Isogeny graphs, algorithms and applications
|
|
- Justina McBride
- 5 years ago
- Views:
Transcription
1 Isogeny graphs, algorithms and applications University of Auckland, New Zealand Reporting on joint work with Christina Delfs (Oldenburg). Thanks: David Kohel, Drew Sutherland, Marco Streng.
2 Plan Elliptic curves and isogenies Isogeny graphs and applications Ordinary case Supersingular case New work with Christina Delfs: improved algorithms for computing isogenies between supersingular elliptic curves. Please ask questions at any time.
3 Isogenies An elliptic curve over a eld k is a non-singular projective cubic curve. The set of k-rational points is a group. An isogeny φ : E 1 E 2 of elliptic curves is a morphism that is a group homomorphism. Examples of isogenies include: [n] : E E and Frobenius map when k is a nite eld. An isogeny has nite kernel G E 1 (k). If the isogeny is separable then #G = deg(φ). Tate's isogeny theorem: Let E 1, E 2 be elliptic curves over a nite eld F q. Then #E 1 (F q ) = #E 2 (F q ) i there is an isogeny φ : E 1 E 2 over F q.
4 Isogenies Given a nite subgroup G E 1 (k) there exists an elliptic curve E 2 and a separable isogeny φ : E 1 E 2 with ker(φ) = G. The pair (E 2, φ) can be computed using Vélu's formulae. Two isogenies φ : E 1 E 2 and φ : E 1 E 2 are equivalent if they have the same kernel. Let l be prime. Let E 1 be an elliptic curve. Then over k there are l + 1 non-equivalent isogenies of degree l from E 1. There exists an isogeny φ : E 1 E 2 dened over k of degree n if and only if Φ n (j(e 1 ), j(e 2 )) = 0 where Φ n is the n-th modular polynomial. Conversely, each root of Φ n (j(e 1 ), y) in k determines an equivalence class of isogenies of degree n. An isogeny of degree n over k can be factored as a composition of isogenies over k of prime degree.
5 If you want to learn more about isogenies...
6 Applications of isogenies Schoof-Elkies-Atkin (Lercier, Couveignes) point-counting algorithm. Kohel's thesis (computing End(E) using volcanos). Relating the discrete logarithm problem on elliptic curves with the same number of points (Galbraith, Jao-Miller-Venkatesan). Charles-Goren-Lauter hash function. Stolbunov cryptosystem. Jao-de-Feo cryptosystem. Computing class polynomials and modular polynomials (Sutherland). There is also interesting work in genus 2 that I do not discuss in this talk.
7 Isogeny graph X (k, E, L) Let k be a eld of characteristic p, E an elliptic curve over k, and L a set of small primes l p. The vertices of the isogeny graph are k-isomorphism classes of elliptic curves k-isogenous to E. Usually we label the vertices with j-invariants. The edges are l-isogenies from φ : E 1 E 2 over k, for some l L, for elliptic curves E 1, E 2 in the vertex set. The graph can be constructed using modular polynomials or Vélu's formulae.
8 Isogeny graphs An elliptic curve E over F p n is supersingular if E[p] = {0} (equiv End(E) non-commutative). Otherwise it is called ordinary. When E/F p is supersingular then X (F p, E, {l}) is connected for any prime l p. We omit the mention of E in the supersingular case. The supersingular graph has around p/12 vertices. The ordinary isogeny graph for an elliptic curve over F q has O( q) vertices. When E is supersingular, or when E is ordinary and L is big enough (in particular, so the graph is connected), then the isogeny graph is an expander graph.
9 Example 0 α ᾱ 2 68 Supersingular Isogeny Graph X (F 83, {2})
10 Example 0 3 α ᾱ Supersingular Isogeny Graph X (F 101, {2})
11 Charles-Goren-Lauter hash function Consider the supersingular graph X (F p, {2}). Fix a pair of initial vertices j 1 and j 0. Given an input string of bits b 1 b 2 one computes a non-backtracking path through the graph by choosing at each stage one of the two neighbours that does not go back to the previous j-invariant. In other words, compute the two roots of Φ 2 (j i, y)/(y j i 1), order them, and use the current bit b i to deterministically choose the next step in the walk. The hash value is the nal j-invariant. Finding a collision in the hash function is equivalent to nding a non-trivial cycle in the isogeny graph. Inverting the hash function is nding a path in the graph between two given vertices.
12 Computational Problems and Algorithms in Graph Theory Find a path between two vertices (= nd an isogeny between two given elliptic curves). Find a non-trivial cycle in the graph. Dijsktra algorithm. Pohl's bi-directional search (details on following slide).
13 Local view only
14 Pohl bi-directional search Start with two vertices. Grow trees outwards from each vertex (breadth-rst search) and store every vertex. When there is a vertex visited by both trees then get a path. By the birthday paradox, expect a match after around πn trials, where N is the size of the graph. Storage and running time therefore O( N) eld elements/operations. The use of this algorithm for the isogeny problem was detailed in a 1999 paper of mine. Would prefer an algorithm that requires low storage and can be distributed.
15 Ordinary case: CM Theory (briey) Let E/F q be ordinary, so #E(F q ) = q + 1 t for some non-zero t. Let π q be the q-power Frobenius: π 2 q tπ q + q = 0. Let d = t 2 4q < 0 and K = Q( d). Then Z[π q ] End(E) O K. An isomorphism class E of elliptic curves in the isogeny class of E corresponds to an ideal class of some order O such that Z[π q ] O O K. Further, isogenies out of E correspond to invertible O-modules. The isogeny graph is equal to a graph of ideal classes. The graph has a regular structure.
16 Volcanoes Kohel: Let E 1, E 2 be ordinary elliptic curves over F q and let [End(E 1 ) : End(E 2 )] = l. Then every isogeny φ : E 1 E 2 has degree divisible by l. The structure of orders Z[ d] O O K is reected in the isogeny graph and there is a notion of level. One can detect when one is on the oor, at which point one can climb to the crater.
17 Ordinary case: CM Theory We consider the graph X (F q, E, L) of F q -isomorphism classes of elliptic curves over F q isogenous to E, and L is a set of primes that split or ramify in Q( d). Computations in class groups are easy. There is a compact representation for ideal classes. One can compute the structure of the ideal class group in subexponential time. See very recent article by Franz Lemmermeyer in LMS JCM about Václav imerka for some interesting history about index calculus algorithms in ideal class groups.
18 Ordinary case Galbraith-Hess-Smart gave a low-storage and distributed algorithm for the ordinary isogeny problem. Idea is to use Pollard-style random walks in the graph. Isogenies correspond to ideals (a, b + d) in imaginary quadratic elds, so can represent an isogeny compactly as the pair (a, b) of integers. Designate distinguished points in the graph. Clients run deterministic pseudorandom walks (like used in Pollard rho) from randomised initial vertices. When walk hits a distinguished point then the data is sent to the server. When the server receives the same distinguished point but from walks starting from dierent initial vertices then the path is found.
19 Ordinary case As with any Pollard-type method it is necessary to handle short cycles in the walk. There is a method to smooth a long path in the graph into a shorter path, using ideas from subexponential algorithms for ideal class groups. By making distinguished points common enough one can also ensure that paths are relatively short, but the storage requirements become large. Algorithm improved greatly by Anton Stolbunov in his PhD thesis. A full discussion is given in a joint paper by Stolbunov and me.
20 Supersingular case In principle could also use Pollard-style pseudorandom walks to solve the supersingular isogeny problem in X (F p, {2}). Problem is that there are only 3 directions from each point, so the probability of falling into a short cycle is high. Can minimise this by using more primes, but then we are not solving the problem in the original graph. It also seems to be non-trivial to compactly represent the isogeny or to shorten a long isogeny. Hence, implementing the algorithm is irksome.
21 Question: What about the supersingular isogeny problem restricted to curves over F p? The number of supersingular elliptic curves in F p is approximately p/12, but there are only O( p) supersingular elliptic curves over F p. So nding a path between two supersingular elliptic curves over F p should be easier than the general problem.
22 Full supersingular isogeny graph 0 α ᾱ 2 68 Supersingular Isogeny Graph X (F 83, 2)
23 Subgraph Subgraph consisting j F 83
24 Not quite a subgraph Recall that X (F p, L) is a graph whose vertices are F p -isomorphism classes of elliptic curves. In turns out to be better to consider not the subgraph of F p -isomorphism classes of curves over F p, but the graph of F p -isomorphism classes of curves over F p. If E/F p is a supersingular elliptic curve and p > 3 then #E(F p ) = p + 1 and any quadratic twist of E also has p + 1 points. Hence, in general each j(e) F p appears twice in the graph. In the ordinary case the quadratic twists belong to a distinct but isomorphic graph.
25 Not quite a subgraph Since a vertex is no longer determined uniquely by its j-invariant we need to be more careful to construct the graph. For example, use Vélu. It also turns out to be better to consider not all isogenies over F p, but only isogenies over F p. In small examples this means missing some edges between curves over F p, but in larger graphs the isogenies not over F p are usually to curves not over F p.
26 Subgraph X (F 83, 2) F 83
27 New graph X (F 83, 2)
28 Structure Let E be a supersingular elliptic curve over F p, where p > 3. End(E) is a maximal order in a quaternion algebra, but forget about that. Frobenius π p End Fp (E) satises π 2 p + p = 0. Hence Z[ p] End Fp (E) is an order in K = Q( p). If p 1 (mod 4) then O K = Z[ p], while if p 3 (mod 4) then there are two possible orders, O K = Z[(1 + p)/2] and O 2 = Z[ p]. By Deuring lifting, E corresponds to an ideal class for O K or O 2. Further, F p -rational isogenies of degree l out of E correspond to invertible O-modules corresponding to the splitting of the prime l.
29 Structure theorem (p > 3 prime) 1. p 1 (mod 4): There are h( 4p) F p -isomorphism classes of supersingular elliptic curves over F p, all having the same endomorphism ring Z[ p]. From every one there is one outgoing F p -rational horizontal 2-isogeny as well as two horizontal l-isogenies for every prime l > 2 with ( ) p l = p 3 (mod 4): There are two levels in the supersingular isogeny graph. From each vertex there are two horizontal l-isogenies for every prime l > 2 with ( ) p = 1. l 2.1 If p 7 (mod 8), on each level h( p) vertices are situated. Surface and oor are connected 1:1 with 2-isogenies and on the surface we also have two horizontal 2-isogenies from each vertex. 2.2 If p 3 (mod 8), we have h( p) vertices on the surface and 3h( p) on the oor. Surface and oor are connected 1:3 with 2-isogenies, and there are no horizontal 2-isogenies.
30 Example 1: p = (mod 4) Supersingular Isogeny Graph X (F 101, 2)
31 New X (F 101, 2)
32 Example 2: p = (mod 8) α ᾱ β β Supersingular Isogeny Graph X (F 103, 2)
33 New X (F 103, 2)
34 Algorithmic applications To ensure the graph is connected we need to use a set of primes L such that the ideals above l L generate the ideal class group. One can use the 2-isogeny volcano structure to reduce to the case of the maximal order. One can perform the Galbraith-Hess-Smart algorithm verbatim to nd an isogeny between two supersingular curves with j-invariants in F p. This algorithm is easily distributed, and the techniques of Stolbunov can be employed. This also leads to an improved algorithm for the general supersingular isogeny problem. In practice one goes back to F p -isomorphism classes.
35 Bibliography S. D. Galbraith, Constructing isogenies between elliptic curves over nite elds, London Math. Soc., Journal of Computational Mathematics, Vol. 2 (1999) S. D. Galbraith, F. Hess, N. P. Smart, Extending the GHS Weil descent attack, EUROCRYPT 2002, Springer LNCS 2332 (2002) S. D. Galbraith and A. Stolbunov, Improved algorithm for the isogeny problem for ordinary elliptic curves, Applicable Algebra in Engineering, Communication and Computing, Vol. 24, No. 2 (2013) C. Delfs and S. D. Galbraith, Computing Isogenies between Supersingular Elliptic Curves over F p (preprint).
36 Challenges Random walks lead to long chains of isogenies: How to get short ones? How to convert isogeny chains to new chains comprising isogenies of dierent degrees (e.g., convert to chains of 2-isogenies)? Can you smell the subgraph of supersingular j-invariants in F p? (e.g., Ionica-Joux) Eciently compute End(E) for all curves in the graph. Give an ecient algorithm that, given a maximal order O in the quaternion algebra ramied only at and p, constructs an elliptic curve E/F p such that End(E) = O. See I. Chevyrev and S. D. Galbraith, Distinguishing Maximal Orders of Quaternion Algebras by their Short Elements, arxiv:
37 Thank You
Ecient Post-Quantum Undeniable Signature on 64-bit ARM
Ecient Post-Quantum Undeniable Signature on 64-bit ARM Amir Jalali 1 Reza Azarderakhsh 1 Mehran Mozaari-Kermani 2 Department of Computer and Electrical Engineering and Computer Science, Florida Atlantic
More informationIsogeny cordillera algorithm to obtain cryptographically good elliptic curves
Isogeny cordillera algorithm to obtain cryptographically good elliptic curves J Miret 1 D Sadornil 2 J Tena 3 R Tomàs 1 M Valls 1 1 Dept de Matemàtica Universitat de Lleida (Spain) Email: {miret,rosana,magda}@epsudles
More informationc 2006 by CRC Press, LLC.
This is the of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC Press 2006. CRC Press has granted the following specific permissions
More informationDale Husemoller. Elliptic Curves. Second Edition. With Appendices by Otto Forster, Ruth Lawrence, and Stefan Theisen. With 42 Illustrations.
Dale Husemoller Elliptic Curves Second Edition With Appendices by Otto Forster, Ruth Lawrence, and Stefan Theisen With 42 Illustrations Springer Preface to the Second Edition Preface to the First Edition
More information--> Buy True-PDF --> Auto-delivered in 0~10 minutes. GM/T Translated English of Chinese Standard: GM/T0044.
Translated English of Chinese Standard: GM/T0044.1-2016 www.chinesestandard.net Buy True-PDF Auto-delivery. Sales@ChineseStandard.net CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE S REPUBLIC OF CHINA GM
More informationImproving Divisor Arithmetic Over Genus 2 Hyperelliptic Curves
Improving Divisor Arithmetic Over Genus 2 Hyperelliptic Curves Sebastian Lindner Supervisor: Michael Jacobson Motivation Our goal is to make computation of divisor arithmetic in the divisor class group
More informationOn the Performance of Hyperelliptic Cryptosystems
On the Performance of Hyperelliptic Cryptosystems Nigel P. Smart Extended Enterpise Laboratory HPL-98-162 September, 1998 hyperelliptic, cryptography In this paper we discuss various aspects of cryptosystems
More informationE-th roots and static Diffie-Hellman using index calculus
E-th roots and static Diffie-Hellman using index calculus Antoine Joux 1 Joint work with Reynald Lercier 2, David Naccache 3, Emmanuel Thomé 4 Elliptic Curve Cryptography 2008 Utrecht 1 DGA and UVSQ 2
More informationSoftware Implementation of Tate Pairing over GF(2 m )
Software Implementation of Tate Pairing over GF(2 m ) G. Bertoni 1, L. Breveglieri 2, P. Fragneto 1, G. Pelosi 2 and L. Sportiello 1 ST Microelectronics 1, Politecnico di Milano 2 Via Olivetti, Agrate
More informationA SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS
A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS Ounasser Abid 1 and Omar Khadir 2 1, 2 Laboratory of Mathematics, Cryptography and Mechanics, FSTM University Hassan II of Casablanca, Morocco
More informationEcient Post-Quantum Undeniable Signature on 64-bit ARM
Ecient Post-Quantum Undeniable Signature on 64-bit RM mir Jalali 1, Reza zarderakhsh 1, and Mehran Mozaari-Kermani 2 1 Department of omputer and Electrical Engineering and omputer Science, Florida tlantic
More informationCOUNTING THE POINTS OF AN ELLIPTIC CURVE ON A LOW-MEMORY DEVICE
COUNTING THE POINTS OF AN ELLIPTIC CURVE ON A LOW-MEMORY DEVICE Abstract. An important but very memory consuming step in elliptic curve cryptography is that of coming up with an elliptic curve where the
More informationConstructing Pairing-Friendly Elliptic Curves for Cryptography
Constructing Pairing-Friendly Elliptic Curves for Cryptography University of California, Berkeley, USA 2nd KIAS-KMS Summer Workshop on Cryptography Seoul, Korea 30 June 2007 Outline 1 Recent Developments
More informationFINDING CRYPTOGRAPHICALLY STRONG ELLIPTIC CURVES: A TECHNICAL REPORT
FINDING CRYPTOGRAPHICALLY STRONG ELLIPTIC CURVES: A TECHNICAL REPORT HAMISH IVEY-LAW AND ROBERT ROLLAND Abstract. Elliptic curve cryptography is becoming the standard for public key cryptography. Unfortunately,
More informationDetails and description of Application
CUDA based implementation of parallelized Pollard's Rho algorithm for ECDLP M. Chinnici a, S. Cuomo b, M. Laporta c, B. Pennacchio d, A. Pizzirani e, S. Migliori f a,d ENEA- FIM-INFOPPQ, Casaccia Research
More informationTORIC VARIETIES JOAQUÍN MORAGA
TORIC VARIETIES Abstract. This is a very short introduction to some concepts around toric varieties, some of the subsections are intended for more experienced algebraic geometers. To see a lot of exercises
More informationFinite Field Arithmetic Using AVX-512 For Isogeny-Based Cryptography
Finite Field Arithmetic Using AVX-512 For Isogeny-Based Cryptography Gabriell Orisaka 1, Diego F. Aranha 1,2, Julio López 1 1 Institute of Computing, University of Campinas, Brazil 2 Department of Engineering,
More informationHeron Quadrilaterals with Sides in Arithmetic or Geometric Progression
Heron Quadrilaterals with Sides in Arithmetic or Geometric Progression R.H.Buchholz & J.A.MacDougall Abstract We study triangles and cyclic quadrilaterals which have rational area and whose sides form
More informationWorst-case running time for RANDOMIZED-SELECT
Worst-case running time for RANDOMIZED-SELECT is ), even to nd the minimum The algorithm has a linear expected running time, though, and because it is randomized, no particular input elicits the worst-case
More informationElliptic Curve Cryptosystem
UDC 681.8 Elliptic Curve Cryptosystem VNaoya Torii VKazuhiro Yokoyama (Manuscript received June 6, 2000) This paper describes elliptic curve cryptosystems (ECCs), which are expected to become the next-generation
More informationLECTURE 13, THURSDAY APRIL 1, 2004
LECTURE 13, THURSDAY APRIL 1, 2004 FRANZ LEMMERMEYER 1. Parametrizing Curves of Genus 0 As a special case of the theorem that curves of genus 0, in particular those with the maximal number of double points,
More informationTutorial: Computable Model Theory and Differential Algebra
Tutorial: Computable Model Theory and Differential Algebra Russell Miller, Queens College & Graduate Center C.U.N.Y. April 12, 2007 Workshop in Differential Algebra and Related Topics Rutgers University,
More informationArithmetic in Quaternion Algebras
Arithmetic in Quaternion Algebras Graduate Algebra Symposium Jordan Wiebe University of Oklahoma November 5, 2016 Jordan Wiebe (University of Oklahoma) Arithmetic in Quaternion Algebras November 5, 2016
More informationParallel Rewriting of Graphs through the. Pullback Approach. Michel Bauderon 1. Laboratoire Bordelais de Recherche en Informatique
URL: http://www.elsevier.nl/locate/entcs/volume.html 8 pages Parallel Rewriting of Graphs through the Pullback Approach Michel Bauderon Laboratoire Bordelais de Recherche en Informatique Universite Bordeaux
More informationSM9 identity-based cryptographic algorithms Part 2: Digital signature algorithm
SM9 identity-based cryptographic algorithms Part 2: Digital signature algorithm Contents 1 Scope... 1 2 Normative references... 1 3 Terms and definitions... 1 3.1 message... 1 3.2 signed message... 1 3.3
More informationFast Hardware Architectures for Supersingular Isogeny Die-Hellman Key Exchange on FPGA
Fast Hardware Architectures for Supersingular Isogeny Die-Hellman Key Exchange on FPGA Brian Koziel 1, Reza Azarderakhsh 2, and Mehran Mozaari-Kermani 3 1 Texas Instruments, kozielbrian@gmail.com. 2 CEECS
More informationSome Highlights along a Path to Elliptic Curves
Some Highlights along a Path to Elliptic Curves Part 6: Rational Points on Elliptic Curves Steven J. Wilson, Fall 016 Outline of the Series 1. The World of Algebraic Curves. Conic Sections and Rational
More informationOn the Diculty of Software Key Escrow. Abstract. At Eurocrypt'95, Desmedt suggested a scheme which allows individuals to encrypt
On the Diculty of Software Key Escrow Lars R. Knudsen Katholieke Universiteit Leuven Dept. Elektrotechniek-ESAT Kardinaal Mercierlaan 94 B-3001 Heverlee Torben P. Pedersen y Cryptomathic Arhus Science
More informationA GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY
A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY KARL L. STRATOS Abstract. The conventional method of describing a graph as a pair (V, E), where V and E repectively denote the sets of vertices and edges,
More information36 Modular Arithmetic
36 Modular Arithmetic Tom Lewis Fall Term 2010 Tom Lewis () 36 Modular Arithmetic Fall Term 2010 1 / 10 Outline 1 The set Z n 2 Addition and multiplication 3 Modular additive inverse 4 Modular multiplicative
More informationreasonable to store in a software implementation, it is likely to be a signicant burden in a low-cost hardware implementation. We describe in this pap
Storage-Ecient Finite Field Basis Conversion Burton S. Kaliski Jr. 1 and Yiqun Lisa Yin 2 RSA Laboratories 1 20 Crosby Drive, Bedford, MA 01730. burt@rsa.com 2 2955 Campus Drive, San Mateo, CA 94402. yiqun@rsa.com
More informationA New Double Point Multiplication Algorithm and Its Application to Binary Elliptic Curves with Endomorphisms
2614 IEEE TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 10, OCTOBER 2014 A New Double Point Multiplication Algorithm Its Application to Binary Elliptic Curves with Endomorphisms Reza Azarderakhsh Koray Karabina
More informationDiscrete Mathematics SECOND EDITION OXFORD UNIVERSITY PRESS. Norman L. Biggs. Professor of Mathematics London School of Economics University of London
Discrete Mathematics SECOND EDITION Norman L. Biggs Professor of Mathematics London School of Economics University of London OXFORD UNIVERSITY PRESS Contents PART I FOUNDATIONS Statements and proofs. 1
More informationUnderstanding Cryptography by Christof Paar and Jan Pelzl. Chapter 9 Elliptic Curve Cryptography
Understanding Cryptography by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 9 Elliptic Curve Cryptography ver. February 2nd, 2015 These slides were prepared by Tim Güneysu, Christof Paar
More informationWhat is a Graphon? Daniel Glasscock, June 2013
What is a Graphon? Daniel Glasscock, June 2013 These notes complement a talk given for the What is...? seminar at the Ohio State University. The block images in this PDF should be sharp; if they appear
More informationOn the automorphism group of the m-coloured random graph
On the automorphism group of the m-coloured random graph Peter J. Cameron and Sam Tarzi School of Mathematical Sciences Queen Mary, University of London Mile End Road London E1 4NS, UK p.j.cameron@qmul.ac.uk
More informationRATIONAL CURVES ON SMOOTH CUBIC HYPERSURFACES. Contents 1. Introduction 1 2. The proof of Theorem References 9
RATIONAL CURVES ON SMOOTH CUBIC HYPERSURFACES IZZET COSKUN AND JASON STARR Abstract. We prove that the space of rational curves of a fixed degree on any smooth cubic hypersurface of dimension at least
More informationTalks at Mathematical Structures for Cryptography
Talks at Mathematical Structures for Cryptography August 9, 2016 Andreas Enge (INRIA Bordeaux-Sud-Ouest & IMB, Université de Bordeaux ) Title: Short addition sequences for theta functions (joint work with
More informationSheaves and Stacks. November 5, Sheaves and Stacks
November 5, 2014 Grothendieck topologies Grothendieck topologies are an extra datum on a category. They allow us to make sense of something being locally defined. Give a formal framework for glueing problems
More informationAn Introduction to Belyi Surfaces
An Introduction to Belyi Surfaces Matthew Stevenson December 16, 2013 We outline the basic theory of Belyi surfaces, up to Belyi s theorem (1979, [1]), which characterizes these spaces as precisely those
More informationEQUIVARIANT COMPLETE SEGAL SPACES
EQUIVARIANT COMPLETE SEGAL SPACES JULIA E. BERGNER AND STEVEN GREG CHADWICK Abstract. In this paper we give a model for equivariant (, 1)-categories. We modify an approach of Shimakawa for equivariant
More informationArithmetic in Quaternion Algebras
Arithmetic in Quaternion Algebras 31st Automorphic Forms Workshop Jordan Wiebe University of Oklahoma March 6, 2017 Jordan Wiebe (University of Oklahoma) Arithmetic in Quaternion Algebras March 6, 2017
More informationChordal graphs and the characteristic polynomial
Discrete Mathematics 262 (2003) 211 219 www.elsevier.com/locate/disc Chordal graphs and the characteristic polynomial Elizabeth W. McMahon ;1, Beth A. Shimkus 2, Jessica A. Wolfson 3 Department of Mathematics,
More informationProvably Secure and Efficient Cryptography
Provably Secure and Efficient Cryptography Tsuyoshi TAKAGI TU Darmstadt ttakagi@cdc.informatik.tu-darmstadt.de http://www.informatik.tu-darmstadt.de/ti/ Contents Overview NICE Cryptosystem Provable Security
More informationChordal Graphs and Minimal Free Resolutions
Chordal Graphs and Minimal Free Resolutions David J. Marchette David A. Johannsen Abstract The problem of computing the minimal free resolution of the edge ideal of a graph has attracted quite a bit of
More informationExtending partial projective planes
Extending partial projective planes J. B. Nation In honor of my colleagues, Ralph Freese and Bill Lampe Abstract. This note discusses a computational method for constructing finite projective planes. Mathematics
More informationK 4,4 e Has No Finite Planar Cover
K 4,4 e Has No Finite Planar Cover Petr Hliněný Dept. of Applied Mathematics, Charles University, Malostr. nám. 25, 118 00 Praha 1, Czech republic (E-mail: hlineny@kam.ms.mff.cuni.cz) February 9, 2005
More informationDiscrete mathematics , Fall Instructor: prof. János Pach
Discrete mathematics 2016-2017, Fall Instructor: prof. János Pach - covered material - Lecture 1. Counting problems To read: [Lov]: 1.2. Sets, 1.3. Number of subsets, 1.5. Sequences, 1.6. Permutations,
More informationA MODEL CATEGORY STRUCTURE ON THE CATEGORY OF SIMPLICIAL CATEGORIES
A MODEL CATEGORY STRUCTURE ON THE CATEGORY OF SIMPLICIAL CATEGORIES JULIA E. BERGNER Abstract. In this paper we put a cofibrantly generated model category structure on the category of small simplicial
More informationarxiv: v1 [math.gr] 31 Dec 2009
arxiv:1001.0086v1 [math.gr] 31 Dec 2009 Computing the Maximum Slope Invariant in Tubular Groups Christopher H. Cashen Department of Mathematics University of Utah Salt Lake City, UT 8112 cashen@math.utah.edu
More informationTilings of the Euclidean plane
Tilings of the Euclidean plane Yan Der, Robin, Cécile January 9, 2017 Abstract This document gives a quick overview of a eld of mathematics which lies in the intersection of geometry and algebra : tilings.
More information9/24/ Hash functions
11.3 Hash functions A good hash function satis es (approximately) the assumption of SUH: each key is equally likely to hash to any of the slots, independently of the other keys We typically have no way
More informationCUBICAL SIMPLICIAL VOLUME OF SURFACES
CUBICAL SIMPLICIAL VOLUME OF SURFACES CLARA LÖH AND CHRISTIAN PLANKL ABSTRACT. Cubical simplicial volume is a variation on simplicial volume, based on cubes instead of simplices. Both invariants are homotopy
More informationNotes for Lecture 10
COS 533: Advanced Cryptography Lecture 10 (October 16, 2017) Lecturer: Mark Zhandry Princeton University Scribe: Dylan Altschuler Notes for Lecture 10 1 Motivation for Elliptic Curves Diffie-Hellman For
More informationECC Elliptic Curve Cryptography. Foundations of Cryptography - ECC pp. 1 / 31
ECC Elliptic Curve Cryptography Foundations of Cryptography - ECC pp. 1 / 31 Elliptic Curve an elliptic curve E is a smooth, projective, algebraic curve defined by the following equation: y 2 3 2 a xy
More informationAn Investigation of Closed Geodesics on Regular Polyhedra
An Investigation of Closed Geodesics on Regular Polyhedra Tony Scoles Southern Illinois University Edwardsville May 13, 2008 1 Introduction This paper was undertaken to examine, in detail, results from
More informationIntroduction to Public-Key Cryptography
Introduction to Public-Key Cryptography Nadia Heninger University of Pennsylvania June 11, 2018 We stand today on the brink of a revolution in cryptography. Diffie and Hellman, 1976 Symmetric cryptography
More informationSPERNER S LEMMA, BROUWER S FIXED-POINT THEOREM, AND THE SUBDIVISION OF SQUARES INTO TRIANGLES
SPERNER S LEMMA, BROUWER S FIXED-POINT THEOREM, AND THE SUBDIVISION OF SQUARES INTO TRIANGLES AKHIL MATHEW Abstract These are notes from a talk I gave for high-schoolers at the Harvard- MIT Mathematics
More informationNew Strategies for Filtering the Number Field Sieve Matrix
New Strategies for Filtering the Number Field Sieve Matrix Shailesh Patil Department of CSA Indian Institute of Science Bangalore 560 012 India Email: shailesh.patil@gmail.com Gagan Garg Department of
More informationElliptic Curve Cryptography (ECC) Elliptic Curve Cryptography. Elliptic Curves. Elliptic Curve Cryptography (ECC) Elliptic curve
Elliptic Curve Cryptography Gerardo Pelosi Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB) Politecnico di Milano gerardo.pelosi - at - polimi.it ECC was introduced by Victor Miller and
More informationExtending partial projective planes
Extending partial projective planes J. B. Nation In honor of my colleagues, Ralph Freese and Bill Lampe Abstract. This note discusses a computational method for constructing finite projective planes. Mathematics
More informationarxiv: v1 [math.gt] 28 Feb 2009
Coverings and Minimal Triangulations of 3 Manifolds William Jaco, Hyam Rubinstein and Stephan Tillmann arxiv:0903.0112v1 [math.gt] 28 Feb 2009 Abstract This paper uses results on the classification of
More informationChapter 3. Quadric hypersurfaces. 3.1 Quadric hypersurfaces Denition.
Chapter 3 Quadric hypersurfaces 3.1 Quadric hypersurfaces. 3.1.1 Denition. Denition 1. In an n-dimensional ane space A; given an ane frame fo;! e i g: A quadric hypersurface in A is a set S consisting
More informationA TESSELLATION FOR ALGEBRAIC SURFACES IN CP 3
A TESSELLATION FOR ALGEBRAIC SURFACES IN CP 3 ANDREW J. HANSON AND JI-PING SHA In this paper we present a systematic and explicit algorithm for tessellating the algebraic surfaces (real 4-manifolds) F
More informationFinding a winning strategy in variations of Kayles
Finding a winning strategy in variations of Kayles Simon Prins ICA-3582809 Utrecht University, The Netherlands July 15, 2015 Abstract Kayles is a two player game played on a graph. The game can be dened
More informationThe language of categories
The language of categories Mariusz Wodzicki March 15, 2011 1 Universal constructions 1.1 Initial and inal objects 1.1.1 Initial objects An object i of a category C is said to be initial if for any object
More informationPublic Key Cryptography and RSA
Public Key Cryptography and RSA Major topics Principles of public key cryptosystems The RSA algorithm The Security of RSA Motivations A public key system is asymmetric, there does not have to be an exchange
More informationAlgorithms and arithmetic for the implementation of cryptographic pairings
Cairn seminar November 29th, 2013 Algorithms and arithmetic for the implementation of cryptographic pairings Nicolas Estibals CAIRN project-team, IRISA Nicolas.Estibals@irisa.fr What is an elliptic curve?
More informationOne Key to Rule Them All
One Key to Rule Them All Nigel P. Smart Extended Enterprise Laboratory HP Laboratories Bristol HPL-1999-26 March, 1999 cryptographic keys We show how to specify an elliptic curve public key, RSA public
More informationNICOLAS BOURBAKI ELEMENTS OF MATHEMATICS. General Topology. Chapters 1-4. Springer-Verlag Berlin Heidelberg New York London Paris Tokyo
NICOLAS BOURBAKI ELEMENTS OF MATHEMATICS General Topology Chapters 1-4 Springer-Verlag Berlin Heidelberg New York London Paris Tokyo ADVICE TO THE READER v CONTENTS OF THE ELEMENTS OF MATHEMATICS SERIES
More informationHecke module structure of quaternions
Hecke module structure of quaternions David R. Kohel Abstract The arithmetic of quaternions is recalled from a constructive point of view. A Hecke module is introduced, defined as a free abelian group
More informationElliptic Curve Cryptography (ECC) Elliptic Curve Cryptography. Elliptic Curves. Elliptic Curve Cryptography (ECC) Elliptic curve
Elliptic Curve Cryptography Gerardo Pelosi Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB) Politecnico di Milano gerardo.pelosi - at - polimi.it ECC was introduced by Victor Miller and
More informationNewton Polygons of L-Functions
Newton Polygons of L-Functions Phong Le Department of Mathematics University of California, Irvine June 2009/Ph.D. Defense Phong Le Newton Polygons of L-Functions 1/33 Laurent Polynomials Let q = p a where
More informationGraph Theory Questions from Past Papers
Graph Theory Questions from Past Papers Bilkent University, Laurence Barker, 19 October 2017 Do not forget to justify your answers in terms which could be understood by people who know the background theory
More informationA Boolean Expression. Reachability Analysis or Bisimulation. Equation Solver. Boolean. equations.
A Framework for Embedded Real-time System Design? Jin-Young Choi 1, Hee-Hwan Kwak 2, and Insup Lee 2 1 Department of Computer Science and Engineering, Korea Univerity choi@formal.korea.ac.kr 2 Department
More informationUNIVERSITY OF CALGARY. Improved Arithmetic in the Ideal Class Group of Imaginary Quadratic Number Fields. With an Application to Integer Factoring
UNIVERSITY OF CALGARY Improved Arithmetic in the Ideal Class Group of Imaginary Quadratic Number Fields With an Application to Integer Factoring by Maxwell Sayles A THESIS SUBMITTED TO THE FACULTY OF GRADUATE
More informationSM9 identity-based cryptographic algorithms Part 3: Key exchange protocol
SM9 identity-based cryptographic algorithms Part 3: Key exchange protocol Contents 1 Scope... 1 2 Normative references... 1 3 Terms and definitions... 1 3.1 key exchange... 1 3.2 key agreement... 1 3.3
More informationA technique for adding range restrictions to. August 30, Abstract. In a generalized searching problem, a set S of n colored geometric objects
A technique for adding range restrictions to generalized searching problems Prosenjit Gupta Ravi Janardan y Michiel Smid z August 30, 1996 Abstract In a generalized searching problem, a set S of n colored
More informationEulerian subgraphs containing given edges
Discrete Mathematics 230 (2001) 63 69 www.elsevier.com/locate/disc Eulerian subgraphs containing given edges Hong-Jian Lai Department of Mathematics, West Virginia University, P.O. Box. 6310, Morgantown,
More informationKey Exchange. Secure Software Systems
1 Key Exchange 2 Challenge Exchanging Keys &!"#h%&'() & & 1 2 6(6 1) 2 15! $ The more parties in communication, the more keys that need to be securely exchanged " # Do we have to use out-of-band methods?
More informationFrom String Theory to Elliptic Curves over Finite Field, F p
From String Theory to Elliptic Curves over Finite Field, F p A Senior Project submitted to The Division of Science, Mathematics, and Computing of Bard College by Linh Thi Dieu Pham Annandale-on-Hudson,
More informationForeword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the
Foreword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the M-94 Cryptography and History Cryptography and Computers
More informationImproving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude Paul C. van Oorschot and Michael J. Wiener Bell-Northern Research, P.O. Box 3511 Station C, Ottawa, Ontario, K1Y 4H7, Canada {paulv,wiener}@bnr.ca
More informationMath 162b Syllabus p-adic Galois Representations
Math 162b Syllabus p-adic Galois Representations Andrei Jorza 2012-01-03 Contents 1 Local Class Field Theory 1.1 Local fields 1.2 Newton polygons 1.3 Ramification of local fields 1.4 Main results of local
More information4. Simplicial Complexes and Simplicial Homology
MATH41071/MATH61071 Algebraic topology Autumn Semester 2017 2018 4. Simplicial Complexes and Simplicial Homology Geometric simplicial complexes 4.1 Definition. A finite subset { v 0, v 1,..., v r } R n
More informationpα i + q, where (n, m, p and q depend on i). 6. GROMOV S INVARIANT AND THE VOLUME OF A HYPERBOLIC MANIFOLD
6. GROMOV S INVARIANT AND THE VOLUME OF A HYPERBOLIC MANIFOLD of π 1 (M 2 )onπ 1 (M 4 ) by conjugation. π 1 (M 4 ) has a trivial center, so in other words the action of π 1 (M 4 ) on itself is effective.
More informationor else take their intersection. Now define
Samuel Lee Algebraic Topology Homework #5 May 10, 2016 Problem 1: ( 1.3: #3). Let p : X X be a covering space with p 1 (x) finite and nonempty for all x X. Show that X is compact Hausdorff if and only
More informationChapter 2 The Language PCF
Chapter 2 The Language PCF We will illustrate the various styles of semantics of programming languages with an example: the language PCF Programming language for computable functions, also called Mini-ML.
More informationRSA. Public Key CryptoSystem
RSA Public Key CryptoSystem DIFFIE AND HELLMAN (76) NEW DIRECTIONS IN CRYPTOGRAPHY Split the Bob s secret key K to two parts: K E, to be used for encrypting messages to Bob. K D, to be used for decrypting
More information6c Lecture 3 & 4: April 8 & 10, 2014
6c Lecture 3 & 4: April 8 & 10, 2014 3.1 Graphs and trees We begin by recalling some basic definitions from graph theory. Definition 3.1. A (undirected, simple) graph consists of a set of vertices V and
More informationBRAUER GROUPS: TALK 1
BRAUER GROUPS: TALK 1 JEREMY BOOHER In this first talk, we will discuss the topological Brauer group and the Brauer group of Spec k, which are classically studied in the guise of central simple algebras.
More informationGraph Theory Problem Ideas
Graph Theory Problem Ideas April 15, 017 Note: Please let me know if you have a problem that you would like me to add to the list! 1 Classification Given a degree sequence d 1,...,d n, let N d1,...,d n
More informationOn the Component Number of Links from Plane Graphs
On the Component Number of Links from Plane Graphs Daniel S. Silver Susan G. Williams January 20, 2015 Abstract A short, elementary proof is given of the result that the number of components of a link
More informationA Fine Partitioning of Cells
A Fine Partitioning of Cells Atlas of Lie Groups Workshop American Institute of Mathematics Palo Alto, July 16-20, 2007 1. The setting in Atlas Let me begin by talking a bit about the organization of the
More informationGroup Oriented Identity-Based Deniable Authentication Protocol from the Bilinear Pairings
International Journal of Network Security, Vol.5, No.3, PP.283 287, Nov. 2007 283 Group Oriented Identity-Based Deniable Authentication Protocol from the Bilinear Pairings Rongxing Lu and Zhenfu Cao (Corresponding
More informationThe Edge Slide Graph of the 3-cube
Rose-Hulman Undergraduate Mathematics Journal Volume 12 Issue 2 Article 6 The Edge Slide Graph of the 3-cube Lyndal Henden Massey University, Palmerston North, New Zealand, lyndal_henden@hotmail.com Follow
More informationLecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1
CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) January 11, 2018 Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 In this lecture
More informationThe Complexity of Change
The Complexity of Change JAN VAN DEN HEUVEL Utrecht, 3 April 2014 Department of Mathematics London School of Economics and Political Science A classical puzzle: the 15-Puzzle 13 2 3 12 1 2 3 4 9 11 1 10
More informationLet v be a vertex primed by v i (s). Then the number f(v) of neighbours of v which have
Let v be a vertex primed by v i (s). Then the number f(v) of neighbours of v which have been red in the sequence up to and including v i (s) is deg(v)? s(v), and by the induction hypothesis this sequence
More informationWhitney s theorem for 2-regular planar digraphs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 67(2) (2017), Pages 159 165 Whitney s theorem for 2-regular planar digraphs an Archdeacon epartment of Mathematics and Statistics University of Vermont Burlington,
More information