Skip to main content

New Bounds on the OBDD-Size of Integer Multiplication via Universal Hashing

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2010))

Abstract

Ordered binary decision diagrams (OBDDs) nowadays be- long to the most common representation types for Boolean functions. Although they allow important operations such as satisfiability test and equality test to be performed efficiently, their limitation lies in the fact that they may require exponential size for important functions. Bryant [8] has shown that any OBDD-representation of the function MULn-1;n, which computes the middle bit of the product of two n-bit numbers, requires at least 2n/8 nodes. In this paper a stronger bound of 2n/2/61 is proven by a new technique, using a recently found universal family of hash functions [23]. As a result, one cannot hope anymore to find reason- able small OBDDs even for the multiplication of relatively short integers, since for only a 64-bit multiplication millions of nodes are required. Fur- ther, a first non-trivial upper bound of 7/3. 24n/3 for the OBDD size of MULn-1;n is provided.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. B. Akers. Binary decision diagrams. IEEE Transactions on Computers, C-27:509–516, 1978.

    Article  Google Scholar 

  2. M. Atici and D. R. Stinson. Universal hashing and multiple authentication. In Advances in Cryptology CRYPTO’ 96, pp. 16–30 1996.

    Google Scholar 

  3. P. Beame, M. Tompa, and P. Yan. Communication-space tradeoffs for unrestricted protocols. SIAM Journal on Computing, 23:652–661, 1994.

    Article  MATH  MathSciNet  Google Scholar 

  4. B. Bollig and I. Wegener. Improving the variable ordering of OBDDs is NP-complete. IEEE Transactions on Computers, 45:993–1002, 1996.

    Article  MATH  Google Scholar 

  5. B. Bollig and I. Wegener. Asymptotically optimal bounds for OBDDs and the solution of some basic OBDD problems. In Proceedings of the 25th International Colloquium on Automata, Languages, and Programming, pp. 187–198. 2000.

    Google Scholar 

  6. Y. Breibart, H. B. Hunt III, and D. Rosenkrantz. On the size of binary decision diagrams representing Boolean functions. Theoretical Computer Science, 145:45–69, 1995.

    Article  MathSciNet  Google Scholar 

  7. R. E. Bryant. Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, C-35:677–691, 1986.

    Article  Google Scholar 

  8. R. E. Bryant. On the complexity of VLSI implementations and graph representations of boolean functions with applications to integer multiplication. IEEE Transactions on Computers, 40:205–213, 1991.

    Article  MathSciNet  Google Scholar 

  9. J. L. Carter and M. N. Wegman. Universal classes of hash functions. Journal of Computer and System Sciences, 18:143–154, 1979.

    Article  MATH  MathSciNet  Google Scholar 

  10. M. Dietzfelbinger. Universal hashing and k-wise independent random variables via integer arithmetic without primes. In Proceedings of the 13th Annual Symposium on Theoretical Aspects of Computer Science, pp. 569–580. 1996.

    Google Scholar 

  11. M. Dietzfelbinger, T. Hagerup, J. Katajainen, and M. Penttonen. A reliable randomized algorithm for the closest-pair problem. Journal of Algorithms, 25:19–51, 1997.

    Article  MATH  MathSciNet  Google Scholar 

  12. M. Dietzfelbinger, A. Karlin, K. Mehlhorn, F. Meyer auf der Heide, H. Rohnert, and R. E. Tarjan. Dynamic perfect hashing: Upper and lower bounds. SIAM Journal on Computing, 23:738–761, 1994.

    Article  MATH  MathSciNet  Google Scholar 

  13. M. L. Fredman, J. Komlós, and E. Szemerédi. Storing a sparse table with O(1) worst case access time. Journal of the Association for Computing Machinery, 31:538–544, 1984.

    MATH  MathSciNet  Google Scholar 

  14. R. Impagliazzo and D. Zuckerman. How to recycle random bits. In Proceedings of the 30th Annual IEEE Symposium on Fountations of Computer Science, pp. 248–253. 1989.

    Google Scholar 

  15. C. Y. Lee. Representation of switching circuits by binary-decision programs. The Bell Systems Technical Journal, 38:985–999, 1959.

    Google Scholar 

  16. Y. Mansour, N. Nisan, and P. Tiwari. The computational complexity of universal hashing. Theoretical Computer Science, 107:121–133, 1993.

    Article  MATH  MathSciNet  Google Scholar 

  17. P. Rogaway. Bucket hashing and its application to fast message authentication. In Advances in Cryptology CRYPTO’ 95, pp. 29–42. 1995.

    Google Scholar 

  18. D. Sieling. On the existence of polynomial time approximation schemes for OBDD minimization. In Proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science, pp. 205–215. 1998.

    Google Scholar 

  19. D. Sieling and I. Wegener. NC-algorithms for operations on binary decision diagrams. Parallel Processing Letters, 48:139–144, 1993.

    MATH  MathSciNet  Google Scholar 

  20. M. Sipser. A complexity theoretic approach to randomness. In Proceedings of the 15th Annual ACM Symposium on Theory of Computing, pp. 330–335. 1983.

    Google Scholar 

  21. I. Wegener. Branching Programs and Binary Decision Diagrams-Theory and Applications. Siam, first edition, 2000.

    Google Scholar 

  22. M. N. Wegman and J. L. Carter. New classes and applications of hash functions. In Proceedings of the 20th Annual IEEE Symposium on Fountations of Computer Science, pp. 175–182. 1979.

    Google Scholar 

  23. P. Woelfel. Efficient strongly universal and optimally universal hashing. In Mathematical Foundations of Computer Science: 24th International Symposium, pp. 262–272. 1999.

    Google Scholar 

  24. P. Woelfel. Klassen universeller Hashfunktionen mit ganzzahliger Arithmetik. Diploma thesis, Univ. Dortmund, 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Woelfel, P. (2001). New Bounds on the OBDD-Size of Integer Multiplication via Universal Hashing. In: Ferreira, A., Reichel, H. (eds) STACS 2001. STACS 2001. Lecture Notes in Computer Science, vol 2010. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44693-1_49

Download citation

  • DOI: https://doi.org/10.1007/3-540-44693-1_49

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41695-1

  • Online ISBN: 978-3-540-44693-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics