632 research outputs found
A non-commutative algorithm for multiplying (7 7) matrices using 250 multiplications
We present a non-commutative algorithm for multiplying (7x7) matrices using
250 multiplications and a non-commutative algorithm for multiplying (9x9)
matrices using 520 multiplications. These algorithms are obtained using the
same divide-and-conquer technique
A non-commutative algorithm for multiplying 5x5 matrices using 99 multiplications
We present a non-commutative algorithm for multiplying 5x5 matrices using 99
multiplications. This algorithm is a minor modification of Makarov's algorithm
which exhibit the previous best known bound with 100 multiplications
Relativistic Cholesky-decomposed density matrix MP2
In the present article, we introduce the relativistic Cholesky-decomposed
density (CDD) matrix second-order M{\o}ller-Plesset perturbation theory (MP2)
energies. The working equations are formulated in terms of the usual
intermediates of MP2 when employing the resolution-of-the-identity
approximation (RI) for two-electron integrals. Those intermediates are obtained
by substituting the occupied and virtual quaternion pseudo-density matrices of
our previously proposed two-component atomic orbital-based MP2 (J. Chem. Phys.
145, 014107 (2016)) by the corresponding pivoted quaternion Cholesky factors.
While working within the Kramers-restricted formalism, we obtain a formal
spin-orbit overhead of 16 and 28 for the Coulomb and exchange contribution to
the 2C MP2 correlation energy, respectively, compared to a non-relativistic
(NR) spin-free CDD-MP2 implementation. This compact quaternion formulation
could also be easily explored in any other algorithm to compute the 2C MP2
energy. The quaternion Cholesky factors become sparse for large molecules and,
with a block-wise screening, block sparse-matrix multiplication algorithm, we
observed an effective quadratic scaling of the total wall time for
heavy-element containing linear molecules with increasing system size. The
total run time for both 1C and 2C calculations was dominated by the contraction
to the exchange energy. We have also investigated a bulky Te-containing
supramolecular complex. For such bulky, three-dimensionally extended molecules
the present screening scheme has a much larger prefactor and is less effective
Nearly Optimal Computations with Structured Matrices
We estimate the Boolean complexity of multiplication of structured matrices
by a vector and the solution of nonsingular linear systems of equations with
these matrices. We study four basic most popular classes, that is, Toeplitz,
Hankel, Cauchy and Van-der-monde matrices, for which the cited computational
problems are equivalent to the task of polynomial multiplication and division
and polynomial and rational multipoint evaluation and interpolation. The
Boolean cost estimates for the latter problems have been obtained by Kirrinnis
in \cite{kirrinnis-joc-1998}, except for rational interpolation, which we
supply now. All known Boolean cost estimates for these problems rely on using
Kronecker product. This implies the -fold precision increase for the -th
degree output, but we avoid such an increase by relying on distinct techniques
based on employing FFT. Furthermore we simplify the analysis and make it more
transparent by combining the representation of our tasks and algorithms in
terms of both structured matrices and polynomials and rational functions. This
also enables further extensions of our estimates to cover Trummer's important
problem and computations with the popular classes of structured matrices that
generalize the four cited basic matrix classes.Comment: (2014-04-10
Public Key Exchange Using Matrices Over Group Rings
We offer a public key exchange protocol in the spirit of Diffie-Hellman, but
we use (small) matrices over a group ring of a (small) symmetric group as the
platform. This "nested structure" of the platform makes computation very
efficient for legitimate parties. We discuss security of this scheme by
addressing the Decision Diffie-Hellman (DDH) and Computational Diffie-Hellman
(CDH) problems for our platform.Comment: 21 page
Exploring platform (semi)groups for non-commutative key-exchange protocols
In this work, my advisor Delaram Kahrobaei, our collaborator David Garber, and I explore polycyclic groups generated from number fields as platform for the AAG key-exchange protocol. This is done by implementing four different variations of the length-based attack, one of the major attacks for AAG, and submitting polycyclic groups to all four variations with a variety of tests. We note that this is the first time all four variations of the length-based attack are compared side by side. We conclude that high Hirsch length polycyclic groups generated from number fields are suitable for the AAG key-exchange protocol.
Delaram Kahrobaei and I also carry out a similar strategy with the Heisenberg groups, testing them as platform for AAG with the length-based attack. We conclude that the Heisenberg groups, with the right parameters are resistant against the length-based attack.
Another work in collaboration with Delaram Kahrobaei and Vladimir Shpilrain is to propose a new platform semigroup for the HKKS key-exchange protocol, that of matrices over a Galois field. We discuss the security of HKKS under this platform and advantages in computation cost. Our implementation of the HKKS key-exchange protocol with matrices over a Galois field yields fast run time
- …