We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save this undefined to your undefined account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your undefined account.
Find out more about saving content to .
To send this article to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about sending to your Kindle.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
We give a computationally effective criterion for determining whether a finite-index subgroup of $\mathrm{SL}_2(\mathbf{Z})$ is a congruence subgroup, extending earlier work of Hsu for subgroups of $\mathrm{PSL}_2(\mathbf{Z})$.
This paper introduces ‘hyper-and-elliptic-curve cryptography’, in which a single high-security group supports fast genus-2-hyperelliptic-curve formulas for variable-base-point single-scalar multiplication (for example, Diffie–Hellman shared-secret computation) and at the same time supports fast elliptic-curve formulas for fixed-base-point scalar multiplication (for example, key generation) and multi-scalar multiplication (for example, signature verification).
The problem of solving polynomial equations over finite fields has many applications in cryptography and coding theory. In this paper, we consider polynomial equations over a ‘large’ finite field with a ‘small’ characteristic. We introduce a new algorithm for solving this type of equations, called the successive resultants algorithm (SRA). SRA is radically different from previous algorithms for this problem, yet it is conceptually simple. A straightforward implementation using Magma was able to beat the built-in Roots function for some parameters. These preliminary results encourage a more detailed study of SRA and its applications. Moreover, we point out that an extension of SRA to the multivariate case would have an important impact on the practical security of the elliptic curve discrete logarithm problem in the small characteristic case.
We show how one can obtain an asymptotic expression for some special functions with a very explicit error term starting from appropriate upper bounds. We will work out the details for the Bessel function $J_\nu (x)$ and the Airy function ${\rm Ai}(x).$ In particular, we answer a question raised by Olenko and find a sharp bound on the difference between $J_\nu (x)$ and its standard asymptotics. We also give a very simple and surprisingly precise approximation for the zeros ${\rm Ai}(x).$
In the recent breakthrough paper by Barbulescu, Gaudry, Joux and Thomé, a quasi-polynomial time algorithm is proposed for the discrete logarithm problem over finite fields of small characteristic. The time complexity analysis of the algorithm is based on several heuristics presented in their paper. We show that some of the heuristics are problematic in their original forms, in particular when the field is not a Kummer extension. We propose a fix to the algorithm in non-Kummer cases, without altering the heuristic quasi-polynomial time complexity. Further study is required in order to fully understand the effectiveness of the new approach.
We analyse the mask associated with the $2n$-point interpolatory Dubuc–Deslauriers subdivision scheme $S_{a^{[n]}}$. Sharp bounds are presented for the magnitude of the coefficients $a^{[n]}_{2i-1}$ of the mask. For scales $i \in [1,\sqrt{n}]$ it is shown that $|a^{[n]}_{2i-1}|$ is comparable to $i^{-1}$, and for larger power scales, exponentially decaying bounds are obtained. Using our bounds, we may precisely analyse the summability of the mask as a function of $n$ by identifying which coefficients of the mask contribute to the essential behaviour in $n$, recovering and refining the recent result of Deng–Hormann–Zhang that the operator norm of $S_{a^{[n]}}$ on $\ell ^\infty $ grows logarithmically in $n$.
In this paper we study the discrete logarithm problem in medium- and high-characteristic finite fields. We propose a variant of the number field sieve (NFS) based on numerous number fields. Our improved algorithm computes discrete logarithms in $\def \xmlpi #1{}\def \mathsfbi #1{\boldsymbol {\mathsf {#1}}}\let \le =\leqslant \let \leq =\leqslant \let \ge =\geqslant \let \geq =\geqslant \def \Pr {\mathit {Pr}}\def \Fr {\mathit {Fr}}\def \Rey {\mathit {Re}}\mathbb{F}_{p^n}$ for the whole range of applicability of the NFS and lowers the asymptotic complexity from $L_{p^n}({1/3},({128/9})^{1/3})$ to $L_{p^n}({1/3},(2^{13}/3^6)^{1/3})$ in the medium-characteristic case, and from $L_{p^n}({1/3},({64/9})^{1/3})$ to $L_{p^n}({1/3},((92 + 26 \sqrt{13})/27)^{1/3})$ in the high-characteristic case.
We consider the classical problem of finding the best uniform approximation by polynomials of $1/(x-a)^2,$ where $a>1$ is given, on the interval $[-\! 1,1]$. First, using symbolic computation tools we derive the explicit expressions of the polynomials of best approximation of low degrees and then give a parametric solution of the problem in terms of elliptic functions. Symbolic computation is invoked then once more to derive a recurrence relation for the coefficients of the polynomials of best uniform approximation based on a Pell-type equation satisfied by the solutions.
We address the problem of evaluating an $L$-function when only a small number of its Dirichlet coefficients are known. We use the approximate functional equation in a new way and find that it is possible to evaluate the $L$-function more precisely than one would expect from the standard approach. The method, however, requires considerably more computational effort to achieve a given accuracy than would be needed if more Dirichlet coefficients were available.
Let $\def \xmlpi #1{}\def \mathsfbi #1{\boldsymbol {\mathsf {#1}}}\let \le =\leqslant \let \leq =\leqslant \let \ge =\geqslant \let \geq =\geqslant \def \Pr {\mathit {Pr}}\def \Fr {\mathit {Fr}}\def \Rey {\mathit {Re}}A^{0}(\Gamma _{2})$ denote the ring of scalar-valued Siegel modular forms of degree two, level $1$ and even weights. In this paper, we prove the determinant of a basis of the module of vector-valued Siegel modular forms $\bigoplus _{k \equiv \epsilon \ {\rm mod}\ {2}}A_{\det ^{k}\otimes \mathrm{Sym}(j)}(\Gamma _{2})$ over $A^{0}(\Gamma _{2})$ is equal to a power of the cusp form of degree two and weight $35$ up to a constant. Here $j = 4, 6$ and $\epsilon = 0, 1$. The main result in this paper was conjectured by Ibukiyama (Comment. Math. Univ. St. Pauli 61 (2012) 51–75).
This paper proposes a new family of symmetric $4$-point ternary non-stationary subdivision schemes that can generate the limit curves of $C^3$ continuity. The continuity of this scheme is higher than the existing 4-point ternary approximating schemes. The proposed scheme has been developed using trigonometric B-spline basis functions and analyzed using the theory of asymptotic equivalence. It has the ability to reproduce or regenerate the conic sections, trigonometric polynomials and trigonometric splines as well. Some graphical and numerical examples are being considered, by choosing an appropriate tension parameter $0<\alpha <\pi /3 $, to show the usefulness of the proposed scheme. Moreover, the Hölder regularity and the reproduction property are also being calculated.
We present an efficient algorithm to compute the Hasse–Witt matrix of a hyperelliptic curve $\def \xmlpi #1{}\def \mathsfbi #1{\boldsymbol {\mathsf {#1}}}\let \le =\leqslant \let \leq =\leqslant \let \ge =\geqslant \let \geq =\geqslant \def \Pr {\mathit {Pr}}\def \Fr {\mathit {Fr}}\def \Rey {\mathit {Re}}C/\mathbb{Q}$ modulo all primes of good reduction up to a given bound $N$, based on the average polynomial-time algorithm recently proposed by the first author. An implementation for hyperelliptic curves of genus 2 and 3 is more than an order of magnitude faster than alternative methods for $N = 2^{26}$.
We present a new method to propagate $p$-adic precision in computations, which also applies to other ultrametric fields. We illustrate it with some examples and give a toy application to the stable computation of the SOMOS 4 sequence.
We construct an elliptic curve over the field of rational functions with torsion group $\mathbb{Z}/2\mathbb{Z}\times \mathbb{Z}/4\mathbb{Z}$ and rank equal to four, and an elliptic curve over $\mathbb{Q}$ with the same torsion group and rank nine. Both results improve previous records for ranks of curves of this torsion group. They are obtained by considering elliptic curves induced by Diophantine triples.
We propose a fast method of calculating the $\def \xmlpi #1{}\def \mathsfbi #1{\boldsymbol {\mathsf {#1}}}\let \le =\leqslant \let \leq =\leqslant \let \ge =\geqslant \let \geq =\geqslant \def \Pr {\mathit {Pr}}\def \Fr {\mathit {Fr}}\def \Rey {\mathit {Re}}p$-part of the class numbers in certain non-cyclotomic $\mathbb{Z}_p$-extensions of an imaginary quadratic field using elliptic units constructed by Siegel functions. We carried out practical calculations for $p=3$ and determined $\lambda $-invariants of such $\mathbb{Z}_3$-extensions which were not known in our previous paper.
There is an algorithm of Schoof for finding divisors of class numbers of real cyclotomic fields of prime conductor. In this paper we introduce an improvement of the elliptic analogue of this algorithm by using a subgroup of elliptic units given by Weierstrass forms. These elliptic units which can be expressed in terms of $\def \xmlpi #1{}\def \mathsfbi #1{\boldsymbol {\mathsf {#1}}}\let \le =\leqslant \let \leq =\leqslant \let \ge =\geqslant \let \geq =\geqslant \def \Pr {\mathit {Pr}}\def \Fr {\mathit {Fr}}\def \Rey {\mathit {Re}}x$-coordinates of points on elliptic curves enable us to use the fast arithmetic of elliptic curves over finite fields.
Boyd showed that the beta expansion of Salem numbers of degree 4 were always eventually periodic. Based on an heuristic argument, Boyd had conjectured that the same is true for Salem numbers of degree 6 but not for Salem numbers of degree 8. This paper examines Salem numbers of degree 8 and collects experimental evidence in support of Boyd’s conjecture.
We find all quadratic post-critically finite (PCF) rational functions defined over $\mathbb{Q}$, up to conjugation by elements of $\mathop{\rm PGL}_2(\overline{\mathbb{Q}})$. We describe an algorithm to search for possibly PCF functions. Using the algorithm, we eliminate all but 12 rational functions, all of which are verified to be PCF. We also give a complete description of all possible rational preperiodic structures for quadratic PCF functions defined over $\mathbb{Q}$.
Let $\mathfrak{R}$ be a complete discrete valuation ring, $S=\mathfrak{R}[[u]]$ and $d$ a positive integer. The aim of this paper is to explain how to efficiently compute usual operations such as sum and intersection of sub-$S$-modules of $S^d$. As $S$ is not principal, it is not possible to have a uniform bound on the number of generators of the modules resulting from these operations. We explain how to mitigate this problem, following an idea of Iwasawa, by computing an approximation of the result of these operations up to a quasi-isomorphism. In the course of the analysis of the $p$-adic and $u$-adic precisions of the computations, we have to introduce more general coefficient rings that may be interesting for their own sake. Being able to perform linear algebra operations modulo quasi-isomorphism with $S$-modules has applications in Iwasawa theory and $p$-adic Hodge theory. It is used in particular in Caruso and Lubicz (Preprint, 2013, arXiv:1309.4194) to compute the semi-simplified modulo $p$ of a semi-stable representation.