L-Functions of Certain Exponential Sums Over Finite Fields Ii 3

Total Page:16

File Type:pdf, Size:1020Kb

L-Functions of Certain Exponential Sums Over Finite Fields Ii 3 L-FUNCTIONS OF CERTAIN EXPONENTIAL SUMS OVER FINITE FIELDS II XIN LIN AND CHAO CHEN ABSTRACT. Inthis paper,we computethe q-adic slopes of the L-functions of an important class of exponential sums arising from analytic number theory. Our main tools include Adolphson-Sperber’s work on toric exponential sums and Wan’s decomposition theorems. 1. INTRODUCTION A fundamental problem in number theory is to estimate the reciprocal zeros and poles of L-functions of certain exponential sums over finite fields of characteristic p. Deligne’s theorem on Riemann hypothesis gives general information for the complex absolute values of the zeros and poles. The theorem also indicates that the reciprocal roots and poles are ℓ-adic units if ℓ is a prime and ℓ =6 p. So the remaining unknown part is the p-adic estimate of the L-function which can be identified with the p-adic version of Riemann hypothesis for the L-function. In this paper, we study the p-adic slopes of L-functions of a special family of exponential sums. Let Fq be the finite field of q elements with characteristic p. For each positive integer ∗ k, let Fqk denote the degree k finite extension of Fq and Fqk denote the set of non-zero ∗ elements in Fqk . Let ψ : Fp → C be a fixed nontrivial additive character over Fp and r Trk : Fqk → Fp be the trace map. Let n = i=1 ni be a partition of a positive integer n. We introduce n variables P xij, for 1 ≤ i ≤ r, 1 ≤ j ≤ ni, and n positive integral constants bij, for 1 ≤ i ≤ r, 1 ≤ j ≤ ni. ∗ In this paper, we are concerned with the following class of exponential sums: for ai ∈ Fq and bij ∈ Z>0, r ni Sk(~a)= ψ Trk xij , r ai arXiv:2107.13357v1 [math.NT] 28 Jul 2021 =1 i=1 j=1 !! i=1 n bij Xi x X X P Qj=1 ij ∗ where the sum is over all xij ∈ Fqk . Since the case of bij divisible by p can be reduced to p ∤ bij through a change of variables, in this paper we assume p ∤ bij for 1 ≤ i ≤ r, 1 ≤ j ≤ ni. The estimate of Sk(~a) plays an important role in analytic number theory when n = 4, ni =2 and bij =1. It is a crucial ingredient in Heath Brown’s work on the divisor function d3(n) in arithmetic progressions [HB86]. It also appears in Friedlander and Iwaniec’s work on estimating certain averages of incomplete Kloosterman sums in application to 2010 Mathematics Subject Classification. Primary 11S40, 11T23, 11L07. Key words and phrases. Exponential sums, L-function, Laurent polynomials, Newton polygon, Hodge polygon, Decomposition theory, Weight computation. 1 2 XIN LIN AND CHAO CHEN the divisor problem of d3(n) [FI85]. Relying on the estimate of Sk(~a) and Friedlander- Iwaniec’s result, Zhang gained a boundary of the error terms in his work on twin prime conjecture [Zha14]. For the complex absolute values of exponential sums, Katz [Kat87] proved that (n−1)k/2 |Sk(~a)| ≤ c1q , r ni where c1 = i=1 1+ j=1 bij − 1. To understand the p-adic absolute values of the exponential sums, we study p-adic slopes Q P of the reciprocal roots and poles of the associated L-function ∞ T k (1.1) L(~a, T ) = exp Sk(~a) . k ! Xk=1 When n =4, ni =2 and bij =1, our previous paper [CL20] showed that 6 L(~a, T )=(1 − T )(1 − qT ) (1 − αiT ), i=1 Y where the p-adic norms of the reciprocal roots are given by 1 if i =1. −1 q if i =2, 3. |αi|p = −2 q if i =4, 5. q−3 if i =6. In this paper, we obtain q-adic slopes for the above general class of exponential sums. Note that our main result is consistent with Katz’s complex estimate. Theorem 1.1. Let D = lcm{bij|1 ≤ i ≤ r, 1 ≤ j ≤ ni}. (1) The associated L-function is a polynomial given by d−r (−1)n r−1 L(~a, T ) = (1 − T ) (1 − αiT ), i=1 Y r ni where d = i=1 1+ j=1 bij . (2) If p ≡ 1(modD), for each m = 0, 1, . , nD, the number of reciprocal zeros of Qn P L(~a, T )(−1) with q-adic slope m/D is the coefficient of xm+D in the following generating function ni 1 r (1+ j=1 b )D n−r 1 − x ij G(x)= 1 − xD P , ni D/bij i=1 j=1 1 − x Y and for any rational number m∈ / {0, 1Q, . , nD}, there is no reciprocal zero of L(~a, T )(−1)n with q-adic slope m/D. Corollary 1.2. Assume bij =1 (1 ≤ i ≤ r, 1 ≤ j ≤ ni). (−1)n r (1) The polynomial L(~a, T ) has degree i=1 (1 + ni) − 1. r (2) Let d = (1 + ni). If ni is even for 1 ≤ i ≤ n, we have i=1 Q r2+3r+2 d− 2 Q 2 r (−1)n r−1 r −r L(~a, T ) = (1 − T ) (1 − γ0T )(1 − qT ) 2 (1 − γiT ) (1 − αjT ), i=1 j=1 Y Y L-FUNCTIONS OF CERTAIN EXPONENTIAL SUMS OVER FINITE FIELDS II 3 n−1 where ordq γ0 =0, ordq γi = 1(1 ≤ i ≤ r), |γi| = q 2 (0 ≤ i ≤ r), ordq αj > 1 n−1 and |αj| ≤ q 2 . n (3) For each m = 0, 1, 2,...,n, the number of reciprocal zeros of L(~a, T )(−1) with q-adic slope m is the coefficient of xm+1 in the following generating function r ni G1(x)= (1 + x + ··· + x ) , i=1 Y and for any rational number m∈ / {0, 1,...,n}, there is no reciprocal zero of L(~a, T )(−1)n with q-adic slope m. Our approach is to reduce this theorem to the L-function of toric exponential sums and i then apply the systematic results available for such toric L-functions. Let Ni = l=1 nl for 1 ≤ i ≤ r and N0 =0. Let xij = xNi−1+j and bij = bNi−1+j (1 ≤ i ≤ r, 1 ≤ j ≤ ni). ±1 ±1 P Consider a Laurent polynomial f ∈ Fq[x1 ,...,xn+1] defined by n r ai f(x1, x2,...,xn+1)= xi + xn+1 − 1 , Ni bl i=1 i=1 l=N 1+1 xl ! X X i− ∗ where ai ∈ Fq and bl ∈ Z>0. For any positive integer k,Q let ∗ Sk(f)= ψ(Trk(f)) ∗ xi∈F Xqk be the associated exponential sum. Its generating L-function is defined to be ∞ k ∗ ∗ T L (f, T ) = exp Sk(f) . k ! Xk=1 ∗ The following equation describes the relationship between Sk(~a) and Sk(f), (−1)n 1 S (~a)= + S∗(f). k qk qk k Based on the relationship, it’s easy to check that n 1 n (1.2) L(~a, T )(−1) = L∗ (f,T/q)(−1) . 1 − T/q So it suffices to evaluate the reciprocal roots or poles of L∗(f, T ). By Adolphson and Sper- ∗ (−1)n ber’s theorem [AS89], L (f, T ) is a polynomial if p ∤ lcm{bij}. Under this assump- n tion, we compute the q-adic Newton polygon of L∗(f, T )(−1) , which indicates the q-adic slope information of the L-function. Furthermore, using Wan’s decomposition theorem, we show that the L-function has the following form d−r ∗ (−1)n r−1 L (f, T ) = (1 − T )(1 − qT ) (1 − βiT ), i=1 Y r ni where d = i=1 1+ j=1 bij . This leads to our main theorem. This paper is organized as follows. In section 2, we review some technical methods and Q P theorems including Adolphson-Sperber’s theorems and Wan’s decomposition theorems. In section 3, we prove the main results. 4 XIN LIN AND CHAO CHEN 2. PRELIMINARIES ±1 ±1 2.1. Rationality of the generating L-function. Let f ∈ Fq x1 ,...,xn be a Laurent polynomial and its associated exponential sum is defined to be ∗ (2.1) Sk(f)= ψ(Trk(f)), ∗ xi∈F Xqk ∗ where Trk : Fqk → Fp is the trace map and ψ : Fp → C is a fixed nontrivial additive ∗ character. It’s a classical problem to give a good estimate for the valuations of Sk (f) in analytic number theory. In order to compute the absolute values of the exponential sums, ∗ we usually study the generating L-function of Sk(f) given by ∞ k ∗ ∗ T L (f, T ) = exp Sk(f) ∈ Q(ζp)[[T ]]. k ! Xk=1 By a theorem of Dwork-Bombieri-Grothendieck [Dwo62,Gro66], the generating L-function is a rational function, d1 (1 − α T ) L∗(f, T )= i=1 i , d2 Qj=1(1 − βjT ) where all the reciprocal zeros and poles areQ non-zero algebraic integers. After taking loga- rithmic derivatives, we have the formula d2 d1 ∗ k k (2.2) Sk(f)= βj − αi , k ∈ Z≥1, j=1 i=1 X X which implies that the zeros and poles of the generating L-function contain critical infor- mation about the exponential sums. From Deligne’s theorem on Riemann hypothesis [Del80], the complex absolute values of reciprocal zeros and poles are bounded as follows ui/2 vj /2 |αi| = q , |βj| = q ,ui ∈ Z ∩ [0, 2n], vj ∈ Z ∩ [0, 2n]. For non-archimedean absolute values, Deligne [Del80] proved that |αi|ℓ = |βj|ℓ =1 when ℓ is a prime and ℓ =6 p.
Recommended publications
  • A Note on the Origin of the Twin Prime Conjecture
    A Note on the Origin of the Twin Prime Conjecture by William Dunham Department of Mathematics & Computer Science, Muhlenberg College; Department of Mathematics, Harvard University (visiting 2012-2013) More than any other branch of mathematics, number As the title suggests, de Polignac’s paper was about theory features a collection of famous problems that took prime numbers, and on p. 400 he stated two “theorems.” centuries to be proved or that remain unresolved to the It should be noted that he was not using the word in its present day. modern sense. Rather, de Polignac confirmed the truth of Among the former is Fermat’s Last Theorem. This these results by checking a number of cases and thereby states that it is impossible to find a whole number n ≥ 3 called them “theorems.” Of course, we would call them, at and whole numbers x , y , and z for which xn + yn = zn . best, “conjectures.” The true nature of these statements is suggested by the fact that de Polignac introduced them In 1640, as all mathematicians know, Fermat wrote this in under the heading “Induction and remarks” as seen below, a marginal note and claimed to have “an admirable proof” in a facsimile of his original text. that, alas, did not fit within the space available. The result remained unproved for 350 years until Andrew Wiles, with assistance from Richard Taylor, showed that Fermat was indeed correct. On the other hand, there is the Goldbach conjecture, which asserts that every even number greater than 2 can be expressed as the sum of two primes.
    [Show full text]
  • Dr. Yitang Zhang Professor Department of Mathematics University of California, Santa Barbara
    Distinguished Lifetime Achievement Award Dr. Yitang Zhang Professor Department of Mathematics University of California, Santa Barbara Citation of Accomplishments Establishing the first finite bound on the gaps of prime numbers and thus solving a centuries- old problem in number theory, and his unsubdued passion for mathematics and science. Dr. Yitang Zhang was born on February 5, 1955 in Shanghai, China, and lived there until he was 13 years old. During the Cultural Revolution, he and his parents were sent to the countryside to work in the fields. He worked as a laborer for ten years and was unable to attend high school. After the Cultural Revolution ended, he entered Peking University in 1978 as an undergraduate student and graduated in 1982. Then he became a graduate student of Professor Pan Chengbiao, a number theorist at Peking University, and obtained his master’s degree in mathematics in 1984. With recommendations from Professor Ding Shisun, the president of Peking University, Yitang was granted a full scholarship at Purdue University. He arrived at Purdue in June 1985, studied there for seven years, and obtained his Ph.D. in mathematics in December 1991. After graduation, he had a hard time finding an academic position. After several years, he managed to find a position as a lecturer at the University of New Hampshire (UNH), where he was hired by Professor Kenneth Appel in 1999. He served as a lecturer at UNH until January 2014, when UNH appointed him to a full professorship as a result of his breakthrough on the distribution of prime numbers. In Fall 2015, he accepted an offer of full professorship at the University of California, Santa Barbara.
    [Show full text]
  • Fundamental Theorems in Mathematics
    SOME FUNDAMENTAL THEOREMS IN MATHEMATICS OLIVER KNILL Abstract. An expository hitchhikers guide to some theorems in mathematics. Criteria for the current list of 243 theorems are whether the result can be formulated elegantly, whether it is beautiful or useful and whether it could serve as a guide [6] without leading to panic. The order is not a ranking but ordered along a time-line when things were writ- ten down. Since [556] stated “a mathematical theorem only becomes beautiful if presented as a crown jewel within a context" we try sometimes to give some context. Of course, any such list of theorems is a matter of personal preferences, taste and limitations. The num- ber of theorems is arbitrary, the initial obvious goal was 42 but that number got eventually surpassed as it is hard to stop, once started. As a compensation, there are 42 “tweetable" theorems with included proofs. More comments on the choice of the theorems is included in an epilogue. For literature on general mathematics, see [193, 189, 29, 235, 254, 619, 412, 138], for history [217, 625, 376, 73, 46, 208, 379, 365, 690, 113, 618, 79, 259, 341], for popular, beautiful or elegant things [12, 529, 201, 182, 17, 672, 673, 44, 204, 190, 245, 446, 616, 303, 201, 2, 127, 146, 128, 502, 261, 172]. For comprehensive overviews in large parts of math- ematics, [74, 165, 166, 51, 593] or predictions on developments [47]. For reflections about mathematics in general [145, 455, 45, 306, 439, 99, 561]. Encyclopedic source examples are [188, 705, 670, 102, 192, 152, 221, 191, 111, 635].
    [Show full text]
  • Ten Mathematical Landmarks, 1967–2017
    Ten Mathematical Landmarks, 1967{2017 MD-DC-VA Spring Section Meeting Frostburg State University April 29, 2017 Ten Mathematical Landmarks, 1967{2017 Nine, Eight, Seven, and Six Nine: Chaos, Fractals, and the Resurgence of Dynamical Systems Eight: The Explosion of Discrete Mathematics Seven: The Technology Revolution Six: The Classification of Finite Simple Groups Ten Mathematical Landmarks, 1967{2017 Five: The Four-Color Theorem 1852-1976 1852: Francis Guthrie's conjecture: Four colors are sufficient to color any map on the plane in such a way that countries sharing a boundary edge (not merely a corner) must be colored differently. 1878: Arthur Cayley addresses the London Math Society, asks if the Four-Color Theorem has been proved. 1879: A. B. Kempe publishes a proof. 1890: P. J. Heawood notes that Kempe's proof has a serious gap in it, uses same method to prove the Five-Color Theorem for planar maps. The Four-Color Conjecture remains open. 1891: Heawood makes a conjecture about coloring maps on the surfaces of many-holed tori. 1900-1950's: Many attempts to prove the 4CC (Franklin, George Birkhoff, many others) give a jump-start to a certain branch of topology called Graph Theory. The latter becomes very popular. Ten Mathematical Landmarks, 1967{2017 Five: The Four-Color Theorem (4CT) The first proof By the early 1960s, the 4CC was proved for all maps with at most 38 regions. In 1969, H. Heesch developed the two main ingredients needed for the ultimate proof, namely reducibility and discharging. He also introduced the idea of an unavoidable configuration.
    [Show full text]
  • Awards of ICCM 2013 by the Editors
    Awards of ICCM 2013 by the Editors academies of France, Sweden and the United States. He is a recipient of the Fields Medal (1986), the Crafoord Prize Morningside Medal of Mathematics in Mathematics (1994), the King Faisal International Prize Selection Committee for Science (2006), and the Shaw Prize in Mathematical The Morningside Medal of Mathematics Selection Sciences (2009). Committee comprises a panel of world renowned mathematicians and is chaired by Professor Shing-Tung Björn Engquist Yau. A nomination committee of around 50 mathemati- Professor Engquist is the Computational and Applied cians from around the world nominates candidates based Mathematics Chair Professor at the University of Texas at on their research, qualifications, and curriculum vitae. Austin. His recent work includes homogenization theory, The Selection Committee reviews these nominations and multi-scale methods, and fast algorithms for wave recommends up to two recipients for the Morningside propagation. He is a member of the Royal Swedish Gold Medal of Mathematics, up to two recipients for the Morningside Gold Medal of Applied Mathematics, and up to four recipients for the Morningside Silver Medal of Mathematics. The Selection Committee members, with the exception of the committee chair, are all non-Chinese to ensure the independence, impartiality and integrity of the awards decision. Members of the 2013 Morningside Medal of Mathe- matics Selection Committee are: Richard E. Borcherds Professor Borcherds is Professor of Mathematics at the University of California at Berkeley. His research in- terests include Lie algebras, vertex algebras, and auto- morphic forms. He is best known for his work connecting the theory of finite groups with other areas in mathe- matics.
    [Show full text]
  • NUMBER THEORY and COMBINATORICS SEMINAR UNIVERSITY of LETHBRIDGE Contents
    PAST SPEAKERS IN THE NUMBER THEORY AND COMBINATORICS SEMINAR OF THE DEPARTMENT OF MATHEMATICS & COMPUTER SCIENCE AT THE UNIVERSITY OF LETHBRIDGE http://www.cs.uleth.ca/~nathanng/ntcoseminar/ Organizers: Nathan Ng and Dave Witte Morris (starting Fall 2011) Amir Akbary (Fall 2007 – Fall 2010) Contents ........................... Fall 2020 2 Spring 2014 ....................... 48 ........................ Spring 2020 5 Fall 2013 .......................... 52 ........................... Fall 2019 9 Spring 2013 ....................... 55 ....................... Spring 2019 12 Fall 2012 .......................... 59 .......................... Fall 2018 16 Spring 2012 ....................... 63 ....................... Spring 2018 20 Fall 2011 .......................... 67 .......................... Fall 2017 24 Fall 2010 .......................... 70 ....................... Spring 2017 28 Spring 2010 ....................... 71 .......................... Fall 2016 31 Fall 2009 .......................... 73 ....................... Spring 2016 34 Spring 2009 ....................... 75 .......................... Fall 2015 39 Fall 2008 .......................... 77 ....................... Spring 2015 42 Spring 2008 ....................... 80 .......................... Fall 2014 45 Fall 2007 .......................... 83 Fall 2020 Open problem session Sep 28, 2020 Please bring your favourite (math) problems. Anyone with a problem to share will be given about 5 minutes to present it. We will also choose most of the speakers for the rest of the semester.
    [Show full text]
  • Citation for Yitang Zhang the Ostrowski Prize for 2013 Is Awarded to Professor Yitang Zhang for His Breakthrough Work on Small Gaps Between Prime Numbers
    Citation for Yitang Zhang The Ostrowski Prize for 2013 is awarded to Professor Yitang Zhang for his breakthrough work on small gaps between prime numbers. Yitang Zhang was granted a Bachelor's degree in 1982 and a Master's degree in 1985 from Peking University. He then travelled to the United States for further graduate work and in 1991 obtained a Ph.D. degree from Purdue University. In 1999 he joined the Department of Mathematics at the University of New Hampshire, where he remains to this day. Professor Zhang's work deals with a fundamental question about the dis- tribution of prime numbers.Let us put it in a historical context. Let p1; p2;::: denote the increasing sequence of prime numbers. It follows from the prime number theorem that the average gap between consecutive prime numbers pn+1 and pn is roughly log pn in size. What can be said about small gaps between consecutive primes? Erd}os,in 1940, was the first to prove that there is a positive number c which is smaller than 1 such that pn+1 − pn < c log pn (1) for infinitely many positive integers n: This result was refined by Bombieri and Davenport, Huxley, Maier and others. In particular, Maier proved that (1) holds with c = :248 ::: in 1988. Next Goldston, Pintz and Yildirim established, in a pair of papers which appeared in 2009 and 2010, that a much stronger result is true. They proved that there is a positive number C such that 1=2 2 pn+1 − pn < C(log pn) (log log pn) for infinitely many positive integers n: Building on the work of Goldston, Pintz and Yildirim, Zhang proved in 2013 that 7 pn+1 − pn < 7 · 10 for infinitely many positive integers n: This represents a stunning step for- ward and brings the twin prime conjecture into view.
    [Show full text]
  • The Non-Publishability Theorem of the Proof of Goldbach's Conjecture A
    The non-publishability theorem of the proof of Goldbach’s conjecture or A story about the possibility of mathematics not being an exact science after all Dénes, Tamás – mathematician (Budapest, Hungary) email: [email protected] “Sometimes it is the people no one can imagine anything of who do the things no one can imagine.” (A. M. Turing) On the one hand, I am the protagonist of the following story, but I am also its modest chronicler. Thus, all characters in the story, as well as the documents contained in the appendices, are real. In our increasingly virtualized world, it might seem strange to read such a REAL STORY. Yet, it is important that I put it down and share it, as it represents the aristocratic reality of today’s scientific world (specifically the realm of mathematics), which we had seemed to have left behind in the second part of the 20 th century, with the golden age of a new Enlightenment upon us. We were hoping for the revival of the age of Enlightenment, when the hierarchy of feudal interests was overwritten by new ideas, by the notion of the beauty inherent to new insights. “The Theorem can be likened to a pearl, and the method of proof to an oyster. The pearl is prized for its luster and simplicity; the oyster is a complex living beast whose innards give rise to this mysteriously simple gem.” ( D.R. Hofstadter, 1945–, American mathematician, historian of mathematics) This story starts at the turn of the millennium, when in 2001 I published my Complementary Prime-Sieve theorem in the PU.M.A journal (T.
    [Show full text]
  • Winter 2014 Graduate Course Descriptions
    Winter 2014 Graduate Course Descriptions __________________________________________________________________ 501 AIM Student Seminar Vershynin F 12:00‐1:00pm & 3:00‐4:00pm Math 501 is a required course for all students enrolled in the Applied and Interdisciplinary Mathematics (AIM) MS and PhD graduate programs. In the Winter term, all first‐year AIM students from both programs must sign up for this course. Due to the highly specialized content of the course, enrollment is available only for students in an AIM degree program. The purpose of Math 501 is to address specific issues related to the process of studying applied mathematics in the AIM program and becoming an active member of the research community. The weekly meetings of the class will be divided among three types of sessions: 1. Focus on… “presentations.” These are presentations on various topics, some of immediate practical significance for students and others of a farther‐reaching nature. These discussions will include aspects of scholarly writing, research, and career development. 2. AIM Faculty Portraits. These are short presentations by faculty members in the Mathematics Department and other partner disciplines who are potential advisors or committee members for AIM students. The AIM faculty portraits provide a direct channel for students to discover what research is being done in various areas by current faculty, and to see what kind of preparation is required for participating in such research. 3. AIM Research Seminar Warm‐up talks. One of the course requirements for Math 501 is weekly attendance of the AIM Research Seminar that takes place from 3‐4 PM each Friday. The warm‐up talks are presentations during the regular course meeting time by particularly dynamic speakers slated to speak in the AIM Research Seminar later the same day as a way to provide background material with the goal of making the AIM Research Seminar lecture more valuable for students.
    [Show full text]
  • From the AMS Secretary
    From the AMS Secretary Society and delegate to such committees such powers as Bylaws of the may be necessary or convenient for the proper exercise American Mathematical of those powers. Agents appointed, or members of com- mittees designated, by the Board of Trustees need not be Society members of the Board. Nothing herein contained shall be construed to em- Article I power the Board of Trustees to divest itself of responsi- bility for, or legal control of, the investments, properties, Officers and contracts of the Society. Section 1. There shall be a president, a president elect (during the even-numbered years only), an immediate past Article III president (during the odd-numbered years only), three Committees vice presidents, a secretary, four associate secretaries, a Section 1. There shall be eight editorial committees as fol- treasurer, and an associate treasurer. lows: committees for the Bulletin, for the Proceedings, for Section 2. It shall be a duty of the president to deliver the Colloquium Publications, for the Journal, for Mathemat- an address before the Society at the close of the term of ical Surveys and Monographs, for Mathematical Reviews; office or within one year thereafter. a joint committee for the Transactions and the Memoirs; Article II and a committee for Mathematics of Computation. Section 2. The size of each committee shall be deter- Board of Trustees mined by the Council. Section 1. There shall be a Board of Trustees consisting of eight trustees, five trustees elected by the Society in Article IV accordance with Article VII, together with the president, the treasurer, and the associate treasurer of the Society Council ex officio.
    [Show full text]
  • A Friendly Introduction to Mathematical Logic Christopher C
    SUNY Geneseo KnightScholar Geneseo Authors Milne Library Publishing 1-1-2015 A Friendly Introduction to Mathematical Logic Christopher C. Leary SUNY Geneseo Lars Kristiansen Follow this and additional works at: https://knightscholar.geneseo.edu/geneseo-authors This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License. Recommended Citation Leary, Christopher C. and Kristiansen, Lars, "A Friendly Introduction to Mathematical Logic" (2015). Geneseo Authors. 6. https://knightscholar.geneseo.edu/geneseo-authors/6 This Book is brought to you for free and open access by the Milne Library Publishing at KnightScholar. It has been accepted for inclusion in Geneseo Authors by an authorized administrator of KnightScholar. For more information, please contact [email protected]. oduc Intr tio y n dl to n ie r F A Mathematical Logic 2nd Edition Christopher C. Leary Lars Kristiansen A Friendly Introduction to Mathematical Logic A Friendly Introduction to Mathematical Logic 2nd Edition Second printing With corrections and some renumbered exercises Christopher C. Leary State University of New York College at Geneseo Lars Kristiansen The University of Oslo Milne Library, SUNY Geneseo, Geneseo, NY c 2015 Christopher C. Leary and Lars Kristiansen ISBN: 978-1-942341-07-9 Milne Library SUNY Geneseo One College Circle Geneseo, NY 14454 Lars Kristiansen has received financial support from the Norwegian Non-fiction Literature Fund Contents Preface ix 1 Structures and Languages 1 1.1 Na¨ıvely . .3 1.2 Languages . .5 1.3 Terms and Formulas . .9 1.4 Induction . 13 1.5 Sentences . 19 1.6 Structures . 22 1.7 Truth in a Structure .
    [Show full text]
  • Some Recent Advances in Number Theory P.V
    J. of Ramanujan Society of Math. and Math. Sc. ISSN : 2319-1023 Vol.6, No.1 (2017), pp. 145-156 SOME RECENT ADVANCES IN NUMBER THEORY P.V. Arunachalam Former President, Indian Mathematical Society E-mail: [email protected] Dedicated to Prof. K. Srinivasa Rao on his 75th Birth Anniversary 1: RSA Algorithm −1977 2: Andrew Wiles-FLT −1995 3: AKS Primality Test −2002 4: Terence-Tao AP & Primes −2006 5: Yitang Zhang-\Bounded Gaps" −2011 1. RSA Algorithm -1977 (Ron Rivest, Adi Shamir, Leonard Andleman) 146 J. of Ramanujan Society of Math. and Math. Sc. Encryption is the standard method for making a communications private. Any- one who wants to send a private message to another user, encrypts (enciphers) the message before transmitting it. Only the intended recipient knows how to correctly decrypt (decipher) the message. Any one who has been \eavesdropping" on the communication could only see the encrypted message. He does not know how to decrypt it successfully. As such privacy can be ensured in electronic communica- tions. Cryptosystem is a system to encrypt and decrypt information. These are of two kinds: public key or private key. Private key encryption methods, use the same key to both encrypt and decrypt data. The key must be known only to the parties who are authorized to encrypt and decrypt a particular message. Public - Key encrypto-systems use different keys to encrypt and decrypt data. The public keys is globally available. The private key is kept confidential. (1977) The RSA (Rivest - Shamir - Adleman of MIT-US) algorithm is one of the most popular and secure public - key encryption methods.
    [Show full text]