1,478 research outputs found

    Quasi-Linear Cellular Automata

    Full text link
    Simulating a cellular automaton (CA) for t time-steps into the future requires t^2 serial computation steps or t parallel ones. However, certain CAs based on an Abelian group, such as addition mod 2, are termed ``linear'' because they obey a principle of superposition. This allows them to be predicted efficiently, in serial time O(t) or O(log t) in parallel. In this paper, we generalize this by looking at CAs with a variety of algebraic structures, including quasigroups, non-Abelian groups, Steiner systems, and others. We show that in many cases, an efficient algorithm exists even though these CAs are not linear in the previous sense; we term them ``quasilinear.'' We find examples which can be predicted in serial time proportional to t, t log t, t log^2 t, and t^a for a < 2, and parallel time log t, log t log log t and log^2 t. We also discuss what algebraic properties are required or implied by the existence of scaling relations and principles of superposition, and exhibit several novel ``vector-valued'' CAs.Comment: 41 pages with figures, To appear in Physica

    Efficient unified Montgomery inversion with multibit shifting

    Get PDF
    Computation of multiplicative inverses in finite fields GF(p) and GF(2/sup n/) is the most time-consuming operation in elliptic curve cryptography, especially when affine co-ordinates are used. Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. In the paper, the authors demonstrate that affine co-ordinate implementation provides a comparable speed to that of projective co-ordinates with careful hardware realisation of existing algorithms for calculating inverses in both fields without utilising special moduli or irreducible polynomials. They present two inversion algorithms for binary extension and prime fields, which are slightly modified versions of the Montgomery inversion algorithm. The similarity of the two algorithms allows the design of a single unified hardware architecture that performs the computation of inversion in both fields. They also propose a hardware structure where the field elements are represented using a multi-word format. This feature allows a scalable architecture able to operate in a broad range of precision, which has certain advantages in cryptographic applications. In addition, they include statistical comparison of four inversion algorithms in order to help choose the best one amongst them for implementation onto hardware

    A Unifying Hierarchy of Valuations with Complements and Substitutes

    Full text link
    We introduce a new hierarchy over monotone set functions, that we refer to as MPH\mathcal{MPH} (Maximum over Positive Hypergraphs). Levels of the hierarchy correspond to the degree of complementarity in a given function. The highest level of the hierarchy, MPH\mathcal{MPH}-mm (where mm is the total number of items) captures all monotone functions. The lowest level, MPH\mathcal{MPH}-11, captures all monotone submodular functions, and more generally, the class of functions known as XOS\mathcal{XOS}. Every monotone function that has a positive hypergraph representation of rank kk (in the sense defined by Abraham, Babaioff, Dughmi and Roughgarden [EC 2012]) is in MPH\mathcal{MPH}-kk. Every monotone function that has supermodular degree kk (in the sense defined by Feige and Izsak [ITCS 2013]) is in MPH\mathcal{MPH}-(k+1)(k+1). In both cases, the converse direction does not hold, even in an approximate sense. We present additional results that demonstrate the expressiveness power of MPH\mathcal{MPH}-kk. One can obtain good approximation ratios for some natural optimization problems, provided that functions are required to lie in low levels of the MPH\mathcal{MPH} hierarchy. We present two such applications. One shows that the maximum welfare problem can be approximated within a ratio of k+1k+1 if all players hold valuation functions in MPH\mathcal{MPH}-kk. The other is an upper bound of 2k2k on the price of anarchy of simultaneous first price auctions. Being in MPH\mathcal{MPH}-kk can be shown to involve two requirements -- one is monotonicity and the other is a certain requirement that we refer to as PLE\mathcal{PLE} (Positive Lower Envelope). Removing the monotonicity requirement, one obtains the PLE\mathcal{PLE} hierarchy over all non-negative set functions (whether monotone or not), which can be fertile ground for further research
    corecore