Search results
Results from the WOW.Com Content Network
For example, log 10 10000 = 4, and log 10 0.001 = −3. These are instances of the discrete logarithm problem. Other base-10 logarithms in the real numbers are not instances of the discrete logarithm problem, because they involve non-integer exponents. For example, the equation log 10 53 = 1.724276… means that 10 1.724276… = 53.
The discrete logarithm algorithm and the factoring algorithm are instances of the period-finding algorithm, and all three are instances of the hidden subgroup problem. On a quantum computer, to factor an integer , Shor's algorithm runs in polynomial time, meaning the time taken is polynomial in . [6]
The hidden subgroup problem is especially important in the theory of quantum computing for the following reasons.. Shor's algorithm for factoring and for finding discrete logarithms (as well as several of its extensions) relies on the ability of quantum computers to solve the HSP for finite abelian groups.
This team was able to compute discrete logarithms in GF(2 30750) using 25,481,219 core hours on clusters based on the Intel Xeon architecture. This computation was the first large-scale example using the elimination step of the quasi-polynomial algorithm. [9] Previous records in a finite field of characteristic 2 were announced by:
In computer science, polylogarithmic functions occur as the order of time for some data structure operations. Additionally, the exponential function of a polylogarithmic function produces a function with quasi-polynomial growth, and algorithms with this as their time complexity are said to take quasi-polynomial time. [2]
That is, assuming a solution for H takes 1 unit time, H ' s solution can be used to solve L in polynomial time. [1] [2] As a consequence, finding a polynomial time algorithm to solve a single NP-hard problem would give polynomial time algorithms for all the problems in the complexity class NP.
Solvable in polynomial time for 2-sets (this is a matching). [2] [3]: SP2 Finding the global minimum solution of a Hartree-Fock problem [37] Upward planarity testing [8] Hospitals-and-residents problem with couples; Knot genus [38] Latin square completion (the problem of determining if a partially filled square can be completed)
The discrete log problem is of fundamental importance to the area of public key cryptography. Many of the most commonly used cryptography systems are based on the assumption that the discrete log is extremely difficult to compute; the more difficult it is, the more security it provides a data transfer.