SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
Mapping the Discrete Logarithm
                                                                  Daniel R. Cloutier                                          Joshua Holden
                                                                 Cincinnati, OH, USA                               Rose-Hulman Institute of Technology
                                                               Daniel.R.Cloutier@                                      Terre Haute, IN 47803, USA
                                                             alumni.rose-hulman.edu                              Joshua.Holden@rose-hulman.edu


1       Graphs Produced by Discrete Exponentiation:                                                                This yields the following results

        A Comparison to Random Graphs                                                                                   Ξ1(z) =
                                                                                                                                    1
                                                                                                                                           ln
                                                                                                                                                    1
                                                                                                                                                               (Number of components)                                  (4)
We investigate the functional graph produced by the discrete exponentiation                                                     1 − zb(z)       1 − zb(z)
transformation                                                                                                                     zb(z)
                                                                                                                        Ξ2(z) =                    (Number of cyclic nodes)                                            (5)
                                g a mod p.                                                                                      (1 − zb(z)) 2
                                                                                                                                     z2
This is the inverse of the discrete logarithm, which is used in many crypto-                                            Ξ3(z) =               .     (Number of terminal nodes)                                         (6)
                                                                                                                                (1 − 2z 2)3/2
graphic algorithms. We predict that these graphs behave like random graphs
with the same in-degrees and out-degrees for each node.                                                           We compute an asymptotic form for each of these by performing a singular-
                                                                                                               ity analysis1 as in [2, Section 2]. (See [1] for full proofs.)
2       Terminology and Background                                                                             Theorem 1. The expected values of the following parameters in a random bi-
A functional graph is a directed graph such that each vertex must have exactly                                 nary functional graph of size n, as n → ∞, are asymptotic to
one edge directed out from it. An m-ary functional graph is a graph where
each node has in-degree of exactly zero or m.                                                                                                                                    ln (2n) + γ
  There are a number of statistics of interest derived from functional graphs.                                                               Number of components                                                      (i)
                                                                                                                                                                                      2
These include:                                                                                                                             Number of cyclic nodes                   πn/2 − 1                          (ii)
 • number of connected components                                                                                                        Number of terminal nodes                n/2                                 (iii)
 • number of cyclic nodes                                                                                        In part (i), γ represents the Euler constant which is approximately
 • number of terminal nodes                                                                                    0.57721566. Note that the formula in part (iii) can be proved to be exact.
 • average cycle length                                                                                          Using similar techniques, we can calculate:
                                                                                                               Theorem 2. The expected values for the following parameters as seen from a
 • maximum cycle length
                                                                                                               random node in a random binary functional graph of size n, as n → ∞, are
 • average tail length                                                                                         asymptotic to
 • maximum tail length
                                                                                                                                               Average cycle length                πn/8                                (i)
                                                                                                                                                  Average tail length              πn/8                                (ii)

                                                                                                               Theorem 3. The expected values of the largest cycle and the largest tail in a
                                                                                                               random binary functional graph of size n, as n → ∞, are asymptotic to

                                                                                                                                             πn ∞             ∞
                                                                                                                                                                 −u du                                             √
                                                                                                                   Largest cycle                  1 − exp −     e                               dv ≈ 0.78248 n
                                                                                                                                              2 0           v       u
                                                                                                                                                                                                                        (i)
                                                                                                                                         √                                            √
                                                                                                                     Largest tail            2πn ln 2 − 3 + 2 ln 2 ≈ 1.73746 n − 1.61371                               (ii)

                                                                                                               4       Success in Predicting the Observed Results
                                                                                                               We generated experimental data for the parameters described by these theoret-
                                                                                                               ical predictions. The generation and analysis of each of the discrete exponen-
Figure 1: The graph generated using f (x) = 3x mod 11. This graph has two                                      tiation graphs was handled by C++ code written by the first author. The com-
connected components: one containing a cycle of length three (1,3,5) and the                                   putation took approximately one week for each prime. The statistics observed
other containing a cycle of length one (fixed point) at 4.                                                      (Table 1) seem to support the claim that binary functional graphs induced by
                                                                                                               exponentiation modulo a prime behave in the same fashion as random binary
                                                                                                               functional graphs.
3       Theoretical Predictions for Random Binary
                                                                                                                                                   100043                  100057                  106261
        Functional Graphs: The Basis for Comparison                                                                                          Observed Error Observed Error Observed Error
The methods in [2] can be extended to develop estimates for these parameters                                            Components             6.389      0.047%       6.364      0.437%       6.370     0.810%
in random binary functional graphs. Define the following:                                                                Cyclic Nodes          395.303 0.029% 395.858 0.105% 408.433 0.217%
        BinFunGraph = set(Components)                                                                                   Terminal Nodes         50021        0%         50028        0%        53130         0%
        Component = cycle(Node*BinaryTree)                                                                              Avg Cycle             198.319 0.056% 197.766 0.230% 202.651 0.795%
        BinaryTree = Node + Node*set(BinaryTree, cardinality = 2)                                                       Avg Tail              197.961 0.125% 197.550 0.339% 202.422 0.907%
        Node            = Atomic Unit                                                                                   Max Cycle             247.261 0.094% 247.302 0.082% 256.986 0.754%
   Imitating [2, Section 2.1], the generating functions of interest are                                                 Max Tail              541.827 1.115% 549.588 1.145% 566.370 1.744%

                   f (z) = ec(z)           (Binary functional graphs)                                  (1)     Table 1: The observed results for the three primes over all binary functional
                                  1                                                                            graphs generated and the corresponding percent errors.
                    c(z) = ln                        (Connected components)                            (2)
                              1 − zb(z)
                                1 2
                    b(z) = z + zb (z)                (Binary trees)                                    (3)     References
                                2
                                                                                                               [1] Daniel R. Cloutier and Joshua Holden. Mapping the discrete logarithm.
  A bivariate generating function, ξ(u, z), is defined with parameter u marking                                     http://xxx.lanl.gov/abs/math.NT/0605024.
the elements of interest. The mean value generating function, Ξ(z), is found as                                [2] Philippe Flajolet and Andrew M. Odlyzko. Random mapping statistics.
                                                                                                                   In Advances in cryptology—EUROCRYPT ’89 (Houthalen, 1989), volume
                                                 ∂ξ                                                                434 of Lecture Notes in Comput. Sci., pages 329–354. Springer, Berlin,
                                          Ξ(z) =        .
                                                 ∂u u=1                                                            1990.
    1
     The analyses in this paper have been performed using the computer algebra program Maple and the packages created as part of the Algorithms Project at INRIA, Rocquencourt, France. The packages can be found online at
http://pauillac.inria.fr/algo/libraries/software.html.

Más contenido relacionado

La actualidad más candente

7 - Model Assessment and Selection
7 - Model Assessment and Selection7 - Model Assessment and Selection
7 - Model Assessment and SelectionNikita Zhiltsov
 
Engr 371 final exam april 2006
Engr 371 final exam april 2006Engr 371 final exam april 2006
Engr 371 final exam april 2006amnesiann
 
Detecting Bugs in Binaries Using Decompilation and Data Flow Analysis
Detecting Bugs in Binaries Using Decompilation and Data Flow AnalysisDetecting Bugs in Binaries Using Decompilation and Data Flow Analysis
Detecting Bugs in Binaries Using Decompilation and Data Flow AnalysisSilvio Cesare
 
Engr 371 final exam april 2010
Engr 371 final exam april 2010Engr 371 final exam april 2010
Engr 371 final exam april 2010amnesiann
 
Lecture6
Lecture6Lecture6
Lecture6voracle
 
Parameter Estimation for Semiparametric Models with CMARS and Its Applications
Parameter Estimation for Semiparametric Models with CMARS and Its ApplicationsParameter Estimation for Semiparametric Models with CMARS and Its Applications
Parameter Estimation for Semiparametric Models with CMARS and Its ApplicationsSSA KPI
 
Lesson 25: Evaluating Definite Integrals (handout)
Lesson 25: Evaluating Definite Integrals (handout)Lesson 25: Evaluating Definite Integrals (handout)
Lesson 25: Evaluating Definite Integrals (handout)Matthew Leingang
 
Java cơ bản java co ban
Java cơ bản java co ban Java cơ bản java co ban
Java cơ bản java co ban ifis
 
IGARSS2011 FR3.T08.3 BenDavid.pdf
IGARSS2011 FR3.T08.3 BenDavid.pdfIGARSS2011 FR3.T08.3 BenDavid.pdf
IGARSS2011 FR3.T08.3 BenDavid.pdfgrssieee
 
Camera calibration
Camera calibrationCamera calibration
Camera calibrationYuji Oyamada
 
20101017 program analysis_for_security_livshits_lecture02_compilers
20101017 program analysis_for_security_livshits_lecture02_compilers20101017 program analysis_for_security_livshits_lecture02_compilers
20101017 program analysis_for_security_livshits_lecture02_compilersComputer Science Club
 
Quoc le tera-scale deep learning
Quoc le   tera-scale deep learningQuoc le   tera-scale deep learning
Quoc le tera-scale deep learningzukun
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based EncryptionPratik Poddar
 
Lesson 2: A Catalog of Essential Functions (handout)
Lesson 2: A Catalog of Essential Functions (handout)Lesson 2: A Catalog of Essential Functions (handout)
Lesson 2: A Catalog of Essential Functions (handout)Matthew Leingang
 
Wavelets for computer_graphics_stollnitz
Wavelets for computer_graphics_stollnitzWavelets for computer_graphics_stollnitz
Wavelets for computer_graphics_stollnitzJuliocaramba
 

La actualidad más candente (20)

7 - Model Assessment and Selection
7 - Model Assessment and Selection7 - Model Assessment and Selection
7 - Model Assessment and Selection
 
Engr 371 final exam april 2006
Engr 371 final exam april 2006Engr 371 final exam april 2006
Engr 371 final exam april 2006
 
Detecting Bugs in Binaries Using Decompilation and Data Flow Analysis
Detecting Bugs in Binaries Using Decompilation and Data Flow AnalysisDetecting Bugs in Binaries Using Decompilation and Data Flow Analysis
Detecting Bugs in Binaries Using Decompilation and Data Flow Analysis
 
Engr 371 final exam april 2010
Engr 371 final exam april 2010Engr 371 final exam april 2010
Engr 371 final exam april 2010
 
Lecture6
Lecture6Lecture6
Lecture6
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Lesson 1: Functions
Lesson 1: FunctionsLesson 1: Functions
Lesson 1: Functions
 
Parameter Estimation for Semiparametric Models with CMARS and Its Applications
Parameter Estimation for Semiparametric Models with CMARS and Its ApplicationsParameter Estimation for Semiparametric Models with CMARS and Its Applications
Parameter Estimation for Semiparametric Models with CMARS and Its Applications
 
Lesson 25: Evaluating Definite Integrals (handout)
Lesson 25: Evaluating Definite Integrals (handout)Lesson 25: Evaluating Definite Integrals (handout)
Lesson 25: Evaluating Definite Integrals (handout)
 
Java cơ bản java co ban
Java cơ bản java co ban Java cơ bản java co ban
Java cơ bản java co ban
 
IGARSS2011 FR3.T08.3 BenDavid.pdf
IGARSS2011 FR3.T08.3 BenDavid.pdfIGARSS2011 FR3.T08.3 BenDavid.pdf
IGARSS2011 FR3.T08.3 BenDavid.pdf
 
36
3636
36
 
Camera calibration
Camera calibrationCamera calibration
Camera calibration
 
20101017 program analysis_for_security_livshits_lecture02_compilers
20101017 program analysis_for_security_livshits_lecture02_compilers20101017 program analysis_for_security_livshits_lecture02_compilers
20101017 program analysis_for_security_livshits_lecture02_compilers
 
Quoc le tera-scale deep learning
Quoc le   tera-scale deep learningQuoc le   tera-scale deep learning
Quoc le tera-scale deep learning
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
 
Lesson 2: A Catalog of Essential Functions (handout)
Lesson 2: A Catalog of Essential Functions (handout)Lesson 2: A Catalog of Essential Functions (handout)
Lesson 2: A Catalog of Essential Functions (handout)
 
Mm2521542158
Mm2521542158Mm2521542158
Mm2521542158
 
Wavelets for computer_graphics_stollnitz
Wavelets for computer_graphics_stollnitzWavelets for computer_graphics_stollnitz
Wavelets for computer_graphics_stollnitz
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 

Destacado

Performance vs. Salários NBA 2011-2012
Performance vs. Salários NBA 2011-2012Performance vs. Salários NBA 2011-2012
Performance vs. Salários NBA 2011-2012Idel Halfen
 
Web 2.0 en la Educacion
Web 2.0 en la EducacionWeb 2.0 en la Educacion
Web 2.0 en la Educacionfeelynamin
 
What is it european day of languages
What is it european day of languagesWhat is it european day of languages
What is it european day of languagesivid1990
 
PRESENTATION BY SRI TEJA
PRESENTATION BY SRI TEJAPRESENTATION BY SRI TEJA
PRESENTATION BY SRI TEJAvardhamanece
 
Assignment on literature review
Assignment on literature reviewAssignment on literature review
Assignment on literature reviewYuuta Takahashi
 
Căn hộ phố đông 653 trcăn mở bán đợt cuối bàn giao nhà 0989707653
Căn hộ phố đông 653 trcăn mở bán đợt cuối bàn giao nhà 0989707653Căn hộ phố đông 653 trcăn mở bán đợt cuối bàn giao nhà 0989707653
Căn hộ phố đông 653 trcăn mở bán đợt cuối bàn giao nhà 0989707653kimthoa3124
 
Formación Pizarra Digital 2008-2009
Formación Pizarra Digital 2008-2009Formación Pizarra Digital 2008-2009
Formación Pizarra Digital 2008-2009cprgraus
 
Cronicas de una resurreccion anunciada 20.04.2014
Cronicas de una resurreccion anunciada   20.04.2014Cronicas de una resurreccion anunciada   20.04.2014
Cronicas de una resurreccion anunciada 20.04.2014iacymcallao
 
Herramientas colaborativas
Herramientas colaborativasHerramientas colaborativas
Herramientas colaborativasJohan Llanten
 
10 способов как не надо тестировать высоконагруженный веб-сервис
10 способов как не надо тестировать высоконагруженный веб-сервис10 способов как не надо тестировать высоконагруженный веб-сервис
10 способов как не надо тестировать высоконагруженный веб-сервисSQALab
 
Informacion Feria de Canton 2,012
Informacion Feria de Canton 2,012Informacion Feria de Canton 2,012
Informacion Feria de Canton 2,012Canton2012
 
Modelo O S I Taller 8
Modelo  O S I     Taller 8Modelo  O S I     Taller 8
Modelo O S I Taller 8edvinogo
 
Capitulo oriental 18
Capitulo oriental 18Capitulo oriental 18
Capitulo oriental 18Palomense
 
WeddingsEventsRebekah
WeddingsEventsRebekahWeddingsEventsRebekah
WeddingsEventsRebekahrebekahandre
 

Destacado (20)

Diseño Web 02
Diseño Web 02Diseño Web 02
Diseño Web 02
 
Lf353
Lf353Lf353
Lf353
 
Performance vs. Salários NBA 2011-2012
Performance vs. Salários NBA 2011-2012Performance vs. Salários NBA 2011-2012
Performance vs. Salários NBA 2011-2012
 
Web 2.0 en la Educacion
Web 2.0 en la EducacionWeb 2.0 en la Educacion
Web 2.0 en la Educacion
 
Eva Giberti Sexualidad
Eva Giberti SexualidadEva Giberti Sexualidad
Eva Giberti Sexualidad
 
Comoserhacker
ComoserhackerComoserhacker
Comoserhacker
 
What is it european day of languages
What is it european day of languagesWhat is it european day of languages
What is it european day of languages
 
PRESENTATION BY SRI TEJA
PRESENTATION BY SRI TEJAPRESENTATION BY SRI TEJA
PRESENTATION BY SRI TEJA
 
Assignment on literature review
Assignment on literature reviewAssignment on literature review
Assignment on literature review
 
Căn hộ phố đông 653 trcăn mở bán đợt cuối bàn giao nhà 0989707653
Căn hộ phố đông 653 trcăn mở bán đợt cuối bàn giao nhà 0989707653Căn hộ phố đông 653 trcăn mở bán đợt cuối bàn giao nhà 0989707653
Căn hộ phố đông 653 trcăn mở bán đợt cuối bàn giao nhà 0989707653
 
Formación Pizarra Digital 2008-2009
Formación Pizarra Digital 2008-2009Formación Pizarra Digital 2008-2009
Formación Pizarra Digital 2008-2009
 
Cronicas de una resurreccion anunciada 20.04.2014
Cronicas de una resurreccion anunciada   20.04.2014Cronicas de una resurreccion anunciada   20.04.2014
Cronicas de una resurreccion anunciada 20.04.2014
 
Herramientas colaborativas
Herramientas colaborativasHerramientas colaborativas
Herramientas colaborativas
 
10 способов как не надо тестировать высоконагруженный веб-сервис
10 способов как не надо тестировать высоконагруженный веб-сервис10 способов как не надо тестировать высоконагруженный веб-сервис
10 способов как не надо тестировать высоконагруженный веб-сервис
 
Informacion Feria de Canton 2,012
Informacion Feria de Canton 2,012Informacion Feria de Canton 2,012
Informacion Feria de Canton 2,012
 
comets of preetam teja
comets of preetam tejacomets of preetam teja
comets of preetam teja
 
Modelo O S I Taller 8
Modelo  O S I     Taller 8Modelo  O S I     Taller 8
Modelo O S I Taller 8
 
Capitulo oriental 18
Capitulo oriental 18Capitulo oriental 18
Capitulo oriental 18
 
JMcI/C2K
JMcI/C2KJMcI/C2K
JMcI/C2K
 
WeddingsEventsRebekah
WeddingsEventsRebekahWeddingsEventsRebekah
WeddingsEventsRebekah
 

Similar a Mapping the discrete logarithm

G234353
G234353G234353
G234353irjes
 
Applications Of One Type Of Euler-Lagrange Fractional Differential Equation
Applications Of One Type Of Euler-Lagrange Fractional Differential EquationApplications Of One Type Of Euler-Lagrange Fractional Differential Equation
Applications Of One Type Of Euler-Lagrange Fractional Differential EquationIRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Quantifying the call blending balance in two way communication retrial queues...
Quantifying the call blending balance in two way communication retrial queues...Quantifying the call blending balance in two way communication retrial queues...
Quantifying the call blending balance in two way communication retrial queues...wrogiest
 
Dsp U Lec06 The Z Transform And Its Application
Dsp U   Lec06 The Z Transform And Its ApplicationDsp U   Lec06 The Z Transform And Its Application
Dsp U Lec06 The Z Transform And Its Applicationtaha25
 
4213ijaia05
4213ijaia054213ijaia05
4213ijaia05ijaia
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersIDES Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Application of matrix algebra to multivariate data using standardize scores
Application of matrix algebra to multivariate data using standardize scoresApplication of matrix algebra to multivariate data using standardize scores
Application of matrix algebra to multivariate data using standardize scoresAlexander Decker
 
11.application of matrix algebra to multivariate data using standardize scores
11.application of matrix algebra to multivariate data using standardize scores11.application of matrix algebra to multivariate data using standardize scores
11.application of matrix algebra to multivariate data using standardize scoresAlexander Decker
 
Dsp U Lec04 Discrete Time Signals & Systems
Dsp U   Lec04 Discrete Time Signals & SystemsDsp U   Lec04 Discrete Time Signals & Systems
Dsp U Lec04 Discrete Time Signals & Systemstaha25
 
Implementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
Implementing 3D SPHARM Surfaces Registration on Cell B.E. ProcessorImplementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
Implementing 3D SPHARM Surfaces Registration on Cell B.E. ProcessorPTIHPA
 
Dsp U Lec08 Fir Filter Design
Dsp U   Lec08 Fir Filter DesignDsp U   Lec08 Fir Filter Design
Dsp U Lec08 Fir Filter Designtaha25
 
Approximate Bayesian Computation on GPUs
Approximate Bayesian Computation on GPUsApproximate Bayesian Computation on GPUs
Approximate Bayesian Computation on GPUsMichael Stumpf
 
MATHEON Center Days: Index determination and structural analysis using Algori...
MATHEON Center Days: Index determination and structural analysis using Algori...MATHEON Center Days: Index determination and structural analysis using Algori...
MATHEON Center Days: Index determination and structural analysis using Algori...Dagmar Monett
 

Similar a Mapping the discrete logarithm (20)

G234353
G234353G234353
G234353
 
HOPFIELD NETWORK
HOPFIELD NETWORKHOPFIELD NETWORK
HOPFIELD NETWORK
 
Applications Of One Type Of Euler-Lagrange Fractional Differential Equation
Applications Of One Type Of Euler-Lagrange Fractional Differential EquationApplications Of One Type Of Euler-Lagrange Fractional Differential Equation
Applications Of One Type Of Euler-Lagrange Fractional Differential Equation
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Quantifying the call blending balance in two way communication retrial queues...
Quantifying the call blending balance in two way communication retrial queues...Quantifying the call blending balance in two way communication retrial queues...
Quantifying the call blending balance in two way communication retrial queues...
 
Dsp U Lec06 The Z Transform And Its Application
Dsp U   Lec06 The Z Transform And Its ApplicationDsp U   Lec06 The Z Transform And Its Application
Dsp U Lec06 The Z Transform And Its Application
 
4213ijaia05
4213ijaia054213ijaia05
4213ijaia05
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR Filters
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Simplified Model
Simplified ModelSimplified Model
Simplified Model
 
J0535964
J0535964J0535964
J0535964
 
Application of matrix algebra to multivariate data using standardize scores
Application of matrix algebra to multivariate data using standardize scoresApplication of matrix algebra to multivariate data using standardize scores
Application of matrix algebra to multivariate data using standardize scores
 
11.application of matrix algebra to multivariate data using standardize scores
11.application of matrix algebra to multivariate data using standardize scores11.application of matrix algebra to multivariate data using standardize scores
11.application of matrix algebra to multivariate data using standardize scores
 
San diego pres
San diego presSan diego pres
San diego pres
 
Dsp U Lec04 Discrete Time Signals & Systems
Dsp U   Lec04 Discrete Time Signals & SystemsDsp U   Lec04 Discrete Time Signals & Systems
Dsp U Lec04 Discrete Time Signals & Systems
 
Er24902905
Er24902905Er24902905
Er24902905
 
Implementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
Implementing 3D SPHARM Surfaces Registration on Cell B.E. ProcessorImplementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
Implementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
 
Dsp U Lec08 Fir Filter Design
Dsp U   Lec08 Fir Filter DesignDsp U   Lec08 Fir Filter Design
Dsp U Lec08 Fir Filter Design
 
Approximate Bayesian Computation on GPUs
Approximate Bayesian Computation on GPUsApproximate Bayesian Computation on GPUs
Approximate Bayesian Computation on GPUs
 
MATHEON Center Days: Index determination and structural analysis using Algori...
MATHEON Center Days: Index determination and structural analysis using Algori...MATHEON Center Days: Index determination and structural analysis using Algori...
MATHEON Center Days: Index determination and structural analysis using Algori...
 

Más de Joshua Holden

The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...Joshua Holden
 
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...Joshua Holden
 
Statistics for fixed points of x ↦ x^x mod p
Statistics for fixed points of x  ↦ x^x mod pStatistics for fixed points of x  ↦ x^x mod p
Statistics for fixed points of x ↦ x^x mod pJoshua Holden
 
Teaching the Group Theory of Permutation Ciphers
Teaching the Group Theory of Permutation CiphersTeaching the Group Theory of Permutation Ciphers
Teaching the Group Theory of Permutation CiphersJoshua Holden
 
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...Joshua Holden
 
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...Joshua Holden
 
A statistical look at maps of the discrete logarithm
A statistical look at maps of the discrete logarithmA statistical look at maps of the discrete logarithm
A statistical look at maps of the discrete logarithmJoshua Holden
 
Fixed points and two-cycles of the self-power map
Fixed points and two-cycles of the self-power mapFixed points and two-cycles of the self-power map
Fixed points and two-cycles of the self-power mapJoshua Holden
 
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...Joshua Holden
 
A Good Hash Function is Hard to Find, and Vice Versa
A Good Hash Function is Hard to Find, and Vice VersaA Good Hash Function is Hard to Find, and Vice Versa
A Good Hash Function is Hard to Find, and Vice VersaJoshua Holden
 
How Do You Say 'Cryptography' in Romanian?
How Do You Say 'Cryptography' in Romanian?How Do You Say 'Cryptography' in Romanian?
How Do You Say 'Cryptography' in Romanian?Joshua Holden
 
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...Joshua Holden
 
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...Joshua Holden
 
How to Paint Your Way out of a Maze
How to Paint Your Way out of a MazeHow to Paint Your Way out of a Maze
How to Paint Your Way out of a MazeJoshua Holden
 
Blackwork embroidery and algorithms for maze traversals
Blackwork embroidery and algorithms for maze traversalsBlackwork embroidery and algorithms for maze traversals
Blackwork embroidery and algorithms for maze traversalsJoshua Holden
 
Mathematical Cryptography
Mathematical CryptographyMathematical Cryptography
Mathematical CryptographyJoshua Holden
 
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...Joshua Holden
 
Modular Arithmetic and Trap Door Ciphers
Modular Arithmetic and Trap Door CiphersModular Arithmetic and Trap Door Ciphers
Modular Arithmetic and Trap Door CiphersJoshua Holden
 
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...Joshua Holden
 

Más de Joshua Holden (20)

The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
 
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
 
Statistics for fixed points of x ↦ x^x mod p
Statistics for fixed points of x  ↦ x^x mod pStatistics for fixed points of x  ↦ x^x mod p
Statistics for fixed points of x ↦ x^x mod p
 
Teaching the Group Theory of Permutation Ciphers
Teaching the Group Theory of Permutation CiphersTeaching the Group Theory of Permutation Ciphers
Teaching the Group Theory of Permutation Ciphers
 
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
 
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
 
A statistical look at maps of the discrete logarithm
A statistical look at maps of the discrete logarithmA statistical look at maps of the discrete logarithm
A statistical look at maps of the discrete logarithm
 
Fixed points and two-cycles of the self-power map
Fixed points and two-cycles of the self-power mapFixed points and two-cycles of the self-power map
Fixed points and two-cycles of the self-power map
 
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
 
A Good Hash Function is Hard to Find, and Vice Versa
A Good Hash Function is Hard to Find, and Vice VersaA Good Hash Function is Hard to Find, and Vice Versa
A Good Hash Function is Hard to Find, and Vice Versa
 
How Do You Say 'Cryptography' in Romanian?
How Do You Say 'Cryptography' in Romanian?How Do You Say 'Cryptography' in Romanian?
How Do You Say 'Cryptography' in Romanian?
 
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
 
Math in Your Hands
Math in Your HandsMath in Your Hands
Math in Your Hands
 
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
 
How to Paint Your Way out of a Maze
How to Paint Your Way out of a MazeHow to Paint Your Way out of a Maze
How to Paint Your Way out of a Maze
 
Blackwork embroidery and algorithms for maze traversals
Blackwork embroidery and algorithms for maze traversalsBlackwork embroidery and algorithms for maze traversals
Blackwork embroidery and algorithms for maze traversals
 
Mathematical Cryptography
Mathematical CryptographyMathematical Cryptography
Mathematical Cryptography
 
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
 
Modular Arithmetic and Trap Door Ciphers
Modular Arithmetic and Trap Door CiphersModular Arithmetic and Trap Door Ciphers
Modular Arithmetic and Trap Door Ciphers
 
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
 

Último

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Último (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Mapping the discrete logarithm

  • 1. Mapping the Discrete Logarithm Daniel R. Cloutier Joshua Holden Cincinnati, OH, USA Rose-Hulman Institute of Technology Daniel.R.Cloutier@ Terre Haute, IN 47803, USA alumni.rose-hulman.edu Joshua.Holden@rose-hulman.edu 1 Graphs Produced by Discrete Exponentiation: This yields the following results A Comparison to Random Graphs Ξ1(z) = 1 ln 1 (Number of components) (4) We investigate the functional graph produced by the discrete exponentiation 1 − zb(z) 1 − zb(z) transformation zb(z) Ξ2(z) = (Number of cyclic nodes) (5) g a mod p. (1 − zb(z)) 2 z2 This is the inverse of the discrete logarithm, which is used in many crypto- Ξ3(z) = . (Number of terminal nodes) (6) (1 − 2z 2)3/2 graphic algorithms. We predict that these graphs behave like random graphs with the same in-degrees and out-degrees for each node. We compute an asymptotic form for each of these by performing a singular- ity analysis1 as in [2, Section 2]. (See [1] for full proofs.) 2 Terminology and Background Theorem 1. The expected values of the following parameters in a random bi- A functional graph is a directed graph such that each vertex must have exactly nary functional graph of size n, as n → ∞, are asymptotic to one edge directed out from it. An m-ary functional graph is a graph where each node has in-degree of exactly zero or m. ln (2n) + γ There are a number of statistics of interest derived from functional graphs. Number of components (i) 2 These include: Number of cyclic nodes πn/2 − 1 (ii) • number of connected components Number of terminal nodes n/2 (iii) • number of cyclic nodes In part (i), γ represents the Euler constant which is approximately • number of terminal nodes 0.57721566. Note that the formula in part (iii) can be proved to be exact. • average cycle length Using similar techniques, we can calculate: Theorem 2. The expected values for the following parameters as seen from a • maximum cycle length random node in a random binary functional graph of size n, as n → ∞, are • average tail length asymptotic to • maximum tail length Average cycle length πn/8 (i) Average tail length πn/8 (ii) Theorem 3. The expected values of the largest cycle and the largest tail in a random binary functional graph of size n, as n → ∞, are asymptotic to πn ∞ ∞ −u du √ Largest cycle 1 − exp − e dv ≈ 0.78248 n 2 0 v u (i) √ √ Largest tail 2πn ln 2 − 3 + 2 ln 2 ≈ 1.73746 n − 1.61371 (ii) 4 Success in Predicting the Observed Results We generated experimental data for the parameters described by these theoret- ical predictions. The generation and analysis of each of the discrete exponen- Figure 1: The graph generated using f (x) = 3x mod 11. This graph has two tiation graphs was handled by C++ code written by the first author. The com- connected components: one containing a cycle of length three (1,3,5) and the putation took approximately one week for each prime. The statistics observed other containing a cycle of length one (fixed point) at 4. (Table 1) seem to support the claim that binary functional graphs induced by exponentiation modulo a prime behave in the same fashion as random binary functional graphs. 3 Theoretical Predictions for Random Binary 100043 100057 106261 Functional Graphs: The Basis for Comparison Observed Error Observed Error Observed Error The methods in [2] can be extended to develop estimates for these parameters Components 6.389 0.047% 6.364 0.437% 6.370 0.810% in random binary functional graphs. Define the following: Cyclic Nodes 395.303 0.029% 395.858 0.105% 408.433 0.217% BinFunGraph = set(Components) Terminal Nodes 50021 0% 50028 0% 53130 0% Component = cycle(Node*BinaryTree) Avg Cycle 198.319 0.056% 197.766 0.230% 202.651 0.795% BinaryTree = Node + Node*set(BinaryTree, cardinality = 2) Avg Tail 197.961 0.125% 197.550 0.339% 202.422 0.907% Node = Atomic Unit Max Cycle 247.261 0.094% 247.302 0.082% 256.986 0.754% Imitating [2, Section 2.1], the generating functions of interest are Max Tail 541.827 1.115% 549.588 1.145% 566.370 1.744% f (z) = ec(z) (Binary functional graphs) (1) Table 1: The observed results for the three primes over all binary functional 1 graphs generated and the corresponding percent errors. c(z) = ln (Connected components) (2) 1 − zb(z) 1 2 b(z) = z + zb (z) (Binary trees) (3) References 2 [1] Daniel R. Cloutier and Joshua Holden. Mapping the discrete logarithm. A bivariate generating function, ξ(u, z), is defined with parameter u marking http://xxx.lanl.gov/abs/math.NT/0605024. the elements of interest. The mean value generating function, Ξ(z), is found as [2] Philippe Flajolet and Andrew M. Odlyzko. Random mapping statistics. In Advances in cryptology—EUROCRYPT ’89 (Houthalen, 1989), volume ∂ξ 434 of Lecture Notes in Comput. Sci., pages 329–354. Springer, Berlin, Ξ(z) = . ∂u u=1 1990. 1 The analyses in this paper have been performed using the computer algebra program Maple and the packages created as part of the Algorithms Project at INRIA, Rocquencourt, France. The packages can be found online at http://pauillac.inria.fr/algo/libraries/software.html.