 1 2 case of CSC (1) that for rimes "close" to i ɛ (integer i, ( real ) ɛ [3, 4]), a solution to CSC exists and ( it ) can be comuted deterministically in Õ 1 3 time 1, while the revious best is Õ 1 2. Interestingly, we Abstract of this work aeared in the third Worksho on Mathematical Crytology (WMC 2012) held at CIEM-Castro Urdiales, Sain, on 9-11 July Corresonding Author. Postal address: University of Luxembourg, FSTC, 6 rue Richard Coudenhove- Kalergi, L-1359 Luxembourg. Tel: Fax: addresses: srinivasvivek.venkatesh@uni.lu (Srinivas Vivek), cevm@csa.iisc.ernet.in (C. E. Veni Madhavan). 1 The running times of the algorithms related to the CSC roblem reect the total number of bit oerations required. In order to avoid cluttering the running time exressions with logarithmic factors, we often use the soft-oh notation Õ Cormen et al. (2001,. 59). The imlicit logarithmic factor is ln 3. 2

3 Algorithm 1 Solving CSC (1) given, α and δ (δ > 0). (1) For x 1 to 1 3 +δ (a) For y 1 to 1 3 +δ (i) z x 3 y 2 (mod ) (ii) If (x, y, z) satises CSC (1), then Return (x, y, z). have emirically observed that about one-third of all the rimes are covered by the above class. The rest of the aer is organized as follows. In Section 2, we briey discuss the revious results on the CSC roblem. In Section 3, we generalize a heuristic algorithm described in Maitra et al. (2009) for the α = 1 2 case of CSC to a generic α ( 1 3 < α 2) 1. Later in that section, we make some remarks on the non-alicability of the LLL and other lattice basis reduction algorithms for solving the CSC roblem. Previous results on the distribution of the non-negative integers N satisfying the fractional art inequality {θn} < φ (rational θ, real φ are given) is resented in Section 4, and we shall also see there how to eciently comute the least such N. In Section 5, we will extend the results of Section } 4 to eciently determine the least common N satisfying both {θn} < φ and {ˆθN < ˆφ (both θ and ˆθ are rational), when certain conditions on θ, ˆθ, φ, ˆφ and N are satised. As a consequence we shall see how, given any v, we can eciently determine a solution to CSC. The existence of solutions for rimes close to i ɛ, and consequently lesser time to comute them, is resented in Section 6. We nally conclude in Section Previous Work Let R, Z and N denote, resectively, the set of real numbers, the set of integers and the set of ositive integers. Throughout this aer, the variable reresents a rime number, α R, 1 3 < α 1 2, and by n (mod ) (for n Z) we mean the least non-negative remainder obtained on dividing n by. The symbols, and { } denote the oor, ceiling and fractional art, resectively, of a real value. When rimes are close to (but less than) erfect cubes, then we can directly get the solution x = 1 3, y = 1 and z = x 3, satisfying CSC (1). Since this method will not work for many rimes, we need a systematic aroach. The simlest algorithm to comute a solution to CSC (1) is to vary x and y from 1 to α, and check if (x, y) satises CSC (1). Clearly, the worst-case running time of this algorithm is Õ( 2α). The rst non-trivial (heuristic) algorithm for the CSC roblem is due to Das (1999); Das and Veni Madhavan (2005). It is based on a heuristic estimate that the number of solutions to CSC (1) is aroximately 3α 1. An evidence for the estimate is obtained by observing that the robability of z x 3 y 2 (mod ) being less than α is α 1 Maitra et al. (2009). Interestingly, the question of non-emtiness of the solution set of CSC (1) for all but nitely many rimes is still oen. We now obtain Algorithm 1 for the CSC roblem. In Algorithm 1, δ > 0 must be suciently large to ensure that ) there are enough solutions. Clearly, the running time of Algorithm 1 is ( Õ 2 3 +o(1) when δ = o(1). Note ) that the x, y and z we get as a solution are of magnitude O ( 1 3 +o(1) and are indeendent 3

4 Algorithm 2 Solving CSC (2) given and α. (1) For v 1 to 1 (a) For z 1 to α 1 (i) x v 2 z (mod ), y v 3 z (mod ) (ii) If (v, z) satises CSC (2), then (A) Return (x, y, z). of α. By assuming that the solutions of CSC (1) are uniform randomly distributed in the range 1 x, y < 1 3 +δ, and consequently the robability that a randomly selected ) ( air (x, y) (1 x, y < δ satises CSC (1) being 3 3 +δ ) 1 = 2 ( 1 3 +δ ) ( 1 3 +δ) 1, we get the ( (heuristic) exected running time of Algorithm 1 to be Õ 1 ( 1 +δ)) ) 3 = ( Õ 2 3 o(1). However, note that even when we give a value of x for which there is a solution to CSC (1), we cannot eciently determine a corresonding value of y, and vice-versa. This serves as the motivation for us to study the (v, z)-arametrization of CSC introduced in Maitra et al. (2009). The next major attemt at solving the CSC roblem was by Maitra et al. (2009). They arametrized x 3 y 2 z (mod ) as ( y ) 2 x x z v2 (mod ) x v 2 z (mod ), y v 3 z (mod ). Hence CSC (1) can be equivalently written as x v 2 z (mod ), y v 3 z (mod ), x 3 y 2 z, 1 x, y, z < α, 1 v <. (2) We refer to the above equation as CSC (2). Based on CSC (2), we obtain Algorithm 2. The worst-case running time of Algorithm 2 is Õ( 1+α) and the (heuristic) exected running time is Õ( 2 2α). Note that the worstcase and the exected running time of Algorithm 2 is worse than that of Algorithm 1. Throughout Maitra et al. (2009), only the α = 1 2 case is dealt. It is shown for v < 1 2 that we can otimize the inner loo of Algorithm 2. This is made ossible by exloiting the roerties of solutions to CSC (2) (α = 1 2 ). As a consequence they show that the solutions can be eciently comuted for those rimes close to (but less than) the fourth owers. In the next section, we generalize the otimized version of Algorithm 2 in Maitra et al. (2009) (for the α = 1 2 case) to a general α ( 1 3 < α 1 2). Hence, in order to avoid reetition, we refrain from further describing the results of Maitra et al. (2009). More details on the ecient comutation of solutions for rimes close to fourth owers can be found in Section Heuristic Algorithm and Some Remarks In this section and in Sections 4 and 5, α can take any real value such that 1 3 < α 1 2. Throughout the remainder of the aer, we will work with the (v, z)-arametrization given by CSC (2). The results resented in this section follow in a straightforward manner from those corresonding to the case of α = 1 2 in Maitra et al. (2009). 4

5 Algorithm 3 Solving CSC (2) such that v < α, given and α. (1) For v 1 α to α 1 v (a) For j 1 to 2 1 α (i) z j v 2 (ii) x v 2 z (mod ) (iii) If (x < α v ), then Return (x, y vx, z). Proosition 1. If x, y, z, v < α, x v 2 z (mod ) and y v 3 z (mod ), then the condition x 3 y 2 z is equivalent to x v 2 z. Proof. The condition v, x < α imlies that vx <. Since y v 3 z vx (mod ), we have y = vx. Therefore, x 3 y 2 z x 3 (vx) 2 z x v 2 z x < v 2 z. We now obtain the following corollaries from Proosition 1 and its roof. Corollary 2. If 1 v 1 α 2 or α v 1 α, then corresonding to v there exists no solution to CSC (2). Proof. If 1 v 1 α, then y vx (mod ) imlies that y = vx. If α v 1 α, then y α. Hence there can be no solution. If α > 1 1 α 3 and 1 v 2, then from Proosition 1, we have x 3 = y 2 z and hence there can exist no solution to CSC (2). Note that when α = 1 2, then α = 1 α = 1 2. Corollary 3. Corresonding to v < α if there exists a solution to CSC (2), then x < α v. Using the above results, we obtain Algorithm 3 for solving CSC (2) for those rimes which have a solution for v < α. An examle of a rime for which there is no solution to CSC (2) for v < α ( 1 3 < α 1 2 ) is 101. The ste 1.(a).i of Algorithm 3 is an otimized version of the corresonding ste 1.(a) of Algorithm 2. The inner loo of Algorithm 2 corresonds to the arithmetic rogression v 2 z (varying z for a xed v). Hence between any two multiles of, we need to consider only the rst term of the rogression. The exression z j v in Algorithm 3 recisely 2 corresonds to these terms. The uer bound on the index j is obtained by observing that j v 2 α. The fact that v 2 (1 < v < α ) and that j 1 ensures that v 2 z >. Since v 2 < 2α v, in the worst case, there are exactly 2 iterations of the inner 1 α for-loo corresonding to j. Hence the running time of Algorithm 3 is Õ 1 α ( ) v 2 3α = Õ = Õ( 4α 1). 1 α v= 1 α 2 1 α When α < 1 2, this algorithm is asymtotically faster than the Õ( 2α) -algorithm we obtain when z is incremented only by 1 at a time. This algorithm runs in olynomial time for those rimes which have a solution to CSC (2) for v 1 α 2. It is shown in the 5

6 α = 1 2 case that there are innitely many rimes which have a solution for v 1 4 Maitra et al. (2009). The (heuristic) exected running time of Algorithm 3 is the same as its worst-case running time. This is because the exected number of solutions for v < α is 4α 2, which is at most 1 for α 1 2. Note that these running times are worse comared to that of Algorithm 1. In the inner loo of Algorithm 3, we were trying to determine { a z (z} < α ),( for) a given v (v < α ), such that v 2 z (mod ) < α v, or equivalently v 2 (mod ) z < 1 α v. Using revious results on the ga roblem of fractional art sequences, we shall see in the next section that such a (least) z can be comuted deterministically in olynomial time, and hence the running time of Algorithm 3 can be reduced to Õ(α ). The fact that not all rimes have a solution to CSC (2) corresonding to v < α, and that the range ( 1 α ) 2, α shrinks to zero length as α 1 3 (for a xed ), rovides us a motivation to ursue the following { roblem. } To nd a common { z (z < } α ) simultaneously satisfying the two inequalities v 2 (mod ) z < α and v 3 (mod ) z < α, and also satisfying the condition x 3 y 2 z. In Section 5, we rovide a deterministic olynomial-time algorithm to this roblem by extending the results for the single inequality case, thereby reducing the worst-case running time of Algorithm 2 to Õ() and the exected running time of Algorithm 2 to Õ( 2 3α) Lattice Basis Reduction: Remarks { v 2 (mod ) } The roblem of nding a common z (z < α ) satisfying both z < α } and z < α can be restated as nding airs (c, d) and (ĉ, d) such that { v 3 (mod ) 1 c, ĉ, d < α, c d r (mod ) and ĉ d ˆr (mod ), where r = v 2 (mod ), ˆr = v 3 (mod ) and d = z. Note that all the (c, d) (no restriction on the values of c and d) satisfying c d r (mod ) form a two dimensional lattice. Similarly, the (ĉ, ˆd) satisfying ĉ ˆd ˆr (mod ) form another lattice. Hence we are looking for a short vector on each of the two lattices such that both the vectors have the same value in the second coordinate (d = ˆd). The LLL or other lattice basis reduction algorithms do not seem to be of much use in our case, though the shortest vector roblem in two dimensions can be exactly solved in deterministic olynomial time (Lenstra Jr., 2008; Micciancio and Goldwasser, 2002). The roblem seems to lie in the fact that the condition x 3 y 2 z in CSC (2) does not have a geometric analogue unlike the rest of the conditions, as seen in the revious aragrah. Let us try to examine this issue in the case of v = 1 in CSC (2). When v = 1, we have r = ˆr = 1 and the lattices c d r (mod ) and ĉ ˆd ˆr (mod ) are now identical to Z Z. But the shortest ossible air of vectors (c = 1, d = 1) and (ĉ = 1, ˆd = 1) fail to satisfy the condition x 3 y 2 z. Also, no other air of (exonentially many) short vectors in Z Z can satisfy CSC (2) because when v = 1, then x = y = z and hence x 3 = y 2 z. In fact, as we have seen in Corollary 2, there are no solutions to CSC (2) corresonding to 1 v 1 α 2 and α v 1 α. However if v is suciently large, then we may be able to heuristically argue that the condition x 3 y 2 z holds with a high robability. But our goal is to obtain a deterministic olynomial time method to determine whether there exists a solution to CSC (2) for a given value of v. Hence trying to comute short lattice vectors until the condition x 3 y 2 z is satised does not seem to work in our case. 6

7 4. Solving a Fractional Part Inequality In the revious section, we saw that the Algorithm 3 would } considerably ( ) seed u if we could eciently determine a z such that z α. Let us consider a { v 2 (mod ) < 1 more general roblem of determining an N (for a given θ and φ) such that {θn} < φ, where θ, φ R, 0 < θ, φ < 1, N N {0}. (3) The restrictions on θ and φ will not lead to any loss of generality because 0 {θn} < 1 and {(m + θ)n} = {θn} m Z. The roblem of determining the gas between the successive N satisfying (3) is known as the ga roblem Slater (1967). The distribution of the N satisfying (3) was rst studied in Slater (1950). It is shown, for both rational and irrational θ, that the successive N satisfying (3) is searated by gas of at most three dierent lengths, one being the sum of the other two. A related roblem is the ste roblem Slater (1967). The roblem is to determine the stes into which the interval [0, 1] is artitioned when the values {1θ}, {2θ},..., {Nθ} are arranged in the ascending order. A result analogous to that of the ga roblem is alicable to the ste roblem. For more details on this and other related roblems, we refer the reader to Drobot (1987); Fraenkel and Holzman (1995); Halton (1965); Slater (1964, 1967). When θ is irrational, the sequence Nθ (N 0) is uniformly distributed modulo 1 Graham et al. (1994,. 87). Throughout the rest of the aer, we shall conne ourselves to the case of θ being rational. Let θ = r q, r, q N, r < q and gcd(r, q) = 1. Solving the inequality {θn} < φ for N is equivalent to solving rn (mod q) < T, where T = φq. Henceforth, let φ be of the form φ = T q, where 0 < T < q. Note that the inequality rn (mod q) < T has exactly T solutions for 0 N < q. Also note that the sequence of fractional arts {Nθ} is eriodic with eriod q. From these observations, let us rewrite (3) as follows {θn} < φ, where θ = r q, φ = T, 1 r, T < q, gcd(r, q) = 1, (4) q r, T, q N, and N N {0}. The following reliminary continued fraction formulae will be useful in further discussions. Many of these can be found, for instance, in Hensley (2006,. 6). Let θ be as dened in (4). Let the simle continued fraction exansion of θ be θ = r q = [0; a 1, a 2,..., a n ], where a i N, a n > 1. (5) The s th convergent to θ is r s = [0; a 1, a 2,..., a s ], q s where gcd(r s, q s ) = 1, 1 s n, (6) r 0 = 0 and q 0 = 1. Let q s be the simle continuant of a 1, a 2,..., a s, then it satises q s = a s q s 1 + q s 2 where 1 s n, q 0 = 1, q 1 = 0. (7) Note that r s is the simle continuant of a 2, a 3,..., a s (2 s n, r 1 = 1, r 0 = 0), r n = r and q n = q. Let Q s be the simle continuant of a n, a n 1,..., a n s+1 (1 s n, Q 0 = 1, Q 1 = 0). Particular values of Q i are Q n = q n = q, Q n 1 = r n = r and Q 1 = a n. The Q i satisfy v 7

8 Q n s+1 = a s Q n s + Q n s 1 (1 s n), (8) q s Q n s + q s 1 Q n s 1 = q (0 s n), (9) Q n s = ( 1) s 1 (r q s 1 q r s 1 ) (1 s n + 1). (10) Let A s be the s th comlete quotient of θ, where 1 = [0; a s, a s+1,..., a n ] = Q n s (1 s n). (11) A s Q n s+1 Remark 4. Most of the results in this section can be found in Slater (1950, Part 1) and the rest can be easily derived from it. There are only a few notational changes we have made when using their results. The variables x, i (1 i n), Z, Z 0 and α in Slater (1950, Part 1) have been relaced by, resectively, θ, r i (1 i n), T, T 0 and γ. For the sake of comleteness, we have collected the required results in this section. We often refer to Lemma 5, Theorems 6 and 9, Corollaries 7, 8 and 10, and Equations (5) - (13) mentioned here. The ideas of this section are needed in the next section. The T given in (4) can be uniquely reresented as T = T 0 (s, b) + c, as dened by Lemma 5. Lemma 5. Any T N, 0 < T < q, may be exressed uniquely as T = T 0 + c, (12) where T 0 = T 0 (s, b) = (b + 1) Q n s + Q n s 1, (13) with b = 0, 1,..., a s 1 if s = 2, 3,..., n, with b = 0, 1,..., a 1 2 if s = 1, and c = 0, 1,..., Q n s 1. Whenever we write T 0 or T 0 (s, b) (or, T 0, T 0, ˆT 0 and ˆT 0), we always refer to the secial numbers of (13). Unless the arameters s (ŝ or s ) and b (ˆb or b ) are exlicitly maniulated, say as in T 0 (s, b + 1), by writing T 0 (s, b) = T 0, we always mean that s and b are as uniquely determined according to (13). Theorem 6 below describes all the N that satisfy (4) for T 0. By writing (4) for (θ, T 0 ), we mean that θ = θ and T = T 0 in (4). If the value of θ is clear from the context, then we will simly write (4) for T 0. Theorem 6. The non-negative N satisfying (4) for T 0 (s, b) are N(γ, β) = γ q s 1 + β (q s b q s 1 ) where, if s is even, β = γ = 0, or β = 1, 2, 3,... with γ { (β 1) B s, (β 1) B s + 1,..., β B s }, where, if s is odd, β = 0, 1, 2,... and B s = b + 1 A s+1, dene B n = b. with γ { β B s, β B s + 1,..., (β + 1) B s }, 8

9 Algorithm 4 Given θ (r, q) and T, to comute the least ositive N satisfying (4) for T. (1) Determine T 0(s, b ) (the least value satisfying (13) such that T 0 T ) using Lemma 5. (2) Comute, using Theorem 6, the rst two ositive values of N, say N 1 and N 2 (N 1 < N 2 ), satisfying (4) for T 0. (3) If N 1 satises (4) for T, then Return N 1, else Return N 2. From the above theorem it follows that in the case of (4) for T 0, there are only two ga-lengths searating the successive N satisfying (4) for T 0 (excet when T 0 = 1). We also obtain Corollaries 7 and 8 from Theorem 6. Corollary 7. The successive N satisfying (4) for T 0 (s, b) are searated by only two ga-lengths q s 1 and q s b q s 1, and the number of gas for 0 N q are T 0 Q n s and Q n s, resectively. The larger ga-length is q s b q s 1 while the smaller one is q s 1. Note that T 0 Q n s = 0 only when T 0 = 1. It is easy to see that for any value of θ in (4), T = 1 is always a secial number of (13). When T 0 (s, b) > 1, then B s > 0. Corollary 8. When 1 < T 0 < q, the ga-lengths in Corollary 7 are dierent. If s is even, then the rst ga is the larger ga (q s b q s 1 ), followed by B s smaller gas (q s 1 ). If s is odd, then the rst B s gas are the smaller gas, followed by one larger ga. Theorem 9 below is a generic version of Theorem 6 which is valid for any value of T (0 < T < q). Theorem 9 is known in the literature as Slater's three-ga theorem Fraenkel and Holzman (1995). Corollary 10 follows from Theorem 9. Theorem 9. Let T = T 0 (s, b) + c be the reresentation determined by (12). The N satisfying (4) for T are searated by only three ga-lengths q s 1, q s b q s 1 and q s (b + 1) q s 1. The number of these gas, for 0 N q, are T Q n s, Q n s c and c, resectively. The largest ga-length is q s b q s 1, which is the same as the larger galength corresonding to (4) for T 0. The other two gas of ga-lengths q s (b + 1) q s 1 and q s 1 are obtained by slitting the larger ga corresonding to (4) for T 0. Corollary 10. Let T = T 0 (s, b) + c (by (12)), and T 0(s, b ) be the least value satisfying (13) such that T 0 T. If N 1 and N 2 are two consecutive values satisfying (4) for T 0, then N 1 or N 2 (or both) satisfy (4) for T 0, and hence also satisfy (4) for T. Corollary 10 suggests that in order to comute the least ositive N satisfying (4), then it suces to comute the rst two ositive N satisfying (4) for T 0. These two values of N are in turn comuted using Theorem 6. Using this idea we now obtain Algorithm 4. Proosition 11. The running time of Algorithm 4 is O ( ln 3 q ) bit-oerations. This follows from the fact that the extended Euclidean algorithm terminates in O(ln q) stes and requires O ( ln 3 q ) bit-oerations when run on the inuts r and q. Hence the length of the continued fraction exansion of θ is O(ln q). The continuants q s and Q s (1 s n) can be comuted with O ( ln 3 q ) bit-oerations, and so are each of the stes in Algorithm 4. 9

10 Using Algorithm 4, we can signicantly seed u Algorithm 3. We can relace the inner loo of Algorithm 3 by a call to Algorithm 4 with θ = v2 (mod ) (r = v 2 (mod ), q = ) and T = α v. We must also erform a check whether the returned value, say z, satises z < α. The worst-case and the exected running time of Algorithm 3 is now reduced to Õ(α ) from Õ( 4α 1). 5. Solving Simultaneous Fractional Part Inequalities In the revious section, we saw how to eciently comute the least ositive N satisfying {θn} < φ, when θ is a rational number. The Algorithm 2 for the CSC roblem suggests us to solve a generalization of the above roblem. More recisely, we need to eciently } determine the least ositive N simultaneously satisfying both {θn} < φ and {ˆθN < ˆφ, for rational θ and ˆθ (θ, ˆθ, φ and ˆφ are given). The roblem of exlicitly determining such an N has not been addressed before. A related existential } result is that the successive (non-negative) N satisfying both {θn} < φ and {ˆθN < ˆφ are searated by nitely many gas (θ, ˆθ are either rational or irrational). It is easy to show this result for θ and ˆθ both being rational. For more details on this and other related results refer to Fraenkel and Holzman (1995); Slater (1964). As assumed in the revious section, θ and ˆθ will always denote rational numbers in the interval (0, 1). Consider the two inequalities (the rst same as (4)) and {θn} < φ, where θ = r q, φ = T, 1 r, T < q, gcd(r, q) = 1, (14) q {ˆθN } < ˆφ, where ˆθ = ˆr ˆq, ˆφ = ˆT ˆq, 1 ˆr, ˆT < ˆq, gcd(ˆr, ˆq) = 1, (15) r, T, q, ˆr, ˆT, ˆq N (given), and N N {0} (to be determined). A straightforward algorithm to comute the least ositive N satisfying both (14) and (15) is to successively comute the N satisfying one of (14) or (15) (using Corollary 10 and Theorem 6), until the other inequality is also satised. This aroach is not ecient as can be seen from the examle where q = ˆq = (rime > 2), r = 1, ˆr = 1 and T = ˆT = In this case there is no common (nontrivial) solution to (14) and (15), but this algorithm will still check +1 2 values of N which are less than. Designing a olynomial-time algorithm for the generic case of (14) and (15) aears hard. Fortunately, when we aly the restrictions T q 1 2, ˆT ˆq 1 2, and N < (min(q, ˆq)) 1 2, then we can come u with a deterministic olynomial-time algorithm to comute the least ositive common N satisfying both (14) and (15). It is easy to guess that the above restrictions are tailor-made for those corresonding to the roblem of determining a z (z < α ), for a given v (1 v < ), such that (v, z) satises CSC (2). In order to simlify the descrition of the algorithm, throughout the rest of the section, we shall only consider the instance of (14) and (15) corresonding to CSC (2). The algorithm for the generic case (with the above mentioned restrictions) can be easily derived from Algorithm 5. 10

11 In the case of CSC (2) (given rime ( 3), v (1 v < ), and α ( 1 3 < α 1 2 )), the equations (14) and (15) become {θz} < φ, where θ = r, φ = T, r = v2 (mod ), T = α, (16) and } {ˆθZ < ˆφ, ˆr where ˆθ =, ˆT ˆφ =, ˆr = v3 (mod ), ˆT = α, (17) where Z N {0} (to be determined). Note that gcd(r, ) = gcd(ˆr, ) = 1. In (16) and (17), we have relaced N with Z to remind us that we are working in the case of CSC (2). Note that if we require a value of Z satisfying both (16) and (17) to also satisfy CSC (2), then the following two conditions must also be satised and 1 Z < α, (18) x 3 y 2 z, where x v 2 Z (mod ), y v 3 Z (mod ), z = Z. (19) Let θ, T, ˆθ and ˆT be as in (16) and (17). Let T = α = T 0 (s, b) + c (20) and ˆT = α = ˆT 0 (ŝ, ˆb) + ĉ (21) be the reresentation of T and ˆT, determined by (12), corresonding to (16) and (17), resectively. Denote the largest ga-length corresonding to (16) and (17) by g max and ĝ max, resectively. From Theorem 9, the exact values of g max and ĝ max are, resectively, q s b q s 1 and ˆqŝ ˆb ˆqŝ 1. We now have the following lemma. Lemma 12. g max, ĝ max α 1. Proof. First, we rove the lemma for g max. Since T = α and (16) has exactly T gas for 0 Z, we need α g max. Therefore, g max. Using the fact that g max is an integer, we get g max for ĝ max. α 1 2 α 1. Similarly the result follows Using Theorem 9 (alied to (16)), Lemma 12, and Corollary 8 (alied to (14) for (θ, T 0 )), we see that when s (in (20)) is even, the rst ga corresonding to (16) is the ga of length q s b q s 1 (= g max ) or q s (b + 1) q s 1 (= g max q s 1 ). (It cannot be q s 1, by Corollary 8 (alied to (14) for (θ, T 0(s, b + 1)))). Hence there can be at most two values of Z < α which satisfy (16). Note that there can be exactly two values of Z < α only when g max = α 1 and the rst (larger) ga of (14) for (θ, T 0 ) has slit. Similarly when ŝ (in (21)) is even, there can be at most two values of Z < α which satisfy (17). Hence when s (or ŝ) is even, we just need to check if g max q s 1 and g max (or, ĝ max ˆqŝ 1 and ĝ max ) satisfy (16)-(19). In these (three) cases, we can comute the smallest Z satisfying (16)-(19) in olynomial time. Let both s and ŝ be odd. Using Theorem 9 (alied to (16)), Lemma 12, and Corollary 8 (alied to (14) for (θ, T 0 )), we see that the rst B s gas corresonding to (16) are of

12 length q s 1, and then followed by a ga of length g max, or a ga of length q s 1 followed by a ga of length g max q s 1. In the case of (17), the rst ˆBŝ gas are of length ˆqŝ 1, and then followed by a ga of length ĝ max, or a ga of length ˆqŝ 1 followed by a ga of length ĝ max ˆqŝ 1. Let M = min( B s q s 1, ˆBŝ ˆqŝ 1 ) and F = lcm(q s 1, ˆqŝ 1 ). (22) In the range [0, M] there is only one tye of ga-length in (16) as well as (17). Now there are two ossibilities for M. If M α 1, then there are exactly α 1 F values ( of Z < α satisfying ) both (16) and (17). The corresonding values of Z are j F 1 j. Note that when F > α 1, there are no solutions. The α 1 F other ossibility is that M < α 1. The values of Z u to M (1 M < α 1) satisfying both (16) and (17) are j F ( 1 j ) M F. Again, if M < F, then there are no solutions u to M. Let h = q s 1 or h = ˆqŝ 1 according as M = B s q s 1 or not. Since g max, ĝ max α 1 (Lemma 12) and M, F 1, we have M +g max, M +ĝ max α. Therefore the only ossibility of another solution is Z = M + h. Hence, even in the case of both s and ŝ being odd, we can nd a Z < α, if one exists, satisfying both (16) and (17). Since we even require that the Z must satisfy (19), then we need to check all the solutions u to α 1. When there are exonentially many solutions, as in the case of v = 1, then we might end u checking all the solutions but none satisfying (19). This roblem can be overcome with the hel of the following theorem, which shows that it suces to check the satisability of (19) for Z = F. Theorem 13. Let s (in (20)) and ŝ (in (21)) ( be both odd, and M, ) F be as in (22). Consider the common solutions Z j = j F 1 j min(m, α 1) F satisfying (16), (17) and (18). Either all the Z j satisfy (19) or none of them satises (19). Proof. Let min(m, α 1) F 1, so that there exists at least one common solution. Let x j v 2 Z j (mod ), y j v 3 Z j (mod ) and z j = Z j. Therefore x j j x 1 (mod ), y j j y 1 (mod ) and z j = j z 1. Since j, x 1, y 1, z 1 α 1 < 1 2, we get x j = j x 1, y j = j y 1 and z j = j z 1. Hence x 3 j y2 j z j if and only if x 3 1 y1z 2 1. Using the above ideas, we obtain Algorithm 5. It determines, for a given v, the least Z (say z) satisfying (16) to (19), i.e. determines the least z such that (v, z) satises CSC (2), if any exists. The following roosition follows easily from Proosition 11. Proosition 14. The running time of Algorithm 5 is O ( ln 3 ) bit-oerations. We have imlemented Algorithm 5 in PARI/GP on an Intel Pentium-4 single core rocessor running Ubuntu Linux On exerimenting (for the α = 1 2 case of CSC (2)) with 10 randomly chosen 1024-bit rimes and 100 randomly chosen v for each value of, we got the average running time of Algorithm 5 to be 0.02 seconds. Using Algorithm 5, we can reduce the worst-case running time of Algorithm 2 to Õ( 1) from Õ( 1+α), and the exected running time of Algorithm 2 reduces to Õ( 2 3α) from 12

13 Algorithm 5 Given v (1 v < ) ( 3), to determine the least ositive z, if any, such that (v, z) satises CSC (2). (1) Determine the reresentations T = α = T 0 (s, b) + c and ˆT = α = ˆT 0 (ŝ, ˆb) + ĉ by alying Lemma 5 for (16) and for (17), resectively. (2) If s (or ŝ) is even, and if z q s (b+1) q s 1 or else z q s b q s 1 (or ˆqŝ (ˆb+1) ˆqŝ 1 or else ˆqŝ ˆb ˆqŝ 1 ) satises CSC (2) for the given v, then Return z. (3) Else (s, ŝ - both odd) (a) If B s q s 1 ˆBŝ ˆqŝ 1, then M B s q s 1 and h q s 1, else M ˆBŝ ˆqŝ 1 and h ˆqŝ 1. (b) F lcm(q s 1, ˆqŝ 1 ) (c) If z F satises CSC (2) for the given v, then Return z. (d) If M < α 1 and if z M + h satises CSC (2) for the given v, then Return z. Õ ( 2 2α). Note that, for the α = 1 2 case, the imroved worst-case running time of Algorithm 2 equals that of the current best deterministic algorithm (Algorithm 1), and similarly the imroved exected running time of Algorithm 2 matches the current best exected running time (Algorithm 1). In order to make Algorithm 2 even more ecient, we need to be able to redict a small range of values of v in which we are guaranteed a solution. This roblem aears to be hard and currently we are even unable to determine whether corresonding to v = i+1 a solution to CSC (2) exists, given that v = i has no solutions. Nevertheless, it is imortant to ursue research in this direction since we are now required to analyze the distribution of solutions of CSC (2) with resect to only one arameter v, unlike two arameters x and y in the case of CSC (1). The converse roblem of determining various rimes which have a solution to CSC (2) for a given value of v (say i) is useful to identify classes of rimes for which we can nd a solution eciently. This roblem is addressed in the next section. 6. Existence of Solutions to CSC It is shown in Maitra et al. (2009) that for the rimes satisfying (i 1) 2 i 2 i + 1 < < (i 1) 2 i 2, there exists a solution to CSC (2) (α = 1 2 ) and a corresonding (v, z) air is ( v = i, z = (i 1) 2). Using the rime number theorem, we see ( that ) the (exected) n number of rimes less than n satisfying the above inequality is Θ 1 2 ln n. Hence rimes ( ) close to the fourth owers have a solution for v 1 4 v > 1 4 and using Algorithm 3 (α = 1 2 ) the solution can be eciently comuted. It is easy to see that the above result is based on the following lemma. Lemma 15. If 0 < a 2 b < 2 1 a (2) (α = 1 2 ). and 1 a, b < 1 2, then (v = a, z = b) satises CSC 13

14 Note that the number of rimes for which the trile (x = 1 3 ( ), y = 1, z = x 3 ) satises CSC (1) (α = 1 2 ) is Θ n 5 6. ln n Let us try to generalize the above result that rimes close to (but less than) the fourth owers have a solution for v 1 4, to determine those rimes which have a solution to CSC (2) (α = 1 2 ) for a given v = i, and that v 1 ɛ (ɛ R, 3 ɛ 4). Throughout this section we will restrict ourselves only to the case α = 1 2 of CSC (2). Let i N, i 6, ɛ R and 3 ɛ 4. Let v = i in CSC (2). Dene z = i ɛ 2, hence v 2 z i ɛ. If we choose such that (i 1) ɛ < < v 2 z i ɛ and v 2 z < 2 1 v, then by Lemma 15 we have (v, z) satisfying CSC (2) for such a, and also v 1 ɛ. The restriction (i 1) ɛ < i ɛ ensures that the rimes are in disjoint intervals as i varies for a xed ɛ. Since v 2 z = i 2 i ɛ 2 = i ɛ { i ɛ 2} i 2 i ɛ and 0 { i ɛ 2} i 2 < i 2, we require ɛ 3, and the restriction ɛ 4 follows from Algorithm 3 (α = 1 2 ). Note that when i 6, we have i ɛ < 2 (i 1) ɛ and hence v 2 z (mod ) = v 2 z. We need to nd those rimes which satisfy the conditions and (i 1) ɛ < < i 2 i ɛ 2 (23) i 2 i ɛ 2 < 1 2 i. (24) The inequality in (24) is quadratic and it can be solved for (this is the reason for requiring α = 1 2 ). On solving (24) for, and then requiring that it also satises (23), we get the solution set { P ɛ, i = rimes ( ) i2 i ɛ 2 4 i4 i ɛ i 2 < < i 2 i ɛ 2 }. Proosition 16. The rimes P ɛ, i have (v = i, z = i ɛ 2 ) satisfying CSC (2) (α = 1 2 ), and v 1 ɛ. Since ( by P ɛ, i is Θ ( 4 i 4 i ɛ 2 1 ) 2 i i ɛ 2 2 1, the number of rimes less than n (for a xed ɛ) covered ). Note that v 1 ɛ, but not really v ɛ, as belongs to an interval n 1 2 ln n (of length v ɛ 2 1 ) whose right end is the multile of v 2 nearest to (and less than or equal to) v ɛ. We still say that is close to v ɛ v since ɛ v ɛ (v 1) 0 as v. ɛ For a given i, the set P ɛ, i can be better ictured by considering the interval 3 ɛ 4 [ i 3, i 4], dividing it into sub-intervals of length i 2, i.e. intervals of the form ( i 3 +(j 1) i 2, i 3 +j i 2 ) for 1 j i 2 i, and then considering in each sub-interval all the rimes in the right most sub-sub-interval of length i + j 1. It is easy to see that the cardinality ( ) of P ɛ, i is Θ. This aroach gives us a fairly accurate algorithm to comute 3 ɛ 4 i 3 ln i the cardinality of ɛ, ip ɛ, i. When l 3, we have l 3 < (l+1) 3 < l 4 and hence any real number k 27 can be written in the form l ɛ (for some 3 ɛ 4 and l N) and the number of such reresentations of 14

15 Table 1. Secic values of count(n). n count(n) π(n) count(n) π(n) ( ) ( ) k is Θ k 1 3 k 1 4 = Θ k 1 3. These ideas suggest that ɛ, i can ossibly cover a large ɛ, ip roortion of rimes. Because the sets P ɛ,i have too much overla, calculating the exact roortion of these rimes seems to be challenging. Let count(n) denote the number of rimes less than or equal to n which are also in ɛ, ip ɛ, i. It is emirically observed u to one billion that about one in three rimes belongs to ɛ, ip ɛ, i. Table 1 gives the value of count(n) for some values of n. The values of count(n) listed in Table 1 deviate only marginally from the actual values because of the oating-oint aroximations in their comutations. The function π(n) denotes the total number of rimes less than or equal to n. From Proosition 16, we conclude that for rimes P ɛ, i there is a solution to CSC (2) (α = 1 2 ) corresonding to v, where 1 4 < v < 1 3 ( + 1, ) and using Algorithm 2 along with Algorithm 5, we can determine a solution in ( ) Õ 1 3 time. It can be easily shown that for these rimes the Algorithm 3 takes Õ 1 2 time in the worst case, the revious best running time. Using an aroach similar to the one in this section, we may be able to identify more classes of rimes for which a solution to CSC (2) can be comuted more eciently. 7. Conclusion We have shown that we can determine in deterministic olynomial time whether a solution to CSC (2) exists for a given v (1 v < ), and we can also comute it eciently, if one exists. An imortant research direction is to analyze the distribution of solutions with resect to the arameter v and use the analysis to guess a value of v close to the one which has a solution. We have also shown that the rimes close to i ɛ (integer i, real ɛ [3, 4]) have a solution to CSC (2) (α = 1 2 ). Determining a recise estimate of the roortion of rimes covered by this characterization needs to be addressed. Extending this analysis of the distribution of solutions to a general α ( 1 3 < α 1 2 ) also needs to be done. Determining whether a solution to CSC (2) exists for a given z (1 z < α ) leads to interesting questions on fractional art sequences such as eciently nding a common N simultaneously satisfying both { θn 2} < φ and { θn 3} < φ. 15

16 Acknowledgements We would like to thank Mr. Puttabasavaiah for heling us obtain the aers Slater (1950, 1967). Many thanks to Prof. John H. Halton for mailing his aer Halton (1965), and also to Srikanth Pai for useful initial discussions. References Coersmith, D., Odlzyko, A. M., Schroeel, R., Discrete logarithms in GF (). Algorithmica 1 (1), 115. Cormen, T. H., Leiserson, C. E., Rivest, R. L., Stein, C., Introduction to algorithms. The MIT ress. Das, A., Galois Field comutations: Imlementation of a library and a study of the discrete logarithm roblem. Ph.D. thesis, Indian Institute of Science, Bangalore. Das, A., Veni Madhavan, C. E., On the cubic sieve method for comuting discrete logarithms over rime elds. International Journal of Comuter Mathematics 82 (12), Drobot, V., Gas in the sequence n 2 ϑ (mod 1). International Journal of Mathematics and Mathematical Sciences 10 (1), Fraenkel, A. S., Holzman, R., Ga roblems for integer art and fractional art sequences. Journal of Number Theory 50 (1), Graham, R. L., Knuth, D. E., Patashnik, O., Concrete Mathematics: a foundation for comuter science. Addison-Wesley Reading, MA. Halton, J. H., The distribution of the sequence {nξ} (n = 0, 1, 2,...). In: Proceedings of the Cambridge Philosohical Society. Vol Hensley, D., Continued Fractions. World Scientic Pub Co Inc. Lenstra, A. K., Lenstra Jr., H. W., Handbook of Theoretical Comuter Science. MIT Press/Elsevier, Amsterdam, Ch. Algorithms in Number Theory, Lenstra Jr., H. W., Algorithmic Number Theory: Lattices, Number Fields, Curves and Crytograhy. Cambridge Univ Press, Ch. Lattices, Maitra, S., Rao, Y. V. S., Stanica, P., Gangoadhyay, S., Nontrivial solutions to the cubic sieve congruence roblem: x 3 y 2 z mod. Comutación y Sistemas 12 (3), Menezes, A. J., Van Oorschot, P. C., Vanstone, S. A., Handbook of Alied Crytograhy. CRC. Micciancio, D., Goldwasser, S., Comlexity of lattice roblems: a crytograhic ersective. Vol Sringer Netherlands. Schirokauer, O., Weber, D., Denny, T., Discrete logarithms: the eectiveness of the index calculus method. In: Proceedings of the Algorithmic Number Theory Symosium II. Sringer, Slater, N. B., The distribution of the integers N for which {θn} < φ. In: Proceedings of the Cambridge Philosohical Society. Vol Slater, N. B., Distribution roblems and hysical alications. Comositio Math 16, Slater, N. B., Gas and stes for the sequence nθ mod 1. In: Proceedings of the Cambridge Philosohical Society. Vol

HENSEL S LEMMA KEITH CONRAD

HENSEL S LEMMA KEITH CONRAD HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar

More information

Multiplicative group law on the folium of Descartes

Multiplicative group law on the folium of Descartes Multilicative grou law on the folium of Descartes Steluţa Pricoie and Constantin Udrişte Abstract. The folium of Descartes is still studied and understood today. Not only did it rovide for the roof of

More information

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields Malaysian Journal of Mathematical Sciences 10(S February: 15-35 (016 Secial Issue: The 3 rd International Conference on Mathematical Alications in Engineering 014 (ICMAE 14 MALAYSIAN JOURNAL OF MATHEMATICAL

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

#A8 INTEGERS 12 (2012) PARTITION OF AN INTEGER INTO DISTINCT BOUNDED PARTS, IDENTITIES AND BOUNDS

#A8 INTEGERS 12 (2012) PARTITION OF AN INTEGER INTO DISTINCT BOUNDED PARTS, IDENTITIES AND BOUNDS #A8 INTEGERS 1 (01) PARTITION OF AN INTEGER INTO DISTINCT BOUNDED PARTS, IDENTITIES AND BOUNDS Mohammadreza Bidar 1 Deartment of Mathematics, Sharif University of Technology, Tehran, Iran mrebidar@gmailcom

More information

Verifying Two Conjectures on Generalized Elite Primes

Verifying Two Conjectures on Generalized Elite Primes 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 12 (2009), Article 09.4.7 Verifying Two Conjectures on Generalized Elite Primes Xiaoqin Li 1 Mathematics Deartment Anhui Normal University Wuhu 241000,

More information

An Estimate For Heilbronn s Exponential Sum

An Estimate For Heilbronn s Exponential Sum An Estimate For Heilbronn s Exonential Sum D.R. Heath-Brown Magdalen College, Oxford For Heini Halberstam, on his retirement Let be a rime, and set e(x) = ex(2πix). Heilbronn s exonential sum is defined

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

Practice Final Solutions

Practice Final Solutions Practice Final Solutions 1. True or false: (a) If a is a sum of three squares, and b is a sum of three squares, then so is ab. False: Consider a 14, b 2. (b) No number of the form 4 m (8n + 7) can be written

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education

CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education CERIAS Tech Reort 2010-01 The eriod of the Bell numbers modulo a rime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education and Research Information Assurance and Security Purdue University,

More information

Representing Integers as the Sum of Two Squares in the Ring Z n

Representing Integers as the Sum of Two Squares in the Ring Z n 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 17 (2014), Article 14.7.4 Reresenting Integers as the Sum of Two Squares in the Ring Z n Joshua Harrington, Lenny Jones, and Alicia Lamarche Deartment

More information

ON THE SET a x + b g x (mod p) 1 Introduction

ON THE SET a x + b g x (mod p) 1 Introduction PORTUGALIAE MATHEMATICA Vol 59 Fasc 00 Nova Série ON THE SET a x + b g x (mod ) Cristian Cobeli, Marian Vâjâitu and Alexandru Zaharescu Abstract: Given nonzero integers a, b we rove an asymtotic result

More information

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS #A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th 18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider

More information

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler Intrinsic Aroximation on Cantor-like Sets, a Problem of Mahler Ryan Broderick, Lior Fishman, Asaf Reich and Barak Weiss July 200 Abstract In 984, Kurt Mahler osed the following fundamental question: How

More information

On Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve

On Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve On onlinear Polynomial Selection and Geometric Progression (mod ) for umber Field Sieve amhun Koo, Gooc Hwa Jo, and Soonhak Kwon Email: komaton@skku.edu, achimheasal@nate.com, shkwon@skku.edu Det. of Mathematics,

More information

Math 4400/6400 Homework #8 solutions. 1. Let P be an odd integer (not necessarily prime). Show that modulo 2,

Math 4400/6400 Homework #8 solutions. 1. Let P be an odd integer (not necessarily prime). Show that modulo 2, MATH 4400 roblems. Math 4400/6400 Homework # solutions 1. Let P be an odd integer not necessarily rime. Show that modulo, { P 1 0 if P 1, 7 mod, 1 if P 3, mod. Proof. Suose that P 1 mod. Then we can write

More information

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS #A47 INTEGERS 15 (015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS Mihai Ciu Simion Stoilow Institute of Mathematics of the Romanian Academy, Research Unit No. 5,

More information

#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS

#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS #A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS Norbert Hegyvári ELTE TTK, Eötvös University, Institute of Mathematics, Budaest, Hungary hegyvari@elte.hu François Hennecart Université

More information

ISOSCELES TRIANGLES IN Q 3. Matt Noble Department of Mathematics, Middle Georgia State University, Macon, Georgia

ISOSCELES TRIANGLES IN Q 3. Matt Noble Department of Mathematics, Middle Georgia State University, Macon, Georgia #A9 INTEGERS 18 (2018) ISOSCELES TRIANGLES IN Q Matt Noble Deartment of Mathematics, Middle Georgia State University, Macon, Georgia matthew.noble@mga.edu Received: 7/2/17, Acceted: 2//18, Published: 2/19/18

More information

Applicable Analysis and Discrete Mathematics available online at HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS

Applicable Analysis and Discrete Mathematics available online at   HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS Alicable Analysis and Discrete Mathematics available online at htt://efmath.etf.rs Al. Anal. Discrete Math. 4 (010), 3 44. doi:10.98/aadm1000009m HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS Zerzaihi

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

AN IMPROVED BABY-STEP-GIANT-STEP METHOD FOR CERTAIN ELLIPTIC CURVES. 1. Introduction

AN IMPROVED BABY-STEP-GIANT-STEP METHOD FOR CERTAIN ELLIPTIC CURVES. 1. Introduction J. Al. Math. & Comuting Vol. 20(2006), No. 1-2,. 485-489 AN IMPROVED BABY-STEP-GIANT-STEP METHOD FOR CERTAIN ELLIPTIC CURVES BYEONG-KWEON OH, KIL-CHAN HA AND JANGHEON OH Abstract. In this aer, we slightly

More information

RAMANUJAN-NAGELL CUBICS

RAMANUJAN-NAGELL CUBICS RAMANUJAN-NAGELL CUBICS MARK BAUER AND MICHAEL A. BENNETT ABSTRACT. A well-nown result of Beuers [3] on the generalized Ramanujan-Nagell equation has, at its heart, a lower bound on the quantity x 2 2

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

Math 104B: Number Theory II (Winter 2012)

Math 104B: Number Theory II (Winter 2012) Math 104B: Number Theory II (Winter 01) Alina Bucur Contents 1 Review 11 Prime numbers 1 Euclidean algorithm 13 Multilicative functions 14 Linear diohantine equations 3 15 Congruences 3 Primes as sums

More information

ON POLYNOMIAL SELECTION FOR THE GENERAL NUMBER FIELD SIEVE

ON POLYNOMIAL SELECTION FOR THE GENERAL NUMBER FIELD SIEVE MATHEMATICS OF COMPUTATIO Volume 75, umber 256, October 26, Pages 237 247 S 25-5718(6)187-9 Article electronically ublished on June 28, 26 O POLYOMIAL SELECTIO FOR THE GEERAL UMBER FIELD SIEVE THORSTE

More information

The inverse Goldbach problem

The inverse Goldbach problem 1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the

More information

Mobius Functions, Legendre Symbols, and Discriminants

Mobius Functions, Legendre Symbols, and Discriminants Mobius Functions, Legendre Symbols, and Discriminants 1 Introduction Zev Chonoles, Erick Knight, Tim Kunisky Over the integers, there are two key number-theoretic functions that take on values of 1, 1,

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Heuristics on Tate Shafarevitch Groups of Elliptic Curves Defined over Q

Heuristics on Tate Shafarevitch Groups of Elliptic Curves Defined over Q Heuristics on Tate Shafarevitch Grous of Ellitic Curves Defined over Q Christohe Delaunay CONTENTS. Introduction 2. Dirichlet Series and Averages 3. Heuristics on Tate Shafarevitch Grous References In

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Diophantine Equations and Congruences

Diophantine Equations and Congruences International Journal of Algebra, Vol. 1, 2007, no. 6, 293-302 Diohantine Equations and Congruences R. A. Mollin Deartment of Mathematics and Statistics University of Calgary, Calgary, Alberta, Canada,

More information

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES OHAD GILADI AND ASSAF NAOR Abstract. It is shown that if (, ) is a Banach sace with Rademacher tye 1 then for every n N there exists

More information

SUMS OF TWO SQUARES PAIR CORRELATION & DISTRIBUTION IN SHORT INTERVALS

SUMS OF TWO SQUARES PAIR CORRELATION & DISTRIBUTION IN SHORT INTERVALS SUMS OF TWO SQUARES PAIR CORRELATION & DISTRIBUTION IN SHORT INTERVALS YOTAM SMILANSKY Abstract. In this work we show that based on a conjecture for the air correlation of integers reresentable as sums

More information

Elliptic Curves and Cryptography

Elliptic Curves and Cryptography Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a

More information

Inequalities for finite trigonometric sums. An interplay: with some series related to harmonic numbers

Inequalities for finite trigonometric sums. An interplay: with some series related to harmonic numbers Kouba Journal of Inequalities and Alications 6 6:73 DOI.86/s366-6-- R E S E A R C H Oen Access Inequalities for finite trigonometric sums. An interlay: with some series related to harmonic numbers Omran

More information

MAS 4203 Number Theory. M. Yotov

MAS 4203 Number Theory. M. Yotov MAS 4203 Number Theory M. Yotov June 15, 2017 These Notes were comiled by the author with the intent to be used by his students as a main text for the course MAS 4203 Number Theory taught at the Deartment

More information

2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized

2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized BIT 38 :2 (998), 283{292. QUASI-MONTE CARLO METHODS FOR NUMERICAL INTEGRATION OF MULTIVARIATE HAAR SERIES II KARL ENTACHER y Deartment of Mathematics, University of Salzburg, Hellbrunnerstr. 34 A-52 Salzburg,

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

On generalizing happy numbers to fractional base number systems

On generalizing happy numbers to fractional base number systems On generalizing hay numbers to fractional base number systems Enriue Treviño, Mikita Zhylinski October 17, 018 Abstract Let n be a ositive integer and S (n) be the sum of the suares of its digits. It is

More information

(Workshop on Harmonic Analysis on symmetric spaces I.S.I. Bangalore : 9th July 2004) B.Sury

(Workshop on Harmonic Analysis on symmetric spaces I.S.I. Bangalore : 9th July 2004) B.Sury Is e π 163 odd or even? (Worksho on Harmonic Analysis on symmetric saces I.S.I. Bangalore : 9th July 004) B.Sury e π 163 = 653741640768743.999999999999.... The object of this talk is to exlain this amazing

More information

Almost All Palindromes Are Composite

Almost All Palindromes Are Composite Almost All Palindromes Are Comosite William D Banks Det of Mathematics, University of Missouri Columbia, MO 65211, USA bbanks@mathmissouriedu Derrick N Hart Det of Mathematics, University of Missouri Columbia,

More information

An Overview of Witt Vectors

An Overview of Witt Vectors An Overview of Witt Vectors Daniel Finkel December 7, 2007 Abstract This aer offers a brief overview of the basics of Witt vectors. As an alication, we summarize work of Bartolo and Falcone to rove that

More information

Small Zeros of Quadratic Forms Mod P m

Small Zeros of Quadratic Forms Mod P m International Mathematical Forum, Vol. 8, 2013, no. 8, 357-367 Small Zeros of Quadratic Forms Mod P m Ali H. Hakami Deartment of Mathematics, Faculty of Science, Jazan University P.O. Box 277, Jazan, Postal

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): 10.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): 10. Booker, A. R., & Pomerance, C. (07). Squarefree smooth numbers and Euclidean rime generators. Proceedings of the American Mathematical Society, 45(), 5035-504. htts://doi.org/0.090/roc/3576 Peer reviewed

More information

A Social Welfare Optimal Sequential Allocation Procedure

A Social Welfare Optimal Sequential Allocation Procedure A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

Lattice Attacks on the DGHV Homomorphic Encryption Scheme

Lattice Attacks on the DGHV Homomorphic Encryption Scheme Lattice Attacks on the DGHV Homomorhic Encrytion Scheme Abderrahmane Nitaj 1 and Tajjeeddine Rachidi 2 1 Laboratoire de Mathématiques Nicolas Oresme Université de Caen Basse Normandie, France abderrahmanenitaj@unicaenfr

More information

arxiv: v4 [math.nt] 11 Oct 2017

arxiv: v4 [math.nt] 11 Oct 2017 POPULAR DIFFERENCES AND GENERALIZED SIDON SETS WENQIANG XU arxiv:1706.05969v4 [math.nt] 11 Oct 2017 Abstract. For a subset A [N], we define the reresentation function r A A(d := #{(a,a A A : d = a a }

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

arxiv:cond-mat/ v2 25 Sep 2002

arxiv:cond-mat/ v2 25 Sep 2002 Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

Introduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen

Introduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen Ancient and new algorithms for load balancing in the L norm Adi Avidor Yossi Azar y Jir Sgall z July 7, 997 Abstract We consider the on-line load balancing roblem where there are m identical machines (servers)

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Almost 4000 years ago, Babylonians had discovered the following approximation to. x 2 dy 2 =1, (5.0.2)

Almost 4000 years ago, Babylonians had discovered the following approximation to. x 2 dy 2 =1, (5.0.2) Chater 5 Pell s Equation One of the earliest issues graled with in number theory is the fact that geometric quantities are often not rational. For instance, if we take a right triangle with two side lengths

More information

When do Fibonacci invertible classes modulo M form a subgroup?

When do Fibonacci invertible classes modulo M form a subgroup? Calhoun: The NPS Institutional Archive DSace Reository Faculty and Researchers Faculty and Researchers Collection 2013 When do Fibonacci invertible classes modulo M form a subgrou? Luca, Florian Annales

More information

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM JOHN BINDER Abstract. In this aer, we rove Dirichlet s theorem that, given any air h, k with h, k) =, there are infinitely many rime numbers congruent to

More information

Factorability in the ring Z[ 5]

Factorability in the ring Z[ 5] University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Dissertations, Theses, and Student Research Paers in Mathematics Mathematics, Deartment of 4-2004 Factorability in the ring

More information

RECIPROCITY LAWS JEREMY BOOHER

RECIPROCITY LAWS JEREMY BOOHER RECIPROCITY LAWS JEREMY BOOHER 1 Introduction The law of uadratic recirocity gives a beautiful descrition of which rimes are suares modulo Secial cases of this law going back to Fermat, and Euler and Legendre

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

MATH 361: NUMBER THEORY EIGHTH LECTURE

MATH 361: NUMBER THEORY EIGHTH LECTURE MATH 361: NUMBER THEORY EIGHTH LECTURE 1. Quadratic Recirocity: Introduction Quadratic recirocity is the first result of modern number theory. Lagrange conjectured it in the late 1700 s, but it was first

More information

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave

More information

On the Joint Distribution Of Sel φ (E/Q) and Sel φ (E /Q) in Quadratic Twist Families

On the Joint Distribution Of Sel φ (E/Q) and Sel φ (E /Q) in Quadratic Twist Families On the Joint Distribution Of Sel φ E/Q and Sel φ E /Q in Quadratic Twist Families Daniel Kane and Zev Klagsbrun Introduction Recently, there has a lot of interest in the arithmetic statistics related to

More information

LEIBNIZ SEMINORMS IN PROBABILITY SPACES

LEIBNIZ SEMINORMS IN PROBABILITY SPACES LEIBNIZ SEMINORMS IN PROBABILITY SPACES ÁDÁM BESENYEI AND ZOLTÁN LÉKA Abstract. In this aer we study the (strong) Leibniz roerty of centered moments of bounded random variables. We shall answer a question

More information

GIVEN an input sequence x 0,..., x n 1 and the

GIVEN an input sequence x 0,..., x n 1 and the 1 Running Max/Min Filters using 1 + o(1) Comarisons er Samle Hao Yuan, Member, IEEE, and Mikhail J. Atallah, Fellow, IEEE Abstract A running max (or min) filter asks for the maximum or (minimum) elements

More information

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding Outline EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Error detection using arity Hamming code for error detection/correction Linear Feedback Shift

More information

Catalan s Equation Has No New Solution with Either Exponent Less Than 10651

Catalan s Equation Has No New Solution with Either Exponent Less Than 10651 Catalan s Euation Has No New Solution with Either Exonent Less Than 065 Maurice Mignotte and Yves Roy CONTENTS. Introduction and Overview. Bounding One Exonent as a Function of the Other 3. An Alication

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

POINTS ON CONICS MODULO p

POINTS ON CONICS MODULO p POINTS ON CONICS MODULO TEAM 2: JONGMIN BAEK, ANAND DEOPURKAR, AND KATHERINE REDFIELD Abstract. We comute the number of integer oints on conics modulo, where is an odd rime. We extend our results to conics

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

New Information Measures for the Generalized Normal Distribution

New Information Measures for the Generalized Normal Distribution Information,, 3-7; doi:.339/info3 OPEN ACCESS information ISSN 75-7 www.mdi.com/journal/information Article New Information Measures for the Generalized Normal Distribution Christos P. Kitsos * and Thomas

More information

New weighing matrices and orthogonal designs constructed using two sequences with zero autocorrelation function - a review

New weighing matrices and orthogonal designs constructed using two sequences with zero autocorrelation function - a review University of Wollongong Research Online Faculty of Informatics - Paers (Archive) Faculty of Engineering and Information Sciences 1999 New weighing matrices and orthogonal designs constructed using two

More information

x 2 a mod m. has a solution. Theorem 13.2 (Euler s Criterion). Let p be an odd prime. The congruence x 2 1 mod p,

x 2 a mod m. has a solution. Theorem 13.2 (Euler s Criterion). Let p be an odd prime. The congruence x 2 1 mod p, 13. Quadratic Residues We now turn to the question of when a quadratic equation has a solution modulo m. The general quadratic equation looks like ax + bx + c 0 mod m. Assuming that m is odd or that b

More information

On a class of Rellich inequalities

On a class of Rellich inequalities On a class of Rellich inequalities G. Barbatis A. Tertikas Dedicated to Professor E.B. Davies on the occasion of his 60th birthday Abstract We rove Rellich and imroved Rellich inequalities that involve

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R. 1 Corresondence Between Fractal-Wavelet Transforms and Iterated Function Systems With Grey Level Mas F. Mendivil and E.R. Vrscay Deartment of Alied Mathematics Faculty of Mathematics University of Waterloo

More information

c Copyright by Helen J. Elwood December, 2011

c Copyright by Helen J. Elwood December, 2011 c Coyright by Helen J. Elwood December, 2011 CONSTRUCTING COMPLEX EQUIANGULAR PARSEVAL FRAMES A Dissertation Presented to the Faculty of the Deartment of Mathematics University of Houston In Partial Fulfillment

More information

QUADRATIC RECIPROCITY

QUADRATIC RECIPROCITY QUADRATIC RECIPROCIT POOJA PATEL Abstract. This aer is an self-contained exosition of the law of uadratic recirocity. We will give two roofs of the Chinese remainder theorem and a roof of uadratic recirocity.

More information

Strong Matching of Points with Geometric Shapes

Strong Matching of Points with Geometric Shapes Strong Matching of Points with Geometric Shaes Ahmad Biniaz Anil Maheshwari Michiel Smid School of Comuter Science, Carleton University, Ottawa, Canada December 9, 05 In memory of Ferran Hurtado. Abstract

More information

On the Multiplicative Order of a n Modulo n

On the Multiplicative Order of a n Modulo n 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 13 2010), Article 10.2.1 On the Multilicative Order of a n Modulo n Jonathan Chaelo Université Lille Nord de France F-59000 Lille France jonathan.chaelon@lma.univ-littoral.fr

More information

BEST POSSIBLE DENSITIES OF DICKSON m-tuples, AS A CONSEQUENCE OF ZHANG-MAYNARD-TAO

BEST POSSIBLE DENSITIES OF DICKSON m-tuples, AS A CONSEQUENCE OF ZHANG-MAYNARD-TAO BEST POSSIBLE DENSITIES OF DICKSON m-tuples, AS A CONSEQUENCE OF ZHANG-MAYNARD-TAO ANDREW GRANVILLE, DANIEL M. KANE, DIMITRIS KOUKOULOPOULOS, AND ROBERT J. LEMKE OLIVER Abstract. We determine for what

More information

The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001

The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001 The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001 The Hasse-Minkowski Theorem rovides a characterization of the rational quadratic forms. What follows is a roof of the Hasse-Minkowski

More information

NUMBER SYSTEMS. Number theory is the study of the integers. We denote the set of integers by Z:

NUMBER SYSTEMS. Number theory is the study of the integers. We denote the set of integers by Z: NUMBER SYSTEMS Number theory is the study of the integers. We denote the set of integers by Z: Z = {..., 3, 2, 1, 0, 1, 2, 3,... }. The integers have two oerations defined on them, addition and multilication,

More information

BOUNDS FOR THE SIZE OF SETS WITH THE PROPERTY D(n) Andrej Dujella University of Zagreb, Croatia

BOUNDS FOR THE SIZE OF SETS WITH THE PROPERTY D(n) Andrej Dujella University of Zagreb, Croatia GLASNIK MATMATIČKI Vol. 39(59(2004, 199 205 BOUNDS FOR TH SIZ OF STS WITH TH PROPRTY D(n Andrej Dujella University of Zagreb, Croatia Abstract. Let n be a nonzero integer and a 1 < a 2 < < a m ositive

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Algebraic Number Theory

Algebraic Number Theory Algebraic Number Theory Joseh R. Mileti May 11, 2012 2 Contents 1 Introduction 5 1.1 Sums of Squares........................................... 5 1.2 Pythagorean Triles.........................................

More information

Solution sheet ξi ξ < ξ i+1 0 otherwise ξ ξ i N i,p 1 (ξ) + where 0 0

Solution sheet ξi ξ < ξ i+1 0 otherwise ξ ξ i N i,p 1 (ξ) + where 0 0 Advanced Finite Elements MA5337 - WS7/8 Solution sheet This exercise sheets deals with B-slines and NURBS, which are the basis of isogeometric analysis as they will later relace the olynomial ansatz-functions

More information

Infinitely Many Quadratic Diophantine Equations Solvable Everywhere Locally, But Not Solvable Globally

Infinitely Many Quadratic Diophantine Equations Solvable Everywhere Locally, But Not Solvable Globally Infinitely Many Quadratic Diohantine Equations Solvable Everywhere Locally, But Not Solvable Globally R.A. Mollin Abstract We resent an infinite class of integers 2c, which turn out to be Richaud-Degert

More information

Introduction Model secication tests are a central theme in the econometric literature. The majority of the aroaches fall into two categories. In the r

Introduction Model secication tests are a central theme in the econometric literature. The majority of the aroaches fall into two categories. In the r Reversed Score and Likelihood Ratio Tests Geert Dhaene Universiteit Gent and ORE Olivier Scaillet Universite atholique de Louvain January 2 Abstract Two extensions of a model in the resence of an alternative

More information

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1) CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

Best approximation by linear combinations of characteristic functions of half-spaces

Best approximation by linear combinations of characteristic functions of half-spaces Best aroximation by linear combinations of characteristic functions of half-saces Paul C. Kainen Deartment of Mathematics Georgetown University Washington, D.C. 20057-1233, USA Věra Kůrková Institute of

More information