Computers in Mathematics 2020
DOI: 10.1201/9781003072157-5
|View full text |Cite
|
Sign up to set email alerts
|

Computer Algebra in the Service of Mathematical Physics and Number Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
20
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(20 citation statements)
references
References 1 publication
0
20
0
Order By: Relevance
“…where N is assumed to be a large positive integer? This question was recognized as a very important one in complexity theory, as well as in various applications to algorithmic number theory: Atkin-Swinnerton-Dyer congruences, integer factorization, discrete logarithm and point-counting [10,3].…”
Section: Introductionmentioning
confidence: 99%
“…where N is assumed to be a large positive integer? This question was recognized as a very important one in complexity theory, as well as in various applications to algorithmic number theory: Atkin-Swinnerton-Dyer congruences, integer factorization, discrete logarithm and point-counting [10,3].…”
Section: Introductionmentioning
confidence: 99%
“…org; Marc Mezzarobba, LIX, CNRS, École polytechnique, Institut polytechnique de Paris, 91200, Palaiseau, France, marc@ mezzarobba.net; Nobuki Takayama, Kobe University, Kobe, Japan, takayama@math.kobe-u.ac.jp; Tristan VacconUniversité de Limoges;, CNRS, XLIM UMR 7252, Limoges, France, tristan.vaccon@unilim.fr. ingredient for reaching a quasi-optimal complexity is an adaptation to the -adic setting of the socalled bit-burst method introduced by Chudnovsky and Chudnovsky [8,9], building on the binary splitting technique [e.g. , 16] (see also [2, §178]) and other ideas dating back to Brent's work on elementary functions [6].…”
Section: Introductionmentioning
confidence: 99%
“…We evaluate y (for two values of the parameter a) at N points z. We can compute each such function value in p 1+o(1) bit operations and p 1+o(1) space using the bit-burst algorithm [CC90], employing arithmetic in the number field Q(s). This bound holds uniformly for the required values of a and z, by the same argument as in [Mez12, Corollary 1], using the facts that |z| ≤ p 1+o(1) and that A as well as the defining polynomial of Q(s) have fixed degree and coefficients of bit size O(log p).…”
Section: Introductionmentioning
confidence: 99%
“…The only interesting point in the proof of Theorem 1 is the use of the bit-burst algorithm instead of naive summation, which allows us to compute the function Γ(a, z) in quasilinear rather than quadratic time. The bit-burst algorithm for holonomic functions has been known since the 1980s [CC90,vdH99,vdH01,Mez11,Mez12], and since the 1970s in special cases [Bre76a], yet we are not aware of a correct complexity bound of this kind in the literature for Dirichlet L-functions or even for the special case of the Riemann zeta function.…”
Section: Introductionmentioning
confidence: 99%