A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two
|
|
- Άτροπος Διαμαντόπουλος
- 6 χρόνια πριν
- Προβολές:
Transcript
1 A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two Izuru Kitamura 1, Masanobu Katagi 1, and Tsuyoshi Takagi 2 1 Sony Corporation, Kitashinagawa Shinagawa-ku, Tokyo, Japan {Izuru.Kitamura, Masanobu.Katagi}@jp.sony.com 2 Future University - Hakodate, Kamedanakano-cho Hakodate, , Japan takagi@fun.ac.jp Abstract. We deal with a divisor class halving algorithm on hyperelliptic curve cryptosystems (HECC), which can be used for scalar multiplication, instead of a doubling algorithm. It is not obvious how to construct a halving algorithm, due to the complicated addition formula of hyperelliptic curves. In this paper, we propose the first halving algorithm used for HECC of genus 2, which is as efficient as the previously known doubling algorithm. From the explicit formula of the doubling algorithm, we can generate some equations whose common solutions contain the halved value. From these equations we derive four specific equations and show an algorithm that selects the proper halved value using two trace computations in the worst case. If a base point is fixed, we can reduce these extra field operations by using a pre-computed table which shows the correct halving divisor class the improvement over the previously known fastest doubling algorithm is up to about 10%. This halving algorithm is applicable to DSA and DH scheme based on HECC. Finally, we present the divisor class halving algorithms for not only the most frequent case but also other exceptional cases. Keywords. hyperelliptic curve cryptosystems, scalar multiplication, divisor class halving, efficient computation 1 Introduction We know from recent research that hyperelliptic curve cryptosystems (HECC) of small genus are competing with elliptic curve cryptosystems (ECC) [Ava04,Lan02a-c, PWG + 03]. With an eye to further improvement of HECC we utilize its abundant algebraic structure to make HECC faster in scalar multiplication than ECC. Lange and Duquesne independently showed that Montgomery scalar multiplication is applicable to HECC [Lan04a,Duq04]. We expect other fast algorithms used for ECC can also be efficiently implemented in HECC. This work was carried out when the author was in Technische Universität Darmstadt, Fachbereich Informatik, Hochschulstr.10, D Darmstadt, Germany
2 A point halving algorithm is one of the effective algorithms on ECC and the algorithm tries to find a point P such that 2P = Q for a given point Q. Knudsen and Schroeppel independently proposed a point halving algorithm for ECC over binary fields F 2 n [Knu99,Sch00]. Their algorithm is faster than a doubling algorithm. Moreover, there has been growing consideration of the point halving algorithm, showing, for instance, a fast implementation [FHL + 03], an application for Koblitz curve [ACF04], and an improvement of curves with cofactor 4 [KR04]. The explicit doubling formula of HECC (denote by HECDBL) is more complicated than that of ECC. It is not obvious how the algorithm of Knudsen and Schroeppel can extend to HECC. In this paper, we propose a divisor class halving algorithm applied to HECC with genus 2 over binary fields. Let D =(U, V ) be a reduced divisor, where U = x 2 +u 1 x+ u 0 and V = v 1 x+v 0. The doubled divisor class 2D can be represented as polynomials over F 2 n with coefficients u 1,u 0,v 1,v 0 s and curve parameters y 2 + h(x)y = f(x). We report two crucial quadratic equations which compute some candidates of the halved values. These equations are derived from the property: an equation of degree 6 appeared in the doubling algorithm can be divided by x 4 + u 2 1x 2 + u 2 0.Wealsoshow a criterion and an algorithm selecting the correct divisor class from two candidates. The correct divisor class can be efficiently found if the polynomial h(x) is irreducible. In order to select the correct halved value, we perform some test calculations, and notice that the number of operations can be reduced if the correct halving value is first found. We developed a divisor class halving algorithm used for not only the most frequent case but also exceptional cases, e.g. the weight of input divisor class is 1. The proposed algorithm can be optimized with careful considerations of the basic operations. This paper is organized as follows: in Section 2 we review the algorithms of a hyperelliptic curve. In Section 3 we present our proposed divisor class halving algorithm for HECC, and compare it with existing doubling formulae. In Section 4 a complete divisor class halving algorithm is shown. In Section 5 we consider a halving algorithm for a special curve, deg h = 1. In Section 6 is our conclusion. 2 Hyperelliptic Curve We review the hyperelliptic curve used in this work. Let F 2 n be a binary finite field with 2 n elements. A hyperelliptic curve C of genus g over F 2 n with one point at infinity is defined by C : y 2 + h(x)y = f(x), where f(x) F 2 n[x] is a monic polynomial of degree 2g+1 and h(x) F 2 n[x] isapolynomial of degree at most g, andcurvec has no singular point. Let P i =(x i,y i ) F 2 n F 2 n be a point on curve C and P be a point at infinity, where F 2 n is the algebraic closure of F 2 n.theinverseofp i =(x i,y i )isthepoint P i =(x i,y i + h(x i )). P is called a ramification point if P = P holds. A divisor is a formal sum of points: D = m i P i,m i Z. A semi-reduced divisor is given by D = m i P i ( m i )P, where m i 0andP i P j for i j, and semi-reduced divisor D is called reduced 2
3 if m i g holds. The weight of a reduced divisor D is defined as m i, and we denote it by w(d). Jacobian J is isomorphic to the divisor class group which forms an additive group. Each divisor class can be represented uniquely by a reduced divisor and so we can identify the set of points on the Jacobian with the set of reduced divisors and assume this identification from now on. The reduced and the semi-reduced divisors are expressed by a pair of polynomials (u, v), which satisfies the following conditions [Mum84]: u(x) = (x + x i ) mi,v(x i )=y i, deg v<deg u, v 2 + hv + f 0modu. A divisor class is defined over F 2 n if the representing polynomials u, v are defined over this field and the set of F 2 n-rational points of the Jacobian is denoted by J(F 2 n). Note that even if u, v F 2 n[x], the coordinates x i and y i may be in extension field of F 2 n. The degree of u equals the weight of the reduced divisor and we represent the zero element by O =(1, 0). To compute the additive group law of J(F 2 n), Cantor gave an addition algorithm as follows: Algorithm 1 Cantor Algorithm Input: D 1 =(U 1,V 1) and D 2 =(U 2,V 2) Output: D 3 =(U 3,V 3)=D 1 + D 2 U i = u i2x 2 + u i1x + u i0,v i = v i1x + v i0, where i =1, 2andu i2 F 2 1. d gcd(u 1,U 2,V 1 + V 2 + h) =s 1U 1 + s 2U 2 + s 3(V 1 + V 2 + h) 2. U U 1U 2/d 2, V (s 1U 1V 2 + s 2U 2V 1 + s 3(V 1V 2 + f))/d mod U 3. while deg U>g U (f + v + V 2 )/U, V h + V mod U 4. U 3 MakeMonic(U),V 3 V 5. return (U 3,V 3) Step 1 and Step 2 are called the composition part and Step 3 is called the reduction part. The composition part computes the semi-reduced divisor D =(U, V ) thatis equivalent to D 3. The reduction part computes the reduced divisor D 3 =(U 3,V 3 ). The Cantor Algorithm is applicable to a hyperelliptic curve of any genus. However, this algorithm is relatively slow due to its generality. Harley then proposed an efficient addition and doubling algorithm for a hyperelliptic curve of genus 2 over F p [GH00,Har00a,Har00b]. This algorithm achieved speeding up by detailed classification into the most frequent case and some exceptional cases. This classification allows us to avoid extra field operations. Sugizaki et al. expanded the Harley algorithm to HECC over F 2 n [SMC + 02], and around the same time Lange expanded the Harley algorithm to HECC over general finite field [Lan02a]. The most frequent case of doubling algorithm HECDBL is defined as follows: HECDBL: w(d 1 )=w(d 2 )=2,D 2 =2D 1,andD 1 has no ramification points. 3
4 Algorithm 2 HECDBL Input: D 1 =(U 1,V 1) Output: D 2 =(U 2,V 2)=2D 1 U i = x 2 + u i1x + u i0,v i = v i1x + v i0, where i =1, 2 1. U 1 U S (f + hv 1 + V 2 1 )/U 1, S Sh 1 mod U 1 3. V 1 SU 1 + V 1 4. U 2 (f + hv 1 + V 1 2 )/U 1 5. U 2 MakeMonic (U 2) 6. V 2 V 1 + h mod U 2 7. return (U 2,V 2) In HECDBL, from Step 1 to Step 3 is the composition part and from Step 4 to Step 6 is the reduction part. The composition part computes the semi-reduced divisor D = (U 1,V 1 )equivalenttod 2.InStep2andStep3,wecomputeV 1 such that f + hv 1 + V 1 2 0modU 1, which can be obtained by V 1 V 1 mod U 1 via Newton iteration. The reduction part computes the reduced divisor D 2 =(U 2,V 2 )=2D 1. From Algorithm 2, it is clear that the number of field operations depends on the curve parameters. To reduce the number of field operations, in previous works, a transformed curve y 2 +(x 2 + h 1 x + h 0 )y = x5 + f 3 x3 + + f 0, via isomorphic transformations: y h 5 2 y and x h2 2 x + f 4, are used. We call this transformed curve a general curve. In this paper, our aim is to present the divisor class halving algorithm for the general curve and to prove the correctness of this algorithm. Additionally, we consider a simple polynomial h(x) =h 1 x + h 0 and we call this curve a special curve. In a cryptographic application, we are only interested in a curve whose order of J(F 2 n)is2 r, i.e. whose cofactor is two, where r is a large prime number. Note that the cofactor is always divisible by 2 (See Appendix A). Moreover, as inputs and outputs for the halving and doubling algorithm we use the divisor classes whose order is r. 3 Proposed Halving Algorithm for General Curve In this section we propose a divisor class halving algorithm (HECHLV) on hyperelliptic curve cryptosystems of genus two. We derive HECHLV by inverse computing of HECDBL. ForHECHLV, the significance problem is to find the missing polynomial k such that V 1 + h = ku 2 + V 2 in Algorithm 2. First, we compute k by a reverse operation of the reduction part, then the semi-reduced divisor via k, atlastd 1 = 1 2 D 2 by a reverse operation of the composition part. 3.1 Main Idea We follow the opposite path to HECDBL. FromStep6ofHECDBL, there is a unique polynomial k = k 1 x + k 0 such that V 1 + h =(k 1x + k 0 )U 2 + V 2. Substituting V 1 to 4
5 equation (f + hv 1 + V 1 2 ) appeared in Step 4, the following relationship yields: U 2U 1 = f + h(ku 2 + V 2 )+k 2 U V 2 2. (1) Because the doubled divisor class (U 2,V 2 ) is known, we can obtain the relationship between k and U 1.NotethatU 2 = k1u 2 2 from the highest term of equation (1). Recall that U 1 = U 1 2 from Step 1, namely, we know U 1 = x 4 + u 2 11x 2 + u (2) In other words, the coefficients of degree 3 and 1 are zero. From this observation, there are polynomials whose solutions includes k 0 and k 1. In our algorithm we try to find k 0 and k 1 by solving the polynomials. Once k 0 and k 1 are calculated, we can easily compute the halved divisor class D 1 =(U 1,V 1 ) from equation (1). We describe the sketch of the proposed algorithm in the following. Algorithm 3 Sketch HECHLV Input: D 2 =(U 2,V 2) Output: D 1 =(U 1,V 1)= 1 2 D2 U i = x 2 + u i1x + u i0,v i = v i1x + v i0, where i =1, 2 1. determine k = k 1x + k 0 by the reverse operation of the reduction part 1.1 V 1 V 2 + h + ku 2,k= k 1x + k U 1 (f + hv 1 + V 1 2 )/(k1u 2 2) 1.3 derive k 0,k 1 from two equations coeff(u 1, 3) = 0 and coeff(u 1, 1) = 0 2. compute U 1 = x 4 + u 2 11x 2 + u 2 10 in the semi-reduced divisor by using k 0,k compute u 2 11 by substituting k 0,k 1 in coeff(u 1, 2) 2.2 compute u 2 10 by substituting k 0,k 1 in coeff(u 1, 0) 3. compute D 1 =(U 1,V 1)= 1 D2 by the reverse operation of the composition part U 1 U 1 = x2 + u 11x + u V 1 V 2 + h + ku 2 mod U 1 4. return (U 1,V 1) In the following, we explain Algorithm 3 in detail. The coeff(u, i) is the coefficient of x i in polynomial U. In Step 1.2, we compute polynomial U 1 in equation (1): where coeff(u 1, 3) = (k 1h 2 + k 2 1 u 21 +1)/k 2 1 coeff(u 1, 2) = (k 1 h 1 + k 0 h 2 + k 2 1u 20 + k c 2 )/k 2 1 coeff(u 1, 1) = (k 1h 0 + k 0 h 1 + k 2 0 u 21 + c 1 )/k 2 1 coeff(u 1, 0) = (k 0 h 0 + k 2 0u 20 + c 0 )/k 2 1, c 2 = f 4 + u 21, c 1 = f 3 + h 2 v 21 + u 20 + c 2 u 21, c 0 = f 2 + h 2 v 20 + h 1 v 21 + v c 2u 20 + c 1 u 21. 5
6 Equation (2) yields the explicit relationship related to variables k 0, k 1, u 11,andu 10 : k 1 h 2 + k 2 1u 21 +1=0 (3) u 11 = k 1 h 0 + k 0 h 1 + k 2 0u 21 + c 1 =0 (4) k 1 h 1 + k 0 h 2 + k 2 1 u 20 + k c 2/k 1 (5) u 10 = k 0 h 0 + k 2 0 u 20 + c 0 /k 1 (6) In the algorithm we used the following lemma in order to uniquely find k 0, k 1. The proof of this lemma is in Appendix B. Lemma 1. Let h(x) be an irreducible polynomial of degree 2. There is only one value k 1 which satisfies both equations (3) and (4). Equation (4) has a solution only for the correct k 1. There is only one value k 0 which yields the halved divisor class D 1 in algorithm 3. Equation xh 2 + x 2 u 11 +1=0 has a solution only for the correct k 0. After calculating k 0,k 1, we can easily compute u 11,u 10, v 11,andv 10 via equations (5), (6), and V 1 V 2 + h +(k 1 x + k 0 )U 2 mod U Proposed Algorithm We make the assumption that the polynomial h has degree two and is irreducible. We present the proposed algorithm in Algorithm 4. The proposed algorithm requires to solve quadratic equations. It is well known that equation ax 2 + bx + c = 0 has roots if and only if Tr(ac/b 2 ) = 0. Let one root of ax 2 + bx + c =0bex 0, then the other root be x 0 + b/a. If this equation has roots, i.e. Tr(ac/b 2 ) = 0, then we can solve this equation by using half trace, namely x 0 = H(ac/b 2 ),x 0 = x 0 + b/a. This equation has no root if Tr(ac/b 2 )=1. We explain the proposed algorithm as follows. The correctness of this algorithm is shown in Lemma 1. In Step 1, we solve two solutions k 1 and k 1 of equation (3). In Step 2, the correct k 1 is selected by checking the trace of equation (4). Then we obtain two solutions k 0 and k 0 of equation (4). In Step 3, the correct k 0 is selected by checking trace of xh 2 + x 2 u = 0. In Steps 4 and 5 we compute the halved divisor class. 6
7 Algorithm 4 HECHLV Input: D 2 =(U 2,V 2) Output: D 1 =(U 1,V 1)= 1 2 D2 U i = x 2 + u i1x + u i0, V i = v i1x + v i0, where i =1, 2, h 2 0 step procedure 1. Solve k 1h 2 + k1u =0 α h 2/u 21,γ u 21/h 2 2, k 1 H(γ)α, k 1 k 1 + α 2. Select correct k 1 by solving k 1h 0 + k 0h 1 + k0u c 1 =0 c 2 f 4 + u 21, c 1 f 3 + h 2v 21 + u 20 + c 2u 21, c 0 f 2 + h 2v 20 + h 1v 21 + v c 2u 20 + c 1u 21,α h 1/u 21, w u 21/h 2 1, γ (c 1 + k 1h 0)w if Tr(γ) =1thenk 1 k 1, γ (c 1 + k 1h 0)w k 0 H(γ)α, k 0 k 0 + α 3. Select correct k 0 by checking trace of xh 2 + x 2 u 11 +1=0 u 11 k 1h 1 + k 0h 2 + k1 2u20 + k2 0 + c2/k1, γ u11/h2 2 if Tr(γ) =1thenk 0 k 0, u 11 k 1h 1 + k 0h 2 + k1 2u20 + k2 0 + c2/k1 4. Compute U 1 u 10 k 0h 0 + k0 2 u20 + c0/k1 5. Compute V 1 = V 2 + h + ku 2 mod U 1 w h 2 + k 1u 21 + k 0 + k 1u 11 v 11 v 21 + h 1 + k 1u 20 + k 0u 21 + u 10k 1 + u 11w, v 10 v 20 + h 0 + k 0u 20 + u 10w 6. D 1 (x 2 + u 11x + u 10,v 11x + v 10), return D Complexity and Improvement In order to estimate the complexity of HECHLV shown in Algorithm 4, we consider four cases with respect to the selection of k 1 and k 0. When we get incorrect k 1 and k 0 (k 1 and k 0 are correct) in Steps 1 and 2, respectively, we have to replace k 1 k 1, k 0 k 0 and compute γ, u 11 again in Steps 2 and 3, respectively. In the worst case this requires 4M +1SR as additional field operations compared to the best case, and we have another two cases: one is k 0 and k 1 are correct and the other is k 0 and k 1 are correct. Note that a multiplication by M for short and other operations are expressed as follows: a squaring (S), an inversion (I), a square root (SR), a half trace (H), and atrace(t ). Our experimental observations found that these four cases occur with almost the same probability. Therefore, we employ the average of these four cases as the average case. Now we consider how to optimize the field operations in Algorithm 4. We will discuss the optimization under the two topics: choices of the curve parameter and scalar multiplication using a fixed base point. Choices of the curve parameter. The complexity of HECHLV depends on the coefficients of the curve. If the coefficients are small, one, or zero, we reduce some field operations. Firstly, we reduce some inversion operations to one. If 1/h 2 1 and 1/h 2 2 are allowed as inputs, we reduce two inversion operations and we compute 1/k 1 = h 2 +k 1 u 21 from 7
8 equation (3), then Algorithm 4 requires only one inversion operation 1/u 21. Secondly, we use the general curve. When f 4 = 0 we reduce 3M to 1M +1S by c 2 u 21 = u 2 21 and c 2 u 20 + c 1 u 21 = u 21 (u 20 + c 1 ). When h 2 = 1 two multiplications by h 2 and two multiplications by 1/h 2 2 are omitted. Thirdly, we use the general curve when h 1 =1. In this case, we change 1M to 1S by v 21 (h 1 + v 21 )=v 21 + v21, 2 where1s is faster than 1M, and two multiplications by h 1 and one multiplication by 1/h 2 1 are reduced. Finally, we use the general curve when h 1 = h 0 = 1 then we skip one multiplication k 1 h 0. We summarize these improvements in Algorithm 5. Algorithm 5 HECHLV (h 2 =1,f 4 =0) Input: D 2 =(U 2,V 2), 1/h 2 1 Output: D 1 =(U 1,V 1)= 1 2 D2 U i = x 2 + u i1x + u i0, V i = v i1x + v i0, where i =1, 2 step procedure cost 1. Solve k 1 + k 2 1u21 +1=0 1M +1I +1H α 1/u 21, k 1 H(u 21)α, k 1 k1 + α 2. Select correct k 1 by solving k 1h 0 + k 0h 1 + k0 2 u21 + c1 =09M +1S +1H +1T c 1 f 3 + v 21 + u 20 + u 2 21 c 0 f 2 + v 20 + v 21(h 1 + v 21) +u 21(u 20 + c 1) (h 1 =1:v 21(h 1 + v 21) =v 21 + v 2 21 ) w 0 u 21/h 2 1, α h1α, γ (c1 + k1h0)w0 if Tr(γ) =1thenk 1 k 1, γ (c1 + k1h0)w0 (h1 =1:γ γ + h0) k 0 H(γ)α, k 0 k0 + α 3. Select correct k 0 by solving x + x 2 u 11 +1=0 5M +1S +2SR +1T w 0 k 2 1, w1 w0u20 + k1h1 + u21 w 2 k 0 + w 1 + k 0, w 4 k 1u 21 +1, u 11 w 2w 4 if Tr(u 11) =1then k 0 k 0, w2 k0 + w 1 + k 0, u 11 w 2w 4 4. Compute U 1 4M +1SR w 1 k 0u 20, w 5 w 4 +1, w 6 (k 0 + k 1)(u 20 + u 21) u 10 w 4 k0(w 1 + h 0)+c 0 5. Compute V 1 = V 2 + h + ku 2 mod U 1 2M w 4 w 5 + k 0 +1, w 5 w 1 + w 5 + w 6 + v 21 + h 1 w 6 w 1 + v 20 + h 0, w 7 w 2 + w 4 w 1 w 7u 10, w 3 (k 1 + w 7)(u 10 + u 11) v 11 w 1 + w 2 + w 3 + w 5, v 10 w 1 + w 6 6. D 1 (x 2 + u 11x + u 10,v 11x + v 10), return D 1 total (k 1,k 0) is correct 18M +2S +1I +2SR +2H +2T (k 1,k 0 ) is correct 19M +2S +1I +3SR +2H +2T (k 1,k0) is correct 20M +2S +1I +2SR +2H +2T (k 1,k 0 ) is correct 21M +2S +1I +3SR +2H +2T h 1 =1 (k 1,k 0) or (k 1,k0) is correct 14M +3S +1I +2SR +2H +2T (k 1,k 0 ) or (k 1,k 0 ) is correct 15M +3S +1I +3SR +2H +2T h 1 = h 0 =1 (k 1,k 0) or (k 1,k0) is correct 13M +3S +1I +2SR +2H +2T (k 1,k 0 ) or (k 1,k 0 ) is correct 14M +3S +1I +3SR +2H +2T Scalar multiplication with a fixed base point. We describe the scalar multiplication using divisor class halvings. Knudsen and Schroeppel proposed the ECC scalar multiplication algorithm, halve-and-add binary method, which replaces point doublings in double-and-add binary methods with point halvings. Similarly, the halve-and-add binary method can be applied to HECC via the divisor class halving proposed in Algorithm 5. In order to compute the halve-and-add binary method, we have to convert 8
9 a scalar value from binary representation to half representation. Let r be the order of the underlying base point and m = log 2 r. For a given integer d we can represent d m ˆd i=0 i 2 i m (mod r) and m i=0 di 2 m ˆd i i=0 i 2 i m,whered i, ˆd i {0, 1}. This representation d i is used for the halve-and-add binary method. In the case of scalar multiplication with a fixed base point D, weimproveacomputation method of 1 2 D via pre-computed tables. When we know the correct k i 1 and k 0 in advance, we reduce three multiplications, two traces, and one square root in Algorithm 5. We can take the pre-computed tables t 1 =(t 1,m t 1,m 1 t 1,0 ) 2 and t 0 =(t 0,m t 0,m 1 t 0,0 ) 2 which show whether k 1 (k 0 )ork 1(k 0) is the correct value in each halving t 1,i =0(t 0,i =0)meansk 1 (k 0 ) is correct and t 1,i =1(t 0,i =1) means k 1 (k 0 ) is correct, since whether k 1(k 0 ) is correct or not depends on D. This improvement can be applied to a right-to-left binary method by adding 1 2 D.The i divisor class halve-and-add binary method is as follows: Algorithm 6 Halve-and-add binary (right-to-left) method. Input: d Z,D J(F 2 n), r :orderof D, m = log 2 r, t 1, t 0 Output: dd: scalar multiplication with a fixed base point step procedure m 1. ˆd i=0 i 2 i 2 m d (mod r), ˆdi {0, 1} m d 2. i i=0 2 m ˆd i i=0 i 2 i m, d i {0, 1} 3. Q O, R D 4. for i from 0 to m do: if d i =1thenQ Q + R. 5. R HECHLV(R, t 1,i,t 0,i ). 6. return Q. These tables require only the same bit length as D since D needs 4n bits while m has length 2n and we need two bits to encode the right choices of k 1 and k 0.We adopt this table-lookup method to the general curve and show this in Algorithm 10, which then requires only 18M +2S +1I +2SR +2H. 3.4 Comparison of doubling and halving We compare field operations cost of doubling algorithms to halving algorithms. Table 1 provides a comparison of HECDBL and the above halving algorithms in the average case. By using the normal basis, we can neglect the computation time of a squaring, a square root, a half trace, and a trace compared to that of a field multiplication or an inversion [Knu99]. Menezes [Men93] showed that an inversion operation requires log 2 (n 1) +#(n 1) 1 multiplications, where #(n 1) is the number of 1 s in the binary representation of n 1. By neglecting these operations, for the general curve, HECHLV and HECDBL require 19.5M N +1I and 21M N +1I, respectively, where M N 9
10 Table 1. Comparison of Halving and Doubling Scheme HECHLV HECDBL [LS04] h 2 =1,f 4 =0 19.5M +2S +1I +2.5SR +2H +2T 21M +5S +1I random base point (27.5M N, 29.95M P ) (29M N, 29.5M P ) h 2 =1,f 4 =0 18M +2S +1I +2SR +2H fixed base point (26M N, 28.2M P ) h 2 = h 1 =1,f 4 =0 14.5M +3S +1I +2.5SR +2H +2T 18M +7S +1I random base point (22.5M N, 25.05M P ) (26M N, 26.7M P ) h 2 = h 1 =1,f 4 =0 14M +3S +1I +2SR +2H fixed base point (22M N, 24.3M P ) h 2 = h 1 = h 0 =1,f 4 =013.5M +3S +1I +2.5SR +2H +2T 15M +7S +1I random base point (21.5M N, 24.05M P ) (23M N, 23.7M P ) h 1 = h 1 = h 0 =1,f 4 =0 13M +3S +1I +2SR +2H fixed base point (21M N, 23.3M P ) is a multiplication over the normal basis. When we assume 1I =8M N HECHLV and HECDBL require 27.5M N and 29M N, respectively. On the other hand, by using the polynomial basis, we cannot ignore the computation time of a squaring, a square root, and a half trace. Assuming that 1S =0.1M P, 1SR =0.5M P,1H =0.5M P,and1I =8M P,whereM P is a multiplication over the polynomial basis. For the general curve, HECHLV and HECDBL require 29.95M P and 29.5M P, respectively. By selecting the polynomial basis, however, we can compute these arithmetic faster than half the time of multiplication, and there is a possibility to reduce the cost of these operations. Table 1 shows that when we use the normal basis HECHLV is faster than HECDBL for all the cases. On the contrary by using the polynomial basis, HECHLV is faster than HECDBL when h 2 = h 1 =1andf 4 = 0, especially the improvement by using a fixed base point over HECDBL is up to about 10%. 4 Complete Procedures for Divisor Class Halving Algorithm In the previous sections, we proposed the halving algorithm, which corresponds to the most frequent case in the doubling algorithm. However, we also have to consider several exceptional procedures for giving complete procedures of the halving algorithm. These cases appear with very low probability, but we cannot ignore them. Therefore, we have to implement these procedures in order to perform the scalar multiplication correctly. In this paper we only deal with a divisor class whose order is r (not order 2 r), and thus the divisor class does not include any ramification points. Therefore, we have to consider four inverse operations of HECDBL 2 1, HECDBL 1 2, HECDBL 2 2,andHECDBL as follows: 10
11 HECDBL 2 1 : w(d 1)=2,w(D 2)=1,D 2 =2D 1. HECDBL 1 2 : w(d 1)=1,w(D 2)=2,u 21 =0,D 2 =2D 1. HECDBL 2 2 : w(d 1)=2,w(D 2)=2,u 21 =0,D 2 =2D 1. Note that HECDBL 2 2 is computed via HECDBL. In the halving algorithm, however, we have to care HECDBL 2 2 because the inverse map of HECDBL 2 2 is indistinguishable from the inverse map of HECDBL 1 2. Therefore, the halving algorithms can be classified into four cases: HECHLV, HECHLV 1 2, HECHLV 2 2,andHECHLV 2 1.These cases are inverse maps of HECDBL, HECDBL 2 1, HECDBL 2 2,andHECDBL 1 2,respectively. The Complete HECHLV is as follows: Algorithm 7 Complete HECHLV Input: D 2 =(U 2,V 2) Output: D 1 =(U 1,V 1)= 1 2 D2 U i = u i2x 2 + u i1x + u i0,v i = v i1x + v i0,u i2 F 2, where i =1, 2, h 2 0 step procedure 1. HECHLV 1 2 : w(d 2)=1, w(d 1)=2 if deg U 2 =1thenD 1 HECHLV 1 2 (D 2), return D 1 2. HECHLV 2 1 : w(d 2)=2,w(D 1)=1,u 21 =0or HECHLV 2 2 : w(d 2)=2,w(D 1)=2,u 21 =0 if deg U 2 =2andu 21 =0thenD 1 HECHLV 2 2 (D 2), return D 1 3. HECHLV: w(d 2)=w(D 1)=2, u 21 0 if deg U 2 =2andu 21 0thenD 1 HECHLV(D 2), return D 1 In the following subsection we present explicit algorithms for each exceptional procedure. 4.1 HECHLV 1 2 A divisor class halving algorithm HECHLV 1 2 is similar to HECHLV. The main difference between HECHLV 1 2 and HECHLV is weight of input D 2. For example, in HECHLV 1 2, f+hv 1+V 1 2 is a monic polynomial with degree five because of deg(v 1) = 2andU 2 is a monic polynomial, so U 1 (f + hv 1 + V 1 2 )/U 2 not divided by k1 2 like HECHLV. We present the proposed algorithm in Algorithm 8. This algorithm is the analogy of HECHLV and the correctness of this algorithm is shown similarly to Lemma 1. Note that, in Step 3, the correct k 0 is selected by checking trace of xh 2 + x 2 u 11 +1=0 not xh 2 + x 2 u 11 +(f 4 + u 10 ) = 0 because the weight of D 1 is always two and the method to select the correct k 0 is checking whether 1 2 D 1 J(F 2 n) or not, see Appendix B. 11
12 Algorithm 8 HECHLV 1 2 Input: D 2 =(U 2,V 2)=(x + u 20,v 20) Output: D 1 =(U 1,V 1)=(x 2 + u 11x + u 10,v 11x + v 10) = 1 D2, h2 0 2 step procedure 1. Solve k 1h 2 + k1u c 3 =0 c 3 f 4 + u 20,α h 2,γ c 3/h 2 2, k 1 H(γ)α, k 1 k 1 + α 2. Select correct k 1 by solving k 1h 0 + k 0h 1 + k0 2 + c 1 =0 c 2 f 3 + c 3u 20, c 1 f 2 + h 2v 20 + c 2u 20, c 0 f 1 + h 1v 20 + c 1u 20 α h 1,γ (c 1 + k 1h 0)/α 2 if Tr(γ) =1thenk 1 k 1, γ (c 1 + k 1h 0)/α 2 k 0 H(γ)α, k 0 k 0 + α 3. Select correct k 0 by checking trace of xh 2 + x 2 u 11 +1=0 u 11 k 1h 1 + k 0h 2 + k1 2u20 + c2, γ u11/h2 2 if Tr(γ) =1thenk 0 k 0,u 11 k 1h 1 + k 0h 2 + k1 2 u20 + c2 4. Compute U 1 u 10 k 0h 0 + k0 2 u20 + c0 5. Compute V 1 = V 2 + h + ku 2 mod U 1 w h 2 + k 1, v 11 h 1 + k 1u 20 + k 0 + u 11w, v 10 v 20 + h 0 + k 0u 20 + u 10w 6. D 1 (x 2 + u 11x + u 10,v 11x + v 10), return D HECHLV 2 1 In this case, D 1 =(x + u 10,v 10 ) is computed by reverse operation of HECDBL 1 2. D 2 =(x 2 + u 20,v 21 x + v 20 )=2D 1 is computed as follows: x 2 + u 20 =(x + u 10 ) 2, v 21 = (u f 3u f 1 + h 1 v 10 )/h(u 10 ), and v 20 = v 10 + v 21 u 10. Then we can easily express u 10,v 10 by u 20,v 21,v 20 and curve parameters by u 10 = u 20, v 10 = (v 21 h(u 10 )+u f 3 u f 1 )/h HECHLV 2 2 The case of u 21 = 0, there are two candidate of 1 2 D 2: D 1 =(x + u 20,v 2 ( u 20 )) and D 1 = (x 2 + u 11 x + u 10,v 11 x + v 10 ). If D 1 is a correct divisor class, we use HECHLV 2 1. On the other hand, if D 1 is a correct one, we use HECHLV2 2.We need to select a correct algorithm HECHLV 2 1 or HECHLV 2 2 as follows: First, we assume that D 1 is a correct divisor class, second compute u 11, then check the trace of xh 2 + x 2 u 11 +1=0. IfTr(u 11 /h 2 2 )=0,D 1 is correct, then select the algorithm HECHLV 2 2.IfTr(u 11 /h 2 2)=1,D 1 is correct, then select the algorithm HECHLV 2 1. The algorithm HECHLV 2 2 is as follows: 12
13 Algorithm 9 HECHLV 2 2 Input: D 2 =(U 2,V 2)=(x 2 + u 20,v 21x + v 20) Output: D 1 =(U 1,V 1)=(x 2 + u 11x + u 10,v 11x + v 10) = 1 D2, h2 0 2 step procedure 1. Solve k 1h 2 +1=0 k 1 =1/h 2 2. Solve k 1h 0 + k 0h 1 + c 1 =0 c 2 f 4, c 1 f 3 + h 2v 21 + u 20 + c 2u 21 c 0 f 2 + h 2v 20 +(h 1 + v 21)v 21 + c 2u 20 + c 1u 21 k 0 =(k 1h 0 + c 1)/h 1 3. Select correct algorithm by checking trace of xh 2 + x 2 u 11 +1=0 u 11 k 1h 1 + k 0h 2 + k1 2u20 + k2 0 + c2/k1, γ u11/h2 2 if Tr(γ) =1thenD 1 HECHLV 2 1 (D 2), return D 1 3. Compute U 1 u 10 k 0h 0 + k0 2 u20 + c0/k1 4. Compute V 1 = V 2 + h + ku 2 mod U 1 w h 2 + k 1, v 11 h 1 + k 1u 20 + k 0 + u 11w, v 10 v 20 + h 0 + k 0u 20 + u 10w 5. D 1 (x 2 + u 11x + u 10,v 11x + v 10), return D 1 5 Halving Algorithm for Other Curves In this section, we focus on other curves: (1) h(x) is reducible in F 2 n with deg h =2, and (2)the special curve with deg h = 1, i.e. h 2 =0. Let h(x) be a reducible polynomial of degree 2, namely h(x) =(x + x 1 )(x + x 2 ) where x 1,x 2 F 2 n. Assume that x 1 x 2, then there are three different divisor classes of order 2, say D 1,D 2,andD 3 (See Appendix A). In this case, Lemma 1 is no longer true, and there are four different candidates of the halved value arisen from equation (3) and equation (4). They are equal to 1 2 D, 1 2 D + D 1, 1 2 D + D 2,and 1 2 D + D 3. In order to determine the proper divisor class, we have to check the trace of both equation (3) and (4). Therefore the halving algorithm for this case requires more number of field operations than that required for the general curve. If x 1 = x 2 holds, we know h 1 = 0 and there is only one divisor class of degree 2. In this case, equation (4) has a unique root for each solution k 1 of equation (3), namely we have only two candidates of the halved value. It can be distinguished by the trace of equation xh 2 + x 2 h = 0 as we discussed in Lemma 1. For the special curve of deg h =1,wehaveonlyonevaluek 1 not two, recall for the general curve, there are two value k 1 and k 1 and we need to select correct one. This is the main difference between the general curve and the special curve. For the special curve, we obtain a system of equations related to variables k 0,k 1,u 11, and u 10 by the same method for the general curve. k1 2 u 21 +1=0 (7) k 1 h 0 + k 0 h 1 + k0 2 u 21 + c 1 =0 (8) 13
14 In the case of the general curve, we select correct k 0 by checking trace of the degree two equation of k 1 in next halving. If this equation has roots (no roots) i.e. trace is zero, k 0 is correct (not correct). In the case of the special curve, on the other hand, we have only one value k 1 from equation (7), so we select correct k 0 by checking a degree two equation (8) of k 0 in next halving, instead of the equation of k 1.Ifthe equation of k 0 in next halving has roots (no roots), k 0 is correct (not correct). We show an example of the algorithm for the special curve h(x) = x in Appendix D. 6 Conclusion In this paper, we presented the first divisor class halving algorithm for HECC of genus 2, which is as efficient as the previously known doubling algorithm. The proposed formula is an extension of the halving formula for elliptic curves reported by Knudsen [Knu99] and Schroeppel [Sch00], in which the halved divisor classes are computed by solving some special equations that represent the doubled divisor class. Because the doubling formula for HECC is relatively complicated, the underlying halving algorithm is in general less efficient than that for elliptic curves. However, we specified two crucial equations whose common solutions contain the proper halved values, then an algorithm for distinguishing a proper value was presented. Our algorithm s improvement over the previously known fastest doubling algorithm is up to about 10%. Moreover, the proposed algorithm is complete we investigated the exceptional procedures appeared in the divisor class halving algorithm, for example, operations with divisor classes whose weight is one. The presented algorithm has not been optimized yet, and there is a possibility to enhance its efficiency. References [Ava04] R. Avanzi, Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations, CHES 2004, LNCS 3156, pp , [ACF04] R. Avanzi, M. Ciet, and F. Sica, Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism, PKC 2004, LNCS 2947, pp.28-40, [Can87] D. Cantor, Computing in the Jacobian of a Hyperelliptic Curve, Mathematics of Computation, 48, 177, pp , [Duq04] S. Duquesne, Montgomery Scalar Multiplication for Genus 2 Curves, ANTS 2004, LNCS 3076, pp , [FHL + 03] K. Fong, D. Hankerson, J. López, and A. Menezes, Field inversion and point halving revised, Technical Report CORR , [GH00] P. Gaudry and R. Harley, Counting Points on Hyperelliptic Curves over Finite Fields, ANTS 2000, LNCS 1838, pp , [HHM00] D. Hankerson, J. Hernandez, A. Menezes, Software Implementation of Elliptic Curve Cryptography over Binary Fields, CHES 2000, LNCS 1965, pp.1-24,
15 [Har00a] R. Harley, Adding.txt, harley/hyper/ [Har00b] R. Harley, Doubling.c, harley/hyper/ [KR04] B. King and B. Rubin, Improvements to the Point Halving Algorithm, ACISP 2004, LNCS 3108, pp , [Kob89] N. Koblitz, Hyperelliptic Cryptosystems, Journal of Cryptology, Vol.1, pp , [Knu99] E. Knudsen, Elliptic Scalar Multiplication Using Point Halving, ASIACRYPT 99, LNCS 1716, pp , [Lan02a] T. Lange, Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae, Cryptology eprint Archive, 2002/121, IACR, [Lan02b] T. Lange, Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves, Cryptology eprint Archive, 2002/147, IACR, [Lan02c] T. Lange, Weighed Coordinate on Genus 2 Hyperelliptic Curve, Cryptology eprint Archive, 2002/153, IACR, [Lan04a] T. Lange, Montgomery Addition for Genus Two Curves, ANTS 2004, LNCS 3076, pp , [Lan04b] T. Lange, Foumulae for Arithmetic on Genus 2 Hyperelliptic Curves, J.AAECC Volume 15, Number 5, pp , [LS04] T. Lange, M. Stevens, Efficient Doubling on Genus Two Curves over Binary Fields, SAC 2004, pre-proceedings, pp , [Men93] A. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, [Mum84] D. Mumford, Tata Lectures on Theta II, Progress in Mathematics 43, Birkhäuser, [MCT01] K. Matsuo, J. Chao and S. Tsujii, Fast Genus Two Hyperelliptic Curve Cryptosystems, Technical Report ISEC , IEICE Japan, pp.89-96, [PWP03] J. Pelzl, T. Wollinger, and C. Paar, High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two, Cryptology eprint Archive, 2003/212, IACR, [PWG + 03] J. Pelzl, T. Wollinger, J. Guajardo and C. Paar, Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves, CHES 2003, LNCS 2779, pp , [Sch00] R. Schroeppel, Elliptic curve point halving wins big. 2nd Midwest Arithmetic Geometry in Cryptography Workshop, Urbana, Illinois, November [SMC + 02] T. Sugizaki, K. Matsuo, J. Chao, and S. Tsujii, An Extension of Harley Addition Algorithm for Hyperelliptic Curves over Finite Fields of Characteristic Two, Technical Report ISEC2002-9, IEICE Japan, pp.49-56, A The Divisor Class of Order 2 We show that the order of Jacobian J over F 2 n of genus 2 is always divisible by 2. Let T 2 be the divisor represented by T 2 =(g, v T ), where g is a divisor of MakeMonic(h) with deg g>0andv T is uniquely determined from h due to Mumford representation. It is easy to check 2T 2 = O via Cantor Algorithm. Indeed, we know d = MakeMonic(h) in Step 1, and thus (U 3,V 3 )=(1, 0)holdsinStep4. 15
16 Next, we prove that T 2 is always in J(F 2 n). First assume that h is degree 1, namely h(x) =h 1 x + h 0.Thenv T is y 1 such that y 2 1 = f(h 0/h 1 ) due to h (v 2 T + f). If h is reducible of degree 2, we can represent MakeMonic(h(x)) = (x+x 1 )(x+x 2 ), where x 1,x 2 F 2 n are x-coordinate of points on the definition curve. The corresponding y-coordinate can be computed by solving y 2 i = f(x i)fori =1, 2, respectively. From Mumford representation, we obtain v T = v 1 x + v 0 F 2 n[x] as follows: v 0 = y 1x 2 + y 2 x 1 x 1 + x 2, v 1 = y 1 + y 2 x 1 + x 2, (9) except the case of x 1 = x 2. Consequently, we can calculate v T F 2 n[x]. Set D 3 = ((x + x 2 )(x + x 2 ),v 1 x + v 0 ). Similarly, D i =(x + x i,y i ) is a divisor of order 2, where y i = f(x 1 )fori =1, 2. We notice that {O, D 1,D 2,D 3 } is a quaternion group of Klein with multiplication rules D 1 +D 2 = D 3,D 2 +D 3 = D 1,andD 3 +D 1 = D 2.Ifx 1 = x 2 holds, the order of the divisor (x + x 1,y 1 )withy 2 1 = f(x 1) is divisible by 2. In the following we assume that h is irreducible of degree 2. Set h(x) =h 2 x 2 +h 1 x+ h 0.Thesolutionsx 1,x 2 of h(x) =0isnotinF 2 n, and we can not apply the algorithm used for the reducible h of degree 2. We show how to construct v T = v 1 x+v 0 F 2 n[x] explicitly. We have h 1 h 2 = x 1 + x 2, h 0 = x 1 x 2, y i = x 5 i h + f 4x 4 i + f 3x 3 i + f 2x 2 i + f 1x i + f 0, (10) 2 where i =1, 2 for the definition polynomial f of the underlying curve. From these equations we can explicitly write down v 0,v 1 in the following. y 1 x 2 + y 2 x 1 = x 5 1 x 2 + f 4 x 4 1 x 2 + f 3 x 3 1 x 2 + f 2 x 2 1 x 2 + f 1 x 1 x 2 + f 0 x 2 + x 5 2 x 1 + f 4 x 4 2 x 1 + f 3 x 3 2 x 1 + f 2 x 2 2 x 1 + f 1 x 2 x 1 + f 0 x 1 = x 1 x 2 x x3 2 + x 1x 2 f4 (x 1 + x 2 )+x 1 x 2 f3 x1 + x 2 +2x 1 x 2 f2 + f 1 x1 x 2 x1 + x 2 + f 0 (x 1 + x 2 ) (h1 ) 3 + h 0h 1 h 2 h 2 + h 0 h 1 f 4 2 h 2 2 = h 0 h 2 + f 3 h 0 h 2 h1 + h 0 h 1 f 1 h 2 h 2 + h 1 f 0 2 h 2 This equation contains only coefficients of h and f. In the transformation above we used the relationship: x x3 2 =(x 1 + x 2 ) 3 + x 1 x 2 (x 1 + x 2 )= ( h1 h 2 ) 3 + h 0h 1 Therefore we have obtained the explicit formula for calculating v 0 F 2 n. h
17 v 0 = y 1x 2 + y 2 x 1 = h (h1 ) h 0h 1 x 1 + x 2 h 1 h 2 h h 0 f 4 + h 0 h1 f 3 + h0 f 1 + f 0 h 2 h 1 h 2 h 1 Similarly v 1 F 2 n can be calculated as follows: v 1 = y (h1 ) y 2 = + h ( 0 h1 + h ) 0 + h 1 f 4 + h1 f 3 + h 0 + f 2 + h2 f 1 x 1 + x 2 h 2 h 2 h 2 h 1 h 2 h 2 h 1 h 1 B Proof of Lemma Lemma 1. Let h(x) be an irreducible polynomial of degree 2. There is only one value k 1 which satisfies both equations (3) and (4). Equation (4) has a solution only for the correct k 1. There is only one value k 0 which yields the halved divisor D 1 in algorithm HECHLV. Equationxh 2 + x 2 u 11 +1=0 has a solution only for the correct k 0. Proof. In this paper we assume that the order of J(F 2 n)is2 r, wherer is a large prime number. For a given divisor D 2, there are two points whose doubled reduced divisor is equal to D 2. The halved divisor equals either 1 2 D 2 or 1 2 D 2 + T 2,whereT 2 is an element in the kernel of the multiplication-by-two in J(F 2 n). We call 1 2 D 2 the proper halved divisor. From the condition of coeff(u, 3) = 0, equation (3) is always solvable. For each solution of equation (3), there exist two solutions of equation (4) due to coeff(u, 1) = 0. From these values we obtain four different divisors using equations (5),(6), and one of them is the proper halved value 1 2D. In the following, we discuss how to select the proper divisor. At first we prove that if h(x) is an irreducible polynomial, equation (4) is solvable only for one solution of equation (3). It is well known that equation ax 2 + bx + c =0 has roots if and only if Tr(ac/b 2 ) = 0. Let one root of ax 2 + bx + c =0bex 0 and the other be x 0 + b/a. Let the two roots of equation (3) be k 1 and k 1 = k 1 + h 2 /u 21. Equation (4) with k 1 substituted is as follows: (k 1 + h 2 /u 21 )h 0 + k 0 h 1 + k 2 0u 21 + c 1 =0. (11) Now we compute Tr(ac/b 2 ) of the equation (11): Tr(((k 1 + h 2 /u 21 )h 0 + c 1 )u 21 /h 2 1 )=Tr((k 1h 0 + c 1 )u 21 /h 2 1 )+Tr((h 0h 2 )/h 2 1 ) (12) Because Tr(ac/b 2 ) of the equation (4) is Tr((k 1 h 0 + c 1 )u 21 /h 2 1 ), if Tr((h 0h 2 )/h 2 1 )=1 i.e. h(x) =h 2 x 2 + h 1 x + h 0 is irreducible, one equation has two roots and the other equation has no roots. This leads to the uniqueness of k 1. Therefore, we can select a proper value from {k 1,k 1 } by checking the trace of equation (4). 17
18 Next we show how to choose the proper k 0. Equation (4) has two roots k 0 and k 0 for the proper k 1 described above. Two different halved divisor 1 2 D 2 and 1 2 D 2 +T 2 can be obtained by k 0 and k 0. We will distinguish the proper divisor by applying the above halving algorithm again. Let D 1 = 1 2 D 2. The halving algorithm for D 1 yields two divisors 1 2 D 1 J(F 2 n)and 1 2 D 1+T 2 J(F 2 n). On the other hand, for D 1 = 1 2 D 2+T 2, there are two halved divisors: 1 2 D 1 + T 4 and 1 2 D 1 +3T 4,whereT 4 and 3T 4 are two divisors of order four in J not in J(F 2 n), namely 1 2 D 1 + T 4 J(F 2 n)and 1 2 D 1 +3T 4 J(F 2 n). Therefore, the proper k 0 should satisfy halved D 1 in J(F 2 n). In the other words, if and only if k 0 (or k 0 ) is proper, equation xh 2 + x 2 u 11 +1=0 has two roots over F 2 n,whereu 11 is computed from k 0 (or k 0 ) using equation (5). Consequently, we can select the proper k 0 by checking the trace of equation xh 2 + x 2 u 11 +1=0 for u 11 0.Thecaseofu 11 = 0 occurs with negligible probability, but we can select the proper k 0 as follows: Let u 11 and u 11 be the coefficient of equation (5) for two candidates k 0 and k 0, respectively. Note that if u 11 = 0 holds, then u 11 0for h 1 /h 2 u 21. Therefore, the proper one can be selected by checking Tr(u 11 /h2 2 )=1. If h 1 /h 2 = u 21 holds, we can use the formula HECHLV 2 2 described in Section 5. C Improved Algorithm with fixed base point Algorithm 10 HECHLV(h 2 =1,f 4 =0, fixed base point) Input: D 2 =(U 2,V 2), 1/h 2 1, t0, t1 Output: D 1 =(U 1,V 1)= 1 2 D2 U i = x 2 + u i1x + u i0, V i = v i1x + v i0, where i =1, 2 step procedure cost 1. Solve k 1 + k1 2 u21 +1=0 1M +1I +1H α 1/u 21 if (t 1 =0)thenk 1 H(u 21)α else k 1 (H(u 21) +1)α 2. Solve k 1h 0 + k 0h 1 + k 2 0u21 + c1 =0 7M +1S +1H c 1 f 3 + v 21 + u 20 + u 2 21 c 0 f 2 + v 20 + v 21(h 1 + v 21) +u 21(u 20 + c 1) (h 1 =1:v 21(h 1 + v 21) =v 21 + v21 2 ) w 0 u 21/h 2 1, α h1α, γ (c1 + k1h0)w0 if (t 0 =0)thenk 0 H(γ)α else k 0 (H(γ) +1)α 3. Compute U 1 8M +1S +2SR w 0 k 2 1, w1 w0u20 + k1h1 + u21, w2 k0 + w 1 + k 0 w 4 k 1u 21 +1, u 11 w 2w 4 w 1 k 0u 20, w 5 w 4 +1, w 6 (k 0 + k 1)(u 20 + u 21) u 10 w 4 k0(w 1 + h 0)+c 0 4. Compute V 1 = V 2 + h + ku 2 mod U 1 2M w 4 w 5 + k 0 +1, w 5 w 1 + w 5 + w 6 + v 21 + h 1 w 6 w 1 + v 20 + h 0, w 7 w 2 + w 4 w 1 w 7u 10 w 3 (k 1 + w 7)(u 10 + u 11) v 11 w 1 + w 2 + w 3 + w 5, v 10 w 1 + w 6 5. D 1 (x 2 + u 11x + u 10,v 11x + v 10), return D 1 total 18M +2S +1I +2SR +2H h 1 =1 14M +3S +1I +2SR +2H h 1 = h 0 =1 13M +3S +1I +2SR +2H 18
19 D Halving Algorithm for the Special Curve: h(x) = x Algorithm 11 HEC HLV(y 2 + xy = x 5 + f 1 x + f 0 ) Input: D 2 =(U 2,V 2) Output: D 1 =(U 1,V 1), U i(x) =x 2 + u i1x + u i0, V i = v i1x + v i0, gcd(u i,h)=1 step procedure cost 1. Solve k1 2 u21 +1=0 1I +1SR w 0 1/u 21, k 1 w 0 2. Solve k 0 + k0 2 u21 + c1 =0 3M +2S +1SR +1H c 1 u 20 + u 2 21, w1 c1u21, c0 v21 + v u21u20 + w1 invk 1 u 21, w 2 H(w 1), w 3 w 2 +1 k 0 w 0w 2, k 0 k0 + w0 3. Compute U 1 4M +3SR +1T u 11 invk 1 + k 0,u 10 (k 0 + c 1)u 20 + c 0u 21 if Tr(u 11(u 10 + invk 1 + k 0)) = 1 then k 0 k 0, w2 w3, u11 u11 + k1, u10 u10 + w 0u Compute V 1 = V 2 + h + ku 2 mod U 1 5M w 1 k 1(u 21 + u 11) +k 0 v 11 k 1(u 20 + u 10) +w 2 + v u 11w 1 v 10 k 0u 20 + v 20 + u 10w 1 total k 0 is correct 11M +2S +1I +4SR +1H +1T k 0 is correct 12M +2S +1I +5SR +1H +1T 19
EE512: Error Control Coding
EE512: Error Control Coding Solution for Assignment on Finite Fields February 16, 2007 1. (a) Addition and Multiplication tables for GF (5) and GF (7) are shown in Tables 1 and 2. + 0 1 2 3 4 0 0 1 2 3
2 Composition. Invertible Mappings
Arkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan Composition. Invertible Mappings In this section we discuss two procedures for creating new mappings from old ones, namely,
Homework 3 Solutions
Homework 3 Solutions Igor Yanovsky (Math 151A TA) Problem 1: Compute the absolute error and relative error in approximations of p by p. (Use calculator!) a) p π, p 22/7; b) p π, p 3.141. Solution: For
CHAPTER 25 SOLVING EQUATIONS BY ITERATIVE METHODS
CHAPTER 5 SOLVING EQUATIONS BY ITERATIVE METHODS EXERCISE 104 Page 8 1. Find the positive root of the equation x + 3x 5 = 0, correct to 3 significant figures, using the method of bisection. Let f(x) =
HOMEWORK 4 = G. In order to plot the stress versus the stretch we define a normalized stretch:
HOMEWORK 4 Problem a For the fast loading case, we want to derive the relationship between P zz and λ z. We know that the nominal stress is expressed as: P zz = ψ λ z where λ z = λ λ z. Therefore, applying
Concrete Mathematics Exercises from 30 September 2016
Concrete Mathematics Exercises from 30 September 2016 Silvio Capobianco Exercise 1.7 Let H(n) = J(n + 1) J(n). Equation (1.8) tells us that H(2n) = 2, and H(2n+1) = J(2n+2) J(2n+1) = (2J(n+1) 1) (2J(n)+1)
Phys460.nb Solution for the t-dependent Schrodinger s equation How did we find the solution? (not required)
Phys460.nb 81 ψ n (t) is still the (same) eigenstate of H But for tdependent H. The answer is NO. 5.5.5. Solution for the tdependent Schrodinger s equation If we assume that at time t 0, the electron starts
derivation of the Laplacian from rectangular to spherical coordinates
derivation of the Laplacian from rectangular to spherical coordinates swapnizzle 03-03- :5:43 We begin by recognizing the familiar conversion from rectangular to spherical coordinates (note that φ is used
forms This gives Remark 1. How to remember the above formulas: Substituting these into the equation we obtain with
Week 03: C lassification of S econd- Order L inear Equations In last week s lectures we have illustrated how to obtain the general solutions of first order PDEs using the method of characteristics. We
Second Order Partial Differential Equations
Chapter 7 Second Order Partial Differential Equations 7.1 Introduction A second order linear PDE in two independent variables (x, y Ω can be written as A(x, y u x + B(x, y u xy + C(x, y u u u + D(x, y
C.S. 430 Assignment 6, Sample Solutions
C.S. 430 Assignment 6, Sample Solutions Paul Liu November 15, 2007 Note that these are sample solutions only; in many cases there were many acceptable answers. 1 Reynolds Problem 10.1 1.1 Normal-order
Other Test Constructions: Likelihood Ratio & Bayes Tests
Other Test Constructions: Likelihood Ratio & Bayes Tests Side-Note: So far we have seen a few approaches for creating tests such as Neyman-Pearson Lemma ( most powerful tests of H 0 : θ = θ 0 vs H 1 :
4.6 Autoregressive Moving Average Model ARMA(1,1)
84 CHAPTER 4. STATIONARY TS MODELS 4.6 Autoregressive Moving Average Model ARMA(,) This section is an introduction to a wide class of models ARMA(p,q) which we will consider in more detail later in this
Section 8.3 Trigonometric Equations
99 Section 8. Trigonometric Equations Objective 1: Solve Equations Involving One Trigonometric Function. In this section and the next, we will exple how to solving equations involving trigonometric functions.
Problem Set 3: Solutions
CMPSCI 69GG Applied Information Theory Fall 006 Problem Set 3: Solutions. [Cover and Thomas 7.] a Define the following notation, C I p xx; Y max X; Y C I p xx; Ỹ max I X; Ỹ We would like to show that C
Lecture 2: Dirac notation and a review of linear algebra Read Sakurai chapter 1, Baym chatper 3
Lecture 2: Dirac notation and a review of linear algebra Read Sakurai chapter 1, Baym chatper 3 1 State vector space and the dual space Space of wavefunctions The space of wavefunctions is the set of all
Finite Field Problems: Solutions
Finite Field Problems: Solutions 1. Let f = x 2 +1 Z 11 [x] and let F = Z 11 [x]/(f), a field. Let Solution: F =11 2 = 121, so F = 121 1 = 120. The possible orders are the divisors of 120. Solution: The
Example Sheet 3 Solutions
Example Sheet 3 Solutions. i Regular Sturm-Liouville. ii Singular Sturm-Liouville mixed boundary conditions. iii Not Sturm-Liouville ODE is not in Sturm-Liouville form. iv Regular Sturm-Liouville note
Ordinal Arithmetic: Addition, Multiplication, Exponentiation and Limit
Ordinal Arithmetic: Addition, Multiplication, Exponentiation and Limit Ting Zhang Stanford May 11, 2001 Stanford, 5/11/2001 1 Outline Ordinal Classification Ordinal Addition Ordinal Multiplication Ordinal
6.3 Forecasting ARMA processes
122 CHAPTER 6. ARMA MODELS 6.3 Forecasting ARMA processes The purpose of forecasting is to predict future values of a TS based on the data collected to the present. In this section we will discuss a linear
k A = [k, k]( )[a 1, a 2 ] = [ka 1,ka 2 ] 4For the division of two intervals of confidence in R +
Chapter 3. Fuzzy Arithmetic 3- Fuzzy arithmetic: ~Addition(+) and subtraction (-): Let A = [a and B = [b, b in R If x [a and y [b, b than x+y [a +b +b Symbolically,we write A(+)B = [a (+)[b, b = [a +b
2. THEORY OF EQUATIONS. PREVIOUS EAMCET Bits.
EAMCET-. THEORY OF EQUATIONS PREVIOUS EAMCET Bits. Each of the roots of the equation x 6x + 6x 5= are increased by k so that the new transformed equation does not contain term. Then k =... - 4. - Sol.
Lecture 2. Soundness and completeness of propositional logic
Lecture 2 Soundness and completeness of propositional logic February 9, 2004 1 Overview Review of natural deduction. Soundness and completeness. Semantics of propositional formulas. Soundness proof. Completeness
Matrices and Determinants
Matrices and Determinants SUBJECTIVE PROBLEMS: Q 1. For what value of k do the following system of equations possess a non-trivial (i.e., not all zero) solution over the set of rationals Q? x + ky + 3z
Section 7.6 Double and Half Angle Formulas
09 Section 7. Double and Half Angle Fmulas To derive the double-angles fmulas, we will use the sum of two angles fmulas that we developed in the last section. We will let α θ and β θ: cos(θ) cos(θ + θ)
The Simply Typed Lambda Calculus
Type Inference Instead of writing type annotations, can we use an algorithm to infer what the type annotations should be? That depends on the type system. For simple type systems the answer is yes, and
Areas and Lengths in Polar Coordinates
Kiryl Tsishchanka Areas and Lengths in Polar Coordinates In this section we develop the formula for the area of a region whose boundary is given by a polar equation. We need to use the formula for the
Quadratic Expressions
Quadratic Expressions. The standard form of a quadratic equation is ax + bx + c = 0 where a, b, c R and a 0. The roots of ax + bx + c = 0 are b ± b a 4ac. 3. For the equation ax +bx+c = 0, sum of the roots
Exercises 10. Find a fundamental matrix of the given system of equations. Also find the fundamental matrix Φ(t) satisfying Φ(0) = I. 1.
Exercises 0 More exercises are available in Elementary Differential Equations. If you have a problem to solve any of them, feel free to come to office hour. Problem Find a fundamental matrix of the given
Απόκριση σε Μοναδιαία Ωστική Δύναμη (Unit Impulse) Απόκριση σε Δυνάμεις Αυθαίρετα Μεταβαλλόμενες με το Χρόνο. Απόστολος Σ.
Απόκριση σε Δυνάμεις Αυθαίρετα Μεταβαλλόμενες με το Χρόνο The time integral of a force is referred to as impulse, is determined by and is obtained from: Newton s 2 nd Law of motion states that the action
Partial Differential Equations in Biology The boundary element method. March 26, 2013
The boundary element method March 26, 203 Introduction and notation The problem: u = f in D R d u = ϕ in Γ D u n = g on Γ N, where D = Γ D Γ N, Γ D Γ N = (possibly, Γ D = [Neumann problem] or Γ N = [Dirichlet
Areas and Lengths in Polar Coordinates
Kiryl Tsishchanka Areas and Lengths in Polar Coordinates In this section we develop the formula for the area of a region whose boundary is given by a polar equation. We need to use the formula for the
Every set of first-order formulas is equivalent to an independent set
Every set of first-order formulas is equivalent to an independent set May 6, 2008 Abstract A set of first-order formulas, whatever the cardinality of the set of symbols, is equivalent to an independent
Math 6 SL Probability Distributions Practice Test Mark Scheme
Math 6 SL Probability Distributions Practice Test Mark Scheme. (a) Note: Award A for vertical line to right of mean, A for shading to right of their vertical line. AA N (b) evidence of recognizing symmetry
Inverse trigonometric functions & General Solution of Trigonometric Equations. ------------------ ----------------------------- -----------------
Inverse trigonometric functions & General Solution of Trigonometric Equations. 1. Sin ( ) = a) b) c) d) Ans b. Solution : Method 1. Ans a: 17 > 1 a) is rejected. w.k.t Sin ( sin ) = d is rejected. If sin
ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 19/5/2007
Οδηγίες: Να απαντηθούν όλες οι ερωτήσεις. Αν κάπου κάνετε κάποιες υποθέσεις να αναφερθούν στη σχετική ερώτηση. Όλα τα αρχεία που αναφέρονται στα προβλήματα βρίσκονται στον ίδιο φάκελο με το εκτελέσιμο
Section 9.2 Polar Equations and Graphs
180 Section 9. Polar Equations and Graphs In this section, we will be graphing polar equations on a polar grid. In the first few examples, we will write the polar equation in rectangular form to help identify
Approximation of distance between locations on earth given by latitude and longitude
Approximation of distance between locations on earth given by latitude and longitude Jan Behrens 2012-12-31 In this paper we shall provide a method to approximate distances between two points on earth
Math221: HW# 1 solutions
Math: HW# solutions Andy Royston October, 5 7.5.7, 3 rd Ed. We have a n = b n = a = fxdx = xdx =, x cos nxdx = x sin nx n sin nxdx n = cos nx n = n n, x sin nxdx = x cos nx n + cos nxdx n cos n = + sin
Congruence Classes of Invertible Matrices of Order 3 over F 2
International Journal of Algebra, Vol. 8, 24, no. 5, 239-246 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/.2988/ija.24.422 Congruence Classes of Invertible Matrices of Order 3 over F 2 Ligong An and
SOLVING CUBICS AND QUARTICS BY RADICALS
SOLVING CUBICS AND QUARTICS BY RADICALS The purpose of this handout is to record the classical formulas expressing the roots of degree three and degree four polynomials in terms of radicals. We begin with
Chapter 6: Systems of Linear Differential. be continuous functions on the interval
Chapter 6: Systems of Linear Differential Equations Let a (t), a 2 (t),..., a nn (t), b (t), b 2 (t),..., b n (t) be continuous functions on the interval I. The system of n first-order differential equations
Solutions to Exercise Sheet 5
Solutions to Eercise Sheet 5 jacques@ucsd.edu. Let X and Y be random variables with joint pdf f(, y) = 3y( + y) where and y. Determine each of the following probabilities. Solutions. a. P (X ). b. P (X
3.4 SUM AND DIFFERENCE FORMULAS. NOTE: cos(α+β) cos α + cos β cos(α-β) cos α -cos β
3.4 SUM AND DIFFERENCE FORMULAS Page Theorem cos(αβ cos α cos β -sin α cos(α-β cos α cos β sin α NOTE: cos(αβ cos α cos β cos(α-β cos α -cos β Proof of cos(α-β cos α cos β sin α Let s use a unit circle
Numerical Analysis FMN011
Numerical Analysis FMN011 Carmen Arévalo Lund University carmen@maths.lth.se Lecture 12 Periodic data A function g has period P if g(x + P ) = g(x) Model: Trigonometric polynomial of order M T M (x) =
Instruction Execution Times
1 C Execution Times InThisAppendix... Introduction DL330 Execution Times DL330P Execution Times DL340 Execution Times C-2 Execution Times Introduction Data Registers This appendix contains several tables
Second Order RLC Filters
ECEN 60 Circuits/Electronics Spring 007-0-07 P. Mathys Second Order RLC Filters RLC Lowpass Filter A passive RLC lowpass filter (LPF) circuit is shown in the following schematic. R L C v O (t) Using phasor
( ) 2 and compare to M.
Problems and Solutions for Section 4.2 4.9 through 4.33) 4.9 Calculate the square root of the matrix 3!0 M!0 8 Hint: Let M / 2 a!b ; calculate M / 2!b c ) 2 and compare to M. Solution: Given: 3!0 M!0 8
Econ 2110: Fall 2008 Suggested Solutions to Problem Set 8 questions or comments to Dan Fetter 1
Eon : Fall 8 Suggested Solutions to Problem Set 8 Email questions or omments to Dan Fetter Problem. Let X be a salar with density f(x, θ) (θx + θ) [ x ] with θ. (a) Find the most powerful level α test
9.09. # 1. Area inside the oval limaçon r = cos θ. To graph, start with θ = 0 so r = 6. Compute dr
9.9 #. Area inside the oval limaçon r = + cos. To graph, start with = so r =. Compute d = sin. Interesting points are where d vanishes, or at =,,, etc. For these values of we compute r:,,, and the values
CRASH COURSE IN PRECALCULUS
CRASH COURSE IN PRECALCULUS Shiah-Sen Wang The graphs are prepared by Chien-Lun Lai Based on : Precalculus: Mathematics for Calculus by J. Stuwart, L. Redin & S. Watson, 6th edition, 01, Brooks/Cole Chapter
SCHOOL OF MATHEMATICAL SCIENCES G11LMA Linear Mathematics Examination Solutions
SCHOOL OF MATHEMATICAL SCIENCES GLMA Linear Mathematics 00- Examination Solutions. (a) i. ( + 5i)( i) = (6 + 5) + (5 )i = + i. Real part is, imaginary part is. (b) ii. + 5i i ( + 5i)( + i) = ( i)( + i)
ORDINAL ARITHMETIC JULIAN J. SCHLÖDER
ORDINAL ARITHMETIC JULIAN J. SCHLÖDER Abstract. We define ordinal arithmetic and show laws of Left- Monotonicity, Associativity, Distributivity, some minor related properties and the Cantor Normal Form.
A Note on Intuitionistic Fuzzy. Equivalence Relation
International Mathematical Forum, 5, 2010, no. 67, 3301-3307 A Note on Intuitionistic Fuzzy Equivalence Relation D. K. Basnet Dept. of Mathematics, Assam University Silchar-788011, Assam, India dkbasnet@rediffmail.com
TMA4115 Matematikk 3
TMA4115 Matematikk 3 Andrew Stacey Norges Teknisk-Naturvitenskapelige Universitet Trondheim Spring 2010 Lecture 12: Mathematics Marvellous Matrices Andrew Stacey Norges Teknisk-Naturvitenskapelige Universitet
Reminders: linear functions
Reminders: linear functions Let U and V be vector spaces over the same field F. Definition A function f : U V is linear if for every u 1, u 2 U, f (u 1 + u 2 ) = f (u 1 ) + f (u 2 ), and for every u U
ST5224: Advanced Statistical Theory II
ST5224: Advanced Statistical Theory II 2014/2015: Semester II Tutorial 7 1. Let X be a sample from a population P and consider testing hypotheses H 0 : P = P 0 versus H 1 : P = P 1, where P j is a known
6.1. Dirac Equation. Hamiltonian. Dirac Eq.
6.1. Dirac Equation Ref: M.Kaku, Quantum Field Theory, Oxford Univ Press (1993) η μν = η μν = diag(1, -1, -1, -1) p 0 = p 0 p = p i = -p i p μ p μ = p 0 p 0 + p i p i = E c 2 - p 2 = (m c) 2 H = c p 2
w o = R 1 p. (1) R = p =. = 1
Πανεπιστήµιο Κρήτης - Τµήµα Επιστήµης Υπολογιστών ΗΥ-570: Στατιστική Επεξεργασία Σήµατος 205 ιδάσκων : Α. Μουχτάρης Τριτη Σειρά Ασκήσεων Λύσεις Ασκηση 3. 5.2 (a) From the Wiener-Hopf equation we have:
PARTIAL NOTES for 6.1 Trigonometric Identities
PARTIAL NOTES for 6.1 Trigonometric Identities tanθ = sinθ cosθ cotθ = cosθ sinθ BASIC IDENTITIES cscθ = 1 sinθ secθ = 1 cosθ cotθ = 1 tanθ PYTHAGOREAN IDENTITIES sin θ + cos θ =1 tan θ +1= sec θ 1 + cot
Block Ciphers Modes. Ramki Thurimella
Block Ciphers Modes Ramki Thurimella Only Encryption I.e. messages could be modified Should not assume that nonsensical messages do no harm Always must be combined with authentication 2 Padding Must be
Nowhere-zero flows Let be a digraph, Abelian group. A Γ-circulation in is a mapping : such that, where, and : tail in X, head in
Nowhere-zero flows Let be a digraph, Abelian group. A Γ-circulation in is a mapping : such that, where, and : tail in X, head in : tail in X, head in A nowhere-zero Γ-flow is a Γ-circulation such that
New bounds for spherical two-distance sets and equiangular lines
New bounds for spherical two-distance sets and equiangular lines Michigan State University Oct 8-31, 016 Anhui University Definition If X = {x 1, x,, x N } S n 1 (unit sphere in R n ) and x i, x j = a
Example of the Baum-Welch Algorithm
Example of the Baum-Welch Algorithm Larry Moss Q520, Spring 2008 1 Our corpus c We start with a very simple corpus. We take the set Y of unanalyzed words to be {ABBA, BAB}, and c to be given by c(abba)
CHAPTER 48 APPLICATIONS OF MATRICES AND DETERMINANTS
CHAPTER 48 APPLICATIONS OF MATRICES AND DETERMINANTS EXERCISE 01 Page 545 1. Use matrices to solve: 3x + 4y x + 5y + 7 3x + 4y x + 5y 7 Hence, 3 4 x 0 5 y 7 The inverse of 3 4 5 is: 1 5 4 1 5 4 15 8 3
ω ω ω ω ω ω+2 ω ω+2 + ω ω ω ω+2 + ω ω+1 ω ω+2 2 ω ω ω ω ω ω ω ω+1 ω ω2 ω ω2 + ω ω ω2 + ω ω ω ω2 + ω ω+1 ω ω2 + ω ω+1 + ω ω ω ω2 + ω
0 1 2 3 4 5 6 ω ω + 1 ω + 2 ω + 3 ω + 4 ω2 ω2 + 1 ω2 + 2 ω2 + 3 ω3 ω3 + 1 ω3 + 2 ω4 ω4 + 1 ω5 ω 2 ω 2 + 1 ω 2 + 2 ω 2 + ω ω 2 + ω + 1 ω 2 + ω2 ω 2 2 ω 2 2 + 1 ω 2 2 + ω ω 2 3 ω 3 ω 3 + 1 ω 3 + ω ω 3 +
Jesse Maassen and Mark Lundstrom Purdue University November 25, 2013
Notes on Average Scattering imes and Hall Factors Jesse Maassen and Mar Lundstrom Purdue University November 5, 13 I. Introduction 1 II. Solution of the BE 1 III. Exercises: Woring out average scattering
Parametrized Surfaces
Parametrized Surfaces Recall from our unit on vector-valued functions at the beginning of the semester that an R 3 -valued function c(t) in one parameter is a mapping of the form c : I R 3 where I is some
Lecture 15 - Root System Axiomatics
Lecture 15 - Root System Axiomatics Nov 1, 01 In this lecture we examine root systems from an axiomatic point of view. 1 Reflections If v R n, then it determines a hyperplane, denoted P v, through the
5.4 The Poisson Distribution.
The worst thing you can do about a situation is nothing. Sr. O Shea Jackson 5.4 The Poisson Distribution. Description of the Poisson Distribution Discrete probability distribution. The random variable
Chapter 6: Systems of Linear Differential. be continuous functions on the interval
Chapter 6: Systems of Linear Differential Equations Let a (t), a 2 (t),..., a nn (t), b (t), b 2 (t),..., b n (t) be continuous functions on the interval I. The system of n first-order differential equations
Physical DB Design. B-Trees Index files can become quite large for large main files Indices on index files are possible.
B-Trees Index files can become quite large for large main files Indices on index files are possible 3 rd -level index 2 nd -level index 1 st -level index Main file 1 The 1 st -level index consists of pairs
On a four-dimensional hyperbolic manifold with finite volume
BULETINUL ACADEMIEI DE ŞTIINŢE A REPUBLICII MOLDOVA. MATEMATICA Numbers 2(72) 3(73), 2013, Pages 80 89 ISSN 1024 7696 On a four-dimensional hyperbolic manifold with finite volume I.S.Gutsul Abstract. In
Fourier Series. MATH 211, Calculus II. J. Robert Buchanan. Spring Department of Mathematics
Fourier Series MATH 211, Calculus II J. Robert Buchanan Department of Mathematics Spring 2018 Introduction Not all functions can be represented by Taylor series. f (k) (c) A Taylor series f (x) = (x c)
ANSWERSHEET (TOPIC = DIFFERENTIAL CALCULUS) COLLECTION #2. h 0 h h 0 h h 0 ( ) g k = g 0 + g 1 + g g 2009 =?
Teko Classes IITJEE/AIEEE Maths by SUHAAG SIR, Bhopal, Ph (0755) 3 00 000 www.tekoclasses.com ANSWERSHEET (TOPIC DIFFERENTIAL CALCULUS) COLLECTION # Question Type A.Single Correct Type Q. (A) Sol least
Statistical Inference I Locally most powerful tests
Statistical Inference I Locally most powerful tests Shirsendu Mukherjee Department of Statistics, Asutosh College, Kolkata, India. shirsendu st@yahoo.co.in So far we have treated the testing of one-sided
Generating Set of the Complete Semigroups of Binary Relations
Applied Mathematics 06 7 98-07 Published Online January 06 in SciRes http://wwwscirporg/journal/am http://dxdoiorg/036/am067009 Generating Set of the Complete Semigroups of Binary Relations Yasha iasamidze
Μηχανική Μάθηση Hypothesis Testing
ΕΛΛΗΝΙΚΗ ΔΗΜΟΚΡΑΤΙΑ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΡΗΤΗΣ Μηχανική Μάθηση Hypothesis Testing Γιώργος Μπορμπουδάκης Τμήμα Επιστήμης Υπολογιστών Procedure 1. Form the null (H 0 ) and alternative (H 1 ) hypothesis 2. Consider
Homework 8 Model Solution Section
MATH 004 Homework Solution Homework 8 Model Solution Section 14.5 14.6. 14.5. Use the Chain Rule to find dz where z cosx + 4y), x 5t 4, y 1 t. dz dx + dy y sinx + 4y)0t + 4) sinx + 4y) 1t ) 0t + 4t ) sinx
Optimal Parameter in Hermitian and Skew-Hermitian Splitting Method for Certain Two-by-Two Block Matrices
Optimal Parameter in Hermitian and Skew-Hermitian Splitting Method for Certain Two-by-Two Block Matrices Chi-Kwong Li Department of Mathematics The College of William and Mary Williamsburg, Virginia 23187-8795
Strain gauge and rosettes
Strain gauge and rosettes Introduction A strain gauge is a device which is used to measure strain (deformation) on an object subjected to forces. Strain can be measured using various types of devices classified
DESIGN OF MACHINERY SOLUTION MANUAL h in h 4 0.
DESIGN OF MACHINERY SOLUTION MANUAL -7-1! PROBLEM -7 Statement: Design a double-dwell cam to move a follower from to 25 6, dwell for 12, fall 25 and dwell for the remader The total cycle must take 4 sec
1 String with massive end-points
1 String with massive end-points Πρόβλημα 5.11:Θεωρείστε μια χορδή μήκους, τάσης T, με δύο σημειακά σωματίδια στα άκρα της, το ένα μάζας m, και το άλλο μάζας m. α) Μελετώντας την κίνηση των άκρων βρείτε
Tridiagonal matrices. Gérard MEURANT. October, 2008
Tridiagonal matrices Gérard MEURANT October, 2008 1 Similarity 2 Cholesy factorizations 3 Eigenvalues 4 Inverse Similarity Let α 1 ω 1 β 1 α 2 ω 2 T =......... β 2 α 1 ω 1 β 1 α and β i ω i, i = 1,...,
Space-Time Symmetries
Chapter Space-Time Symmetries In classical fiel theory any continuous symmetry of the action generates a conserve current by Noether's proceure. If the Lagrangian is not invariant but only shifts by a
Main source: "Discrete-time systems and computer control" by Α. ΣΚΟΔΡΑΣ ΨΗΦΙΑΚΟΣ ΕΛΕΓΧΟΣ ΔΙΑΛΕΞΗ 4 ΔΙΑΦΑΝΕΙΑ 1
Main source: "Discrete-time systems and computer control" by Α. ΣΚΟΔΡΑΣ ΨΗΦΙΑΚΟΣ ΕΛΕΓΧΟΣ ΔΙΑΛΕΞΗ 4 ΔΙΑΦΑΝΕΙΑ 1 A Brief History of Sampling Research 1915 - Edmund Taylor Whittaker (1873-1956) devised a
Srednicki Chapter 55
Srednicki Chapter 55 QFT Problems & Solutions A. George August 3, 03 Srednicki 55.. Use equations 55.3-55.0 and A i, A j ] = Π i, Π j ] = 0 (at equal times) to verify equations 55.-55.3. This is our third
Chapter 3: Ordinal Numbers
Chapter 3: Ordinal Numbers There are two kinds of number.. Ordinal numbers (0th), st, 2nd, 3rd, 4th, 5th,..., ω, ω +,... ω2, ω2+,... ω 2... answers to the question What position is... in a sequence? What
Variational Wavefunction for the Helium Atom
Technische Universität Graz Institut für Festkörperphysik Student project Variational Wavefunction for the Helium Atom Molecular and Solid State Physics 53. submitted on: 3. November 9 by: Markus Krammer
Problem Set 9 Solutions. θ + 1. θ 2 + cotθ ( ) sinθ e iφ is an eigenfunction of the ˆ L 2 operator. / θ 2. φ 2. sin 2 θ φ 2. ( ) = e iφ. = e iφ cosθ.
Chemistry 362 Dr Jean M Standard Problem Set 9 Solutions The ˆ L 2 operator is defined as Verify that the angular wavefunction Y θ,φ) Also verify that the eigenvalue is given by 2! 2 & L ˆ 2! 2 2 θ 2 +
department listing department name αχχουντσ ϕανε βαλικτ δδσϕηασδδη σδηφγ ασκϕηλκ τεχηνιχαλ αλαν ϕουν διξ τεχηνιχαλ ϕοην µαριανι
She selects the option. Jenny starts with the al listing. This has employees listed within She drills down through the employee. The inferred ER sttricture relates this to the redcords in the databasee
Notes on the Open Economy
Notes on the Open Econom Ben J. Heijdra Universit of Groningen April 24 Introduction In this note we stud the two-countr model of Table.4 in more detail. restated here for convenience. The model is Table.4.
Solution Series 9. i=1 x i and i=1 x i.
Lecturer: Prof. Dr. Mete SONER Coordinator: Yilin WANG Solution Series 9 Q1. Let α, β >, the p.d.f. of a beta distribution with parameters α and β is { Γ(α+β) Γ(α)Γ(β) f(x α, β) xα 1 (1 x) β 1 for < x
Exercises to Statistics of Material Fatigue No. 5
Prof. Dr. Christine Müller Dipl.-Math. Christoph Kustosz Eercises to Statistics of Material Fatigue No. 5 E. 9 (5 a Show, that a Fisher information matri for a two dimensional parameter θ (θ,θ 2 R 2, can
( y) Partial Differential Equations
Partial Dierential Equations Linear P.D.Es. contains no owers roducts o the deendent variables / an o its derivatives can occasionall be solved. Consider eamle ( ) a (sometimes written as a ) we can integrate
Lecture 13 - Root Space Decomposition II
Lecture 13 - Root Space Decomposition II October 18, 2012 1 Review First let us recall the situation. Let g be a simple algebra, with maximal toral subalgebra h (which we are calling a CSA, or Cartan Subalgebra).
The challenges of non-stable predicates
The challenges of non-stable predicates Consider a non-stable predicate Φ encoding, say, a safety property. We want to determine whether Φ holds for our program. The challenges of non-stable predicates
Paper Reference. Paper Reference(s) 6665/01 Edexcel GCE Core Mathematics C3 Advanced. Thursday 11 June 2009 Morning Time: 1 hour 30 minutes
Centre No. Candidate No. Paper Reference(s) 6665/01 Edexcel GCE Core Mathematics C3 Advanced Thursday 11 June 2009 Morning Time: 1 hour 30 minutes Materials required for examination Mathematical Formulae
the total number of electrons passing through the lamp.
1. A 12 V 36 W lamp is lit to normal brightness using a 12 V car battery of negligible internal resistance. The lamp is switched on for one hour (3600 s). For the time of 1 hour, calculate (i) the energy
Assalamu `alaikum wr. wb.
LUMP SUM Assalamu `alaikum wr. wb. LUMP SUM Wassalamu alaikum wr. wb. Assalamu `alaikum wr. wb. LUMP SUM Wassalamu alaikum wr. wb. LUMP SUM Lump sum lump sum lump sum. lump sum fixed price lump sum lump