Appendix a Packages for Number Theory

Total Page:16

File Type:pdf, Size:1020Kb

Appendix a Packages for Number Theory Appendix A Packages for Number Theory There exist several computer packages which can profitably be used for number-theoretic computations. In this appendix, I will briefly describe the advantages and disadvantages of some of these systems. The oldest general-purpose symbolic algebra packages were written pri­ marily for physicists, and are not well suited for number theory. Furthermore (even for what they were designed for) they are very slow. On the other hand, they have been extensively tested, are have probably less bugs than more re­ cent systems. The two main systems in this category are Macsyma and Reduce. Reduce was extended by G. Collins to handle more efficiently computations linked to polynomials, and this gave rise to Sac-II, with a user interface called AIdes. These were the packages used in the 1970's. A second generation of packages was developed in the 1980's. They are much faster, better adapted to number theory, but having had less use, have more bugs. The two main commercial systems are Mathematica, by Wolfram Research, Inc., and Maple, by the University of Waterloo, Canada. Mathematica has a very nice user interface, and its plotting capabilities, for example on the Macintosh, are su­ perb. Maple is faster and often simpler to use, and has my preference. A third system is widely available, although not commercially released, the Scratch­ pad II system developed by IBM. This is a monster (in the same sense that ADA is a monster as a programming language). A subset of this system has recently been commercially released under the name Axiom. It certainly has the most potential for developing powerful applications, but I do not believe that there is the need for such power (which is usually obtained at the expense of speed) for everyday (number-theoretic) problems. Some other packages were specially designed for small machines like Per­ sonal Computers (PC's). One of these is Derive, which is issued from JL-Math, and requires only half a megabyte of main memory. Derive even runs on some pocket computers! Another system, the Calculus Calculator (CC), is a symbolic manipulator with three-dimensional graphics and matrix operations which also runs on PC's. A third system, Numbers, is a shareware calcula­ tor for number theory that runs on PC's. It is designed to compute number theoretic functions for positive integers up to 150 decimal digits (modular arithmetic, primality testing, continued and Farey fractions, Fibonacci and Lucas numbers, encryption and decryption). In addition to commercial packages, free software systems (which are not complete symbolic packages) also exist. One is Ubasic, written by Y. Kida, A Packages for Number Theory 499 which is a math-oriented high-precision Basic for PC's (see the review in the Notices of the AMS of March 1991). Its extensions to Basic allow it to handle integers and reals of several thousand digits, as well as fractions, complex numbers and polynomials in one variable. Many number-theoretic functions are included in Ubasic, including the factoring algorithm MPQS. Since the package is written in assembly language, Ubasic is very fast. Another package, closer to a symbolic package, is Pari, written by the au­ thor and collaborators (see the review in the Notices of the AMS of October 1991). This package can be used on Unix workstations, Macintosh, Amiga, PC's, etc. Its kernel is also written in assembler, so it is also very fast. Fur­ thermore, it has been specially tailored for number-theoretic computations. In addition, it provides tools which are rarely or never found in other symbolic packages such as the direct handling of concrete mathematical objects, for example p-adic numbers, algebraic numbers and finite fields, etc ... It also gives mathematically more correct results than many packages on fundamen­ tal operations (e.g. subtraction of two real numbers which are approximately equal). Source is included in the package so it is easy to correct, improve and expand. Essentially all of the algorithms described in the present book have been implemented in Pari, so I advise the reader to obtain a copy of it. Apart from those general computer algebra systems, some special-purpose systems exist: Cayley/Magma, GAP, Kant. The Cayley system is designed to support fast computations in algebra (groups, modules, rings, polynomial rings over various kinds of coefficient domains), number theory and finite geometry. It includes general machinery for classical number theory (for example the ECM program of A.K. Lenstra), finite fields and cyclotomic fields. The next release will include a MPQS factoring algorithm, a Jacobi sum-type primality test, facilities for computing in a general algebraic number field, and a general purpose elliptic curve calculator. According to the developers, Cayley V 4 will include "just about all of the algorithms of this book". It will be released under the name Magma. GAP (Groups, Algorithms and Programming) is specially designed for computations in group theory. It includes some facilities for doing elementary number theory, in particular to calculate with arbitrary length integers and rational numbers, cyclotomic fields and their subfields, and finite fields. It has functions for integer factorization (based on elliptic curves), for primality testing, and for some elementary functions from number theory and combinatorics. Its programming language is Maple-like. Kant (Komputational Algebraic Number Theory) is a subroutine package for algorithms from the geometry of numbers and algebraic number theory, which will be included in Magma. In addition to specific packages, handling of multi-precision numbers or more general types can be easily achieved with several languages, Lisp, C and C++. For Lisp, the INRIA implementation LeLisp (which is not public domain) contains a package written in assembler to handle large numbers, and hence is very fast. The GNU Calc system is an advanced desk calculator 500 A Packages for Number Theory for GNU Emacs, written in Emacs Lisp. An excellent public domain C++ compiler can be obtained from the Free Software Foundation, and its library allows to use multi-precision numbers or other types. The library is however written in C++ hence is slow, so it is strongly advised to write a library in assembler for number-theoretic uses. Another multi-precision system written in C is the desk calculator (Calc) of Hans-J. Boehm for Unix workstations. Its particularity is to handle "constructive" real numbers, that is to remember the best known approximation to a number already computed. For PC's, Timothy C. Frenz has developed an "infinite" precision calculator, also named Calc. Finally, a few free packages exist which have been specifically written for handling multi-precision integers as part of a C library in an efficient way. In addition to Pari mentioned above, there is the Bignum package of DEC PRL (which is essentially the package used in LeLisp as mentioned above) which can be obtained by sending an e-mail messagetolibrarian(gdecprl.dec.com. and the GNU multi-precision package Gmp which can be obtained byanony­ mous ftp from prep. ai . mi t . edu, the standard place where one can ftp all the GNU software. Conclusions. My personal advice (which is certainly not objective) is the following. If you are on an IBM-PC 286, you do not have much choice. Obtain Ubasic, Derive or the Calculus Calculator. On an IBM-PC 386 or more, Maple, Sym­ bolics Macsyma, Mathcad (see Maple below) and Pari are also available. If you are on a MacH or on a Unix workstation then, if you really need all the power of a symbolic package, buy either Maple or Mathematica, my preference going to Maple. If you want a system that is already specialized for number theoretic computations, then buy Cayley. In any case, as a complement to this package, obtain Pari. Where to obtain these packages. You can order Maple at the following address: Waterloo Maple Software, 160 Columbia St. W., Waterloo, Ontario, Canada N2L 3L3, phone (519) 747- 2373, fax (519) 747-5284, e-mail wmsi(gdaisy.waterloo.edu. Maple has been ported to many different machines and it is highly probable that it has been ported to the machine that you want. There is also a system named Mathcad that uses some parts of Maple for its symbolic manipulations; Mathcad runs under Microsoft Windows and is published by MathSoft Inc., 201 Broadway, Cambridge, Massachussets, USA, 02139 Phone: (617) 577-1017. You can order Mathematica from Wolfram Research, Inc. at the following address: Wolfram Research, 100 Trade Center Drive, Champaign, IL 61820, phone 800-441-Math, fax 217-398-0747, e-mail info(gwri. com. Mathematica has also been ported to quite a number of machines, and in addition you can use a friendly "front-end" like the Macintosh H linked to a more powerful computer (including supercomputers) which will do the actual computations. A Packages for Number Theory 501 Macsyma exists in two flavors: the commercial versions (Symbolics Mac­ syma, ALJABR, ParaMacs) are licensed from MIT, the non-commercial ver­ sions (Vaxima, Maxima, and DOE-Macsyma) officially come from the Amer­ ican Department of Energy (DOE). All these versions are derived from the Macsyma developed by the Mathlab Group at MIT. The Symbolics version runs on PC 386, Symbolics computers, VMS machines and most Unix work­ stations; the address to order it is: Symbolics MACSYMA Division, Symbol­ ics, Inc., 8 New England Executive Park East, Burlington, MA 01803, phone (617) 221-1250 or 1-800-MACSYMA (free from the U.S.), fax (617) 221-1099, e-mail macsyma-service~symbolics.com. Vaxima is available from the En­ ergy Science and Technology Software Center (ESTSC), P.O. Box 1020, Oak Ridge, Tennessee 37831, phone (615) 576-2606.
Recommended publications
  • User's Guide to Pari-GP
    User's Guide to PARI / GP C. Batut, K. Belabas, D. Bernardi, H. Cohen, M. Olivier Laboratoire A2X, U.M.R. 9936 du C.N.R.S. Universit´eBordeaux I, 351 Cours de la Lib´eration 33405 TALENCE Cedex, FRANCE e-mail: pari@math.u-bordeaux.fr Home Page: http://www.parigp-home.de/ Primary ftp site: ftp://megrez.math.u-bordeaux.fr/pub/pari/ last updated 5 November 2000 for version 2.1.0 Copyright c 2000 The PARI Group Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions, or translations, of this manual under the conditions for verbatim copying, provided also that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. PARI/GP is Copyright c 2000 The PARI Group PARI/GP is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation. It is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY WHATSOEVER. Table of Contents Chapter 1: Overview of the PARI system . 5 1.1 Introduction . 5 1.2 The PARI types . 6 1.3 Operations and functions . 9 Chapter 2: Specific Use of the GP Calculator . 13 2.1 Defaults and output formats . 14 2.2 Simple metacommands . 20 2.3 Input formats for the PARI types . 23 2.4 GP operators .
    [Show full text]
  • Evaluating a BASIC Approach to Sensor Network Node Programming
    Evaluating A BASIC Approach to Sensor Network Node Programming J. Scott Miller Peter A. Dinda Robert P. Dick jeffrey-miller@northwestern.edu pdinda@northwestern.edu dickrp@eecs.umich.edu Northwestern University Northwestern University University of Michigan Abstract 1 Introduction Sensor networks have the potential to empower domain Wireless sensor networks (WSNs) can be viewed as experts from a wide range of fields. However, presently they general purpose distributed computing platforms defined by are notoriously difficult for these domain experts to program, their spatial presence and an emphasis on environment mon- even though their applications are often conceptually simple. itoring. The most prominent applications of sensor networks We address this problem by applying the BASIC program- have thus far included monitoring applications with a variety ming language to sensor networks and evaluating its effec- of requirements, although WSNs need not be limited to these tiveness. BASIC has proven highly successful in the past in tasks. While WSNs are currently of great research interest, it allowing novices to write useful programs on home comput- is ultimately communities and users outside of these areas— ers. Our contributions include a user study evaluating how application domain experts—that have the most to gain from well novice (no programming experience) and intermediate the functionality that WSNs can provide. We focus on ap- (some programming experience) users can accomplish sim- plication domain experts who are programming novices and ple sensor network tasks in BASIC and in TinyScript (a prin- not WSN experts. Our goal is to make the development of cipally event-driven high-level language for node-oriented WSN applications by such individuals and groups tractable programming) and an evaluation of power consumption is- and, ideally, straightforward.
    [Show full text]
  • A Tour of Fermat's World
    ATOUR OF FERMAT’S WORLD Ching-Li Chai Samples of numbers More samples in arithemetic ATOUR OF FERMAT’S WORLD Congruent numbers Fermat’s infinite descent Counting solutions Ching-Li Chai Zeta functions and their special values Department of Mathematics Modular forms and University of Pennsylvania L-functions Elliptic curves, complex multiplication and Philadelphia, March, 2016 L-functions Weil conjecture and equidistribution ATOUR OF Outline FERMAT’S WORLD Ching-Li Chai 1 Samples of numbers Samples of numbers More samples in 2 More samples in arithemetic arithemetic Congruent numbers Fermat’s infinite 3 Congruent numbers descent Counting solutions 4 Fermat’s infinite descent Zeta functions and their special values 5 Counting solutions Modular forms and L-functions Elliptic curves, 6 Zeta functions and their special values complex multiplication and 7 Modular forms and L-functions L-functions Weil conjecture and equidistribution 8 Elliptic curves, complex multiplication and L-functions 9 Weil conjecture and equidistribution ATOUR OF Some familiar whole numbers FERMAT’S WORLD Ching-Li Chai Samples of numbers More samples in §1. Examples of numbers arithemetic Congruent numbers Fermat’s infinite 2, the only even prime number. descent 30, the largest positive integer m such that every positive Counting solutions Zeta functions and integer between 2 and m and relatively prime to m is a their special values prime number. Modular forms and L-functions 3 3 3 3 1729 = 12 + 1 = 10 + 9 , Elliptic curves, complex the taxi cab number. As Ramanujan remarked to Hardy, multiplication and it is the smallest positive integer which can be expressed L-functions Weil conjecture and as a sum of two positive integers in two different ways.
    [Show full text]
  • Computer Supplement #19 ***********************
    THE CRYPTOGRAM Summer 1994 *********************** COMPUTER SUPPLEMENT #19 *********************** In this issue: PATTERN SEARCHING BY COMPUTER | D MELIORA describes a method and gives a Pascal program to perform pattern word searching. SWAGMAN | BOATTAIL has some help for solving basic transposition ciphers like SWAG- MAN, and includes his Cipher library. INTERNET MAILING LIST | Three of the Krewe have started an electronic mailing list to help in solving cryptograms. REVIEWS | DAEDALUS has recommendations for three books and a software package. GW-BASIC CRACKING | A program to decrypt protected GW-BASIC programs. HIGH PRECISION BASIC | Details about a dialect of BASIC that handles large numbers with ease. Plus: News and notes for computerists interested in cryptography, and cryptographers in- terested in computers. Published in association with the American Cryptogram Association INTRODUCTORY MATERIAL The ACA and Your Computer (1p). Background on the ACA for computerists. (As printed in ACA and You, 1988 edition; [Also on Issue Disk #11] Using Your Home Computer (1p). Ciphering at the ACA level with a computer. (As printed in ACA and You, 1988 edition). Frequently Asked Questions (approx. 20p) with answers, from the Usenet newsgroup sci.crypt. REFERENCE MATERIAL BASICBUGS - Bugs and errors in GW-BASIC (1p). [Also on Issue Disk #11]. BBSFILES - List of filenames and descriptions of cryptographic files available on the ACA BBS (files also available on disk via mail). BIBLIOG | A bibliography of computer magazine articles and books dealing with cryptography. (Updated August 89). [available on Issue Disk #11]. CRYPTOSUB - Complete listing of Cryptographic Substitution Program as published by PHOENIX in sections in The Cryptogram 1983{1985.
    [Show full text]
  • A Primer of Analytic Number Theory: from Pythagoras to Riemann Jeffrey Stopple Index More Information
    Cambridge University Press 0521813093 - A Primer of Analytic Number Theory: From Pythagoras to Riemann Jeffrey Stopple Index More information Index #, number of elements in a set, 101 and ␨(2n), 154–157 A =, Abel summation, 202, 204, 213 and Euler-Maclaurin summation, 220 definition, 201 definition, 149 Abel’s Theorem Bernoulli, Jacob, 146, 150, 152 I, 140, 145, 201, 267, 270, 272 Bessarion, Cardinal, 282 II, 143, 145, 198, 267, 270, 272, 318 binary quadratic forms, 270 absolute convergence definition, 296 applications, 133, 134, 139, 157, 167, 194, equivalence relation ∼, 296 198, 208, 215, 227, 236, 237, 266 reduced, 302 definition, 133 Birch Swinnerton-Dyer conjecture, xi, xii, abundant numbers, 27, 29, 31, 43, 54, 60, 61, 291–294, 326 82, 177, 334, 341, 353 Black Death, 43, 127 definition, 27 Blake, William, 216 Achilles, 125 Boccaccio’s Decameron, 281 aliquot parts, 27 Boethius, 28, 29, 43, 278 aliquot sequences, 335 Bombelli, Raphael, 282 amicable pairs, 32–35, 39, 43, 335 de Bouvelles, Charles, 61 definition, 334 Bradwardine, Thomas, 43, 127 ibn Qurra’s algorithm, 33 in Book of Genesis, 33 C2, twin prime constant, 182 amplitude, 237, 253 Cambyses, Persian emperor, 5 Analytic Class Number Formula, 273, 293, Cardano, Girolamo, 25, 282 311–315 Catalan-Dickson conjecture, 336 analytic continuation, 196 Cataldi, Pietro, 30, 333 Anderson, Laurie, ix cattle problem, 261–263 Apollonius, 261, 278 Chebyshev, Pafnuty, 105, 108 Archimedes, 20, 32, 92, 125, 180, 260, 285 Chinese Remainder Theorem, 259, 266, 307, area, basic properties, 89–91, 95, 137, 138, 308, 317 198, 205, 346 Cicero, 21 Aristotle’s Metaphysics,5,127 class number, see also h arithmetical function, 39 Clay Mathematics Institute, xi ∼, asymptotic, 64 comparison test Athena, 28 infinite series, 133 St.
    [Show full text]
  • A Theorem of Fermat on Congruent Number Curves Lorenz Halbeisen, Norbert Hungerbühler
    A Theorem of Fermat on Congruent Number Curves Lorenz Halbeisen, Norbert Hungerbühler To cite this version: Lorenz Halbeisen, Norbert Hungerbühler. A Theorem of Fermat on Congruent Number Curves. Hardy-Ramanujan Journal, Hardy-Ramanujan Society, 2019, Hardy-Ramanujan Journal, 41, pp.15 – 21. hal-01983260 HAL Id: hal-01983260 https://hal.archives-ouvertes.fr/hal-01983260 Submitted on 16 Jan 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Hardy-Ramanujan Journal 41 (2018), 15-21 submitted 28/03/2018, accepted 06/07/2018, revised 06/07/2018 A Theorem of Fermat on Congruent Number Curves Lorenz Halbeisen and Norbert Hungerb¨uhler To the memory of S. Srinivasan Abstract. A positive integer A is called a congruent number if A is the area of a right-angled triangle with three rational sides. Equivalently, A is a congruent number if and only if the congruent number curve y2 = x3 − A2x has a rational point (x; y) 2 Q2 with y =6 0. Using a theorem of Fermat, we give an elementary proof for the fact that congruent number curves do not contain rational points of finite order.
    [Show full text]
  • On the Computation of the HNF of a Module Over the Ring of Integers of A
    On the computation of the HNF of a module over the ring of integers of a number field Jean-Fran¸cois Biasse Department of Mathematics and Statistics University of South Florida Claus Fieker Fachbereich Mathematik Universit¨at Kaiserslautern Postfach 3049 67653 Kaiserslautern - Germany Tommy Hofmann Fachbereich Mathematik Universit¨at Kaiserslautern Postfach 3049 67653 Kaiserslautern - Germany Abstract We present a variation of the modular algorithm for computing the Hermite normal form of an K -module presented by Cohen [7], where K is the ring of integers of a numberO field K. An approach presented in [7] basedO on reductions modulo ideals was conjectured to run in polynomial time by Cohen, but so far, no such proof was available in the literature. In this paper, we present a modification of the approach of [7] to prevent the coefficient swell and we rigorously assess its complexity with respect to the size of the input and the invariants of the field K. Keywords: Number field, Dedekind domain, Hermite normal form, relative extension of number fields arXiv:1612.09428v1 [math.NT] 30 Dec 2016 2000 MSC: 11Y40 1. Introduction Algorithms for modules over the rational integers such as the Hermite nor- mal form algorithm are at the core of all methods for computations with rings Email addresses: biasse@usf.edu (Jean-Fran¸cois Biasse), fieker@mathematik.uni-kl.de (Claus Fieker), thofmann@mathematik.uni-kl.de (Tommy Hofmann) Preprint submitted to Elsevier April 22, 2018 and ideals in finite extensions of the rational numbers. Following the growing interest in relative extensions, that is, finite extensions of number fields, the structure of modules over Dedekind domains became important.
    [Show full text]
  • Congruent Numbers with Many Prime Factors
    Congruent numbers with many prime factors Ye Tian1 Morningside Center of Mathematics, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190, China † Edited by S. T. Yau, Harvard University, Cambridge, MA, and approved October 30, 2012 (received for review September 28, 2012) Mohammed Ben Alhocain, in an Arab manuscript of the 10th Remark 2: The kernel A½2 and the image 2A of the multiplication century, stated that the principal object of the theory of rational by 2 on A are characterized by Gauss’ genus theory. Note that the × 2 right triangles is to find a square that when increased or diminished multiplication by 2 induces an isomorphism A½4=A½2’A½2 ∩ 2A. by a certain number, m becomes a square [Dickson LE (1971) History By Gauss’ genus theory, Condition 1 is equivalent in that there are of the Theory of Numbers (Chelsea, New York), Vol 2, Chap 16]. In exactly an odd number of spanning subtrees in the graph whose modern language, this object is to find a rational point of infinite ; ⋯; ≠ vertices are p0 pk and whose edges are those pipj, i j,withthe order on the elliptic curve my2 = x3 − x. Heegner constructed such quadratic residue symbol pi = − 1. It is then clear that Theorem 1 rational points in the case that m are primes congruent to 5,7 mod- pj ulo 8 or twice primes congruent to 3 modulo 8 [Monsky P (1990) follows from Theorem 2. Math Z – ’ 204:45 68]. We extend Heegner s result to integers m with The congruent number problem is not only to determine many prime divisors and give a sketch in this report.
    [Show full text]
  • Single Digits
    ...................................single digits ...................................single digits In Praise of Small Numbers MARC CHAMBERLAND Princeton University Press Princeton & Oxford Copyright c 2015 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved The second epigraph by Paul McCartney on page 111 is taken from The Beatles and is reproduced with permission of Curtis Brown Group Ltd., London on behalf of The Beneficiaries of the Estate of Hunter Davies. Copyright c Hunter Davies 2009. The epigraph on page 170 is taken from Harry Potter and the Half Blood Prince:Copyrightc J.K. Rowling 2005 The epigraphs on page 205 are reprinted wiht the permission of the Free Press, a Division of Simon & Schuster, Inc., from Born on a Blue Day: Inside the Extraordinary Mind of an Austistic Savant by Daniel Tammet. Copyright c 2006 by Daniel Tammet. Originally published in Great Britain in 2006 by Hodder & Stoughton. All rights reserved. Library of Congress Cataloging-in-Publication Data Chamberland, Marc, 1964– Single digits : in praise of small numbers / Marc Chamberland. pages cm Includes bibliographical references and index. ISBN 978-0-691-16114-3 (hardcover : alk. paper) 1. Mathematical analysis. 2. Sequences (Mathematics) 3. Combinatorial analysis. 4. Mathematics–Miscellanea. I. Title. QA300.C4412 2015 510—dc23 2014047680 British Library
    [Show full text]
  • An Application of the Hermite Normal Form in Integer Programming
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector An Application of the Hermite Normal Form in Integer Programming Ming S. Hung Graduate School of Management Kent State University Kent, Ohio 44242 and Walter 0. Rom School of Business Administration Cleveland State University Cleveland, Ohio 44115 Submitted by Richard A. Brualdi ABSTRACT A new algorithm for solving integer programming problems is developed. It is based on cuts which are generated from the Hermite normal form of the basis matrix at a continuous extreme point. INTRODUCTION We present a new cutting plane algorithm for solving an integer program. The cuts are derived from a modified version of the usual column tableau used in integer programming: Rather than doing a complete elimination on the rows corresponding to the nonbasic variables, these rows are transformed into the Her-mite normal form. There are two major advantages with our cutting plane algorithm: First, it uses all integer operations in the computa- tions. Second, the cuts are deep, since they expose vertices of the integer hull. The Her-mite normal form (HNF), along with the basic properties of the cuts, is developed in Section I. Sections II and III apply the HNF to systems of equations and integer programs. A proof of convergence for the algorithm is presented in Section IV. Section V discusses some preliminary computa- tional experience. LINEAR ALGEBRA AND ITS APPLlCATlONS 140:163-179 (1990) 163 0 Else&r Science Publishing Co., Inc., 1990 655 Avenue of the Americas, New York, NY 10010 0024-3795/90/$3.50 164 MING S.
    [Show full text]
  • Canonical Heights and Division Polynomials 11
    CANONICAL HEIGHTS AND DIVISION POLYNOMIALS ROBIN DE JONG AND J. STEFFEN MULLER¨ Abstract. We discuss a new method to compute the canonical height of an algebraic point on a hyperelliptic jacobian over a number field. The method does not require any geometrical models, neither p-adic nor complex analytic ones. In the case of genus 2 we also present a version that requires no factori- sation at all. The method is based on a recurrence relation for the `division polynomials' associated to hyperelliptic jacobians, and a diophantine approx- imation result due to Faltings. 1. Introduction In [EW] G. Everest and T. Ward show how to approximate to high precision the canonical height of an algebraic point on an elliptic curve E over a number field K with a limit formula using the (recurrence) sequence of division polynomials φn associated to E, and a diophantine approximation result. The φn have natural analogues for jacobians of hyperelliptic curves. In [Uc2] Y. Uchida shows how to obtain recurrence relations for the φn for hyperelliptic jaco- bians of dimension g ≥ 2. Further there exists a suitable analogue of the diophantine approximation result employed by Everest and Ward, proved by G. Faltings. In this paper we derive a limit formula for the canonical height of an algebraic point on a hyperelliptic jacobian from these inputs. We have implemented the resulting method for computing canonical heights in Magma for g = 2. The method does not require geometrical models, neither p-adic nor complex analytic ones. If the curve is defined over Q and the coordinates of the point are integral, then it also requires no factorisation.
    [Show full text]
  • Fast, Deterministic Computation of the Hermite Normal Form and Determinant of a Polynomial Matrix✩
    Journal of Complexity 42 (2017) 44–71 Contents lists available at ScienceDirect Journal of Complexity journal homepage: www.elsevier.com/locate/jco Fast, deterministic computation of the Hermite normal form and determinant of a polynomial matrixI George Labahn a,∗, Vincent Neiger b, Wei Zhou a a David R. Cheriton School of Computer Science, University of Waterloo, Waterloo ON, Canada N2L 3G1 b ENS de Lyon (Laboratoire LIP, CNRS, Inria, UCBL, Université de Lyon), Lyon, France article info a b s t r a c t Article history: Given a nonsingular n × n matrix of univariate polynomials over Received 19 July 2016 a field K, we give fast and deterministic algorithms to compute Accepted 18 March 2017 its determinant and its Hermite normal form. Our algorithms use Available online 12 April 2017 ! Oe.n dse/ operations in K, where s is bounded from above by both the average of the degrees of the rows and that of the columns Keywords: of the matrix and ! is the exponent of matrix multiplication. The Hermite normal form soft- notation indicates that logarithmic factors in the big- Determinant O O Polynomial matrix are omitted while the ceiling function indicates that the cost is Oe.n!/ when s D o.1/. Our algorithms are based on a fast and deterministic triangularization method for computing the diagonal entries of the Hermite form of a nonsingular matrix. ' 2017 Elsevier Inc. All rights reserved. 1. Introduction n×n For a given nonsingular polynomial matrix A in KTxU , one can find a unimodular matrix U 2 n×n KTxU such that AU D H is triangular.
    [Show full text]