632 research outputs found

    A non-commutative algorithm for multiplying (7 ×\times 7) matrices using 250 multiplications

    Full text link
    We present a non-commutative algorithm for multiplying (7x7) matrices using 250 multiplications and a non-commutative algorithm for multiplying (9x9) matrices using 520 multiplications. These algorithms are obtained using the same divide-and-conquer technique

    A non-commutative algorithm for multiplying 5x5 matrices using 99 multiplications

    Full text link
    We present a non-commutative algorithm for multiplying 5x5 matrices using 99 multiplications. This algorithm is a minor modification of Makarov's algorithm which exhibit the previous best known bound with 100 multiplications

    Relativistic Cholesky-decomposed density matrix MP2

    Get PDF
    In the present article, we introduce the relativistic Cholesky-decomposed density (CDD) matrix second-order M{\o}ller-Plesset perturbation theory (MP2) energies. The working equations are formulated in terms of the usual intermediates of MP2 when employing the resolution-of-the-identity approximation (RI) for two-electron integrals. Those intermediates are obtained by substituting the occupied and virtual quaternion pseudo-density matrices of our previously proposed two-component atomic orbital-based MP2 (J. Chem. Phys. 145, 014107 (2016)) by the corresponding pivoted quaternion Cholesky factors. While working within the Kramers-restricted formalism, we obtain a formal spin-orbit overhead of 16 and 28 for the Coulomb and exchange contribution to the 2C MP2 correlation energy, respectively, compared to a non-relativistic (NR) spin-free CDD-MP2 implementation. This compact quaternion formulation could also be easily explored in any other algorithm to compute the 2C MP2 energy. The quaternion Cholesky factors become sparse for large molecules and, with a block-wise screening, block sparse-matrix multiplication algorithm, we observed an effective quadratic scaling of the total wall time for heavy-element containing linear molecules with increasing system size. The total run time for both 1C and 2C calculations was dominated by the contraction to the exchange energy. We have also investigated a bulky Te-containing supramolecular complex. For such bulky, three-dimensionally extended molecules the present screening scheme has a much larger prefactor and is less effective

    Nearly Optimal Computations with Structured Matrices

    Get PDF
    We estimate the Boolean complexity of multiplication of structured matrices by a vector and the solution of nonsingular linear systems of equations with these matrices. We study four basic most popular classes, that is, Toeplitz, Hankel, Cauchy and Van-der-monde matrices, for which the cited computational problems are equivalent to the task of polynomial multiplication and division and polynomial and rational multipoint evaluation and interpolation. The Boolean cost estimates for the latter problems have been obtained by Kirrinnis in \cite{kirrinnis-joc-1998}, except for rational interpolation, which we supply now. All known Boolean cost estimates for these problems rely on using Kronecker product. This implies the dd-fold precision increase for the dd-th degree output, but we avoid such an increase by relying on distinct techniques based on employing FFT. Furthermore we simplify the analysis and make it more transparent by combining the representation of our tasks and algorithms in terms of both structured matrices and polynomials and rational functions. This also enables further extensions of our estimates to cover Trummer's important problem and computations with the popular classes of structured matrices that generalize the four cited basic matrix classes.Comment: (2014-04-10

    Public Key Exchange Using Matrices Over Group Rings

    Get PDF
    We offer a public key exchange protocol in the spirit of Diffie-Hellman, but we use (small) matrices over a group ring of a (small) symmetric group as the platform. This "nested structure" of the platform makes computation very efficient for legitimate parties. We discuss security of this scheme by addressing the Decision Diffie-Hellman (DDH) and Computational Diffie-Hellman (CDH) problems for our platform.Comment: 21 page

    Exploring platform (semi)groups for non-commutative key-exchange protocols

    Full text link
    In this work, my advisor Delaram Kahrobaei, our collaborator David Garber, and I explore polycyclic groups generated from number fields as platform for the AAG key-exchange protocol. This is done by implementing four different variations of the length-based attack, one of the major attacks for AAG, and submitting polycyclic groups to all four variations with a variety of tests. We note that this is the first time all four variations of the length-based attack are compared side by side. We conclude that high Hirsch length polycyclic groups generated from number fields are suitable for the AAG key-exchange protocol. Delaram Kahrobaei and I also carry out a similar strategy with the Heisenberg groups, testing them as platform for AAG with the length-based attack. We conclude that the Heisenberg groups, with the right parameters are resistant against the length-based attack. Another work in collaboration with Delaram Kahrobaei and Vladimir Shpilrain is to propose a new platform semigroup for the HKKS key-exchange protocol, that of matrices over a Galois field. We discuss the security of HKKS under this platform and advantages in computation cost. Our implementation of the HKKS key-exchange protocol with matrices over a Galois field yields fast run time
    corecore