Folding and Unfolding Bloom Filters - an Off-Line Planing and on Line-Optimisation Francoise Sailhan, Mark-Oliver Stehr

Total Page:16

File Type:pdf, Size:1020Kb

Folding and Unfolding Bloom Filters - an Off-Line Planing and on Line-Optimisation Francoise Sailhan, Mark-Oliver Stehr Folding and Unfolding Bloom Filters - an Off-line Planing and on Line-Optimisation Francoise Sailhan, Mark-Oliver Stehr To cite this version: Francoise Sailhan, Mark-Oliver Stehr. Folding and Unfolding Bloom Filters - an Off-line Planing and on Line-Optimisation. IEEE International Conference on Internet of Things, Nov 2012, Besancon, France. pp.34-41, 10.1109/GreenCom.2012.16. hal-01126174 HAL Id: hal-01126174 https://hal.archives-ouvertes.fr/hal-01126174 Submitted on 27 Nov 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Folding and Unfolding Bloom Filters - An Off-Line Planning and On-Line Optimization Problem Francoise Sailhan∗y, and Mark-Oliver Stehr∗ ∗ Computer Science Laboratory, SRI international Menlo Park, CA 94025 USA yCedric Laboratory, CNAM, 75003 Paris, France Emails: [email protected], [email protected] Abstract—The Internet of things has reached a stage that do not occur. Nevertheless, the approximate nature of Bloom allows ubiquitous data access. Still, practical limitations remain filter implies that false positives might appear. The probability in networks with scarce bandwidth. Here, we examine the of a false positives depends on (i) the Bloom filter size, (ii) Bloom filter data structure and its use in distributed protocols. We discuss how to minimize the bandwidth and energy usage the number of hash functions and (iii) the number of elements consumed when distributed protocols exchange Bloom filters, stored. Keeping the false positive rate to a minimum requires through dynamic Bloom filter resizing. We propose a general dynamic adaptation of the number of hash functions and/or of and novel formalization of Bloom filter resizing, through foldings the Bloom filter size. Further attempts to increase the size of and unfoldings. The key challenge in the folding approach is the Bloom filter have appeared in the literature. The basic idea determining suitable parameters and how to perform a folding. Specifically, we address the number of times that a Bloom filter is to create a set of Bloom filters [6], [16], [1]. As a side effect, should be folded and optionally unfolded, and how to determine a membership query is a function on the size of this set. While an ideal reduction factor for this process. We formulate our these methods deal with the increase of the Bloom filter size, approach as off-line planning of the integer factorization problem the related decrease is neglected. An alternative [7] consists in (where the integers correspond to the size of a Bloom filter), and partitioning the Bloom filter into k disjoint sub-ranges wherein propose further directions for optimizing the dynamic folding and unfolding of a Bloom filter. an element is added by hashing the sub-range with the related hash function hk. Depending on the expected probability of a I. INTRODUCTION false positives, k is either dynamically increased or decreased, The last decade is characterised by the convergence of per- hence leading to a reduced or increased Bloom filter size. vasive technologies including wireless communication, smart Nevertheless, changing the number of hash functions offers devices and the Internet. The resulting Internet of things lower granularity than resizing the Bloom filter. enables not only users but also things to access resources We herein consider the problem of dynamically resizing anywhere, anytime. In practice, data flows ubiquitously us- the Bloom filter by folding and unfolding it. This can be ing global wireless connectivity (e.g., 3G) or ad-hoc local expressed as follows: given a number of items stored in the area networking, as enabled by, for example, IEEE 802.15.4 Bloom filter, let reduce/increase the size of the Bloom filter by protocols. Two key limitations of these networks remain the folding/unfolding it so that the false positive rate ρ stays in the limits on bandwidth and energy. In this context, early-stage following interval [ρ − , ρ + ] and the increase of memory data and resource discovery should be provided so as to allow size is kept to a minimum. We acknowledge that halving a efficient data dissemination [14]. A Bloom filter [2] can play a Bloom filter was originally suggested in [3] and successfully crucial role by allowing to represent a set of data in a compact applied [5] so as to reduce the bandwidth consumption induced manner and by supporting efficient membership queries. More by the exchange of Bloom filters in the context of correlated precisely, a Bloom filter is a vector of bits. It is distinguished anomaly detection in large-scale grid computing [15]. We by the fact that the time associated with a membership query herein extend and generalize this approach by introducing the is independent of the number of elements stored in the Bloom concept of folded and unfolded Bloom filters, which permits filter as well the size of the Bloom filter. In a nutshell, the highly flexible resizing. Bloom filter works as follows: an element to be added to the We also introduce a novel formulation of the problem, Bloom filter is first hashed. Typically, k > 1 hash functions which allows to keep the false positive rate in check by are used. Then, the k outputs are used to flip to 1 the bits at the injecting entropy into the folding process. The key challenge related positions in the Bloom filter. In order to check whether consists in determining how a folding should be performed, an element is stored in the Bloom filter, the queried element namely the number of times the Bloom filter should be is hashed (relying on the same hashing functions). If the k folded/unfolded and the reduction factor associated with each bits at the related position are set to 1 in the Bloom filter, this folding/unfolding. We show that this can be formulated as (i) element is stored. It is worth mentioning that false negatives an off-line planning problem of the factorization of an integer (namely the Bloom filter size) and (ii) an on-line optimization This work was carried out when F. Sailhan was a visiting fellow at SRI. problem of the Bloom filter folding/unfolding. Our main contribution is twofold: we propose an algorithm for planning that depends on the space allocated to count. These counters the folding and unfolding of the Bloom filter depending on must be selected to be large enough to avoid overflows. the expected false positive rate and the related resource waste. A. Properties of Bloom Filters We formulate this problem and provide both a theoretical and experimental analysis of such planning. In addition, based on A [counting] Bloom filter is characterized by the following these planned foldings/unfoldings, we propose an approach to properties: dynamically optimizing the folding and unfolding of a Bloom 1) The time associated with a membership query is filter. independent of the number of elements stored in The remaining sections are organized as follows. We first the [counting] Bloom filter as well as its size. More introduce Bloom filters and survey the related literature (xII). precisely, the time required to insert or find an element Then, we present the Bloom filter folding/unfolding (xIII) depends on the number of hash functions and is hence and the planning of the folding/unfolding (xIV). Finally, we o(k). conclude this report with further optimization and research directions (xV). 2) Both basic and counting Bloom filters engender false positives. Given n the number of elements that are stored II. BACKGROUND ON BLOOM FILTERS in the [counting] Bloom filter (see Table I) and assuming Bloom filters [2] are commonly used to represent a set that the hash functions are perfect, the probability of a so as to support efficient membership queries, that is, to false positive, denoted ρ, satisfies: efficiently test whether an element is a member of a set. For 1 kn k kn this purpose, a Bloom filter B is represented as a vector of ρ = (1 − (1 − ) ) ≈ (1 − e m ) (1) bits, denoted b(1); ··· ; b(m). This vector is initially set to m 0, i.e., 8i 2 [0; m], b(i) = 0. The vector is then updated by Unlike a basic Bloom filter, a counting Bloom adding additional elements. filter may produce a false negative, which occurs if the counting vector is undersized and generates an overflow. a) Bloom filter update: In order to add an element e to the Bloom filter, k hash functions h1; ··· ; hk are used. Each 3) The union of two sets S1 and S2 can be obtained as hash function is applied to the element: h1(e); ··· ; hk(e). follows: Then, the k bits at positions h1(e) mod(m); ··· ; hk(e) • applying a bit-wise OR on the two corresponding mod(m) are set to 1. basic Bloom filters, and • adding the vectors of the two counting Bloom filters. Note that the resulting value cannot exceed m: Bloom filter size b(1); ··· ; b(m): Bloom filter a maximum value defined by the counters’ sizes. k: number of hash functions h1(); ··· ; hk(): set of hash functions n: set of items stored in the Bloom filter 4) The intersection of two sets S1 and S2 cannot be obtained in a deterministic manner on the [counting] TABLE I NOTATION Bloom filter.
Recommended publications
  • Define Composite Numbers and Give Examples
    Define Composite Numbers And Give Examples Hydrotropic and amphictyonic Noam upheaves so injunctively that Hudson charcoal his nymphomania. immanently,Chase eroding she her shells chorine it transiently. bluntly, tameless and scenographic. Ethan bargees her stalagmometers Transponder much money frank had put up by our counselor will tell the numbers and composite number is called the whole or a number of improved methods capable of To give examples. Similarly, when subtraction is performed, the similar pattern is observed. Explicit Teach section and bill discuss the difference between composite and prime numbers. What bout the difference between a prime number does a composite number. That captures the hour well school is said a job enough definition because it. Cite Nimisha Kaushik Difference Between road and Composite Numbers. Write down the multiplication facts as you do this. When we talk getting the divisors of another prime number we had always talking a natural numbers whole numbers greater than 0 Examples of Prime Numbers 2. But opting out of some of these cookies may have an effect on your browsing experience. All of that the positive integer a paragraph in this is already registered with multiple. Are there for prime numbers? The side number is incorrect. Find our prime factorization of whole numbers. Example 11 is a prime number field the only numbers it quiz be divided by evenly is 1 and 11 What is Composite Number Composite numbers has. Lorem ipsum dolor in a composite and gives you know if you. See more ideas about surface and composite numbers prime and composite 4th grade.
    [Show full text]
  • An Analysis of Primality Testing and Its Use in Cryptographic Applications
    An Analysis of Primality Testing and Its Use in Cryptographic Applications Jake Massimo Thesis submitted to the University of London for the degree of Doctor of Philosophy Information Security Group Department of Information Security Royal Holloway, University of London 2020 Declaration These doctoral studies were conducted under the supervision of Prof. Kenneth G. Paterson. The work presented in this thesis is the result of original research carried out by myself, in collaboration with others, whilst enrolled in the Department of Mathe- matics as a candidate for the degree of Doctor of Philosophy. This work has not been submitted for any other degree or award in any other university or educational establishment. Jake Massimo April, 2020 2 Abstract Due to their fundamental utility within cryptography, prime numbers must be easy to both recognise and generate. For this, we depend upon primality testing. Both used as a tool to validate prime parameters, or as part of the algorithm used to generate random prime numbers, primality tests are found near universally within a cryptographer's tool-kit. In this thesis, we study in depth primality tests and their use in cryptographic applications. We first provide a systematic analysis of the implementation landscape of primality testing within cryptographic libraries and mathematical software. We then demon- strate how these tests perform under adversarial conditions, where the numbers being tested are not generated randomly, but instead by a possibly malicious party. We show that many of the libraries studied provide primality tests that are not pre- pared for testing on adversarial input, and therefore can declare composite numbers as being prime with a high probability.
    [Show full text]
  • Fast Generation of RSA Keys Using Smooth Integers
    1 Fast Generation of RSA Keys using Smooth Integers Vassil Dimitrov, Luigi Vigneri and Vidal Attias Abstract—Primality generation is the cornerstone of several essential cryptographic systems. The problem has been a subject of deep investigations, but there is still a substantial room for improvements. Typically, the algorithms used have two parts – trial divisions aimed at eliminating numbers with small prime factors and primality tests based on an easy-to-compute statement that is valid for primes and invalid for composites. In this paper, we will showcase a technique that will eliminate the first phase of the primality testing algorithms. The computational simulations show a reduction of the primality generation time by about 30% in the case of 1024-bit RSA key pairs. This can be particularly beneficial in the case of decentralized environments for shared RSA keys as the initial trial division part of the key generation algorithms can be avoided at no cost. This also significantly reduces the communication complexity. Another essential contribution of the paper is the introduction of a new one-way function that is computationally simpler than the existing ones used in public-key cryptography. This function can be used to create new random number generators, and it also could be potentially used for designing entirely new public-key encryption systems. Index Terms—Multiple-base Representations, Public-Key Cryptography, Primality Testing, Computational Number Theory, RSA ✦ 1 INTRODUCTION 1.1 Fast generation of prime numbers DDITIVE number theory is a fascinating area of The generation of prime numbers is a cornerstone of A mathematics. In it one can find problems with cryptographic systems such as the RSA cryptosystem.
    [Show full text]
  • Sieving for Twin Smooth Integers with Solutions to the Prouhet-Tarry-Escott Problem
    Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem Craig Costello1, Michael Meyer2;3, and Michael Naehrig1 1 Microsoft Research, Redmond, WA, USA fcraigco,[email protected] 2 University of Applied Sciences Wiesbaden, Germany 3 University of W¨urzburg,Germany [email protected] Abstract. We give a sieving algorithm for finding pairs of consecutive smooth numbers that utilizes solutions to the Prouhet-Tarry-Escott (PTE) problem. Any such solution induces two degree-n polynomials, a(x) and b(x), that differ by a constant integer C and completely split into linear factors in Z[x]. It follows that for any ` 2 Z such that a(`) ≡ b(`) ≡ 0 mod C, the two integers a(`)=C and b(`)=C differ by 1 and necessarily contain n factors of roughly the same size. For a fixed smoothness bound B, restricting the search to pairs of integers that are parameterized in this way increases the probability that they are B-smooth. Our algorithm combines a simple sieve with parametrizations given by a collection of solutions to the PTE problem. The motivation for finding large twin smooth integers lies in their application to compact isogeny-based post-quantum protocols. The recent key exchange scheme B-SIDH and the recent digital signature scheme SQISign both require large primes that lie between two smooth integers; finding such a prime can be seen as a special case of finding twin smooth integers under the additional stipulation that their sum is a prime p. When searching for cryptographic parameters with 2240 ≤ p < 2256, an implementation of our sieve found primes p where p + 1 and p − 1 are 215-smooth; the smoothest prior parameters had a similar sized prime for which p−1 and p+1 were 219-smooth.
    [Show full text]
  • Number Theory.Pdf
    Number Theory Number theory is the study of the properties of numbers, especially the positive integers. In this exercise, you will write a program that asks the user for a positive integer. Then, the program will investigate some properties of this number. As a guide for your implementation, a skeleton Java version of this program is available online as NumberTheory.java. Your program should determine the following about the input number n: 1. See if it is prime. 2. Determine its prime factorization. 3. Print out all of the factors of n. Also count them. Find the sum of the proper factors of n. Note that a “proper” factor is one that is less than n itself. Once you know the sum of the proper factors, you can classify n as being abundant, deficient or perfect. 4. Determine the smallest positive integer factor that would be necessary to multiply n by in order to create a perfect square. 5. Verify the Goldbach conjecture: Any even positive integer can be written as the sum of two primes. It is sufficient to find just one such pair. Here is some sample output if the input value is 360. Please enter a positive integer n: 360 360 is NOT prime. Here is the prime factorization of 360: 2 ^ 3 3 ^ 2 5 ^ 1 Here is a list of all the factors: 1 2 3 4 5 6 8 9 10 12 15 18 20 24 30 36 40 45 60 72 90 120 180 360 360 has 24 factors. The sum of the proper factors of 360 is 810.
    [Show full text]
  • Ramanujan, Robin, Highly Composite Numbers, and the Riemann Hypothesis
    Contemporary Mathematics Volume 627, 2014 http://dx.doi.org/10.1090/conm/627/12539 Ramanujan, Robin, highly composite numbers, and the Riemann Hypothesis Jean-Louis Nicolas and Jonathan Sondow Abstract. We provide an historical account of equivalent conditions for the Riemann Hypothesis arising from the work of Ramanujan and, later, Guy Robin on generalized highly composite numbers. The first part of the paper is on the mathematical background of our subject. The second part is on its history, which includes several surprises. 1. Mathematical Background Definition. The sum-of-divisors function σ is defined by 1 σ(n):= d = n . d d|n d|n In 1913, Gr¨onwall found the maximal order of σ. Gr¨onwall’s Theorem [8]. The function σ(n) G(n):= (n>1) n log log n satisfies lim sup G(n)=eγ =1.78107 ... , n→∞ where 1 1 γ := lim 1+ + ···+ − log n =0.57721 ... n→∞ 2 n is the Euler-Mascheroni constant. Gr¨onwall’s proof uses: Mertens’s Theorem [10]. If p denotes a prime, then − 1 1 1 lim 1 − = eγ . x→∞ log x p p≤x 2010 Mathematics Subject Classification. Primary 01A60, 11M26, 11A25. Key words and phrases. Riemann Hypothesis, Ramanujan’s Theorem, Robin’s Theorem, sum-of-divisors function, highly composite number, superabundant, colossally abundant, Euler phi function. ©2014 American Mathematical Society 145 This is a free offprint provided to the author by the publisher. Copyright restrictions may apply. 146 JEAN-LOUIS NICOLAS AND JONATHAN SONDOW Figure 1. Thomas Hakon GRONWALL¨ (1877–1932) Figure 2. Franz MERTENS (1840–1927) Nowwecometo: Ramanujan’s Theorem [2, 15, 16].
    [Show full text]
  • Sieving by Large Integers and Covering Systems of Congruences
    JOURNAL OF THE AMERICAN MATHEMATICAL SOCIETY Volume 20, Number 2, April 2007, Pages 495–517 S 0894-0347(06)00549-2 Article electronically published on September 19, 2006 SIEVING BY LARGE INTEGERS AND COVERING SYSTEMS OF CONGRUENCES MICHAEL FILASETA, KEVIN FORD, SERGEI KONYAGIN, CARL POMERANCE, AND GANG YU 1. Introduction Notice that every integer n satisfies at least one of the congruences n ≡ 0(mod2),n≡ 0(mod3),n≡ 1(mod4),n≡ 1(mod6),n≡ 11 (mod 12). A finite set of congruences, where each integer satisfies at least one them, is called a covering system. A famous problem of Erd˝os from 1950 [4] is to determine whether for every N there is a covering system with distinct moduli greater than N.In other words, can the minimum modulus in a covering system with distinct moduli be arbitrarily large? In regards to this problem, Erd˝os writes in [6], “This is perhaps my favourite problem.” It is easy to see that in a covering system, the reciprocal sum of the moduli is at least 1. Examples with distinct moduli are known with least modulus 2, 3, and 4, where this reciprocal sum can be arbitrarily close to 1; see [10], §F13. Erd˝os and Selfridge [5] conjectured that this fails for all large enough choices of the least modulus. In fact, they made the following much stronger conjecture. Conjecture 1. For any number B,thereisanumberNB,suchthatinacovering system with distinct moduli greater than NB, the sum of reciprocals of these moduli is greater than B. A version of Conjecture 1 also appears in [7].
    [Show full text]
  • Generation of Pseudoprimes Section 1:Introduction
    Generation of Pseudoprimes Danielle Stewart Swenson College of Science and Engineering University of Minnesota [email protected] Section 1:Introduction: Number theory is a branch of mathematics that looks at the many properties of integers. The properties that are looked at in this paper are specifically related to pseudoprime numbers. Positive integers can be partitioned into three distinct sets. The unity, composites, and primes. It is much easier to prove that an integer is composite compared to proving primality. Fermat’s Little Theorem p If p is prime and a is any integer, then a − a is divisible by p. This theorem is commonly used to determine if an integer is composite. If a number does not pass this test, it is shown that the number must be composite. On the other hand, if a number passes this test, it does not prove this integer is prime (Anderson & Bell, 1997) . An example 5 would be to let p = 5 and let a = 2. Then 2 − 2 = 32 − 2 = 30 which is divisible by 5. Since p = 5 5 is prime, we can choose any a as a positive integer and a − a is divisible by 5. Now let p = 4 and 4 a = 2 . Then 2 − 2 = 14 which is not divisible by 4. Using this theorem, we can quickly see if a number fails, then it must be composite, but if it does not fail the test we cannot say that it is prime. This is where pseudoprimes come into play. If we know that a number n is composite but n n divides a − a for some positive integer a, we call n a pseudoprime.
    [Show full text]
  • Factoring Integers with a Brain-Inspired Computer John V
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS 1 Factoring Integers with a Brain-Inspired Computer John V. Monaco and Manuel M. Vindiola Abstract—The bound to factor large integers is dominated • Constant-time synaptic integration: a single neuron in the by the computational effort to discover numbers that are B- brain may receive electrical potential inputs along synap- smooth, i.e., integers whose largest prime factor does not exceed tic connections from thousands of other neurons. The B. Smooth numbers are traditionally discovered by sieving a polynomial sequence, whereby the logarithmic sum of prime incoming potentials are continuously and instantaneously factors of each polynomial value is compared to a threshold. integrated to compute the neuron’s membrane potential. On a von Neumann architecture, this requires a large block of Like the brain, neuromorphic architectures aim to per- memory for the sieving interval and frequent memory updates, form synaptic integration in constant time, typically by resulting in O(ln ln B) amortized time complexity to check each leveraging physical properties of the underlying device. value for smoothness. This work presents a neuromorphic sieve that achieves a constant-time check for smoothness by reversing Unlike the traditional CPU-based sieve, the factor base is rep- the roles of space and time from the von Neumann architecture resented in space (as spiking neurons) and the sieving interval and exploiting two characteristic properties of brain-inspired in time (as successive time steps). Sieving is performed by computation: massive parallelism and constant time synaptic integration. The effects on sieving performance of two common a population of leaky integrate-and-fire (LIF) neurons whose neuromorphic architectural constraints are examined: limited dynamics are simple enough to be implemented on a range synaptic weight resolution, which forces the factor base to be of current and future architectures.
    [Show full text]
  • The Asymptotic Properties of Φ(N) and a Problem Related to Visibility
    The asymptotic properties of φ(n) and a problem related to visibility of Lattice points Debmalya Basak1 Indian Institute of Science Education and Research,Kolkata Abstract We look at the average sum of the Euler’s phi function φ(n) and it’s relation with the visibility of a point from the origin.We show that ∀ k ≥ 1, k ∈ N, ∃ a k×k grid in the 2D space such that no point inside it is visible from the origin.We define visibility of a lattice point from a set and try to find a bound for the cardinality of the smallest set S such that for a given n ∈ N,all points from the n×n grid are visible from S. arXiv:1710.10517v2 [math.NT] 31 Oct 2017 1Email id : [email protected] CONTENTS Debmalya Basak Contents 1 On the Visibility of Lattice Points in 2-D Space 1 1.1 Average order of the Euler Totient function . ............ 1 1.2 Density of Lattice points visible from the origin . ............... 2 2 Hidden Trees in the Forest 3 3 More interesting problems about the visibility of lattice points 4 3.1 Abbott’sTheorem ................................. .... 4 3.2 On finding an explicit set Bn ............................... 5 3.3 CorollaryofTheorem5 ............................. ..... 7 4 Questions that we can look into 8 5 Bibliography 8 ii VISIBILITY OF LATTICE POINTS IN 2 D SPACE Debmalya Basak 1 On the Visibility of Lattice Points in 2-D Space First let’s define the Euler totient function,something which will be very useful in this section.If n ≥ 1,we define φ(n) as the number of positive integers less than n and coprime to n.Now,we will introduce the concept of visibility of lattice points.We say that 2 integer lattice points (a, b) and (c, d) are visible if the line joining those 2 points doesn’t contain any other lattice point in between.Now,we prove a very important result here.
    [Show full text]
  • On Distribution of Semiprime Numbers
    ISSN 1066-369X, Russian Mathematics (Iz. VUZ), 2014, Vol. 58, No. 8, pp. 43–48. c Allerton Press, Inc., 2014. Original Russian Text c Sh.T. Ishmukhametov, F.F. Sharifullina, 2014, published in Izvestiya Vysshikh Uchebnykh Zavedenii. Matematika, 2014, No. 8, pp. 53–59. On Distribution of Semiprime Numbers Sh. T. Ishmukhametov* and F. F. Sharifullina** Kazan (Volga Region) Federal University, ul. Kremlyovskaya 18, Kazan, 420008 Russia Received January 31, 2013 Abstract—A semiprime is a natural number which is the product of two (possibly equal) prime numbers. Let y be a natural number and g(y) be the probability for a number y to be semiprime. In this paper we derive an asymptotic formula to count g(y) for large y and evaluate its correctness for different y. We also introduce strongly semiprimes, i.e., numbers each of which is a product of two primes of large dimension, and investigate distribution of strongly semiprimes. DOI: 10.3103/S1066369X14080052 Keywords: semiprime integer, strongly semiprime, distribution of semiprimes, factorization of integers, the RSA ciphering method. By smoothness of a natural number n we mean possibility of its representation as a product of a large number of prime factors. A B-smooth number is a number all prime divisors of which are bounded from above by B. The concept of smoothness plays an important role in number theory and cryptography. Possibility of using the concept in cryptography is based on the fact that the procedure of decom- position of an integer into prime divisors (factorization) is a laborious computational process requiring significant calculating resources [1, 2].
    [Show full text]
  • Various Arithmetic Functions and Their Applications
    University of New Mexico UNM Digital Repository Mathematics and Statistics Faculty and Staff Publications Academic Department Resources 2016 Various Arithmetic Functions and their Applications Florentin Smarandache University of New Mexico, [email protected] Octavian Cira Follow this and additional works at: https://digitalrepository.unm.edu/math_fsp Part of the Algebra Commons, Applied Mathematics Commons, Logic and Foundations Commons, Number Theory Commons, and the Set Theory Commons Recommended Citation Smarandache, Florentin and Octavian Cira. "Various Arithmetic Functions and their Applications." (2016). https://digitalrepository.unm.edu/math_fsp/256 This Book is brought to you for free and open access by the Academic Department Resources at UNM Digital Repository. It has been accepted for inclusion in Mathematics and Statistics Faculty and Staff Publications by an authorized administrator of UNM Digital Repository. For more information, please contact [email protected], [email protected], [email protected]. Octavian Cira Florentin Smarandache Octavian Cira and Florentin Smarandache Various Arithmetic Functions and their Applications Peer reviewers: Nassim Abbas, Youcef Chibani, Bilal Hadjadji and Zayen Azzouz Omar Communicating and Intelligent System Engineering Laboratory, Faculty of Electronics and Computer Science University of Science and Technology Houari Boumediene 32, El Alia, Bab Ezzouar, 16111, Algiers, Algeria Octavian Cira Florentin Smarandache Various Arithmetic Functions and their Applications PONS asbl Bruxelles, 2016 © 2016 Octavian Cira, Florentin Smarandache & Pons. All rights reserved. This book is protected by copyright. No part of this book may be reproduced in any form or by any means, including photocopying or using any information storage and retrieval system without written permission from the copyright owners Pons asbl Quai du Batelage no.
    [Show full text]