Integer Multiplication in Time O(N Log N) David Harvey, Joris Van Der Hoeven
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Computation of 2700 Billion Decimal Digits of Pi Using a Desktop Computer
Computation of 2700 billion decimal digits of Pi using a Desktop Computer Fabrice Bellard Feb 11, 2010 (4th revision) This article describes some of the methods used to get the world record of the computation of the digits of π digits using an inexpensive desktop computer. 1 Notations We assume that numbers are represented in base B with B = 264. A digit in base B is called a limb. M(n) is the time needed to multiply n limb numbers. We assume that M(Cn) is approximately CM(n), which means M(n) is mostly linear, which is the case when handling very large numbers with the Sch¨onhage-Strassen multiplication [5]. log(n) means the natural logarithm of n. log2(n) is log(n)/ log(2). SI and binary prefixes are used (i.e. 1 TB = 1012 bytes, 1 GiB = 230 bytes). 2 Evaluation of the Chudnovsky series 2.1 Introduction The digits of π were computed using the Chudnovsky series [10] ∞ 1 X (−1)n(6n)!(A + Bn) = 12 π (n!)3(3n)!C3n+3/2 n=0 with A = 13591409 B = 545140134 C = 640320 . It was evaluated with the binary splitting algorithm. The asymptotic running time is O(M(n) log(n)2) for a n limb result. It is worst than the asymptotic running time of the Arithmetic-Geometric Mean algorithms of O(M(n) log(n)) but it has better locality and many improvements can reduce its constant factor. Let S be defined as n2 n X Y pk S(n1, n2) = an . qk n=n1+1 k=n1+1 1 We define the auxiliary integers n Y2 P (n1, n2) = pk k=n1+1 n Y2 Q(n1, n2) = qk k=n1+1 T (n1, n2) = S(n1, n2)Q(n1, n2). -
Course Notes 1 1.1 Algorithms: Arithmetic
CS 125 Course Notes 1 Fall 2016 Welcome to CS 125, a course on algorithms and computational complexity. First, what do these terms means? An algorithm is a recipe or a well-defined procedure for performing a calculation, or in general, for transform- ing some input into a desired output. In this course we will ask a number of basic questions about algorithms: • Does the algorithm halt? • Is it correct? That is, does the algorithm’s output always satisfy the input to output specification that we desire? • Is it efficient? Efficiency could be measured in more than one way. For example, what is the running time of the algorithm? What is its memory consumption? Meanwhile, computational complexity theory focuses on classification of problems according to the com- putational resources they require (time, memory, randomness, parallelism, etc.) in various computational models. Computational complexity theory asks questions such as • Is the class of problems that can be solved time-efficiently with a deterministic algorithm exactly the same as the class that can be solved time-efficiently with a randomized algorithm? • For a given class of problems, is there a “complete” problem for the class such that solving that one problem efficiently implies solving all problems in the class efficiently? • Can every problem with a time-efficient algorithmic solution also be solved with extremely little additional memory (beyond the memory required to store the problem input)? 1.1 Algorithms: arithmetic Some algorithms very familiar to us all are those those for adding and multiplying integers. We all know the grade school algorithm for addition from kindergarten: write the two numbers on top of each other, then add digits right 1-1 1-2 1 7 8 × 2 1 3 5 3 4 1 7 8 +3 5 6 3 7 914 Figure 1.1: Grade school multiplication. -
Integer Linear Programs
20 ________________________________________________________________________________________________ Integer Linear Programs Many linear programming problems require certain variables to have whole number, or integer, values. Such a requirement arises naturally when the variables represent enti- ties like packages or people that can not be fractionally divided — at least, not in a mean- ingful way for the situation being modeled. Integer variables also play a role in formulat- ing equation systems that model logical conditions, as we will show later in this chapter. In some situations, the optimization techniques described in previous chapters are suf- ficient to find an integer solution. An integer optimal solution is guaranteed for certain network linear programs, as explained in Section 15.5. Even where there is no guarantee, a linear programming solver may happen to find an integer optimal solution for the par- ticular instances of a model in which you are interested. This happened in the solution of the multicommodity transportation model (Figure 4-1) for the particular data that we specified (Figure 4-2). Even if you do not obtain an integer solution from the solver, chances are good that you’ll get a solution in which most of the variables lie at integer values. Specifically, many solvers are able to return an ‘‘extreme’’ solution in which the number of variables not lying at their bounds is at most the number of constraints. If the bounds are integral, all of the variables at their bounds will have integer values; and if the rest of the data is integral, many of the remaining variables may turn out to be integers, too. -
A Scalable System-On-A-Chip Architecture for Prime Number Validation
A SCALABLE SYSTEM-ON-A-CHIP ARCHITECTURE FOR PRIME NUMBER VALIDATION Ray C.C. Cheung and Ashley Brown Department of Computing, Imperial College London, United Kingdom Abstract This paper presents a scalable SoC architecture for prime number validation which targets reconfigurable hardware This paper presents a scalable SoC architecture for prime such as FPGAs. In particular, users are allowed to se- number validation which targets reconfigurable hardware. lect predefined scalable or non-scalable modular opera- The primality test is crucial for security systems, especially tors for their designs [4]. Our main contributions in- for most public-key schemes. The Rabin-Miller Strong clude: (1) Parallel designs for Montgomery modular arith- Pseudoprime Test has been mapped into hardware, which metic operations (Section 3). (2) A scalable design method makes use of a circuit for computing Montgomery modu- for mapping the Rabin-Miller Strong Pseudoprime Test lar exponentiation to further speed up the validation and to into hardware (Section 4). (3) An architecture of RAM- reduce the hardware cost. A design generator has been de- based Radix-2 Scalable Montgomery multiplier (Section veloped to generate a variety of scalable and non-scalable 4). (4) A design generator for producing hardware prime Montgomery multipliers based on user-defined parameters. number validators based on user-specified parameters (Sec- The performance and resource usage of our designs, im- tion 5). (5) Implementation of the proposed hardware ar- plemented in Xilinx reconfigurable devices, have been ex- chitectures in FPGAs, with an evaluation of its effective- plored using the embedded PowerPC processor and the soft ness compared with different size and speed tradeoffs (Sec- MicroBlaze processor. -
Version 0.5.1 of 5 March 2010
Modern Computer Arithmetic Richard P. Brent and Paul Zimmermann Version 0.5.1 of 5 March 2010 iii Copyright c 2003-2010 Richard P. Brent and Paul Zimmermann ° This electronic version is distributed under the terms and conditions of the Creative Commons license “Attribution-Noncommercial-No Derivative Works 3.0”. You are free to copy, distribute and transmit this book under the following conditions: Attribution. You must attribute the work in the manner specified by the • author or licensor (but not in any way that suggests that they endorse you or your use of the work). Noncommercial. You may not use this work for commercial purposes. • No Derivative Works. You may not alter, transform, or build upon this • work. For any reuse or distribution, you must make clear to others the license terms of this work. The best way to do this is with a link to the web page below. Any of the above conditions can be waived if you get permission from the copyright holder. Nothing in this license impairs or restricts the author’s moral rights. For more information about the license, visit http://creativecommons.org/licenses/by-nc-nd/3.0/ Contents Preface page ix Acknowledgements xi Notation xiii 1 Integer Arithmetic 1 1.1 Representation and Notations 1 1.2 Addition and Subtraction 2 1.3 Multiplication 3 1.3.1 Naive Multiplication 4 1.3.2 Karatsuba’s Algorithm 5 1.3.3 Toom-Cook Multiplication 6 1.3.4 Use of the Fast Fourier Transform (FFT) 8 1.3.5 Unbalanced Multiplication 8 1.3.6 Squaring 11 1.3.7 Multiplication by a Constant 13 1.4 Division 14 1.4.1 Naive -
The Number Line Topic 1
Topic 1 The Number Line Lesson Tutorials Positive numbers are greater than 0. They can be written with or without a positive sign (+). +1 5 +20 10,000 Negative numbers are less than 0. They are written with a negative sign (−). − 1 − 5 − 20 − 10,000 Two numbers that are the same distance from 0 on a number line, but on opposite sides of 0, are called opposites. Integers Words Integers are the set of whole numbers and their opposites. Opposite Graph opposites When you sit across from your friend at Ź5 ź4 Ź3 Ź2 Ź1 0 1234 5 the lunch table, you negative integers positive integers sit opposite your friend. Zero is neither negative nor positive. Zero is its own opposite. EXAMPLE 1 Writing Positive and Negative Integers Write a positive or negative integer that represents the situation. a. A contestant gains 250 points on a game show. “Gains” indicates a number greater than 0. So, use a positive integer. +250, or 250 b. Gasoline freezes at 40 degrees below zero. “Below zero” indicates a number less than 0. So, use a negative integer. − 40 Write a positive or negative integer that represents the situation. 1. A hiker climbs 900 feet up a mountain. 2. You have a debt of $24. 3. A student loses 5 points for being late to class. 4. A savings account earns $10. 408 Additional Topics MMSCC6PE2_AT_01.inddSCC6PE2_AT_01.indd 408408 111/24/101/24/10 88:53:30:53:30 AAMM EXAMPLE 2 Graphing Integers Graph each integer and its opposite. Reading a. 3 Graph 3. -
1 Multiplication
CS 140 Class Notes 1 1 Multiplication Consider two unsigned binary numb ers X and Y . Wewanttomultiply these numb ers. The basic algorithm is similar to the one used in multiplying the numb ers on p encil and pap er. The main op erations involved are shift and add. Recall that the `p encil-and-pap er' algorithm is inecient in that each pro duct term obtained bymultiplying each bit of the multiplier to the multiplicand has to b e saved till all such pro duct terms are obtained. In machine implementations, it is desirable to add all such pro duct terms to form the partial product. Also, instead of shifting the pro duct terms to the left, the partial pro duct is shifted to the right b efore the addition takes place. In other words, if P is the partial pro duct i after i steps and if Y is the multiplicand and X is the multiplier, then P P + x Y i i j and 1 P P 2 i+1 i and the pro cess rep eats. Note that the multiplication of signed magnitude numb ers require a straight forward extension of the unsigned case. The magnitude part of the pro duct can b e computed just as in the unsigned magnitude case. The sign p of the pro duct P is computed from the signs of X and Y as 0 p x y 0 0 0 1.1 Two's complement Multiplication - Rob ertson's Algorithm Consider the case that we want to multiply two 8 bit numb ers X = x x :::x and Y = y y :::y . -
Integersintegersintegers Chapter 6Chapter 6 6 Chapter 6Chapter Chapter 6Chapter Chapter 6
IntegersIntegersIntegers Chapter 6Chapter 6 Chapter 6 Chapter 6 Chapter 6 6.1 Introduction Sunita’s mother has 8 bananas. Sunita has to go for a picnic with her friends. She wants to carry 10 bananas with her. Can her mother give 10 bananas to her? She does not have enough, so she borrows 2 bananas from her neighbour to be returned later. After giving 10 bananas to Sunita, how many bananas are left with her mother? Can we say that she has zero bananas? She has no bananas with her, but has to return two to her neighbour. So when she gets some more bananas, say 6, she will return 2 and be left with 4 only. Ronald goes to the market to purchase a pen. He has only ` 12 with him but the pen costs ` 15. The shopkeeper writes ` 3 as due amount from him. He writes ` 3 in his diary to remember Ronald’s debit. But how would he remember whether ` 3 has to be given or has to be taken from Ronald? Can he express this debit by some colour or sign? Ruchika and Salma are playing a game using a number strip which is marked from 0 to 25 at equal intervals. To begin with, both of them placed a coloured token at the zero mark. Two coloured dice are placed in a bag and are taken out by them one by one. If the die is red in colour, the token is moved forward as per the number shown on throwing this die. If it is blue, the token is moved backward as per the number 2021-22 MATHEMATICS shown when this die is thrown. -
Solutions to Exercises
Solutions to Exercises Solutions for Chapter 2 Exercise 2.1 Provide a function to check if a character is alphanumeric, that is lower case, upper case or numeric. One solution is to follow the same approach as in the function isupper for each of the three possibilities and link them with the special operator \/ : isalpha c = (c >= ’A’ & c <= ’Z’) \/ (c >= ’a’ & c <= ’z’) \/ (c >= ’0’ & c <= ’9’) An second approach is to use continued relations: isalpha c = (’A’ <= c <= ’Z’) \/ (’a’ <= c <= ’z’) \/ (’0’ <= c <= ’9’) A final approach is to define the functions isupper, islower and isdigit and combine them: isalpha c = (isupper c) \/ (islower c) \/ (isdigit c) This approach shows the advantage of reusing existing simple functions to build more complex functions. 268 Solutions to Exercises 269 Exercise 2.2 What happens in the following application and why? myfst (3, (4 div 0)) The function evaluates to 3, the potential divide by zero error is ignored because Miranda only evaluates as much of its parameter as it needs. Exercise 2.3 Define a function dup which takes a single element of any type and returns a tuple with the element duplicated. The answer is just a direct translation of the specification into Miranda: dup :: * -> (*,*) dup x = (x, x) Exercise 2.4 Modify the function solomonGrundy so that Thursday and Friday may be treated with special significance. The pattern matching version is easily modified; all that is needed is to insert the extra cases somewhere before the default pattern: solomonGrundy "Monday" = "Born" solomonGrundy "Thursday" = "Ill" solomonGrundy "Friday" = "Worse" solomonGrundy "Sunday" = "Buried" solomonGrundy anyday = "Did something else" By contrast, a guarded conditional version is rather messy: solomonGrundy day = "Born", if day = "Monday" = "Ill", if day = "Thursday" = "Worse", if day = "Friday" = "Buried", if day = "Sunday" = "Did something else", otherwise Exercise 2.5 Define a function intmax which takes a number pair and returns the greater of its two components. -
Divide-And-Conquer Algorithms
Chapter 2 Divide-and-conquer algorithms The divide-and-conquer strategy solves a problem by: 1. Breaking it into subproblems that are themselves smaller instances of the same type of problem 2. Recursively solving these subproblems 3. Appropriately combining their answers The real work is done piecemeal, in three different places: in the partitioning of problems into subproblems; at the very tail end of the recursion, when the subproblems are so small that they are solved outright; and in the gluing together of partial answers. These are held together and coordinated by the algorithm's core recursive structure. As an introductory example, we'll see how this technique yields a new algorithm for multi- plying numbers, one that is much more efficient than the method we all learned in elementary school! 2.1 Multiplication The mathematician Carl Friedrich Gauss (1777–1855) once noticed that although the product of two complex numbers (a + bi)(c + di) = ac bd + (bc + ad)i − seems to involve four real-number multiplications, it can in fact be done with just three: ac, bd, and (a + b)(c + d), since bc + ad = (a + b)(c + d) ac bd: − − In our big-O way of thinking, reducing the number of multiplications from four to three seems wasted ingenuity. But this modest improvement becomes very significant when applied recur- sively. 55 56 Algorithms Let's move away from complex numbers and see how this helps with regular multiplica- tion. Suppose x and y are two n-bit integers, and assume for convenience that n is a power of 2 (the more general case is hardly any different). -
1. Simplicity.-Let N Denote an Arbitrary Integer >0, and M an Odd of N, Aimn
160 MA THEMA TICS: E. T. BELL PROC. N. A. S. SIMPLICITY WITH RESPECT TO CERTAIN QUADRA TIC FORMS By E. T. BiLL DGPARTMUNT OF MATrHMATICS, CALUORNmA INSTITUTE OP T'CHINOIOGY Communicated December 28, 1929 1. Simplicity.-Let n denote an arbitrary integer >0, and m an odd interger >0. Write N[n = f] for the number of representations of n in the quadratic form f when this number is finite. If N[n = f] is a polynomial P(n) in the real divisors of n alone, N[n = f] is, by definition, simple; similarly for N[m = f]. In previous papers,1'23I have considered simplicity when f is a sum of an even number of squares. For an odd number > 1 of squares, no N[n = f] is simple, although if n be restricted to be a square, say k2, then N[k2 = f] is simple when f is a sum of 3, 5 or 7 squares, and for one case (k restricted) of 11 squares. To discuss simplicity for forms f in an odd number of variables, the above definition was extended in a former paper4 as follows. The exten- sion leads to theorems that are actually useful in calculations of numbers of representations, and it was devised with this end in view. Let 2 refer to all positive, zero or negative integers t which are congruent modulo M to a fixed integer T, and which render the arguments of the summand >0. Let P(n) denote a polynomial in the real divisors alone of n, and let c be a constant integer >O. -
Integer Work with Tiles
Winter 2013 INTEGER WORK WITH TILES Using +/- tiles, build the number “4” in at least three different ways. Sketch each model after you have built it. 1) 2) 3) Again using the +/- tiles, build the number “0” in at least three different ways. Sketch each model after you have built it. Each of these models represents a “NEUTRAL FIELD” or “ZERO PAIR.” 1) 2) 3) Now build at least three different representations of the number “-3.” Sketch each model after you have built it. 1) 2) 3) Using +/- tiles, build a model of the following numbers with the smallest number of tiles possible. Sketch each model below. 1) -6 2) 5 3) -1 Now add a neutral field to each model immediately above until you have AT LEAST 10 tiles. Has the value of each model changed? Explain below. Integer Work with Tiles Page 1 of 6 Winter 2013 INTEGER ADDITION AND SUBTRACTION Adapted from CPM Educational Program Addition Example: -8 + 6 0 Start with a neutral field which is an + + + + equal number of positive and negative - - - - tiles and has a value of zero. -8 +6 - - - - - - - - + + + + + + Display the two numbers using tiles. + + + + - - - - Combine the two numbers with the + + + + + + + + + + neutral field. - - - - - - - - - - - - -8 + (+6) Circle the “zeros.” Record the sum. + + + + + + + + + + - - - - - - - - - - - - -8 + 6 = -2 Subtraction Example: -2 – (-4) Start with the first number displayed + + + + with the neutral field. - - - - - - -2 Circle the second number in your sketch and show with an arrow that + + + + it will be removed. Remove the second - - - - - - number. -2 – (-4) Circle the “zeros.” Record the difference. + + + + - - -2 – (-4) = 2 Integer Work with Tiles Page 2 of 6 Winter 2013 INTEGER MULTIPLICATION Adapted from CPM Educational Program Multiplication is repeated addition or subtraction in a problem with two factors.