| 
 
 
 | 
                 . This paper is
                part of a project that has received funding from the French
                “Agence de l'innovation de défense”.
. This paper is
                part of a project that has received funding from the French
                “Agence de l'innovation de défense”.
              
                 . This article has
                been written using GNU TeXmacs [49].
. This article has
                been written using GNU TeXmacs [49].
              
| Given an algebraic germ of a plane curve at the origin, in terms of a bivariate polynomial, we analyze the complexity of computing an irreducible decomposition up to any given truncation order. With a suitable representation of the irreducible components, and whenever the characteristic of the ground field is zero or larger than the degree of the germ, we design a new algorithm that involves a nearly linear number of arithmetic operations in the ground field plus a small amount of irreducible univariate polynomial factorizations. 
             | 
      Algebraic curves play a central role in algebraic geometry and various
      applications in effective algebra. In particular, efficient algorithms
      are needed to compute topological or analytic invariants, arithmetic
      genus, desingularized models, integral closures, Riemann–Roch
      spaces, etc. Usual applications in computer algebra concern the
      irreducible factorization of multivariate polynomials, the integration
      of rational functions, the construction of algebraic geometry error
      correcting codes, the bi-linear complexity of polynomial multiplication,
      etc. In the present paper, we are interested in computing the
      irreducible factorization of any given polynomial  , where
, where  denotes an
      effective field. Here “effective” means that
      algorithms are at our disposal for the arithmetic operations and the
      zero test in
 denotes an
      effective field. Here “effective” means that
      algorithms are at our disposal for the arithmetic operations and the
      zero test in  .
.
    
      Historically, the first local factorization methods focused on root
      computations. More precisely, let  denote the
      fraction field of
 denote the
      fraction field of  of Laurent series in
 of Laurent series in  . The field
. The field
    
 
    
      of power series with fractional exponents is called the field of
      Puiseux series (or Puiseux expansions) over  . Let
. Let  denote a fixed algebraic closure of
      denote a fixed algebraic closure of  .
      If
.
      If  has characteristic zero, then
 has characteristic zero, then  is the algebraic closure of
 is the algebraic closure of  .
      In other words, any polynomial
.
      In other words, any polynomial  in
 in  splits into linear factors in
 splits into linear factors in  . Computations of Puiseux expansions of roots of
. Computations of Puiseux expansions of roots of
       go back to Newton [70], and were
      rediscovered by Puiseux [90]; see [7,
      p. 198] and [98, 102]. The well
      known Newton polygon method turns out to be effective whenever
 go back to Newton [70], and were
      rediscovered by Puiseux [90]; see [7,
      p. 198] and [98, 102]. The well
      known Newton polygon method turns out to be effective whenever
       is effective. When adopting a suitable algebraic
      complexity model (in which running times are measured in terms of the
      required number of arithmetic operations in
 is effective. When adopting a suitable algebraic
      complexity model (in which running times are measured in terms of the
      required number of arithmetic operations in  or
 or
       ), the complexity is easily
      seen to be polynomial in the degree of
), the complexity is easily
      seen to be polynomial in the degree of  and in
      the required precision.
 and in
      the required precision.
    
      Another line of works, that directly concerns the actual factorization
      of  , goes back to Ore [75–77] and Mac Lane [62]. For
      the last two decades, Montes and his collaborators have designed
      polynomial time algorithms in this line.
, goes back to Ore [75–77] and Mac Lane [62]. For
      the last two decades, Montes and his collaborators have designed
      polynomial time algorithms in this line.
    
      For both Puiseux series and irreducible factorization it is classical
      that complexity bounds become softly linear whenever the requested
      precision becomes “sufficiently large”: this property
      essentially follows from fast multi-factor Newton–Hensel lifting
      algorithms [31]. In both cases, the state of the art
      algorithms are due to Poteaux and Weimann [87, 89]:
      quasi-linear complexity is achieved whenever the requested precision is
      larger than the valuation of the discriminant of  , assuming that
, assuming that  is separable
      and that the characteristic of
 is separable
      and that the characteristic of  is zero or
      sufficiently large.
 is zero or
      sufficiently large.
    
      However, we are not aware of any algorithm with a softly linear cost for
      arbitrary precisions. In particular, no such algorithm seems to exist
      for precisions below the valuation of the discriminant of  . For the design of such an algorithm, it is
      important to carefully state the problem that needs to be solved and to
      pay attention to the way approximate factors are represented. Modulo
      these precautions and assuming that the characteristic of
. For the design of such an algorithm, it is
      important to carefully state the problem that needs to be solved and to
      pay attention to the way approximate factors are represented. Modulo
      these precautions and assuming that the characteristic of  is zero or sufficiently large, we present the first
      quasi-linear algorithm to solve this factorization problem. This result
      assumes that the cost of univariate factorizations over algebraic
      extensions of
 is zero or sufficiently large, we present the first
      quasi-linear algorithm to solve this factorization problem. This result
      assumes that the cost of univariate factorizations over algebraic
      extensions of  is sufficiently low in a way that
      will be made precise.
 is sufficiently low in a way that
      will be made precise.
    
      So, the goal of the present paper is to perform local irreducible
      factorization at any given precision in quasi-linear time. More
      specifically, we extend and improve the recent result of [89]
      for factoring a polynomial  that is given modulo
 that is given modulo
       for a finite precision
 for a finite precision  , assuming that we already have an algorithm for
      decomposing polynomials in
, assuming that we already have an algorithm for
      decomposing polynomials in  into irreducible
      factors.
 into irreducible
      factors.
    
      Below the valuation of the discriminant of  ,
      the factorization of
,
      the factorization of  is not always well defined,
      and the problem is commonly called “approximate
      factorization”. Approximate factorization is an important problem
      in computer algebra. List decoding of geometric error correcting codes
      is one typical application [9]; a fast algorithm for linear
      factors can be found in [69]. Other applications concern
      the computation of Igusa zeta functions [24] and the
      computation of the divisor of a polynomial at the singular branches of a
      plane curve [1]. We also expect that approximate
      factorization could play a role in bivariate polynomial factorization,
      e.g. in the vein of [61]. Note that
      approximate factorization of polynomials in
 is not always well defined,
      and the problem is commonly called “approximate
      factorization”. Approximate factorization is an important problem
      in computer algebra. List decoding of geometric error correcting codes
      is one typical application [9]; a fast algorithm for linear
      factors can be found in [69]. Other applications concern
      the computation of Igusa zeta functions [24] and the
      computation of the divisor of a polynomial at the singular branches of a
      plane curve [1]. We also expect that approximate
      factorization could play a role in bivariate polynomial factorization,
      e.g. in the vein of [61]. Note that
      approximate factorization of polynomials in  is a
      similar problem that has received a lot of attention during the last
      decades [81, 93]; see [66] for
      some recent advances.
 is a
      similar problem that has received a lot of attention during the last
      decades [81, 93]; see [66] for
      some recent advances.
    
For complexity analyses, we consider algebraic complexity models (such as computation trees). In other words we simply count numbers of arithmetic operations and zero tests in specified algebraic structures.
      Until the end of the paper,  is a fixed rational
      number that can be taken arbitrarily close to zero. For complexity
      estimates we often use the soft-Oh notation:
 is a fixed rational
      number that can be taken arbitrarily close to zero. For complexity
      estimates we often use the soft-Oh notation:  means that
      means that  ; see [31,
      chapter 25, section 7] for technical details. The least integer larger
      or equal to
; see [31,
      chapter 25, section 7] for technical details. The least integer larger
      or equal to  is written
 is written  ; the largest one smaller or equal to
; the largest one smaller or equal to  is written
 is written  .
.
    
      For randomized algorithms over a finite effective ring  , we assume a special instruction that
      uniformly generates random elements in
, we assume a special instruction that
      uniformly generates random elements in  with
      constant cost. For a given input, the cost of a randomized algorithm is
      thus a random variable. The expected cost for input size
 with
      constant cost. For a given input, the cost of a randomized algorithm is
      thus a random variable. The expected cost for input size  is defined as the maximum of the averages of these
      random variables over all possible inputs of size
 is defined as the maximum of the averages of these
      random variables over all possible inputs of size  .
.
    
      For a finite field  of characteristic
 of characteristic  and with
 and with  elements, the usual
      primitive element representation will be used, so elements in
 elements, the usual
      primitive element representation will be used, so elements in  will be regarded in
 will be regarded in  where
 where  is an irreducible polynomial of degree
 is an irreducible polynomial of degree  .
.
    
 as a notation for the cost of
        multiplying two polynomials of degree
 as a notation for the cost of
        multiplying two polynomials of degree  ,
        in terms of the number of operations in the coefficient ring. We
        assume that
,
        in terms of the number of operations in the coefficient ring. We
        assume that  is a non-decreasing function in
 is a non-decreasing function in
         . It is known [15,
        92] that one can take
. It is known [15,
        92] that one can take  .
        For rings of positive characteristic, one even has
.
        For rings of positive characteristic, one even has  , modulo a plausible number-theoretic
        conjecture [40]. We will also denote
, modulo a plausible number-theoretic
        conjecture [40]. We will also denote
       
    
 
    
      for a separable irreducible monic polynomial  and
 and
       . We set
. We set
    
 
    
      Products and inversions in  take
 take  operations in
      operations in  . This was
      first proved in [51] in the case when
. This was
      first proved in [51] in the case when  is a field and
      is a field and  . The result
      was extended to more general algebraic towers in [52].
      Whenever
. The result
      was extended to more general algebraic towers in [52].
      Whenever  , we may work in an
      algebraic extension
, we may work in an
      algebraic extension  of degree
 of degree  such that
      such that  . The computation
      of such an extension can be done using
. The computation
      of such an extension can be done using  operations in the prime subfield
      operations in the prime subfield  of
 of  , thanks to [94, Theorem 4.1]. For
      a fixed field
, thanks to [94, Theorem 4.1]. For
      a fixed field  , this can be
      regarded as a precomputation, whereas computations with elements in
, this can be
      regarded as a precomputation, whereas computations with elements in  instead of
 instead of  induce only a
      logarithmic overhead
 induce only a
      logarithmic overhead  .
.
    
 to be an upper bound for the cost
        (expected or not) of irreducible factorization of a polynomial in
 to be an upper bound for the cost
        (expected or not) of irreducible factorization of a polynomial in
         . It is convenient to
        introduce
. It is convenient to
        introduce
       
    
      so  is a non-decreasing function in
 is a non-decreasing function in  .
.
    
      For example, if  is the finite field
 is the finite field  , then a well known probabilistic algorithm due
      to Cantor and Zassenhaus [16] factors univariate
      polynomials in
, then a well known probabilistic algorithm due
      to Cantor and Zassenhaus [16] factors univariate
      polynomials in  using an expected number of
 using an expected number of  bit operations.
 bit operations.
    
The currently best known algorithm is obtained as a combination of results due to von zur Gathen, Kaltofen and Shoup [32, 54, 55], and Kedlaya and Umans [57]: it takes an expected number of
 
    bit operations; see [53, Corollary 5.1].
      The case of a tower  over
 over  (with the above notation) reduces to the case of
      (with the above notation) reduces to the case of  by means of the fast change of representation of [85,
      Theorem 1.2], that applies whenever
      by means of the fast change of representation of [85,
      Theorem 1.2], that applies whenever
    
|  | (1.1) | 
In terms of bit complexity, and for a “random access memory” computational model, this yields
 
    
      Details can be found in [53, Corollary 5.3]. Whenever
      condition 
 
    
      When the tower has small degrees  ,
      optimized factorization procedures can be found in [50, 53, 54]. In particular, if
,
      optimized factorization procedures can be found in [50, 53, 54]. In particular, if  is smooth, then polynomials of small degree can even be factored in
      quasi-optimal time. Note that these optimizations do not depend on
      Kedlaya–Umans' algorithm for modular composition.
      is smooth, then polynomials of small degree can even be factored in
      quasi-optimal time. Note that these optimizations do not depend on
      Kedlaya–Umans' algorithm for modular composition.
    
      For an abstract effective field  ,
      there does not exist a general algorithm to factor polynomials in
,
      there does not exist a general algorithm to factor polynomials in  into irreducible ones [29, 30].
      Throughout this paper, we will therefore need to assume that such an
      algorithm is provided by the computational model:
 into irreducible ones [29, 30].
      Throughout this paper, we will therefore need to assume that such an
      algorithm is provided by the computational model:
    
      In practice, this property holds whenever  is
      effectively finitely generated over its prime subfield. Once
      factorization is available in
 is
      effectively finitely generated over its prime subfield. Once
      factorization is available in  ,
      it is also available in
,
      it is also available in  ,
      with a complexity that depends on those of resultants and gcds [97].
,
      with a complexity that depends on those of resultants and gcds [97].
    
      Let  still denote an effective field, let
 still denote an effective field, let  be monic as a polynomial in
 be monic as a polynomial in  , and assume that
, and assume that  .
      So
.
      So  defines a germ of curve at the origin. In
      practice, we always truncate
 defines a germ of curve at the origin. In
      practice, we always truncate  at a finite order
      in
 at a finite order
      in  . For the discussion in
      the following paragraphs, we therefore take
. For the discussion in
      the following paragraphs, we therefore take  and
      assume that
 and
      assume that  is monic, primitive, and separable
      in
 is monic, primitive, and separable
      in  , of total degree
, of total degree  , and of partial degrees
, and of partial degrees  in
 in  and
 and  in
 in
       .
.
    
 is zero or
        sufficiently large, then Puiseux expansions to any given precision can
        be computed in polynomial time when considering an algebraic
        complexity model over
 is zero or
        sufficiently large, then Puiseux expansions to any given precision can
        be computed in polynomial time when considering an algebraic
        complexity model over  —this
        result belongs to the folklore.
—this
        result belongs to the folklore.
      
      Consider a Puiseux series  that is a root of
 that is a root of
       . The shortest truncation of
      this series which is different from any truncation of a distinct Puiseux
      series root of
. The shortest truncation of
      this series which is different from any truncation of a distinct Puiseux
      series root of  is called the singular
      part of
 is called the singular
      part of  . In 1978, Kung
      and Traub [58] showed that the Puiseux expansion of
. In 1978, Kung
      and Traub [58] showed that the Puiseux expansion of  can be computed efficiently using Newton's method,
      once its singular part is known.
 can be computed efficiently using Newton's method,
      once its singular part is known.
    
      The complexity of the computation of singular parts started to be
      studied in the eighties. In [41], Henry and Merle showed
      that the embedded resolution of an irreducible germ of curve defined by
       at the origin can be computed with
 at the origin can be computed with  operations in
 operations in  .
      In [23], Duval introduced the notion of rational
      Puiseux expansions, that allowed computations over
.
      In [23], Duval introduced the notion of rational
      Puiseux expansions, that allowed computations over  to be replaced by computations over
      to be replaced by computations over  .
      She adapted the usual Newton polygon algorithm to such a rational
      representation, and made use of dynamic evaluation to handle
      algebraic extensions without polynomial factorization. She achieved a
      total cost of
.
      She adapted the usual Newton polygon algorithm to such a rational
      representation, and made use of dynamic evaluation to handle
      algebraic extensions without polynomial factorization. She achieved a
      total cost of  operations in
 operations in  , whenever the characteristic is zero or
      sufficiently large. This analysis was based on slow arithmetic for
      polynomials and series.
, whenever the characteristic is zero or
      sufficiently large. This analysis was based on slow arithmetic for
      polynomials and series.
    
      In his PhD thesis [83], Poteaux showed that Duval's
      algorithm takes at most  operations in
 operations in  in order to obtain all the singular parts of the Puiseux
      expansions. In [84], Poteaux and Rybowicz also proved that
      the singular parts of the rational Puiseux expansions centered at a
      single point can be computed using
 in order to obtain all the singular parts of the Puiseux
      expansions. In [84], Poteaux and Rybowicz also proved that
      the singular parts of the rational Puiseux expansions centered at a
      single point can be computed using  operations in
 operations in
       , in the case when
, in the case when  ; this bound relies on fast
      polynomial arithmetic. In [87], Poteaux and Weimann finally
      gave a probabilistic algorithm that allows singular parts to be computed
      with
; this bound relies on fast
      polynomial arithmetic. In [87], Poteaux and Weimann finally
      gave a probabilistic algorithm that allows singular parts to be computed
      with  operations in
 operations in  ,
      assuming that the characteristic of
,
      assuming that the characteristic of  is zero or
      sufficiently large. This bound is quasi-optimal in worst cases, when we
      need order about
 is zero or
      sufficiently large. This bound is quasi-optimal in worst cases, when we
      need order about  before root separation takes
      place [87, Example 8.1]. Their algorithm makes use of
      dynamic evaluation and the singular parts are represented by truncations
      of rational Puiseux expansions. These algorithms by Poteaux et
      al. also extend efficiently to obtain the collection of all
      singular parts at each of the singularities of the algebraic curve
      defined by
 before root separation takes
      place [87, Example 8.1]. Their algorithm makes use of
      dynamic evaluation and the singular parts are represented by truncations
      of rational Puiseux expansions. These algorithms by Poteaux et
      al. also extend efficiently to obtain the collection of all
      singular parts at each of the singularities of the algebraic curve
      defined by  . As a byproduct,
      Poteaux and Weimann proved the expected complexity bound
. As a byproduct,
      Poteaux and Weimann proved the expected complexity bound  for the irreducible factors of
 for the irreducible factors of  at
      precision
 at
      precision  , still under the
      assumption that the characteristic of
, still under the
      assumption that the characteristic of  is
 is  ; see [87, Theorem
      1.6].
; see [87, Theorem
      1.6].
    
      When  , a polynomial bit
      complexity for Puiseux series was first achieved by Chistov [17].
      The complexity bound for this case was subsequently detailed and
      improved by Walsh [99, 100]. Since the
      complexity exponents are rather large, multi-modular approaches turn out
      to be of practical interest [83].
, a polynomial bit
      complexity for Puiseux series was first achieved by Chistov [17].
      The complexity bound for this case was subsequently detailed and
      improved by Walsh [99, 100]. Since the
      complexity exponents are rather large, multi-modular approaches turn out
      to be of practical interest [83].
    
Once singular parts are known, we have already mentioned that Puiseux expansions can be extended by means of the Newton operator, as described in [58]; see also [45] for recent optimizations. For small and moderate expansion orders, it is often more efficient to use lazy or relaxed arithmetic to expand algebraic power series [44, 101]. For very large expansion orders, yet another method is to compute a differential operator that annihilates the expansions [19, 20]; see [11] for complexity bounds. It is also worth mentioning that individual terms of algebraic Puiseux series over a finite field can be computed even faster than with the Newton iteration [10].
 ;
        see for instance [56]. Hamburger–Noether expansions
        constitute a natural extension of Puiseux series in positive
        characteristic [13].
;
        see for instance [56]. Hamburger–Noether expansions
        constitute a natural extension of Puiseux series in positive
        characteristic [13].
      
      In his 1989 article [2], Abhyankar addressed a question
      from Kuo about an algorithm to decide the irreducibility of a germ of
      curve, without using blowups or Puiseux series. In characteristic zero,
      Abhyankar gave a positive answer to this question, by using expansions
      of the defining polynomial of the germ with respect to so-called
      approximate roots. These approximate roots can be determined
      recursively by means of a generalized Newton polygon, previously
      introduced in [3, 4]. They generalize the
      Tschirnhaus transform [95, 96], which was also
      used in the Newton polygon algorithm from [43, chapter 3].
      Complexity analyses for ordinary power series coefficients can be found
      in [86, 88]: in favorable cases irreducibility
      tests take softly linear time (plus a justifiable amount of
      irreducibility tests in  ).
).
    
Abhyankar's work has been completed and extended to arbitrary characteristic by Cossart and Moreno-Socías in [22], where they present another construction based on valuation theory. The mathematical relationship between approximate roots, Puiseux expansions, and Hamburger–Noether expansions can be found in [88, 91].
 is a local ring different from
 is a local ring different from  , factorization in
, factorization in  is a more difficult problem, for which Puiseux
        expansions cannot be used. The first interesting case is when
 is a more difficult problem, for which Puiseux
        expansions cannot be used. The first interesting case is when  is the field
 is the field  of the
 of the  -adic numbers. Let
-adic numbers. Let  be a monic primitive square-free polynomial in
 be a monic primitive square-free polynomial in  . A first series of contributions
        concern the Round Four algorithm due to Zassenhaus, and
        dedicated to the construction of integral bases modulo
. A first series of contributions
        concern the Round Four algorithm due to Zassenhaus, and
        dedicated to the construction of integral bases modulo  ; see [21, 26, 27] for instance. The first polynomial time algorithm for
        factoring
; see [21, 26, 27] for instance. The first polynomial time algorithm for
        factoring  over
 over  was
        given by Chistov [18], and then improved by Cantor and
        Gordon in [14].
 was
        given by Chistov [18], and then improved by Cantor and
        Gordon in [14].
      
      After that, Pauli [82] designed a factorization algorithm
      over an algebraic extension of degree  of
 of  with bit complexity
 with bit complexity
    
|  | (1.2) | 
      Another approach for local factorization was initiated by Ore during
      1920–1930, but it was restricted to sufficiently generic
      polynomials (essentially the case of contact towers of height  in our context); see [37] for a summary of
      Ore's result. Ore's ideas have been generalized to factor any input
      polynomial by Montes in his PhD thesis [64]: Montes took
      advantage of mathematical constructions to classify the valuations of
 in our context); see [37] for a summary of
      Ore's result. Ore's ideas have been generalized to factor any input
      polynomial by Montes in his PhD thesis [64]: Montes took
      advantage of mathematical constructions to classify the valuations of
       , due to Mac Lane [62].
      In particular, Montes designed an irreducibility test that was
      subsequently shown [28] to have a complexity similar to
, due to Mac Lane [62].
      In particular, Montes designed an irreducibility test that was
      subsequently shown [28] to have a complexity similar to
      
Based on Montes' PhD thesis, the next complexity improvements are due to Guàrdia, Montes, and Nart [35, 36]. Then, in [8], Bauch, Nart, and Stainsby proved the bit complexity bound
 
    
      for an algebraic extension of degree  of
 of  . Further refinements and
      applications, including the computation of integral closures, can be
      found in [25, 37, 38]. In their
      recent article [89] Poteaux and Weimann improved the latter
      complexity bound to
. Further refinements and
      applications, including the computation of integral closures, can be
      found in [25, 37, 38]. In their
      recent article [89] Poteaux and Weimann improved the latter
      complexity bound to
    
 
    
      (discarding factorization costs in  )
      whenever
)
      whenever  : they made use of
      Abhyankar's approximate roots, the natural “divide and
      conquer” extension of the generalized Hensel lifting of [39],
      and also applied the same “increase of precision” strategy
      as in [87].
: they made use of
      Abhyankar's approximate roots, the natural “divide and
      conquer” extension of the generalized Hensel lifting of [39],
      and also applied the same “increase of precision” strategy
      as in [87].
    
Since Montes' algorithm is in the vein of works by Ore, Mac Lane, Okutsu, it is often refered to as the “OM algorithm” [5, 37]. The relationship between Mac Lane's theory and Okutsu's method for computing integral bases [71–74] is discussed in [34, Corollary 4.6]; see also [25, Theorems 6.7 and 6.9], and [68] for a survey.
Recently, the Poteaux–Weimann variant of Montes' algorithm [89] has been generalized to the more general context of henselian fields [5]. Note that [5] also contains an up-to-date survey of the “OM algorithm” and links with related mathematical results in valuation theory.
 of generalized power series instead of
        of generalized power series instead of  .
        One natural example is to take
.
        One natural example is to take  ,
        where
,
        where  is an effective subfield of another
        field of Laurent series
 is an effective subfield of another
        field of Laurent series  .
        In this case, the underlying value group of
.
        In this case, the underlying value group of  becomes non-archimedean, and the issue arises how to conduct exact
        computations with truncated power series. This is easy if
        becomes non-archimedean, and the issue arises how to conduct exact
        computations with truncated power series. This is easy if  , but less trivial if
, but less trivial if  contains transcendental power series such as
        contains transcendental power series such as  , because of the required zero test. We refer to
        [47, 48] for some recent perspectives on
        this type of computations.
, because of the required zero test. We refer to
        [47, 48] for some recent perspectives on
        this type of computations.
      
      The resolution of algebraic equations over fields  of generalized power series is still based on the Newton polygon method.
      However, the complexity can no longer be analyzed in terms of the
      truncation order in a non-archimedean context. Instead, one may consider
      the resolution of equations in Hensel position as a natural building
      block. In [43], van der Hoeven showed how to reduce the
      resolution of a general algebraic equation of degree
      of generalized power series is still based on the Newton polygon method.
      However, the complexity can no longer be analyzed in terms of the
      truncation order in a non-archimedean context. Instead, one may consider
      the resolution of equations in Hensel position as a natural building
      block. In [43], van der Hoeven showed how to reduce the
      resolution of a general algebraic equation of degree  to at most
      to at most  applications of Hensel's lemma. It
      would be interesting to analyze the complexity of this algorithm in the
      special cases that were considered above.
 applications of Hensel's lemma. It
      would be interesting to analyze the complexity of this algorithm in the
      special cases that were considered above.
    
Non-archimedean value groups are not merely a theoretical curiosity. Until recently, effective counterparts of Hironaka's theory of standard bases for power series were only known in the case of algebraic power series [6, 65]. In [48], generalized Puiseux series have been put to develop elimination theories for more general power series, such as differentially algebraic power series. Non-archimedean value groups actually arise in a natural way when studying algebraic differential equations, and the Newton polygon method can be generalized to this context; see [7] for recent progress and further references.
      The main purpose of this paper is a self-contained and quasi-optimal
      algorithm for the approximate factorization of univariate polynomials
      over rings of formal power series. We show how to efficiently factor
       into irreducible polynomials, and for each
      irreducible factor
 into irreducible polynomials, and for each
      irreducible factor  we construct generators of
      the valuation group of
 we construct generators of
      the valuation group of  in a form of a
      contact tower; see Definition 3.1. An
      irreducible factorization of
 in a form of a
      contact tower; see Definition 3.1. An
      irreducible factorization of  modulo
 modulo
       is a list of factors
 is a list of factors  of
 of
       modulo
 modulo  ,
      along with their associated multiplicity and contact tower; see
      Definition 7.6. In particular the
,
      along with their associated multiplicity and contact tower; see
      Definition 7.6. In particular the  are irreducible, pairwise coprime, and we have
      are irreducible, pairwise coprime, and we have
    
 
    
      for some integers  . The
      contact tower associated to
. The
      contact tower associated to  allows the
      computation of the valuation in
 allows the
      computation of the valuation in  in softly linear
      time. The following main result will be proved at the end of section 8.2:
 in softly linear
      time. The following main result will be proved at the end of section 8.2:
    
         be a fixed positive value, and
        assume
 be a fixed positive value, and
        assume  be monic of degree
 be monic of degree  in
 in  , known modulo
, known modulo  , and such that the characteristic of
, and such that the characteristic of  is zero or
 is zero or  .
        Then, an irreducible factorization of
.
        Then, an irreducible factorization of  modulo
 modulo
         can be computed using
 can be computed using
      
 
        
        operations in  .
.
      
      Example  ,
,  ,
      and
,
      and  . Then
. Then  ,
,  ,
      and
,
      and  is an irreducible factorization of
 is an irreducible factorization of  modulo
 modulo  . Taking
. Taking
       ,
,  ,
,  ,
,  , we obtain another such
      factorization. This shows that approximate factorizations are not unique
      in general.
, we obtain another such
      factorization. This shows that approximate factorizations are not unique
      in general.
    
      Note that the term  is negligible with respect to
 is negligible with respect to
       as soon as the precision
 as soon as the precision  is sufficiently large. By using our approximate factorization algorithm
      with a sufficiently large precision, as a corollary, we deduce the
      following complexity bound for the actual irreducible factorization of
      is sufficiently large. By using our approximate factorization algorithm
      with a sufficiently large precision, as a corollary, we deduce the
      following complexity bound for the actual irreducible factorization of
       ; see section 9.5.
; see section 9.5.
    
         be a fixed positive value, and
        assume
 be a fixed positive value, and
        assume  be monic and separable of degree
 be monic and separable of degree  in
        in  and known at precision
 and known at precision  in
        in  with
 with  .
        Assume that the characteristic of
.
        Assume that the characteristic of  is zero or
 is zero or
         . Then, the irreducible
        factors of
. Then, the irreducible
        factors of  can be computed modulo
 can be computed modulo  using
 using
      
 
        
        operations in  .
.
      
      Theorem 1.3 considers  as part of
      the input. This is not very restrictive in characteristic zero or
 as part of
      the input. This is not very restrictive in characteristic zero or  thanks to [67, Theorem 1]. On the other
      hand, if
 thanks to [67, Theorem 1]. On the other
      hand, if  belongs
 belongs  then
 then
       can be computed with
 can be computed with  operations in
      operations in  .
.
    
Theorem 1.1 is new while Theorem 1.3 essentially corresponds to a slightly improved version of [89, Theorem 4]: we detail the cost analysis of the factorizations and we do not need extra irreducibility tests. Theorem 1.3 may also be regarded as a counterpart of [87, Theorem 1.6], where field extensions are represented in terms of primitive elements and local factors in terms of uniformizing parameters. Note also that Theorem 1.3 is deterministic while [87, Theorem 1.6] is probabilistic (although footnote 2 on page 1062 sketches how to get rid of the probabilistic aspects). Technically speaking, the algorithms presented in this paper share several ingredients with [89], but also include new ones. Below we detail the differences and improvements.
 by means of Gröbner bases, which is convenient for
        implementations in computer algebra systems. Note that Mac Lane's
        theory and Montes' algorithm are restricted to valuations (their
        “key polynomials” are irreducible). On the contrary, our
        framework does not rely on Puiseux expansions or on the data
        structures of the “OM algorithm”. The philosophy behind
        contact calculus consists in extending usual calculus with
        multivariate polynomials by taking care of carries. The
        “contact” terminilogy brings a convenient geometric point
        of view. Computing over contact towers involves a major difficulty:
        how to compute efficiently in small relative precision? In this paper
        we overcome this difficulty by doing most of the actual work within
        the original ring
        by means of Gröbner bases, which is convenient for
        implementations in computer algebra systems. Note that Mac Lane's
        theory and Montes' algorithm are restricted to valuations (their
        “key polynomials” are irreducible). On the contrary, our
        framework does not rely on Puiseux expansions or on the data
        structures of the “OM algorithm”. The philosophy behind
        contact calculus consists in extending usual calculus with
        multivariate polynomials by taking care of carries. The
        “contact” terminilogy brings a convenient geometric point
        of view. Computing over contact towers involves a major difficulty:
        how to compute efficiently in small relative precision? In this paper
        we overcome this difficulty by doing most of the actual work within
        the original ring  with a sufficiently high
        precision.
 with a sufficiently high
        precision.
      While Mac Lane and later Montes focused on constructing augmented valuations over polynomial rings, our down-to-earth and self-contained approach begins with designing efficient data structures in the vein of triangular sets and Hironaka's standard bases [42].
In [35] Guardia, Montes, and Nart address the computation of uniformizing parameters. In this paper we only need the initial part of uniformized representations, along with a rewriting algorithm for homogeneous polynomials. Section 6 contains an algorithm with quasi-linear time for these initial parts and conversions.
 according to the slopes of its Newton polygon. Equal-slope
        factorizations serve a similar purpose for polynomials with a single
        slope. We achieve these computations in softly linear time by means of
        the contact Hensel lifting of section 4.
        according to the slopes of its Newton polygon. Equal-slope
        factorizations serve a similar purpose for polynomials with a single
        slope. We achieve these computations in softly linear time by means of
        the contact Hensel lifting of section 4.
      In Ore's work the distinct and equal-slope factorization were already known and called “dissections”. These “dissections” were generalized by Montes to higher order Newton polygons [64, Capítulo 2]. Note that Montes' “high order Newton” polygon was previously used by Abhyankar [2]. These Newton polygons are still a cornerstone of the “OM algorithm”: for instance [36, Theorem 3.1] corresponds to the distinct-slope factorization and [36, Theorem 3.7] to the equal-slope factorization. The generalization of the Ostrowski theorem to higher order Newton polynomials can be found in [25, Theorem 2.8] or [36, Theorem 2.26]. Our Lemma 7.8 is a mild extension of it to the context of contact towers. The main advantage of our approch is the ability to compute the factors directly in terms of the contact coordinates.
 is discovered as a tree of partial factorizations.
        The leaves are the irreducible factors. When this tree is not
        sufficiently well balanced, the total complexity moves away from
        quasi-linearity.
 is discovered as a tree of partial factorizations.
        The leaves are the irreducible factors. When this tree is not
        sufficiently well balanced, the total complexity moves away from
        quasi-linearity.
      
      Poteaux and Weiman circumvent the equilibration issue of the partial
      factorization tree by using a divide-and-conquer approach on the
      precision. This approach yields a quasi-linear complexity bound [87, 89] under the condition that the precision
      exceeds the valuation of the discriminant of  .
.
    
In order to prove Theorem 1.1, we use a divide and conquer strategy on the degree rather than the truncation order. For this, we developed the central shift algorithm, which is another main contribution of this paper: see section 7.7. The top level algorithm is described in section 8. Note that approximate factorizations in the sense of Theorem 1.1 (especially for truncation orderes below the valuation of the discriminant) are not addressed in [87, 89].
Approximate roots can indeed be regarded as special elements of contact towers. Our contact factorization algorithm does not rely on such roots: as explained in section 8.3, these roots may be useful in practice, but it is a drawback that they are not preserved during factorizations. In fact, our central shift strategy behaves as an algorithmic improvement upon approximate roots: see section 2.6.
      Finally, we also analyze the cost of all univariate factorizations over
      algebraic extensions of  that occur during the
      factorization over
 that occur during the
      factorization over  . We
      expect that it should be possible to avoid such univariate
      factorizations using the technique of directed evaluation [52].
      However, the technical details are not obvious, especially when it comes
      to computing Newton polygons in quasi-linear time. In [89,
      section 5.4], Poteaux and Weimann indicate how dynamic evaluation might
      be combined with their algorithm.
. We
      expect that it should be possible to avoid such univariate
      factorizations using the technique of directed evaluation [52].
      However, the technical details are not obvious, especially when it comes
      to computing Newton polygons in quasi-linear time. In [89,
      section 5.4], Poteaux and Weimann indicate how dynamic evaluation might
      be combined with their algorithm.
    
In order to highlight the complexity issues that arise in local factorization, we dedicate our next section to introductory examples. These key examples illustrate the main computational difficulties that are common to all known approaches.
At the end of the paper, a glossary is dedicated to the specific mathematical notations, and an index gathers references to the main definitions.
Before we give the formal definition of a contact factorization, we review a few motivating examples from the complexity perspective.
      Let  be a totally ordered abelian group and let
 be a totally ordered abelian group and let
       be a monoid embedded in
 be a monoid embedded in  . A graded ring
. A graded ring  with respect to the grading
      with respect to the grading  is a direct
      sum
 is a direct
      sum
    
 
    
      where the  are abelian groups such that
 are abelian groups such that  for all
 for all  and
 and  in
      in  . An element of
. An element of  is said to be homogeneous if it belongs to one of
      the
 is said to be homogeneous if it belongs to one of
      the  . Any element
. Any element  in
 in  can be uniquely written
 can be uniquely written  , where
, where  is called the homogeneous component of degree
      is called the homogeneous component of degree  of
 of  . If
. If
       and
 and  ,
      then we also denote
,
      then we also denote
    
 
    
      The initial form of a non-zero element  , written
, written  , is the non-zero homogeneous component
, is the non-zero homogeneous component  with the smallest index
 with the smallest index  .
      By convention we set
.
      By convention we set  .
.
    
      An ideal  of
 of  is said to
      be homogeneous whenever it can be generated by homogeneous
      elements, or equivalently whenever the homogenous components of any
      element of
 is said to
      be homogeneous whenever it can be generated by homogeneous
      elements, or equivalently whenever the homogenous components of any
      element of  also belong to
 also belong to  .
.
    
      To each non-zero element
       we may associate the smallest index
      we may associate the smallest index
       such that
      such that
       ;
      we set
;
      we set
       .
      The map
.
      The map
       is a
      
      semi-valuation
      , which means that it satisfies
      is a
      
      semi-valuation
      , which means that it satisfies
       and
      and
       for all
      for all
       .
      Given
.
      Given
       ,
      we call
,
      we call
       the
      truncation
      of
      the
      truncation
      of
       at
      
      relative precision
      at
      
      relative precision
      
       .
.
      
The Newton polygon of a non-zero polynomial
 
    
      of degree  is the lower border of the convex hull
      in
 is the lower border of the convex hull
      in  of the set of points
 of the set of points
    
 
    
      Figure 2.1 illustrates this definition with  and
 and  . The
      Newton polygon is thus a broken line with edges
. The
      Newton polygon is thus a broken line with edges  , with
, with  ,
      such that:
,
      such that:
    
           ,
,
        
           for
 for  ,
,
        
           , for all
, for all  and
 and  with
 with  ,
,
        
           , for all
, for all  and
 and  or
 or  with
          with  .
.
        
      Intuitively speaking, these conditions mean that  lies on or above the Newton polygon. If
      lies on or above the Newton polygon. If  ,
      then we have
,
      then we have  and
 and  .
      Any
.
      Any  determines an edge
 determines an edge  with vertices
      with vertices  and
 and  .
      The Newton polynomial associated to
.
      The Newton polynomial associated to  is
      is
    
 
    
      Whenever  , the slope
      of
, the slope
      of  is
 is  .
      The first slope is
.
      The first slope is  whenever
 whenever  . Two consecutive edges have different slopes.
. Two consecutive edges have different slopes.
    
      In order to illustrate computations in algebraic extensions of  or
 or  , let us
      first consider applying the Newton polygon method to an input polynomial
      of the form
, let us
      first consider applying the Newton polygon method to an input polynomial
      of the form
    
 
    
      where  is a monic separable irreducible
      polynomial of degree
 is a monic separable irreducible
      polynomial of degree  and
 and  has degree
      has degree  in
 in  .
      We then consider
.
      We then consider
    
|  | (2.1) | 
      as a polynomial equation in  .
      The Newton polygon of
.
      The Newton polygon of  consists of a single edge
      starting at
 consists of a single edge
      starting at  and ending at
 and ending at  ; its slope is
; its slope is  .
.
    
      Equation  , where
, where  . Indeed, let
. Indeed, let  be the
      class of
 be the
      class of  in
 in  .
      Replacing
.
      Replacing  by
 by  in
 in 
|  | (2.2) | 
      The separability of  implies
 implies  , which allows us to apply Hensel's lemma:
      there exists a unique solution
, which allows us to apply Hensel's lemma:
      there exists a unique solution  with valuation
 with valuation
       in
 in  .
      This is the point of view of factoring
.
      This is the point of view of factoring  in terms
      of Puiseux expansions.
 in terms
      of Puiseux expansions.
    
      In terms of space complexity, we note that computations in  typically require
 typically require  times more space
      than in
 times more space
      than in  . Fortunately, this
      is compensated by the fact that the “unique” solution
. Fortunately, this
      is compensated by the fact that the “unique” solution  to
 to  solutions to
 solutions to  .
      Indeed, any solution in
.
      Indeed, any solution in  is obtained by
      substituting a root
 is obtained by
      substituting a root  of
 of  for
      for  in the expression of
 in the expression of  .
.
    
      From a time complexity point of view, the resolution of  , where
, where  . These give in turn rise to modular
      compositions (with modulus
. These give in turn rise to modular
      compositions (with modulus  ).
      Over general coefficient fields
).
      Over general coefficient fields  ,
      no quasi-optimal algorithm (of complexity
,
      no quasi-optimal algorithm (of complexity  )
      is currently known for this task, so it is preferable to avoid such
      operations whenever possible. In particular, it is better to avoid
      working over algebraic extensions of the field
)
      is currently known for this task, so it is preferable to avoid such
      operations whenever possible. In particular, it is better to avoid
      working over algebraic extensions of the field  of coefficients.
      of coefficients.
    
      In order to avoid modular compositions, one idea is to consider that
      equation  as “solved” if and only if the Newton polygon
      of
 as “solved” if and only if the Newton polygon
      of  with respect to suitable “contact
      coordinates” has a single slope for which the associated Newton
      polynomial is separable (and technically, irreducible).
 with respect to suitable “contact
      coordinates” has a single slope for which the associated Newton
      polynomial is separable (and technically, irreducible).
    
      The problem of solving a general equation  with
 with
       then reduces to the problem of factoring
 then reduces to the problem of factoring  as a product of “solved” polynomials.
      From this perspective, expressing the solutions of
 as a product of “solved” polynomials.
      From this perspective, expressing the solutions of  as Puiseux series becomes a rewriting problem for “solved”
      polynomials, which is independent from the main resolution of the
      equation
      as Puiseux series becomes a rewriting problem for “solved”
      polynomials, which is independent from the main resolution of the
      equation  itself.
 itself.
    
      Consider the polynomial equation in  over
 over  given by
 given by
    
|  | (2.3) | 
      When solving this equation by means of the Newton polygon method, we see
      that the Newton polygon of  has a single slope
      with associated Newton polynomial
 has a single slope
      with associated Newton polynomial
    
 
    
      In other words, all solutions of  , where
, where  . Usually, the Newton polygon
      method proceeds by performing a change of variable
. Usually, the Newton polygon
      method proceeds by performing a change of variable
    
 
    
      while imposing the constraint  .
      So we are reduced to solving
.
      So we are reduced to solving
    
 
    
      The Newton polygon has two edges:  and
 and  . Therefore
. Therefore  and we have
      and we have  , so
, so  , where
, where  .
      We proceed with the change of variable
.
      We proceed with the change of variable
    
 
    
      while imposing the constraint  .
      So we are now led to solving
.
      So we are now led to solving
    
 
    
      The unique value of  can therefore be computed
      efficiently by means of the Newton iteration as a regular root of
 can therefore be computed
      efficiently by means of the Newton iteration as a regular root of  . However, this means that we have
      to work over the algebraic extension
. However, this means that we have
      to work over the algebraic extension  .
.
    
      The idea behind contact calculus is to avoid computing over this type of
      algebraic extensions, by working with respect to so-called contact
      coordinates instead. In the present example, the idea is to rewrite
      
 
    We next reinterpret this equation as
|  | (2.4) | 
      where  and
 and  are two new
      variables that are subject to the following constraints:
 are two new
      variables that are subject to the following constraints:
    
           ,
,  ,
,
        
           and
 and  .
.
        
      The variables  and
 and  can be
      regarded as unknowns, with values in the ring of Puiseux series in
 can be
      regarded as unknowns, with values in the ring of Puiseux series in  . These unknowns satisfy the system
      of equations
. These unknowns satisfy the system
      of equations
    
 
    
      In other words, computing Puiseux expansions of solutions to  is equivalent to computing Puiseux expansions of solutions
      to the latter system. We note that
 is equivalent to computing Puiseux expansions of solutions
      to the latter system. We note that  is separable
      in
 is separable
      in  and that the solutions for
 and that the solutions for  begin with
      begin with  . Then
. Then  is separable in
 is separable in  for each solution
 for each solution
       , so the system admits the
      following solutions:
, so the system admits the
      following solutions:
    
 
    
      After the change of variable  ,
      these solutions are regular roots of the following map modulo
,
      these solutions are regular roots of the following map modulo  :
:
    
 
    
      By means of the Newton iteration, these roots may be lifted efficiently
      to any required precision, and so may the corresponding solutions of
       .
.
    
      The variables  and
 and  are
      called contact coordinates. Note that
 are
      called contact coordinates. Note that
    
 
    
      so the germ of the curve defined by  approximates
      the one defined by
 approximates
      the one defined by  . From a
      geometric point of view, the two germs are “in contact”.
. From a
      geometric point of view, the two germs are “in contact”.
    
      Informally speaking, the Newton polygon of equation  has a single edge of
      vertices
 has a single edge of
      vertices  and
 and  ,
      with associated Newton polynomial
,
      with associated Newton polynomial  ,
      whence
,
      whence  . The precise meaning
      of this “generalized Newton polygon” will be the purpose of
      section 7. Since the polynomial
. The precise meaning
      of this “generalized Newton polygon” will be the purpose of
      section 7. Since the polynomial  is
      separable in
 is
      separable in  , we consider
      the polynomial
, we consider
      the polynomial  to be “solved”.
 to be “solved”.
    
      Working with contact coordinates is a little bit tricky, since  and
 and  are related by the equation
 are related by the equation
       . Basic arithmetic operations
      and the Newton polygon method therefore have to be adapted with care. It
      turns out that “contact calculus” with respect to contact
      coordinates has a double flavor. At small orders
. Basic arithmetic operations
      and the Newton polygon method therefore have to be adapted with care. It
      turns out that “contact calculus” with respect to contact
      coordinates has a double flavor. At small orders  in
      in  , it boils down to working
      in towers of algebraic extensions of
, it boils down to working
      in towers of algebraic extensions of  .
      At large orders in
.
      At large orders in  , we may
      convert between polynomials in
, we may
      convert between polynomials in  and
 and  through the mechanism of
 through the mechanism of  -adic
      expansions.
-adic
      expansions.
    
      In this paper, we have chosen to do most actual computations in  , since fast algorithms for basic
      arithmetic operations in this ring are well known. However, conversions
      between the “plain coordinates”
, since fast algorithms for basic
      arithmetic operations in this ring are well known. However, conversions
      between the “plain coordinates”  and
      the “contact coordinates”
 and
      the “contact coordinates”  incur some
      precision loss. Fortunately, this precision loss can be controlled for
      the applications in this paper. Of course, it would be interesting to
      design a genuine fast arithmetic for contact coordinates without
      precision loss.
 incur some
      precision loss. Fortunately, this precision loss can be controlled for
      the applications in this paper. Of course, it would be interesting to
      design a genuine fast arithmetic for contact coordinates without
      precision loss.
    
      Example 
|  | (2.5) | 
      In that case, the contact coordinates would rather be  and
      and  . This illustrates that
      we do not systematically take
. This illustrates that
      we do not systematically take  ,
      although we always do have
,
      although we always do have  when working over
 when working over
       .
.
    
Let us next consider the equation
|  | (2.6) | 
      In this case, we start with the same contact coordinates  and
 and  as for
 as for  ,
      subject to
,
      subject to  . In general, we
      may need to introduce as many as
. In general, we
      may need to introduce as many as  contact
      coordinates.
 contact
      coordinates.
    
      Yet another variant of 
|  | (2.7) | 
      We again use the same contact coordinates  and
 and
       as for
 as for  rewrites into
 rewrites into  , that can be factored:
, that can be factored:
    
 
    In general, these types of factorizations can be expensive to compute with respect to the original coordinates and become more transparent for the contact coordinates.
Let us first consider the equation
|  | (2.8) | 
      When solving this equation using the usual Newton polygon method, we
      find that there is a single slope  ,
      with
,
      with  , for which the
      associated Newton polynomial
, for which the
      associated Newton polynomial  has a single root
 has a single root
       of multiplicity
 of multiplicity  .
      This means that the leading terms of the Puiseux expansions are
.
      This means that the leading terms of the Puiseux expansions are  and that the remaining terms can be found by
      performing the change of variable
 and that the remaining terms can be found by
      performing the change of variable  and solving
      the resulting equation for
 and solving
      the resulting equation for  :
:
    
 
    
      In a similar way, we find the leading term  of
 of
       , which has again
      multiplicity
, which has again
      multiplicity  . We have to go
      on like this for
. We have to go
      on like this for  steps until reaching the
      equation
 steps until reaching the
      equation
    
 
    
      At this point there are two possible dominant terms for  (namely
      (namely  and
 and  ),
      each of multiplicity one, and we consider that we essentially solved the
      equation (more terms can be obtained efficiently using Newton's method).
),
      each of multiplicity one, and we consider that we essentially solved the
      equation (more terms can be obtained efficiently using Newton's method).
    
      From the complexity point of view, the problem is that we need to
      recompute a new equation at every step where we discover one more term
      of the expansion, which is quite expensive. A well known trick to
      replace the 50 steps by a single one is to compute the solution  to the derivative of the equation, that is
 to the derivative of the equation, that is
    
 
    
      and directly set  instead of
 instead of  . The new equation in
. The new equation in  then becomes
      then becomes
    
 
    
      after which the resolution process directly splits into two branches
       and
 and  .
      In general, for a
.
      In general, for a  -fold
      leading term, we need to consider a solution
-fold
      leading term, we need to consider a solution  to
      the
 to
      the  -fold derivative of the
      equation. In that case, the change of variables
-fold derivative of the
      equation. In that case, the change of variables  is called a Tschirnhaus transform.
      is called a Tschirnhaus transform.
    
      For general contact coordinates, things become more technical, but
      similar strategies apply. In general, if  is a
      ring with unity, if
 is a
      ring with unity, if  is a monic polynomial of
      degree
 is a monic polynomial of
      degree  in
 in  ,
      if
,
      if  divides
 divides  ,
      and if
,
      and if  is invertible in
 is invertible in  , then there exists a unique monic polynomial
, then there exists a unique monic polynomial  of degree
 of degree  such that
 such that  has degree
 has degree  ;
      see section 8.3. The polynomial
;
      see section 8.3. The polynomial  is
      called the
 is
      called the  -th
      approximate root of
-th
      approximate root of  .
      If
.
      If  , then the
, then the  -th approximate root
-th approximate root  corresponds to the Tschirnhaus transform
      corresponds to the Tschirnhaus transform  .
      In general, the
.
      In general, the  -adic
      expansion of
-adic
      expansion of  writes as
 writes as  where the
      where the  are polynomials in
 are polynomials in  of degree
      of degree  , so
, so  is the
 is the  -th
      approximate root of
-th
      approximate root of  if and only if
 if and only if
       .
.
    
      Let us now consider yet another type of equation with an almost  -fold multiple solution
-fold multiple solution
    
|  | (2.9) | 
      When solving the equation naively with the Newton polygon method, we
      obtain a  -fold branch
-fold branch  at the first step, a single branch
 at the first step, a single branch  and a
      and a  -fold branch
-fold branch  at the second step, a single branch
 at the second step, a single branch  and a
      and a  -fold branch
-fold branch  at the third step, and so on. From the complexity point of
      view, factoring out a single branch at every step leads to a cost
 at the third step, and so on. From the complexity point of
      view, factoring out a single branch at every step leads to a cost
    
 
    
      as a function of  , which is
      not quasi-linear in
, which is
      not quasi-linear in  .
.
    
      Using Tschirnhaus transforms is not really of any help. For instance,
      the  -fold derivative of the
      equation yields
-fold derivative of the
      equation yields
    
 
    
      with solution  . After the
      change of variable
. After the
      change of variable  , we still
      obtain one single branch and one
, we still
      obtain one single branch and one  -fold
      branch.
-fold
      branch.
    
What really helps in this situation is a way to determine the series
|  | (2.10) | 
      This series has the property that, after the change of variable  , we obtain the equivalent equation
, we obtain the equivalent equation
    
 
    
      whose Newton polygon has  edges. In particular,
      the resolution process now branches into
 edges. In particular,
      the resolution process now branches into  distinct parts of multiplicity one.
      distinct parts of multiplicity one.
    
      Computing the series  .
      But instead of peeling off factors of degree one from the left-hand side
      of
.
      But instead of peeling off factors of degree one from the left-hand side
      of  with precision about
 with precision about  in a
      recursive manner. This allows to factor
 in a
      recursive manner. This allows to factor  as the
      product of two polynomials of degree close to
 as the
      product of two polynomials of degree close to  , and to repeat this process in a recursive manner.
      Series such as
, and to repeat this process in a recursive manner.
      Series such as  , even within contact coordinates, the central
      shift will allow us to guarantee a suitably balanced factorization
, even within contact coordinates, the central
      shift will allow us to guarantee a suitably balanced factorization  for which
 for which  and
 and  can recursively be factored with good complexity.
 can recursively be factored with good complexity.
    
      This section formalizes the concept of contact towers. The effective
      ground field is written  and the contact
      coordinates will be denoted by
 and the contact
      coordinates will be denoted by  .
.
    
      We endow  with the weighted valuation, simply
      written “
 with the weighted valuation, simply
      written “ ”,
      defined by
”,
      defined by  and
 and  for
 for  . With
. With
    
 
    this valuation induces a grading
 
    
      where  is the set of polynomials made only of
      terms of valuation
 is the set of polynomials made only of
      terms of valuation  ; notice
      that
; notice
      that  . When no confusion is
      possible, we drop “weighted”.
. When no confusion is
      possible, we drop “weighted”.
    
      Let  be the least common multiple of the
      denominators of
 be the least common multiple of the
      denominators of  . Then, the
      Chinese remainder theorem implies the following identity for the group
      completion
. Then, the
      Chinese remainder theorem implies the following identity for the group
      completion  of
 of  :
:
    
 
    
      The integer  is called the ramification
      index of the valuation.
 is called the ramification
      index of the valuation.
    
The following definition is central for the rest of this paper.
         consists of:
 consists of:
      
            Rational numbers  ,
            called weights.
,
            called weights.
          
These data are required to satisfy the following properties:
             is monic in
 is monic in  of
            degree
 of
            degree  ;
;
          
             , for
, for  and
            and  ;
;
          
             and
 and  for
 for  ;
;
          
            We endow  with the weighted valuation
            defined by
 with the weighted valuation
            defined by  and
 and  for
 for
             . We demand that:
. We demand that:
          
                 , for
, for  ;
;
              
                 , for
, for  .
.
              
        The tower is said to be reduced when
         for
 for  .
        Unless explicitly stated, the towers in this paper will be
        almost reduced in the sense that
.
        Unless explicitly stated, the towers in this paper will be
        almost reduced in the sense that  for
        for  .
.
      
      The weights  will also be called the contact
      slopes, in reference to the slopes of the corresponding Newton
      polygons; see section 7.3. When a contact tower is almost
      reduced then
 will also be called the contact
      slopes, in reference to the slopes of the corresponding Newton
      polygons; see section 7.3. When a contact tower is almost
      reduced then  holds. The degree
      of the tower is
 holds. The degree
      of the tower is  .
.
    
      Example  ,
,  ,
,
       form a contact tower of height
 form a contact tower of height  .
.
    
      Example  ,
,  and
 and
       form a contact tower with contact slopes
 form a contact tower with contact slopes  ,
,  .
      Here we got
.
      Here we got  and
 and  from
 from
       and
 and  .
.
    
      We introduce another independent variable  of
      weight
 of
      weight  and subject to the constraint
 and subject to the constraint  . We also define the ideal
. We also define the ideal
    
 
    and the corresponding quotient ring
 
    
      In the following paragraphs, we show that  is
      effective for computations with finite truncation orders in
 is
      effective for computations with finite truncation orders in  and
 and  . For this,
      we adopt the point of view of standard bases, while doing the proofs
      from scratch for completeness. We recall that the lexicographic
      ordering
. For this,
      we adopt the point of view of standard bases, while doing the proofs
      from scratch for completeness. We recall that the lexicographic
      ordering  on
 on  is
      defined as follows:
 is
      defined as follows:
    
 
    
      We also introduce a total ordering  with
 with
    
 
    
      on the group  by
 by
    
 
    
      The ordering  is a monomial ordering in
      the sense that
 is a monomial ordering in
      the sense that
    
 
    implies
 
    
      for all  . The leading
      monomial
. The leading
      monomial  of
 of  with
      respect to this ordering is defined to be the largest monomial with a
      non-zero coefficient in
 with
      respect to this ordering is defined to be the largest monomial with a
      non-zero coefficient in  . The
      set of monomials spanned by the leading monomials of the elements of an
      ideal
. The
      set of monomials spanned by the leading monomials of the elements of an
      ideal  is written
 is written  .
      Note that
.
      Note that  . With the
      terminology of [33], the ordering
. With the
      terminology of [33], the ordering  is called a negative weighted degree lexicographic local
      ordering.
      is called a negative weighted degree lexicographic local
      ordering.
    
      A standard basis of an ideal  with respect to the monomial ordering
      with respect to the monomial ordering  is a set
      of generators
 is a set
      of generators  such that the leading monomial of
      any polynomial in
 such that the leading monomial of
      any polynomial in  is a multiple of the leading
      monomial of at least one of the
 is a multiple of the leading
      monomial of at least one of the  .
      In other words,
.
      In other words,  is generated by
 is generated by  . A standard basis is said to be reduced
      whenever none of the non-leading monomials in the
. A standard basis is said to be reduced
      whenever none of the non-leading monomials in the  belong to
      belong to  .
.
    
For the completeness, we now prove two well known lemmas from the theory of standard bases.
         is a reduced standard basis of
 is a reduced standard basis of  for
        for  .
.
      
      Proof. Since  are
      independent of
 are
      independent of  , it suffices
      to prove the lemma in
, it suffices
      to prove the lemma in  .
      According to the assumptions,
.
      According to the assumptions,  is monic of degree
 is monic of degree
       in
 in  ,
      and
,
      and  for all
 for all  and
 and  . Therefore,
. Therefore,
    
 
    
      for  . The lemma follows from
      general standard basis theory since the leading monomials of the
. The lemma follows from
      general standard basis theory since the leading monomials of the  share no variable. For completeness, we give a
      dedicated proof.
 share no variable. For completeness, we give a
      dedicated proof.
    
      Let us prove by induction on  that
 that  is a standard basis for the ideal
 is a standard basis for the ideal  in
      in  . This clearly holds for
. This clearly holds for
       . Let us assume that the
      induction hypothesis holds for some
. Let us assume that the
      induction hypothesis holds for some  and consider
 and consider
       . If
. If  , then
, then  is a multiple of
 is a multiple of
       . Otherwise, we write
. Otherwise, we write
    
 
    
      with  and
 and  .
      Then
.
      Then
    
 
    
      so  belongs to the ideal
 belongs to the ideal  of
      of  . By the induction
      hypothesis,
. By the induction
      hypothesis,  is a multiple of
 is a multiple of  for some
      for some  , whence so is
, whence so is  . It follows that
. It follows that  is a standard basis. The fact that it is reduced is clear from degree
      considerations.
      is a standard basis. The fact that it is reduced is clear from degree
      considerations. 
    
      For  , we define
, we define
    
 
    
      where  stands at position
 stands at position  and
      and  at position
 at position  .
      Note that the dot product
.
      Note that the dot product  is identically zero.
      For
 is identically zero.
      For  , the initial form of
, the initial form of
       , still written
, still written  , is defined as
, is defined as  .
.
    
      Proof. We prove the lemma by induction on  . For
. For  ,
      we have nothing to prove, so assume that
,
      we have nothing to prove, so assume that  .
      Extracting homogeneous components, we may assume without loss of
      generality that
.
      Extracting homogeneous components, we may assume without loss of
      generality that
    
 
    
      whenever  and
 and  .
      By the induction hypothesis, we may also assume that
.
      By the induction hypothesis, we may also assume that  . Long division of
. Long division of  by
 by
       yields
 yields
    
 
    
      for homogeneous polynomials  with
 with  , for
, for  .
.
    
      Reducing the relation  modulo
 modulo  , we obtain
, we obtain
    
 
    
      Since  is monic in
 is monic in  ,
      it follows that
,
      it follows that  , and thus
      that
, and thus
      that  . Consequently, we
      obtain
. Consequently, we
      obtain
    
 
    which implies
 
    
      Let  . If
. If  , then
, then  is homogeneous.
      Otherwise, we have
 is homogeneous.
      Otherwise, we have
    
 
    
      so  is also homogeneous. Each
 is also homogeneous. Each  can be expanded with respect to
      can be expanded with respect to  :
:
    
 
    
      with  . Then we have
. Then we have
    
 
    
      which implies  for all
 for all  . We conclude by applying the induction
      hypothesis.
. We conclude by applying the induction
      hypothesis. 
    
      Proof. We expand each  with respect to the variable
      with respect to the variable  :
:
    
 
    
      For all  , we get
, we get
    
 
    
      so Lemma 3.5 ensures the existence of homogeneous
      polynomials  in
 in  such that
 such that
    
 
    
      Letting  , we deduce that
, we deduce that
    
 
    
      Since the  are homogeneous, up to replacing the
 are homogeneous, up to replacing the
       by their homogeneous components of suitable
      valuation, we may assume that
 by their homogeneous components of suitable
      valuation, we may assume that
    
          the  are homogeneous,
 are homogeneous,
        
           holds for all
 holds for all  with
 with
           and
 and  ,
,
        
           holds for all
 holds for all  with
 with
           and
 and  .
.
        
      For  , we introduce the
      vectors
, we introduce the
      vectors
    
 
    
      where  stands at position
 stands at position  and
      and  at position
 at position  ,
      so the dot product
,
      so the dot product  is identically zero. We set
 is identically zero. We set
    
 
    
      Using the fact that  , we
      conclude that
, we
      conclude that
    
 
       
    
    
    
      Proof. Let  ,
      so there exist
,
      so there exist  with
 with
    
 
    We repeat the following operations:
          Let  . Since
. Since  , we always have
, we always have  . If
. If  ,
          then we obtain a relation
,
          then we obtain a relation
        
 
        
          where  is the non-empty subset of indices
 is the non-empty subset of indices
           such that
 such that  ,
          so we are done.
,
          so we are done.
        
          Otherwise  , hence
, hence  . The latter relation can be
          lifted to
. The latter relation can be
          lifted to  with
 with  for
 for
           , by Lemma 3.6.
, by Lemma 3.6.
        
          Replace the vector  by
 by  , and go to step 1.
, and go to step 1.
        
      Thanks again to the assumption  ,
      the relation
,
      the relation  holds after each iteration.
      Furthermore, the value of
 holds after each iteration.
      Furthermore, the value of  strictly increases, so
      the process converges. We conclude that
 strictly increases, so
      the process converges. We conclude that  .
. 
    
      Proof. Assume that  belongs to
      belongs to  . Then
. Then  , so Lemma 3.7 implies
      that
, so Lemma 3.7 implies
      that  for some
 for some  .
. 
    
      From Proposition 3.8, we know that an element  of
 of  can be uniquely represented by
      a polynomial
 can be uniquely represented by
      a polynomial  of partial degree
 of partial degree  in
      in  for
 for  .
      We call
.
      We call  the canonical
      representative of
 the canonical
      representative of  .
.
    
We introduce contact towers as a tool for the local resolution of polynomial equations. For this, we will often reduce to the case when all the roots of the polynomial are in the local region of interest. Such polynomials are said to be “clustered”:
         in
 in  is a clustered polynomial if
        its canonical representative is monic in
 is a clustered polynomial if
        its canonical representative is monic in  of
        degree
 of
        degree  and if
 and if  .
.
      
      Example  is a clustered polynomial regarded in
 is a clustered polynomial regarded in  for
      for  .
.
    
      The theory of standard bases comes with algorithms to compute modulo
      ideals given by standard bases. We now detail how to perform such
      computations in the case of  .
.
    
      Additions, subtractions and scalar multiplications are straightforward,
      but other operations require an appropriate treatment of
      “carries” within  -adic
      expansions. For the contact coordinates of Example 3.3, let
      us briefly illustrate how carries occur during multiplications.
-adic
      expansions. For the contact coordinates of Example 3.3, let
      us briefly illustrate how carries occur during multiplications.
    
      Example  and
 and
       form a contact tower with contact slopes
 form a contact tower with contact slopes  ,
,  .
.
    
      Let us first illustrate the computation of a product modulo  :
:
    
 
    Doing a direct polynomial multiplication, we obtain
 
    
      which is not in canonical representation since the degrees in  and
 and  are too high. We thus have to
      rewrite
 are too high. We thus have to
      rewrite
    
 
    and
 
    
      At the end, this leads to the following canonical representation for
       modulo
 modulo  :
:
    
 
      
      The canonical representative  of an element
 of an element  in
 in  can uniquely be written as
 can uniquely be written as
    
 
    
      where  satisfies
 satisfies  for
 for
       . Similarly, the canonical
      representative
. Similarly, the canonical
      representative  of another element
 of another element  can be written as
 can be written as
    
 
    
      Now assume that  for sufficiently large values of
 for sufficiently large values of
       . Then we may regard
. Then we may regard  as a univariate polynomial in
 as a univariate polynomial in  : the “degree of
: the “degree of  in
 in
       ”, written
”, written  , is defined as the largest integer
, is defined as the largest integer
       such that
 such that  .
      We say that
.
      We say that  is “monic of degree
 is “monic of degree
       in
 in  ”
      when
”
      when  and
 and  for
 for  .
.
    
      Now we ask whether we can define and compute a generalized Euclidean
      division of  by
 by  .
      The answer is “yes” under suitable assumptions. More
      generally, the following lemma shows that there exists a unique
.
      The answer is “yes” under suitable assumptions. More
      generally, the following lemma shows that there exists a unique  -adic expansion of
-adic expansion of  .
.
    
         is clustered at
        is clustered at  and has degree
 and has degree  in
 in  . Then,
        there exist unique elements
. Then,
        there exist unique elements  in
 in  satisfying
 satisfying
      
 
        
        and such that  for all
 for all  .
.
      
Proof. This lemma is a reformulation of what we have already proved with contact coordinates. In fact, it suffices to increase the height of the tower by one, to set
 
    
       , and to assign any weight
, and to assign any weight
       to the new variable
 to the new variable  . Therefore, the canonical representative of the
      image of
. Therefore, the canonical representative of the
      image of  in
 in  is given by
 is given by
    
 
    
      where  for
 for  .
      Consequently the above
.
      Consequently the above  -adic
      expansion of
-adic
      expansion of  exists with
 exists with  .
.
    
      As for uniqueness, let the  be as in the
      statement of the lemma, and let us write them
 be as in the
      statement of the lemma, and let us write them
    
 
    
      with  . The
. The  must satisfy
      must satisfy
    
 
    that implies
 
    
      It follows that the  do exist and are uniquely
      determined by the canonical representative of
 do exist and are uniquely
      determined by the canonical representative of  in
 in
       .
. 
    
         and
 and  are respectively
        called the quotient and remainder of
        the Euclidean division of
 are respectively
        called the quotient and remainder of
        the Euclidean division of  by
 by  , and are written
, and are written  and
 and
         .
.
      
      Example 
 
    We have
 
    
      Therefore the division of  by
 by  writes
      writes  with
 with  and
 and  .
.
    
In what follows, we will restrict ourselves to computations with “polynomials” in
 
    
      instead of “series” in  .
      Elements
.
      Elements  in
 in  can be
      represented canonically by polynomials
 can be
      represented canonically by polynomials  of
      partial degrees
 of
      partial degrees  in
 in  for
 for
       . In order to alleviate
      terminology, we call elements in
. In order to alleviate
      terminology, we call elements in  contact
      polynomials, in which case we always assume that
 contact
      polynomials, in which case we always assume that  is represented canonically as a polynomial
      is represented canonically as a polynomial  in
 in
       with
 with  ;
      we will also call this the contact representation.
      At the same time, we will keep the terminology of “canonical
      representatives” whenever we need to carefully distinguish between
;
      we will also call this the contact representation.
      At the same time, we will keep the terminology of “canonical
      representatives” whenever we need to carefully distinguish between
       and its actual polynomial representative
 and its actual polynomial representative  .
.
    
      By what precedes, we may recursively expand elements in  with respect to
      with respect to  until
 until  . However, from a computational point of view such
      recursive
. However, from a computational point of view such
      recursive  -adic
      expansions are expensive. Indeed such expansions are reminiscent of
      computations modulo triangular sets, so it would be interesting to
      examine whether the algorithms of [51] could be adapted or
      not. In this subsection we follow another direction that leads to
      efficient algorithms. The key idea is to rewrite elements in
-adic
      expansions are expensive. Indeed such expansions are reminiscent of
      computations modulo triangular sets, so it would be interesting to
      examine whether the algorithms of [51] could be adapted or
      not. In this subsection we follow another direction that leads to
      efficient algorithms. The key idea is to rewrite elements in  with respect to the plain coordinates
 with respect to the plain coordinates
       and
 and  .
      For this purpose, we introduce the following polynomials:
.
      For this purpose, we introduce the following polynomials:
    
 
    
      Note that  is monic of degree
 is monic of degree  . The change of representation is presented in
      the following lemma:
. The change of representation is presented in
      the following lemma:
    
      Proof. We introduce the following auxiliary
      evaluation morphism over  :
:
    
 
    
      For  , we have
, we have
    
 
    
      so  and
 and  is well defined.
 is well defined.
    
      Let us prove by induction on  that
 that  is bijective. This is clear when
 is bijective. This is clear when  , so assume that
, so assume that  .
      Let
.
      Let  be of degree
 be of degree  for
      some integer
 for
      some integer  . The
. The  -adic expansion of
-adic expansion of  yields a polynomial
      yields a polynomial
    
 
    
      such that  and
 and  for
 for  . Next we recursively compute
. Next we recursively compute  for
 for  . This
      yields
. This
      yields
    
 
    
      with  . This proves that
. This proves that  is surjective.
 is surjective.
    
      Now let  be non-zero. Since
 be non-zero. Since  , we must have
, we must have  ,
      that is
,
      that is  . The induction
      hypothesis implies that
. The induction
      hypothesis implies that  .
. 
    
      As seen in the proof of Lemma 3.15, the isomorphism  corresponds to a cascade of
 corresponds to a cascade of  -adic expansions for
-adic expansions for  .
      We begin with recalling known costs for univariate expansions over an
      effective ring
.
      We begin with recalling known costs for univariate expansions over an
      effective ring  .
.
    
         and let
 and let  be
        monic of degree
 be
        monic of degree  . The
. The  -adic expansion of
-adic expansion of  can be computed using
 can be computed using  operations
        in
 operations
        in  .
.
      
      Proof. Without loss of generality, we may assume
      that  for some integer
 for some integer  . We compute
. We compute  using
 using  operations in
 operations in  .
      We divide
.
      We divide  by
 by  ,
      so
,
      so  with
 with  and
 and  . Then we compute the
. Then we compute the  -adic expansion of
-adic expansion of  and
 and  in a recursive manner so the expansion of
 in a recursive manner so the expansion of  is obtained by merging those of
 is obtained by merging those of  and
      and  . The depth of the
      recursive calls is
. The depth of the
      recursive calls is  . The sum
      of the costs of the operations at depth
. The sum
      of the costs of the operations at depth  is
 is  , whence the claimed bound.
, whence the claimed bound. 
    
         be polynomials in
 be polynomials in  and let
        and let  be a monic polynomial of degree
 be a monic polynomial of degree  in
 in  .
        Then,
.
        Then,  can be computed using
 can be computed using  operations in
        operations in  , where
, where  .
.
      
      Proof. Without loss of generality, we may assume
      that  for some integer
 for some integer  . We compute
. We compute  with
 with  operations in
 operations in  .
      In a recursive manner we compute
.
      In a recursive manner we compute  and
 and  , and finally we compute
, and finally we compute  with
 with  operations in
 operations in  . The rest of the complexity analysis follows
      as in the proof of Lemma 3.16.
. The rest of the complexity analysis follows
      as in the proof of Lemma 3.16. 
    
      Remark  in
      Lemmas 3.16 and 3.17; see [46].
 in
      Lemmas 3.16 and 3.17; see [46].
    
         ,
        and write
,
        and write  . One evaluation
        of
. One evaluation
        of  modulo
 modulo  at an
        element of degree
 at an
        element of degree  in
 in  (for the canonical representation), and one evaluation of
        (for the canonical representation), and one evaluation of  modulo
 modulo  at a polynomial of degree
 at a polynomial of degree
         in
 in  ,
        both take
,
        both take  operations in
 operations in  .
.
      
      Proof. Let  be of degree
 be of degree
       . Its
. Its  -adic expansion takes
-adic expansion takes  operations in
      operations in  by Lemma 3.16. Then,
      we perform
 by Lemma 3.16. Then,
      we perform  calls to
 calls to  in
      degree
 in
      degree  . A straightforward
      induction gives a total complexity bound
. A straightforward
      induction gives a total complexity bound
    
 
    
      The backward conversion makes use of Lemma 3.17, and the
      complexity analysis is similar. 
    
         ,
        and let
,
        and let  and
 and  be two
        contact polynomials in
 be two
        contact polynomials in  of degree
 of degree  in
 in  and given with precision
 and given with precision
         . Then, the product
. Then, the product  can be computed modulo
 can be computed modulo  with
 with
         operations in
 operations in  ,
        where
,
        where  .
.
      
Proof. The product is computed via the following formula:
 
    
      By Proposition 3.19 the cost of the conversions amounts to
       . Multiplying
. Multiplying  and
 and  modulo
 modulo  incurs
      incurs  .
. 
    
      For actual machine computations, we only work with truncated power
      series. The decision of whether it is more efficient to use contact
      representations or the plain representations in  depends on the truncation order. For sufficiently small orders, the
      “carries” can be neglected, which makes it more efficient to
      conduct computations directly in the contact representation. For large
      orders, and thus for asymptotic complexity analyses, the overhead of the
      conversions using isomorphism
      depends on the truncation order. For sufficiently small orders, the
      “carries” can be neglected, which makes it more efficient to
      conduct computations directly in the contact representation. For large
      orders, and thus for asymptotic complexity analyses, the overhead of the
      conversions using isomorphism  . Until the end of the
      paper we perform most of the computations directly in
. Until the end of the
      paper we perform most of the computations directly in  , and thereby minimize the number of
      conversions.
, and thereby minimize the number of
      conversions.
    
      The isomorphism  with respect to
 with respect to
       , in the sense of Lemma 3.12. In fact, let
, in the sense of Lemma 3.12. In fact, let  and
 and  be as in the lemma, and compute the division of
 be as in the lemma, and compute the division of  by
 by  :
:
    
 
    
      where  . The degree in
. The degree in  of the canonical representative of
 of the canonical representative of  is therefore
      is therefore  . It follows
      that
. It follows
      that  equals the remainder
 equals the remainder  of Definition 3.13. Since both
      of Definition 3.13. Since both  and
 and
       have finite degree in
 have finite degree in  , we note that this also yields an easier way to
      define the division in comparison to Lemma 3.12. In
      particular, the assumption that
, we note that this also yields an easier way to
      define the division in comparison to Lemma 3.12. In
      particular, the assumption that  is not needed.
 is not needed.
    
         ,
        and let
,
        and let  and
 and  be two
        contact polynomials in
 be two
        contact polynomials in  of degree
 of degree  in
 in  , and
        given with precision
, and
        given with precision  . If
. If
         is monic in
 is monic in  ,
        then the division of
,
        then the division of  by
 by  can be computed modulo
        can be computed modulo  with
 with  operations in
        operations in  , where
, where  .
.
      
      Proof. The division  is
      computed as above via
 is
      computed as above via
    
 
    
      By Proposition 3.19 the conversions take  . Dividing
. Dividing  by
 by  modulo
 modulo  incurs
 incurs  .
. 
    
      Recall that  represents the valuation semi-group
      of the contact tower
 represents the valuation semi-group
      of the contact tower
    
 
    
         stand for the image of
 stand for the image of  in
 in  . The
        valuation
. The
        valuation  extends to a semi-valuation
 extends to a semi-valuation  with
 with  for
 for  , and such that
, and such that  inherits the weighted grading of
        inherits the weighted grading of  .
.
      
      Proof. For  of canonical
      representative
 of canonical
      representative  , we set
, we set
    
 
    
      We need to verify that  actually defines a
      semi-valuation in
 actually defines a
      semi-valuation in  .
.
    
      If  is another element of
 is another element of  of canonical representative
      of canonical representative  ,
      then it is straightforward to verify that
,
      then it is straightforward to verify that  .
      As for the product, we compute the long division by the standard basis
      thanks to Proposition 3.8:
.
      As for the product, we compute the long division by the standard basis
      thanks to Proposition 3.8:
    
 
    
      where  is the canonical representative of
 is the canonical representative of  , so
, so  .
      The latter long division begins with setting
.
      The latter long division begins with setting  and
      then it successively subtracts polynomials of the form
 and
      then it successively subtracts polynomials of the form  from
      from  where
 where  ,
,
       ,
,  , and
, and  .
      Since the monomials in
.
      Since the monomials in  have valuation
 have valuation  , it follows that
, it follows that
    
 
    
      This shows that  . Since
. Since  , we deduce that
, we deduce that  .
. 
    
      We write  for the partial
      valuation in
 for the partial
      valuation in  of
 of  . The valuation in
. The valuation in  of an
      element of
 of an
      element of  will be the valuation in
 will be the valuation in  of its canonical representative. In the canonical
      representation, the degrees of the
 of its canonical representative. In the canonical
      representation, the degrees of the  being
      bounded, the valuation in
 being
      bounded, the valuation in  of an element in
 of an element in  can be related to
 can be related to  in terms of
      the
 in terms of
      the  . The following bounds
      will be useful when converting between the canonical and plain
      representations.
. The following bounds
      will be useful when converting between the canonical and plain
      representations.
    
      Proof. Assume  .
      There exists a monomial of the form
.
      There exists a monomial of the form  in
 in  . Using
. Using  and
 and
       for
 for  ,
      we verify that
,
      we verify that
    
and then that
|  |  |  | |
|  |  | ||
|  |  | ||
|  |  | ||
|  | |||
|  |  |  | 
      The following lemma asserts that  preserves the
      valuation in
 preserves the
      valuation in  .
.
    
      Proof. For any element  , the inequality
, the inequality  clearly
      holds. Conversely, for any
 clearly
      holds. Conversely, for any  ,
      we have
,
      we have  . It follows that
. It follows that
    
 
    
      whence the first assertion. The second assertion is a consequence of the
      fact that  is a
 is a  -isomorphism;
      see Lemma 3.15.
-isomorphism;
      see Lemma 3.15. 
    
      The next lemma relates valuations and precisions of approximations of
       and
 and  .
.
    
Proof. Lemmas 3.23 and 3.24 give us
|  | (3.4) | 
      In particular, if  then
 then  . As for the second assertion, the inequalities
. As for the second assertion, the inequalities
      
 
    
      In particular, if  then
 then  .
. 
    
      Remark 
 
    For simplicity we will not use this refinement in the sequel.
      The usual Hensel lemma asserts that if a monic polynomial  factors into two monic coprime polynomials
 factors into two monic coprime polynomials  and
 and  modulo
 modulo  , then there exist unique monic polynomials
, then there exist unique monic polynomials  and
 and  in
 in  such that
      such that  ,
,  , and
, and  .
      In addition,
.
      In addition,  and
 and  can be
      obtained with a softly linear cost in the output size.
 can be
      obtained with a softly linear cost in the output size.
    
      A variant of Hensel lifting is the Weierstraß preparation theorem,
      in which case  and
 and  are no
      longer monic, but
 are no
      longer monic, but  is invertible as a power
      series in
 is invertible as a power
      series in  . We will
      generalize these two kinds of lifting to the contact coordinate
      framework.
. We will
      generalize these two kinds of lifting to the contact coordinate
      framework.
    
      Throughout this section,  ,
,
       are elements in
 are elements in  ,
      regarded informally as “polynomials” in the main variable
,
      regarded informally as “polynomials” in the main variable
       . We will assume that
. We will assume that  holds for a “sufficient” initial
      precision, and that
 holds for a “sufficient” initial
      precision, and that  are “pairwise
      coprime”. We want to lift
 are “pairwise
      coprime”. We want to lift  into
 into  so that
 so that  holds up to a required
      precision. The case when
 holds up to a required
      precision. The case when  is monic and
 is monic and
    
 
    
      corresponds to the multi-factor Hensel lifting. The case when
       and
 and
    
 
    
      is called the Weierstraß normalization of
       .
.
    
      Let  be the canonical representative of
 be the canonical representative of  . We recall that
. We recall that  ,
,  ,
      and
,
      and  is the image of
 is the image of  in
 in
       . If
. If  is a non-zero element in
      is a non-zero element in  that is monic in
 that is monic in  , then
, then  represents the remainder in the division of
      represents the remainder in the division of  by
 by
       , as specified in Definition
      3.13.
, as specified in Definition
      3.13.
    
      Let  be clustered (see Definition 3.9)
      at
 be clustered (see Definition 3.9)
      at  and of degree
 and of degree  in
 in
       . Given
. Given  with
      with  , its inverse modulo
, its inverse modulo
       , whenever it exists, belongs
      to
, whenever it exists, belongs
      to  for some
 for some  .
      In order to determine a bound for
.
      In order to determine a bound for  ,
      consider
,
      consider  satisfying
 satisfying
    
           ,
,
        
           is an integer
 is an integer  ,
,
        
           .
.
        
Lemma 3.23 yields
 
    
      If  , then setting
, then setting  leads to
 leads to
    
 
    
      So we may divide  by
 by  and
      subtract
 and
      subtract  from
 from  in order
      to get a “simplified” modular inverse
 in order
      to get a “simplified” modular inverse  of
      of  that satisfies
 that satisfies
    
|  | (4.1) | 
      If  , so that
, so that  , then multiplication of
, then multiplication of  by
      by  also reduces to the case when (4.1)
      holds. In general, this shows that modular inverses can always be
      normalized in the sense of the following definition:
 also reduces to the case when (4.1)
      holds. In general, this shows that modular inverses can always be
      normalized in the sense of the following definition:
    
         be clustered at
 be clustered at  of degree
 of degree  in
 in  , and let
, and let  be of
        degree
 be of
        degree  in
 in  .
        A normalized inverse of
.
        A normalized inverse of  modulo
        modulo  with relative
        precision
 with relative
        precision  is an element
 is an element  with
        with  such that:
 such that:
      
             ,
,
          
             satisfies
 satisfies  ,
,
          
             .
.
          
        If  , then we say that
, then we say that
         is the normalized initial
        inverse of
 is the normalized initial
        inverse of  modulo
 modulo
         .
.
      
      The existence and the computation of such inverses are postponed in
      section 7.1. The next definition concerns the special case
      when  belongs to
 belongs to  .
.
    
         be of degree
 be of degree  in
 in  (
 ( is in
        is in  ). A normalized
        initial inverse of
). A normalized
        initial inverse of  is a homogeneous
        element
 is a homogeneous
        element  such that:
 such that:
      
               satisfies
 satisfies  ,
,
            
               .
.
            
      Proof. We have  .
      Definition 4.2 also yields
.
      Definition 4.2 also yields
    
 
    
      Concerning the uniqueness, if  represents a
      normalized initial inverse of
 represents a
      normalized initial inverse of  then
 then
    
 
    
      and therefore  , whence
, whence  .
. 
    
         has a normalized inverse modulo
 has a normalized inverse modulo
         with relative precision
 with relative precision  , as in Definition 4.1, then it is
        unique and
, as in Definition 4.1, then it is
        unique and  holds for all
 holds for all  .
.
      
      Proof. We extend the contact tower with  and apply Lemma 4.3 in order to obtain
      the equality for the valuation. As for the uniqueness let
 and apply Lemma 4.3 in order to obtain
      the equality for the valuation. As for the uniqueness let  represent another normalized inverse modulo
 represent another normalized inverse modulo  . We have
. We have  and thus
 and thus
       , whence
, whence  .
. 
    
We explain how to increase the relative precision of a normalized modular inverse, in terms of the contact coordinates.
         ,
,
         and
 and  ,
        be such that
,
        be such that
      
             is clustered at
 is clustered at  of
            degree
 of
            degree  in
 in  ,
,
          
             ,
,
          
             is a normalized inverse of
 is a normalized inverse of  modulo
 modulo  with relative
            precision
 with relative
            precision  .
.
          
        Then, there exists a unique normalized modular inverse  of
 of  with relative precision
 with relative precision  such that
 such that  .
        More precisely, with
.
        More precisely, with  and
 and
      
 
        
        we have  and
 and
      
 
        
      Proof. Let  represent an
      unknown in
 represent an
      unknown in  with
 with  ,
      and which satisfies
,
      and which satisfies
    
|  | (4.2) | 
This equation is equivalent to
 
    and, by Lemma 4.4, to
 
    Hence
 
    
      We have  , and therefore
, and therefore  . Lemma 3.23 implies
      that
. Lemma 3.23 implies
      that 
    
 
    
      so  can actually be divided by
 can actually be divided by  . We conclude that
. We conclude that  is
      the unique solution of (4.2), whence
 is
      the unique solution of (4.2), whence  fulfills all requirements.
      fulfills all requirements. 
    
         be clustered at
 be clustered at  of degree
 of degree  in
 in  . If
. If  admits an
        initial inverse
 admits an
        initial inverse  modulo
 modulo  , then there exists a unique
, then there exists a unique  such that
        such that  and
 and  .
.
      
      Proof. Thanks to repeated applications of
      Proposition 4.5 we can construct the initial inverse of
       modulo
 modulo  with any finite
      relative precision. The existence of
 with any finite
      relative precision. The existence of  follows
      from the completeness of
 follows
      from the completeness of  .
. 
    
      The next corollary addresses the precision loss of the initial inverse
      of  modulo
 modulo  when
 when  and
 and  are truncated modulo
 are truncated modulo  .
.
    
         be clustered at
 be clustered at  of degree
 of degree  in
 in  . If
. If  admits an
        initial inverse
 admits an
        initial inverse  modulo
 modulo  , then
, then  (as defined in
        Corollary 4.6) can be computed modulo
 (as defined in
        Corollary 4.6) can be computed modulo  from the truncations of
        from the truncations of  and
 and  modulo
        modulo  , whenever
, whenever  .
.
      
Proof. Let
 
    
      represent the truncations of of  and
 and  modulo
 modulo  , and
      let
, and
      let  be the smallest element of
 be the smallest element of  larger or equal to
      larger or equal to  . Thanks
      to repeated applications of Proposition 4.5 we can compute
      the initial inverse
. Thanks
      to repeated applications of Proposition 4.5 we can compute
      the initial inverse  of
 of  modulo
      modulo  with relative precision
 with relative precision  .
.
    
      Since  and
 and  ,
      we have
,
      we have  and therefore
 and therefore  . From
. From
    
 
    we deduce that
 
    
      It follows that  and then that
 and then that
    
 
    
      Using  , we obtain that
, we obtain that
    
 
    hence
 
    Lemma 3.23 implies that
 
    
      Thanks to the value taken for  it follows that
 it follows that
    
 
    
      whence  .
. 
    
      We now turn to the Weierstraß normalization of an element  . The following definition gathers
      the necessary technical conditions and data structures.
. The following definition gathers
      the necessary technical conditions and data structures.
    
         be of degree
 be of degree  in
 in  . A
        Weierstraß context for
. A
        Weierstraß context for  with relative precision
 with relative precision  consists
        of elements
 consists
        of elements  in
 in  and
 and
         that satisfy the following properties:
 that satisfy the following properties:
      
        If  , then we say that
, then we say that
         is an initial
        Weierstraß context for
 is an initial
        Weierstraß context for  .
.
      
The Weierstraß lifting step summarizes as follows.
         be monic of degree
 be monic of degree
         in
 in  and let
 and let  denote a Weierstraß context for
 denote a Weierstraß context for  with relative precision
        with relative precision  .
        Then, there exists a unique Weierstraß context
.
        Then, there exists a unique Weierstraß context  for
        for  with relative precision
 with relative precision  such that
        such that  ,
,  , and
, and  .
        More precisely, with
.
        More precisely, with
      
 
        
        we have  and
 and
      
 
        Letting
 
        
        we also have  and
 and
      
 
        
      Proof. Consider the unknowns  and
      and  such that
 such that  and
 and
    
 
    It follows that
 
    Lemma 4.4 and the constraints on valuations and precisions equivalently yield
 
    whence
 
    Then Lemma 3.23 gives
 
    
      This shows that  exists and is uniquely
      determined by
 exists and is uniquely
      determined by
    
 
    
      The formula for  is straightforward and the one
      for
 is straightforward and the one
      for  follows from Proposition 4.5.
 follows from Proposition 4.5. 
    
         be monic of degree
 be monic of degree
         in
 in  and let
 and let  denote an initial Weierstraß context for
 denote an initial Weierstraß context for  . Then, there exist unique
. Then, there exist unique  such that
 such that  ,
,
         , and
, and  . We call
. We call  (that is
        clustered at
 (that is
        clustered at  ) the Weierstraß
        part of
) the Weierstraß
        part of  .
.
      
      Proof. This follows from Proposition 4.9
      and the completeness of  .
. 
    
         be monic of degree
 be monic of degree
         in
 in  .
        If there exists an initial Weierstraß context
.
        If there exists an initial Weierstraß context  for
        for  , then
, then  and
        and  (as defined in Corollary 4.10)
        can be computed modulo
 (as defined in Corollary 4.10)
        can be computed modulo  from the truncation of
 from the truncation of
         modulo
 modulo  .
.
      
      Proof. We introduce the truncation  of
 of  modulo
 modulo  , and set
, and set  to the smallest
      element of
 to the smallest
      element of  larger or equal to
 larger or equal to  . The quadruple
. The quadruple  ,
,
       ,
,  ,
,  is an initial
      Weierstraß context for
 is an initial
      Weierstraß context for  .
      From Proposition 4.9 we know that we can compute the
      Weierstraß context
.
      From Proposition 4.9 we know that we can compute the
      Weierstraß context  ,
,
       ,
,  ,
,  for
 for  with relative precision
      with relative precision  , so
      that
, so
      that  and
 and
    
 
    
      According to Corollary 4.6 we may consider the modular
      inverse  of
 of  modulo
 modulo  , so that
, so that  . Hence
. Hence
    
 
    and
 
    Lemma 3.23 implies that
 
    
      Since  and
 and  are monic of
      the same degree in
 are monic of
      the same degree in  we deduce that
 we deduce that  .
. 
    
      The above formulas for the Weierstraß lifting can be applied
      directly in  , but for the
      sake of efficiency it is worth using plain coordinates. As a technical
      complication, conversions between contact and plain coordinates result
      in precision loss. Fortunately, this loss is sufficiently small so that
      it has no serious impact on the complexity of our top-level
      factorization algorithm. In the following algorithm, the input and
      output polynomials use plain coordinates. However, the relative
      precision
, but for the
      sake of efficiency it is worth using plain coordinates. As a technical
      complication, conversions between contact and plain coordinates result
      in precision loss. Fortunately, this loss is sufficiently small so that
      it has no serious impact on the complexity of our top-level
      factorization algorithm. In the following algorithm, the input and
      output polynomials use plain coordinates. However, the relative
      precision  , to be doubled
      during a lifting step, refers to the contact coordinates.
, to be doubled
      during a lifting step, refers to the contact coordinates.
    
        Algorithm 
 and degree
          and degree
           as above, a rational number
          as above, a rational number
           .
          A monic polynomial
.
          A monic polynomial
           modulo
          modulo
           ,
          where
,
          where
           ,
          and polynomials
,
          and polynomials
           in
          in
           modulo
          modulo
           .
          The elements
.
          The elements
           for
          for
           ,
,
          
           ,
          and
,
          and
           form a Weierstraß context for
          form a Weierstraß context for
           with relative precision
          with relative precision
           ,
          as in Definition
          4.8
          .
,
          as in Definition
          4.8
          .
        
        
               in
 in  modulo
 modulo  , such that the elements
, such that the elements
               for
 for  ,
,
               , and
, and  form a Weierstraß context for
 form a Weierstraß context for  with relative precision
 with relative precision  such that
              such that  for
 for  and
              and  .
.
            
              Set  .
.
            
              Compute  in
 in  .
.
            
              Compute  and
 and  in
 in
               .
.
            
              Compute  in
 in  .
.
            
              Compute  in
 in  .
.
            
              Compute  and
 and  in
 in
               .
.
            
              Return  .
.
            
Proof. The hypotheses of Proposition 4.9 are satisfied. We let
 
    Lemma 3.25 implies
 
    
      We have seen in Proposition 4.9 that  , whence
, whence  by Lemma 3.24.
      Consequently
 by Lemma 3.24.
      Consequently  is well defined. With the notation
      of Proposition 4.9 we verify that
 is well defined. With the notation
      of Proposition 4.9 we verify that
    
 
    and
 
    
      By Proposition 4.9, properties  , and relative
      precision
, and relative
      precision  .
.
    
In a similar fashion we verify that
 
    so we have
 
    
      By Proposition 4.5, property  .
. 
    
Applying successively Algorithm 4.1 several times enables us to lift any such initial context to any requested precision. The cost is summarized in the following corollaries.
         be of degree
 be of degree  in
 in  and let
 and let  be  an initial Weierstraß context for
        be  an initial Weierstraß context for  . Then, given
. Then, given  ,
        we may compute a Weierstraß context
,
        we may compute a Weierstraß context  for
 for
         with relative precision
 with relative precision  using
        using
      
 
        
        operations in  , where
, where
         and
 and  is the degree of
        the contact tower.
 is the degree of
        the contact tower.
      
      Proof. We convert the input data into the plain
      representation modulo  using Proposition 3.19,
      with
 using Proposition 3.19,
      with  operations in
 operations in  .
.
    
      We successively apply Algorithm 4.1 to increase the
      relative precision from  to
 to  , for
, for  .
      By Proposition 4.12, the total cost of the lifting
      contributes to
.
      By Proposition 4.12, the total cost of the lifting
      contributes to
    
 
    
      At the end of the lifting, we convert the polynomials to contact
      coordinates modulo  via Proposition 3.19,
      again with
 via Proposition 3.19,
      again with  operations in
 operations in  .
. 
    
         be of degree
 be of degree  in
 in  and let
 and let  form an initial Weierstraß context for
        form an initial Weierstraß context for  . Then, given
. Then, given  with
        precision
 with
        precision  with
 with  ,
        we can compute its Weierstraß part
,
        we can compute its Weierstraß part  (as
        defined in Corollary 4.10) with precision
 (as
        defined in Corollary 4.10) with precision  using
 using
      
 
        
        operations in  , where
, where
         is the degree of the contact tower.
 is the degree of the contact tower.
      
      Proof. The truncation of  at precision
      at precision  does not depend on
 does not depend on  , as long as the initial Weierstraß
      context properties are preserved. In particular we may set
, as long as the initial Weierstraß
      context properties are preserved. In particular we may set  to the largest slope of
 to the largest slope of  (which is
 (which is
       if
 if  is a power of
 is a power of  ), so we have
), so we have  where
      where  , whence
, whence
    
|  | (4.3) | 
      We use Corollary 4.13 with relative precision  , as in the proof of Corollary 4.11.
      The running time is
, as in the proof of Corollary 4.11.
      The running time is
    
 
    
      which yields the claimed bound thanks to inequality 
 
       
    
    
      We now turn to the lifting of a factorization of an element  , assuming that suitable approximate modular
      inverses are known. The following definition gathers the necessary
      technical conditions and data structures.
, assuming that suitable approximate modular
      inverses are known. The following definition gathers the necessary
      technical conditions and data structures.
    
         be clustered at
 be clustered at  of degree
 of degree  in
 in  . A Hensel
        context for
. A Hensel
        context for  with relative precision
 with relative precision
         consists of elements
 consists of elements  in
        in  and integers
 and integers  that
        satisfy the following properties:
 that
        satisfy the following properties:
      
      Informally speaking, the assumption that  admits
      a normalized initial inverse modulo
 admits
      a normalized initial inverse modulo  for
 for  corresponds to the idea that
 corresponds to the idea that  are “initially coprime”. We revisit the classical Chinese
      theorem in this context.
      are “initially coprime”. We revisit the classical Chinese
      theorem in this context.
    
Proof. Let us write
 
    By construction this yields
|  | (4.4) | 
      for  . Assume by induction
      that there exists
. Assume by induction
      that there exists  such that
 such that
    
|  | (4.5) | 
      holds for some  , which is
      indeed the case for
, which is
      indeed the case for  by
 by  , there exists
, there exists  such
      that
 such
      that
    
|  | (4.6) | 
      Since  is initially invertible modulo
 is initially invertible modulo  , Corollary 4.6 yields
      the existence of the initial inverse
, Corollary 4.6 yields
      the existence of the initial inverse  of
 of  modulo
 modulo  ,
      so there exists
,
      so there exists  such that
 such that
    
 
    
      Combining the latter equality to 
 
    
      thanks to Lemma 4.4 and  with
 with  .
      At the end of the induction equality
.
      At the end of the induction equality  , and since
, and since  , we finally deduce that
, we finally deduce that  .
. 
    
      Given  clustered at
 clustered at  ,
      we can increase
,
      we can increase  with
 with  and
 and
       . The contact tower
. The contact tower  obtained in this way corresponds to the quotient ring
 obtained in this way corresponds to the quotient ring
       : in the sequel
: in the sequel  is endowed with the semi-valuation induced by
 is endowed with the semi-valuation induced by  .
.
    
        
 
        
        is a  -linear isomorphism
        and we have
-linear isomorphism
        and we have  , where
, where
      
 
        
      Proof. It is clear from the assumptions that the
      map is well defined and  -linear.
      Let
-linear.
      Let
    
 
    From Lemma 4.4 we have
 
    so Lemma 3.23 implies
 
    
      If follows that  belongs to
 belongs to  and that
      and that  . By construction we
      have
. By construction we
      have
    
 
    
      that proves that  is surjective.
 is surjective.
    
      Let  be in the kernel of
 be in the kernel of  . There exists
. There exists  such that
 such that
       for
 for  .
      By Lemma 4.16 we deduce that
.
      By Lemma 4.16 we deduce that
    
 
    
      whence  . Consequently
. Consequently  is injective.
 is injective. 
    
The Hensel lifting step goes as follows.
         be clustered at
 be clustered at  of degree
 of degree  in
 in  . Let
. Let  represent a
        Hensel context for
 represent a
        Hensel context for  with relative precision
 with relative precision
         . Then, there exists a
        unique Hensel context
. Then, there exists a
        unique Hensel context  for
 for  with relative precision
        with relative precision  such that
 such that  and
 and  for
 for  . More precisely, letting
. More precisely, letting
      
 
        
        for  , we have
, we have  ,
,
      
 
        
        Letting  and
 and
      
 
        
        we also have  and
 and
      
 
        
      Proof. For  ,
      let us consider unknowns
,
      let us consider unknowns  in
 in  such that
      such that  and
 and
    
 
    After expanding the right-hand side of the latter equation, we obtain equivalently that
|  | (4.7) | 
      By Proposition 4.17, equality 
 
    
      For  , Lemma 4.4
      and the constraints on valuations and precisions then yield
, Lemma 4.4
      and the constraints on valuations and precisions then yield
    
 
    whence
 
    Then Lemma 3.23 gives
 
    
      For  , this shows that
, this shows that  is uniquely determined by
 is uniquely determined by
    
 
    
      whence  satisfy the required properties. We
      finally remark that
 satisfy the required properties. We
      finally remark that
    
 
    
      for  , so the formulas for the
, so the formulas for the
       follow from Proposition 4.5.
 follow from Proposition 4.5. 
    
         be clustered at
 be clustered at  of degree
 of degree  in
 in  and let
 and let  represent an initial
        Hensel context for
 represent an initial
        Hensel context for  . Then,
        there exist unique
. Then,
        there exist unique  such that
 such that  , for
, for  ,
        and
,
        and  .
.
      
      Proof. This follows from a repeated use of
      Proposition 4.18 with increasing precision. 
    
         be clustered at
 be clustered at  of degree
 of degree  in
 in  and let
 and let  represent an initial
        Hensel context for
 represent an initial
        Hensel context for  . Then
. Then
         (as defined in Corollary 4.19)
        can be computed modulo
 (as defined in Corollary 4.19)
        can be computed modulo  for
 for  from the truncation of
        from the truncation of  modulo
 modulo  .
.
      
      Proof. We introduce the truncation  of
 of  modulo
 modulo  and let
      and let  be the smallest element of
 be the smallest element of  larger or equal to
 larger or equal to  .
      By assumption,
.
      By assumption,  form an initial Hensel context
      for
 form an initial Hensel context
      for  . From Proposition 4.18 we know that we can compute the Hensel context
. From Proposition 4.18 we know that we can compute the Hensel context  for
 for  with relative precision
 with relative precision  , so that
, so that  and
      and
    
 
    
      Since  is the initial inverse of
 is the initial inverse of  modulo
      modulo  , Corollary 4.6
      ensures the existence of the modular inverse
, Corollary 4.6
      ensures the existence of the modular inverse  of
 of
       modulo
 modulo  ,
      which satisfies
,
      which satisfies
    
 
    It follows that
 
    whence
 
    Lemma 3.23 implies that
 
    
      Since  and
 and  are monic of
      the same degree in
 are monic of
      the same degree in  we deduce that
 we deduce that  .
. 
    
Hensel lifting is performed by the following algorithm that is dedicated to doubling the relative precision of a Hensel context.
        Algorithm 
 and degree
          and degree
           as above, a rational number
          as above, a rational number
           .
          A monic polynomial
.
          A monic polynomial
           modulo
          modulo
           ,
          where
,
          where
           ,
          and polynomials
,
          and polynomials
           in
          in
           modulo
          modulo
           .
          Integers
.
          Integers
           in
          in
           .
          The elements
.
          The elements
           ,
,
          
           ,
          and
,
          and
           for
          for
           form a Hensel context for
          form a Hensel context for
           with relative precision
          with relative precision
           as in Definition
          4.15
          .
          as in Definition
          4.15
          .
        
        
               in
 in  modulo
 modulo  , such that the elements
, such that the elements
               ,
,  , and
, and  for
 for  form a Hensel context for
 form a Hensel context for  with relative precision
              with relative precision  .
.
            
              Set  , and
, and  .
.
            
              Compute  in
 in  ,
              for
,
              for  .
.
            
              For  :
:
            
                  Compute  in
 in  ,
,
                
                  Compute  and
 and  in
                  in  .
.
                
              Compute  in
 in  .
.
            
              Compute  in
 in  for
 for
               .
.
            
              For  , compute
, compute  in
 in  .
.
            
              For  , compute
, compute  and
 and  in
 in  .
.
            
              Return  .
.
            
Proof. The hypotheses of Proposition 4.18 are satisfied. We let
 
    Lemma 3.25 implies
 
    
      We have seen in Proposition 4.18 that  , whence
, whence  by Lemma 3.24. Consequently
 by Lemma 3.24. Consequently  is well defined for
 is well defined for
       . With the notation of
      Proposition 4.18 we verify that
. With the notation of
      Proposition 4.18 we verify that
    
 
    
      By Proposition 4.18, properties  and relative precision
 and relative precision  .
.
    
In a similar fashion we verify that
 
    
      From Proposition 4.18 we know that  divides
      divides  , so it divides
, so it divides  . Consequently
. Consequently  is well defined for
      is well defined for  , and we
      have
, and we
      have
    
 
    
      By Proposition 4.5, property 
Concerning complexities, from Definition 4.2 we first observe that
 
    
      for  . Consequently steps 2,
      4, and 5 take
. Consequently steps 2,
      4, and 5 take
    
 
    
      operations in  using the sub-product tree
      technique; see [31, chapter 10, Theorems 10.6 and 10.10],
      for instance. The other steps require
 using the sub-product tree
      technique; see [31, chapter 10, Theorems 10.6 and 10.10],
      for instance. The other steps require  further
      operations in
 further
      operations in  .
. 
    
Applying successively Algorithm 4.2 several times enables us to lift an initial Hensel context to any requested precision. The cost is summarized in the following corollary.
         be clustered at
 be clustered at  of degree
 of degree  in
 in  , and let
, and let  be an
        initial Hensel context for
 be an
        initial Hensel context for  .
        Then, given
.
        Then, given  and
 and  ,
        we may compute a Hensel context
,
        we may compute a Hensel context  for
 for  with relative precision
 with relative precision  using
        using
      
 
        
        operations in  , where
, where
         is the degree of the contact tower.
 is the degree of the contact tower.
      
      Proof. We convert the input data into the plain
      representation modulo  using Proposition 3.19,
      with
 using Proposition 3.19,
      with  operations in
 operations in  .
.
    
      We successively apply Algorithm 4.2 to increase the
      relative precision from  to
 to  , for
, for  .
      By Proposition  4.21, the total cost of the lifting
      contributes to
.
      By Proposition  4.21, the total cost of the lifting
      contributes to
    
 
    
      At the end of the lifting, we convert the polynomials to contact
      coordinates modulo  using Proposition 3.19,
      again with
 using Proposition 3.19,
      again with  operations in
 operations in  .
. 
    
         be clustered at
 be clustered at  of degree
 of degree  in
 in  , and let
, and let  be an
        initial Hensel context for
 be an
        initial Hensel context for  .
        Then, given
.
        Then, given  at precision
 at precision  we can compute
        we can compute  (as defined in Corollary 4.20) at precision
 (as defined in Corollary 4.20) at precision  for
 for  , using
, using
      
 
        
        operations in  , where
, where
         is the degree of the contact tower.
 is the degree of the contact tower.
      
      Proof. We use Corollary 4.22 with
      the relative precision  as in the proof of
      Corollary 4.20. The running time is
 as in the proof of
      Corollary 4.20. The running time is
    
 
    Then we verify that
 
    
      Using  the cost of the lifting simplifies to
 the cost of the lifting simplifies to
       .
. 
    
In this section we introduce the notion of “separability” for contact towers. This will allow the construction of derivations on contact towers, which will be the key ingredient of the central shift algorithm in section 7.7.
      Informally speaking, a contact tower is said to be separable when the
      initial forms of the its defining polynomials  are separable. The precise definition is as follows.
      are separable. The precise definition is as follows.
    
         of contact
        coordinates as in Definition 3.1 is said to be separable
        when
 of contact
        coordinates as in Definition 3.1 is said to be separable
        when  is initially invertible in
 is initially invertible in  , for
, for  .
        It is said to be effectively separable if
        the normalized initial inverses of the
.
        It is said to be effectively separable if
        the normalized initial inverses of the  are
        known for algorithmic purpose.
 are
        known for algorithmic purpose.
      
      Throughout this section, we assume that  is
      effectively separable. For
 is
      effectively separable. For  ,
,
       represents the initial inverse of
 represents the initial inverse of  modulo
 modulo  . More
      precisely, we assume that
. More
      precisely, we assume that  is homogeneous and
      satisfies
 is homogeneous and
      satisfies  , where
, where  . From Definition 4.1
      we know that
. From Definition 4.1
      we know that
    
 
    
      since  .
.
    
      Example  by
      taking
 by
      taking  ,
,  ,
,  ,
,
       , and
, and  . Indeed,
. Indeed,
    
 
    
      where  stands for remainder with respect to the
      variable
 stands for remainder with respect to the
      variable  .
.
    
      Example  and
      and  form a contact tower of height
 form a contact tower of height  with contact slopes
 with contact slopes  ,
,
       . We get
. We get  and
      and  from
 from  and
 and  . As for the modular inverses we
      may take
. As for the modular inverses we
      may take  ,
,  ,
,
    
 
    Indeed, we verify that
 
      
      Since the map  is a
 is a  -isomorphism,
      from Lemma 3.15, the derivation
-isomorphism,
      from Lemma 3.15, the derivation  on
 on
       induces a derivation on
 induces a derivation on  (that is still denoted by
      (that is still denoted by  for simplicity):
 for simplicity):
    
 
    The separability assumption ensures that this derivation satisfies several convenient properties.
      Proof. We prove the result by induction on  . For
. For  we
      have
 we
      have
    
 
    and
 
    
      For  we have
 we have
    
 
    By Lemma 4.3, the separability assumption yields
 
    Combined with the induction hypothesis we deduce
 
    
      On the other hand, for  we have
 we have
    
 
    and therefore
|  | |||
|  |  | ||
|  |  | ||
|  |  | ||
|  |  |  | 
      We now study the effect of several consecutive differentiations in  .
.
    
Proof. The inequality follows from
 
    Lemma 5.4, and the inequality
 
    
      for  .
. 
    
      Proof. Writing  ,
      we have
,
      we have
    
 
    
      Then, for  , we have
, we have  so Lemma 5.5 yields
 so Lemma 5.5 yields
    
 
    On the other hand,
|  | (5.1) | 
so Lemma 5.4 implies
 
    and
 
       
    
    
    Proof. First note that
 
    
      holds for all  . We prove the
      lemma by induction on
. We prove the
      lemma by induction on  . The
      result is clear for
. The
      result is clear for  , so
      assume that
, so
      assume that  . The induction
      hypothesis implies that
. The induction
      hypothesis implies that
    
|  | (5.2) | 
      for some  such that
 such that
    
 
    
      Differentiating  yields
yields
    
|  | (5.3) | 
      Since  does not depend on
 does not depend on  , the initial form of
, the initial form of  also
      does not depend on
 also
      does not depend on  . It
      follows that
. It
      follows that
    
 
    whence
|  | (5.4) | 
      Equation  , and the definition of
, and the definition of  imply that
 imply that
    
|  | (5.5) | 
      By combining 
|  | (5.6) | 
On the other hand Lemma 5.6 gives us
|  | (5.7) | 
      We conclude the proof by combining equations  
    
      Canonical representations are not always the most efficient ones for
      computations with initial forms. This can be already observed in the
      case when  . Indeed, let us
      write
. Indeed, let us
      write 
    
 
    
      with  and
 and  for
 for  . Let
. Let  and
 and
       be coprime integers such that
 be coprime integers such that
    
 
    
      Then, the coefficient  is zero whenever
 is zero whenever  is not a multiple of
 is not a multiple of  .
      This shows that
.
      This shows that  is sparse in the sense that it
      contains at most
 is sparse in the sense that it
      contains at most  non-zero terms besides
 non-zero terms besides  . In particular, computations that
      use the dense representation are deemed to be suboptimal.
. In particular, computations that
      use the dense representation are deemed to be suboptimal.
    
      Assume for instance that we need to compute the valuation and the
      initial inverse of  . We first
      extract the initial part of its canonical representative
. We first
      extract the initial part of its canonical representative  ; there exist
; there exist  and
 and  such that
 such that
    
 
    
      where  . Note that
. Note that  is again sparse. We now have to compute the Bézout
      relation of the specializations at
 is again sparse. We now have to compute the Bézout
      relation of the specializations at  of
 of  and
 and  in
 in  . Without exploiting the sparsity, this computation
      takes
. Without exploiting the sparsity, this computation
      takes  operations in
 operations in  . In this particular case, the remedy is to compute
      with respect to
. In this particular case, the remedy is to compute
      with respect to  instead of
 instead of  , while exploiting the fact that
, while exploiting the fact that  and
 and  are dense polynomials in
 are dense polynomials in  .
.
    
      In order to generalize this remedy to the case when  , we show in this section how to rewrite sparse
      homogeneous polynomials in
, we show in this section how to rewrite sparse
      homogeneous polynomials in  into suitable
      products of coefficients in “algebraic towers”
 into suitable
      products of coefficients in “algebraic towers”  over
 over  and “monomials”.
 and “monomials”.
    
      In all computations below,  will be an
      effectively separable contact tower (as in Definition 5.1)
      that satisfies the following additional property.
 will be an
      effectively separable contact tower (as in Definition 5.1)
      that satisfies the following additional property.
    
         is said to be regular
        when
 is said to be regular
        when  has valuation
 has valuation  and
        is initially invertible, for
 and
        is initially invertible, for  .
        It is said to be effectively regular if
        the normalized initial inverse of
.
        It is said to be effectively regular if
        the normalized initial inverse of  is known for
        algorithm purpose, for
 is known for
        algorithm purpose, for  .
.
      
      This regularity assumption implies that  is
      determined by
 is
      determined by
    
 
    
      An algebraic tower over  is a sequence
 is a sequence
       with
 with  and
 and  , for
, for  and monic
      polynomials
 and monic
      polynomials  . We will write
. We will write
       for the image of
 for the image of  in
 in  and set
 and set  for
 for  . The tower is said to be effectively
      separable when we are given
. The tower is said to be effectively
      separable when we are given  and
 and  in
 in  of respective degree
 of respective degree  and
 and  such that the Bézout
      relation
 such that the Bézout
      relation
    
 
    
      holds, for  . The next
      definition concerns the alternative representation of homogeneous
      polynomials modulo
. The next
      definition concerns the alternative representation of homogeneous
      polynomials modulo  .
.
    
        
An effectively separable tower
 
            
              where  is monic of degree
 is monic of degree  in
 in  .
              The class of
.
              The class of  in
 in  is written
              is written  . For
. For  the inverse of
 the inverse of  exists
              and is known.
 exists
              and is known.
            
              A tower of purely ramified extensions of  , written
, written
            
 
            
              where  are positive integers called ramification indices,
 are positive integers called ramification indices,
            
 
            
              for  , and
, and  is invertible in
 is invertible in  for
 for  . The class of
. The class of  in
 in  is written
 is written  .
.
            
               and a uniformizing parameter
 and a uniformizing parameter  such that
 such that  ,
              where
,
              where  , for
, for  .
.
            
               coprime with
 coprime with  along with integers
              along with integers  and
 and  such that
              such that  and
 and  , for
, for  .
.
            

      The construction of an initial expansion associated to a contact tower
      is achieved by induction on  .
      This subsection is devoted to the case when
.
      This subsection is devoted to the case when  . As in the introduction of this section, we write
. As in the introduction of this section, we write
    
 
    
      with  and
 and  for
 for  . Note that
. Note that  because the tower is regular. As before, we let
      because the tower is regular. As before, we let  and
      and  be coprime integers such that
 be coprime integers such that
    
 
    We define
 
    
      where  . Note that
. Note that  whenever
 whenever  is not a multiple of
 is not a multiple of
       . The inverse of
. The inverse of  is:
 is:
    
 
    
      With  and
 and  ,
      the map
,
      the map
    
 
    is well defined because
 
    
      Let us now show how to compute conversions via  . Let
. Let  be homogeneous of
      valuation
 be homogeneous of
      valuation  and write
 and write
    
 
    
      with  . Then the formula
. Then the formula
    
 
    
      allows for the computation of  without any
      arithmetic operations or zero tests. This also shows that
 without any
      arithmetic operations or zero tests. This also shows that  is an isomorphism.
 is an isomorphism.
    
      Assume that two elements  and
 and  in
      in  with
 with  have the same
      valuation, that is
 have the same
      valuation, that is
    
 
    
      If  (that corresponds to
 (that corresponds to  ), then
), then  so
 so  and therefore
      and therefore  . Otherwise we
      have
. Otherwise we
      have
    
 
    
      and  and
 and  are coprime. So
 are coprime. So
       divides
 divides  ,
      whence
,
      whence  and
 and  .
      In other words, any homogeneous element in
.
      In other words, any homogeneous element in  can
      be written in a unique way as
 can
      be written in a unique way as  with
 with  ,
,  ,
      and
,
      and  .
.
    
      Now consider the Bézout relation  between
 between
       and
 and  ,
      with
,
      with  and
 and  .
      The element
.
      The element
    
 
    
      has valuation  . From
. From
    
 
    and
 
    
      we obtain formulas to rewrite  and
 and  in terms of
 in terms of  :
:
    
 
    
      Consequently  is a uniformizing
      parameter of
 is a uniformizing
      parameter of  , whose
      valuation group is
, whose
      valuation group is
    
 
    
      and  . In particular,
. In particular,  is a purely ramified extension of
 is a purely ramified extension of  . It remains to make
. It remains to make  effectively separable. To this end, we first compute
      effectively separable. To this end, we first compute
    
 
    
      Let  and
 and  be such that
 be such that
       and let
 and let  be such that
 be such that
       . Then we have
. Then we have
    
 
    
      Necessarily  and
 and  is the
      inverse of
 is the
      inverse of  . From this
      inverse we easily recover the Bézout relation of
. From this
      inverse we easily recover the Bézout relation of  and
      and  , that makes the tower
, that makes the tower
       effectively separable.
 effectively separable.
    

      The next lemma deals with the construction of an initial expansion
      associated to a contact tower. We extend the above construction for
       .
.
    
         , there exists an initial
        expansion such that each
, there exists an initial
        expansion such that each  divides
 divides  , and
, and
      
        is a  -algebra
        isomorphism, for
-algebra
        isomorphism, for  . We set
. We set
         . In addition, with
. In addition, with  ,
,  has
        valuation group
 has
        valuation group
      
 
        
        The algebra  inherits the grading of
 inherits the grading of  . We still write
. We still write  for the semi-valuation induced over
        for the semi-valuation induced over  ,
        so
,
        so  and
 and  for
 for  . Any homogeneous element of
. Any homogeneous element of  can uniquely be written as
 can uniquely be written as  , where
, where  and
 and
      
 
        
      Proof. We prove the lemma by induction on  The case
 The case  has been addressed
      in the previous subsection, so we assume that
 has been addressed
      in the previous subsection, so we assume that  and recall that
      and recall that  is a uniformizing parameter of
 is a uniformizing parameter of
       . We write
. We write
    
 
    
      where  is homogeneous for
 is homogeneous for  . Then we define
. Then we define
    
 
    
      where  and
 and  ,
      for
,
      for  . We introduce
. We introduce
    
 
    so we have
|  | (6.2) | 
      Since the tower is regular,  is invertible. Since
 is invertible. Since
       is homogeneous, we have
 is homogeneous, we have  whenever
      whenever  is not a multiple of
 is not a multiple of  and
      and
    
 
    
      for  . The latter equation is
      equivalent to
. The latter equation is
      equivalent to
    
 
    
      We define  as
 as
    
 
    and
|  | (6.3) | 
      The inverse of  is then given by
 is then given by
    
|  | (6.4) | 
      From the induction hypothesis,  can uniquely be
      rewritten as
 can uniquely be
      rewritten as
    
 
    
      where  is invertible in
 is invertible in  and
      and  . We also have
. We also have
    
 
    so Lemma 3.23 further yields
 
    
      Inside  , the following
      equalities hold:
, the following
      equalities hold:
    
 
    
      which shows that  is well defined.
 is well defined.
    
      Let  be homogeneous of valuation
 be homogeneous of valuation  , such that
, such that  for
 for  , and let us write it in the form
, and let us write it in the form
    
 
    
      with  homogeneous in
 homogeneous in  and
 and
       . Then
. Then
    
 
    
      shows that it is straightforward to compute  recursively, and that
      recursively, and that  is a
 is a  -algebra isomorphism; an explicit recursive
      formula for
-algebra isomorphism; an explicit recursive
      formula for  will be given in the proof of
      Proposition 6.4 below.
 will be given in the proof of
      Proposition 6.4 below.
    
      Now assume that two elements  and
 and  , with
, with  ,
      have the same valuation, that is
,
      have the same valuation, that is
    
 
    or, equivalently
 
    
      Since  , from Definition 3.1,
, from Definition 3.1,  , and since
, and since
       and
 and  are coprime,
 are coprime,  divides
 divides  ,
      whence
,
      whence  and
 and  .
      In other words, any homogeneous element in
.
      In other words, any homogeneous element in  can
      be uniquely written
 can
      be uniquely written  with
 with  ,
,  and
 and  .
.
    
Let
 
    
      be the Bézout relation of  and
 and  , with
, with  and
 and
       . The element
. The element
    
 
    has valuation
 
    On the other hand we verify that
|  | (6.5) | 
and
|  | (6.6) | 
      Consequently, the valuation group of  is
 is
    
 
    
      and  is a uniformizing parameter. In addition we
      have
 is a uniformizing parameter. In addition we
      have
    
 
    whence
|  | (6.7) | 
      In order to show that  is separable, we verify
      that
 is separable, we verify
      that
    
 
    
      Let  and
 and  be such that
 be such that
       and let
 and let  be such that
 be such that
       . Then we have
. Then we have
    
 
    
      It follows that  and
 and
    
 
    whence
|  | (6.8) | 
      From this inverse we easily recover the Bézout relation of  and
 and  so the tower
 so the tower  is effectively separable.
 is effectively separable. 
    
      Before turning the above construction of the initial expansion into an
      algorithm, we study the costs of the conversions  and
      and  . We recall from section
      1.2 that products in
. We recall from section
      1.2 that products in  take
 take  operations in
 operations in  .
.
    
         be homogeneous of
        valuation
 be homogeneous of
        valuation  in
 in  .
        Recall that
.
        Recall that  . Then we can
        compute
. Then we can
        compute  in the form
 in the form  with
        with  using
 using
      
 
        
        operations in  .
        Conversely, given
.
        Conversely, given  with
 with  , we can compute
, we can compute
      
 
        
        with the same cost bound. In addition, if  has degree
        has degree  in
 in  and if
 and if
         divides
 divides  ,
        then we can compute
,
        then we can compute  using
 using
      
 
        
        operations in  .
.
      
      Proof. Let us first assume that  . Let
. Let  denote the
      canonical representative of
 denote the
      canonical representative of  .
      There exists
.
      There exists  such that
 such that  and
      and
    
 
    
      Note that  . Hence, for
. Hence, for  , we may recursively compute
, we may recursively compute  with
 with  .
      Then we verify
.
      Then we verify
    
      Recall that the inverse of  is at our disposal
      and that the
 is at our disposal
      and that the  belong to
 belong to  . So we need to compute
. So we need to compute  using binary powering and fast tower arithmetic. Then, we multiply this
      quantity by
      using binary powering and fast tower arithmetic. Then, we multiply this
      quantity by  . These products
      take
. These products
      take
    
 
    
      operations in  . Since
. Since  and
 and  , we
      may simplify
, we
      may simplify
    
 
    
      Let  be the cost of evaluating
 be the cost of evaluating  at any valuation
      at any valuation  . We have
      shown that
. We have
      shown that
    
 
    whence
 
    
      The above formulas can be read in reverse order for performing a
      backward conversion  , with a
      similar cost; note that
, with a
      similar cost; note that  .
.
    
      Assume now that  . Then we
      replace
. Then we
      replace  by
 by  and use
 and use  to obtain
 to obtain
    
 
    
      This contributes  operations in
 operations in  .
.
    
      The second assertion of the proposition corresponds to the special case
      where  , which leads to the
      cost
, which leads to the
      cost  via the following formulas:
 via the following formulas:
    
|  |  |  | |
|  |  | ||
|  |  |  | 
      Having shown how the conversions  and
 and  can be computed efficiently, let us now turn to the
      incremental construction of an initial expansion. We keep the same
      notation as in section 6.3.
 can be computed efficiently, let us now turn to the
      incremental construction of an initial expansion. We keep the same
      notation as in section 6.3.
    
         of an effectively separable and regular contact tower, an initial
        expansion can be computed using
        of an effectively separable and regular contact tower, an initial
        expansion can be computed using
      
 
        
        operations in  .
.
      
      Proof. The case  has been
      detailed in section 6.1: it takes
 has been
      detailed in section 6.1: it takes
    
 
    
      arithmetic operations in  . By
      induction on
. By
      induction on  we may assume that the initial
      expansion has been computed up to height
 we may assume that the initial
      expansion has been computed up to height  .
      We write
.
      We write
    
 
    
      with the  homogeneous in
 homogeneous in  . Since
. Since  and
 and  , Proposition 6.4 allows us to
      compute
, Proposition 6.4 allows us to
      compute  for
 for  using
 using
    
|  | (6.9) | 
      operations in  . This is
      sufficient to obtain
. This is
      sufficient to obtain  .
.
    
      If  stands for the normalized initial inverse of
 stands for the normalized initial inverse of
       , then we can compute
, then we can compute  . Hence
. Hence
    
 
    
      so the computation of the inverse of  requires
      one evaluation of
 requires
      one evaluation of  at
 at  and
 and
       products in
 products in  .
      The inverse of
.
      The inverse of  is then obtained via
 is then obtained via  operations in
      operations in  . The cost of
      these two tasks does not exceed the bound
. The cost of
      these two tasks does not exceed the bound 
      The computation of the inverse  of
 of  modulo
 modulo  then requires one
      evaluation of
 then requires one
      evaluation of  at the initial inverse of
 at the initial inverse of  , then
, then  products in
      products in  , and
, and  products in
 products in  ,
      by using formula
,
      by using formula  and
 and
       , namely
, namely  , requires
, requires  further
      operations in
 further
      operations in  .
.
    
      By using formula  from
 from  takes
      takes
    
 
    
      operations in  , that is
, that is  operations in
 operations in  .
      The sum of the costs for all levels of the tower is bounded by
.
      The sum of the costs for all levels of the tower is bounded by
    
|  | |||
|  |  |  | 
      In this section we apply the lifting algorithms of section 4
      in order to compute so-called Newton factorizations of a
      polynomial  that is clustered at
 that is clustered at  (Definition 3.9). These are partial factorizations that are
      related to the contact Newton polygon of
      (Definition 3.9). These are partial factorizations that are
      related to the contact Newton polygon of  with respect to the current contact coordinates (Definition 7.7).
      with respect to the current contact coordinates (Definition 7.7).
    
Until the end of the paper, contact towers will be effectively separable (Definition 5.1) and regular (Definition 6.1). Since we occasionally will have to manipulate multiple contact towers at multiple levels, it is convenient to
          regard an element  as an element in any other
 as an element in any other
           via the natural isomorphism
 via the natural isomorphism  ;
;
        
write
 
        
          for the initial form, the valuation, and the truncation of  , when regarded as an element
          in
, when regarded as an element
          in  ;
;
        
          given  , write
, write
        
 
        
          for the initial form and the valuation of  in
 in
           .
.
        
      Since we assumed from the outset that we have an algorithm or oracle for
      factoring univariate polynomials over  ,
      we are interested in factoring elements of
,
      we are interested in factoring elements of  into
      irreducible factors. There is a corresponding notion of irreducible
      contact towers and, thanks to our oracle, all contact towers that we
      will need for our main factoring algorithm can be forced to be of this
      type.
 into
      irreducible factors. There is a corresponding notion of irreducible
      contact towers and, thanks to our oracle, all contact towers that we
      will need for our main factoring algorithm can be forced to be of this
      type.
    
         is said to be initially
        reducible if there exists
 is said to be initially
        reducible if there exists  and
 and  homogeneous in
 homogeneous in  such that
 such that
         . A contact tower
. A contact tower  is irreducible if
 is irreducible if  is initially irreducible for
 is initially irreducible for  .
.
      
      In view of the initial expansion  and
 and  of a contact tower
 of a contact tower  ,
      we observe from Lemma 6.3 that
,
      we observe from Lemma 6.3 that  is
      irreducible if and only if
 is
      irreducible if and only if  is a field.
      Equivalently,
 is a field.
      Equivalently,  is a tower of field extensions. In
      this case, any non-zero element in
 is a tower of field extensions. In
      this case, any non-zero element in  admits a
      unique normalized initial inverse.
 admits a
      unique normalized initial inverse.
    
      Proof. If  is reducible
      then their exists a smallest index
 is reducible
      then their exists a smallest index  such that
 such that
       admits an initial factorization regarded in
 admits an initial factorization regarded in
       . This initial factorization
      yields an initial Hensel context that can be lifted into a non trivial
      factorization of
. This initial factorization
      yields an initial Hensel context that can be lifted into a non trivial
      factorization of  by Corollary 4.19.
 by Corollary 4.19.
    
      Conversely assume that  is irreducible and let
 is irreducible and let
       be a factor of
 be a factor of  .
      Then,
.
      Then,  initially divides
 initially divides  , hence
, hence  cannot be a non
      trivial factor of
 cannot be a non
      trivial factor of  .
. 
    
The next lemmas are devoted to the complexity of initial inversions.
         be an effectively separable,
        regular, and irreducible contact tower, and assume that its initial
        expansion has been precomputed. Let
 be an effectively separable,
        regular, and irreducible contact tower, and assume that its initial
        expansion has been precomputed. Let  be
        homogeneous and of valuation
 be
        homogeneous and of valuation  in
 in  . Then,
. Then,  admits a
        unique normalized initial inverse, that can be computed with
 admits a
        unique normalized initial inverse, that can be computed with
      
 
        
        operations in  .
.
      
      Proof. From Lemma 3.23 we know that
       . The computation of
. The computation of
    
 
    takes
 
    
      operations in  by Proposition 6.4.
      Then we compute
 by Proposition 6.4.
      Then we compute  in time
 in time
    
 
    Proposition 6.4 allows us to obtain
 
    
      with  further operations. Since
 further operations. Since  , Lemma 3.23 implies
, Lemma 3.23 implies  . We verify that
. We verify that
    
 
    
      by using identity  stated in Definition 6.2.
      It follows that
 stated in Definition 6.2.
      It follows that  . After
      multiplying or dividing
. After
      multiplying or dividing  by a suitable power of
 by a suitable power of
       we obtain the normalized initial inverse of
 we obtain the normalized initial inverse of
       .
. 
    
         be an effectively separable,
        regular, and irreducible contact tower, and assume that its initial
        expansion has been precomputed. Let
 be an effectively separable,
        regular, and irreducible contact tower, and assume that its initial
        expansion has been precomputed. Let  be
        clustered at
 be
        clustered at  of degree
 of degree  in
        in  such that
 such that  does not
        divide
 does not
        divide  , and let
, and let  be homogeneous of degree
 be homogeneous of degree  in
 in  and of valuation
 and of valuation  in
 in  . We can test whether
. We can test whether  admits a normalized initial inverse modulo
 admits a normalized initial inverse modulo  or not, and if so compute this initial inverse with
 or not, and if so compute this initial inverse with  operations in
 operations in  .
.
      
      Proof. We increment the tower  with
      with  . The extended tower is
      not necessarily separable or irreducible because of its top level, but
      this does not prevent from building the corresponding incremented
      initial expansion with the difference that
. The extended tower is
      not necessarily separable or irreducible because of its top level, but
      this does not prevent from building the corresponding incremented
      initial expansion with the difference that  is
      not a field extension of
 is
      not a field extension of  ,
      that is not even necessarily separable. By Proposition 6.5
      this “almost initial expansion” incurs
,
      that is not even necessarily separable. By Proposition 6.5
      this “almost initial expansion” incurs  operations in
      operations in  . The
      conclusion follows from Lemma 7.3: still writing
. The
      conclusion follows from Lemma 7.3: still writing  , the required initial modular
      inverse exists if and only if
, the required initial modular
      inverse exists if and only if  is invertible in
 is invertible in
       .
. 
    
      The following lemma asserts that  is clustered at
      any
 is clustered at
      any  for
 for  as soon as it is
      clustered at
 as soon as it is
      clustered at  .
.
    
         be clustered as in Definition 3.9, of degree
 be clustered as in Definition 3.9, of degree  in
 in  . Then, for
. Then, for  ,
        the polynomial
,
        the polynomial  is clustered at
 is clustered at  , and we have
, and we have  where
 where
         .
.
      
      Proof. Note that  is
      monic in
 is
      monic in  of degree
 of degree  .
      Therefore
.
      Therefore  is monic in
 is monic in  of
      degree
 of
      degree  when regarded in
 when regarded in  , for
, for  .
      The rest of the proof is done by induction on
.
      The rest of the proof is done by induction on  from
      from  down to
 down to  .
      The case
.
      The case  corresponds to the hypothesis of the
      lemma. Now let us assume that
 corresponds to the hypothesis of the
      lemma. Now let us assume that  holds for some
 holds for some
       , and consider the contact
      representation
, and consider the contact
      representation
    
 
    
      in  , with
, with
    
 
    
      for  . It follows that
. It follows that
    
 
    
      where the second inequality is strict for  .
      Consequently,
.
      Consequently,  .
. 
    
         be an effectively
        separable, regular, and irreducible contact tower and let
 be an effectively
        separable, regular, and irreducible contact tower and let  be clustered at
 be clustered at  .
        An irreducible contact factorization of
.
        An irreducible contact factorization of
         at precision
 at precision  is a
        sequence of pairs
 is a
        sequence of pairs  modulo
 modulo  for
        for  , such that:
, such that:
      
               is an effectively separable, regular,
              and irreducible contact tower for
 is an effectively separable, regular,
              and irreducible contact tower for  ;
;
            
               and
 and  for
 for  ;
;
            
               is a power of the last contact
              coordinate
 is a power of the last contact
              coordinate  of
 of  modulo
              modulo  for
 for  ;
;
            
               (this equality can be regarded
              equivalently in any
 (this equality can be regarded
              equivalently in any  for
 for  ).
).
            
Consider a contact polynomial
 
    
      with  for
 for  and
 and  . The Newton
      polygon
. The Newton
      polygon  of
 of  is the
      lower border of the convex hull of the set of pairs
 is the
      lower border of the convex hull of the set of pairs  with
      with  and
 and  .
      More precisely,
.
      More precisely,  is a broken line with vertices
 is a broken line with vertices
       , where
, where
    
           ,
,
        
           for
 for  ,
,
        
          for all  such that
 such that  , the point
, the point  is on or
          above the Newton polygon.
 is on or
          above the Newton polygon.
        
      Any  determines an edge
 determines an edge  between the vertices
      between the vertices  and
 and  , of slope
, of slope  .
      The set of points above the Newton polygon is convex. When
.
      The set of points above the Newton polygon is convex. When  we have
 we have  , so
      the slope of the first edge is
, so
      the slope of the first edge is  .
      In order to establish the usual relationship between
.
      In order to establish the usual relationship between  and the Newton polygons of the factors of
      and the Newton polygons of the factors of  ,
      we introduce the following definition.
,
      we introduce the following definition.
    
         of
 of  is said to be effectively
        regular when the elements
 is said to be effectively
        regular when the elements  are
        initially invertible in
 are
        initially invertible in  ,
        and we are given the normalized initial inverses
,
        and we are given the normalized initial inverses  of
        of  for
 for  .
        If
.
        If  then we set
 then we set  by
        convention.
 by
        convention.
      
The following lemma extends a special case of a classical result about Minkowski sums of polytopes due to Ostrowski [78] (translated in [80], and revisited later in [79]). In our variant we need to take care of “carries” involved by the contact arithmetic.
         and
 and  be
        contact polynomials in
 be
        contact polynomials in  .
        Their respective Newton polygons
.
        Their respective Newton polygons  and
 and  are assumed to be regular, the slopes of
 are assumed to be regular, the slopes of  are strictly smaller than the ones of
 are strictly smaller than the ones of  , and all slopes are
, and all slopes are  . If
. If  ,
,
         ,
,  , and
, and  ,
        then the Newton polygon
,
        then the Newton polygon  of
 of  equals
        equals
      
 
        In addition, the contact polynomial
 
        
        satisfies  for
 for  and
 and
         for
 for  .
.
      
Proof. First of all, note that the hypothesis on the slopes guarantees that the region of the plane above the Newton polygon
 
    is actually convex.
      Let  be a point above
 be a point above  . For all
. For all  ,
      we have
,
      we have
    
|  | (7.1) | 
      Similarly, for any point  above
 above  and for all
      and for all  we have
 we have
    
|  | (7.2) | 
      Since the slope of the edge  is smaller than the
      slope of
 is smaller than the
      slope of  , for
, for  , we obtain
, we obtain
    
 
    
      Combining the latter inequality with 
 
    
      which means that  is above the line spanned by
 is above the line spanned by
       and
 and  .
      Similarly, since
.
      Similarly, since  and since the slope of the edge
 and since the slope of the edge
       is smaller than the one of
 is smaller than the one of  , we obtain
, we obtain
    
 
    
      for  . In combination with
. In combination with
      
 
    
      so  is above the line spanned by
 is above the line spanned by  and
      and  . So far, we have proved
      that
. So far, we have proved
      that  is above
 is above  ,
      for all
,
      for all  and
 and  .
.
    
      Since  and
 and  are
      invertible, for
 are
      invertible, for  in
 in  ,
      Lemma 4.3 yields
,
      Lemma 4.3 yields
    
 
    
      Now consider the contact polynomial  with
 with  , so we have
, so we have  and
      and  . Because the slopes of
. Because the slopes of
       are
 are  ,
      the point
,
      the point  is strictly above
 is strictly above  .
.
    
      Let us fix  to a value different from the slopes
      of
 to a value different from the slopes
      of  and
 and  .
      Let us assume first that
.
      Let us assume first that  is less than the
      smallest slope of
 is less than the
      smallest slope of  . If
. If  is less than the largest slope of
 is less than the largest slope of  we let
      we let  to be the largest integer such that
 to be the largest integer such that  is less than the slope of
 is less than the slope of  , otherwise we let
, otherwise we let  .
      Let
.
      Let  be the corresponding valuation induced in
 be the corresponding valuation induced in
       :
:  for
 for
       and
 and  ;
      we write
;
      we write  for the corresponding initial part. We
      verify that
 for the corresponding initial part. We
      verify that
    
 
    Consequently, Lemma 4.3 implies
 
    
      belongs to the Newton polygon of  ,
      and
,
      and  .
.
    
      Assume now that  is greater than the smallest
      slope of
 is greater than the smallest
      slope of  then we let
 then we let  to
      be the first integer such that
 to
      be the first integer such that  is greater than
      the slope of
 is greater than
      the slope of  . Using a
      similar argument as above, we may prove that
. Using a
      similar argument as above, we may prove that 
    
|  | (7.3) | 
      belongs to the Newton polygon of  ,
      and that
,
      and that  . This concludes the
      proof.
. This concludes the
      proof. 
    
         be an effectively separable,
        regular, and irreducible contact tower and let
 be an effectively separable,
        regular, and irreducible contact tower and let
      
 
        
        be a contact polynomial with the  and
        truncated modulo
 and
        truncated modulo  with
 with  . Then, the effectively regular Newton polygon of
. Then, the effectively regular Newton polygon of
         can be computed using
 can be computed using
      
 
        
        operations in  .
.
      
      Proof. We first compute the initial expansion of
       , that contributes to
, that contributes to  from Proposition 6.5. Set
 from Proposition 6.5. Set  in
 in  . In order
      to compute the valuation of
. In order
      to compute the valuation of  we run over all its
      homogeneous components in
 we run over all its
      homogeneous components in  in increasing
      valuation order. Up to precision
 in increasing
      valuation order. Up to precision  ,
      the number of such components is
,
      the number of such components is  .
      Each such component has
.
      Each such component has  terms. Overall the
      number of zero tests in
 terms. Overall the
      number of zero tests in  is
 is  .
.
    
      From the valuations of the  ,
      the computation of the Newton polygon
,
      the computation of the Newton polygon  does not
      involve arithmetic operations in
 does not
      involve arithmetic operations in  ,
      but
,
      but  bit operations (with the usual “divide
      and conquer” algorithm). Finally, for a vertex of abscissa
 bit operations (with the usual “divide
      and conquer” algorithm). Finally, for a vertex of abscissa  of the Newton polygon we need to compute the initial
      inverse of
 of the Newton polygon we need to compute the initial
      inverse of  . For this purpose
      we extract
. For this purpose
      we extract  and appeal to Lemma 7.3.
 and appeal to Lemma 7.3. 
    
      Let  be clustered at
 be clustered at  given with its effectively regular Newton polygon
      given with its effectively regular Newton polygon  . We are to show that each edge of
. We are to show that each edge of  gives rise to a factor of
      gives rise to a factor of  .
.
    
        Algorithm 
 along with its initial expansion; a contact polynomial
          along with its initial expansion; a contact polynomial
           given modulo
          given modulo
           with
          with
           and clustered at
          and clustered at
           ;
          the effectively regular Newton polygon of
;
          the effectively regular Newton polygon of
           (whose slopes are all
          (whose slopes are all
           ).
).
        
        
          Let  be the abscissas of the vertices of the
          Newton polygon, as in Definition 7.7. The normalized
          initial inverse
 be the abscissas of the vertices of the
          Newton polygon, as in Definition 7.7. The normalized
          initial inverse  of
 of  is part of the input for
          is part of the input for  .
.
        
              Contact polynomials  modulo
 modulo  , clustered at
, clustered at  , such that
, such that  ,
,
               admits a single Newton polynomial that
              coincides with the
 admits a single Newton polynomial that
              coincides with the  -th
              one of
-th
              one of  , for
, for  .
.
            
              If  then return
 then return  .
.
            
              Let  and set
 and set  , where
, where  is the slope
              of the edge between abscissas
 is the slope
              of the edge between abscissas  and
 and  .
.
            
              Compute  ,
,  ,
,  ,
,  .
.
            
              Via Corollary 4.14 called with precision  , compute contact
              polynomials
, compute contact
              polynomials  and
 and  in
              in  modulo
 modulo  such
              that
 such
              that  ,
,  is clustered at
 is clustered at  ,
,
               , and
, and  .
.
            
              Recursively call the algorithm with input  : the vertices of the Newton polygon of
: the vertices of the Newton polygon of  are
 are  and the
              normalized initial inverses are
 and the
              normalized initial inverses are  rescaled
              by suitable powers of
 rescaled
              by suitable powers of  .
.
            
              Recursively call the algorithm with input  : the vertices of the Newton polygon of
: the vertices of the Newton polygon of  are
 are  ,
              with normalized initial inverses
,
              with normalized initial inverses  .
.
            
Return the union of the sets of factors returned by the above recursive calls.
      Proof. If  then the
      algorithm is clearly correct. From now assume
 then the
      algorithm is clearly correct. From now assume  . By definition of the effectively regular Newton
      polygon, the value of
. By definition of the effectively regular Newton
      polygon, the value of  occurring in step 3 writes
      as
 occurring in step 3 writes
      as
    
 
    
      From  and
 and  for
 for  , Lemma 4.3 yields
, Lemma 4.3 yields
    
 
    
      Then Lemma 3.23 implies  ,
      hence step 3 computes an initial Weierstraß context for
,
      hence step 3 computes an initial Weierstraß context for  .
.
    
      Let  and
 and  be as in
      Corollary 4.14:
 be as in
      Corollary 4.14:  ,
,
       , and
, and  hold in step 4. From Lemma 7.8 we know that the Newton
      polygon of a is the Minkowski sum of those of
      hold in step 4. From Lemma 7.8 we know that the Newton
      polygon of a is the Minkowski sum of those of  and
      and  (up to the occasional vertex at infinity of
 (up to the occasional vertex at infinity of
       and
 and  ).
      Since the vertices of the Newton polygon of
).
      Since the vertices of the Newton polygon of  have
      valuation in
 have
      valuation in  
  (or
      infinity), so are those of the polygons of
 (or
      infinity), so are those of the polygons of  and
 and
       .
.
    
      Let  be the first index such that
 be the first index such that  . From
. From  ,
      Lemma 3.23 implies
,
      Lemma 3.23 implies  ,
      whence
,
      whence
    
|  | (7.4) | 
      It follows that the Newton polygon of  coincides
      with the one of
 coincides
      with the one of  for
 for  , and that these polygons are effectively regular,
      with the initial inverses as in steps 4 and 5.
, and that these polygons are effectively regular,
      with the initial inverses as in steps 4 and 5.
    
      In step 3, for  , we compute
, we compute
       with
 with  operations in
 operations in  thanks to Proposition 3.20. The same
      cost applies to the computation of
 thanks to Proposition 3.20. The same
      cost applies to the computation of  in step 5. By
      Corollary 4.14, and since
 in step 5. By
      Corollary 4.14, and since  ,
      the cost of the lifting in step 4 is
,
      the cost of the lifting in step 4 is
    
 
    
      The depth of the recursive calls is  ,
      so the complexity bound follows from a standard induction.
,
      so the complexity bound follows from a standard induction. 
    
         be a contact tower,
        and let a be a contact polynomial clustered at
 be a contact tower,
        and let a be a contact polynomial clustered at  . The distinct-slope
        factorization of
. The distinct-slope
        factorization of  is made of contact
        polynomials
 is made of contact
        polynomials  clustered at
 clustered at  such that
        such that  , the Newton
        polygon of
, the Newton
        polygon of  admits a single edge for
 admits a single edge for  and the sequence of the slopes of these edges is
        strictly increasing.
 and the sequence of the slopes of these edges is
        strictly increasing.
      
         be an effectively
        separable, regular, and irreducible contact tower, and let a be a
        contact polynomial clustered at
 be an effectively
        separable, regular, and irreducible contact tower, and let a be a
        contact polynomial clustered at  .
        Then, there exists a unique distinct-slope factorization of
.
        Then, there exists a unique distinct-slope factorization of  .
.
      
      Proof. Since the tower is irreducible, the
      Newton polygon of  can be made effectively
      regular, thanks to Lemma 7.3. Consequently the existence of
      the distinct-slope factorization of
 can be made effectively
      regular, thanks to Lemma 7.3. Consequently the existence of
      the distinct-slope factorization of  follows from
      Proposition 7.10.
 follows from
      Proposition 7.10.
    
      Given a distinct-slope factorization  ,
      by Lemma 7.8 the slopes of the
,
      by Lemma 7.8 the slopes of the  are
      those of the Newton polygon of
 are
      those of the Newton polygon of  .
      If
.
      If  is set to the opposite of the slope of
 is set to the opposite of the slope of  then
 then  is a Newton polynomial
      of
 is a Newton polynomial
      of  of slope
 of slope  (up to a
      power of
 (up to a
      power of  and up to a factor in
 and up to a factor in  ). The uniqueness of the
). The uniqueness of the  thus follows from the uniqueness of the lifting of the distinct slope
      factors.
      thus follows from the uniqueness of the lifting of the distinct slope
      factors. 
    
      Consider the factorization of an element  whose
      Newton polygon has a single edge with finite slope. We have already seen
      that an initial factorization into pairwise coprime factors of
 whose
      Newton polygon has a single edge with finite slope. We have already seen
      that an initial factorization into pairwise coprime factors of  lifts into a factorization of
 lifts into a factorization of  . We now explain how to obtain this initial
      factorization. The contact polynomial
. We now explain how to obtain this initial
      factorization. The contact polynomial  is assumed
      to be truncated modulo
 is assumed
      to be truncated modulo  with
 with  .
.
    
      We assume that the initial expansion of the contact tower has already
      been computed. We extend the map  (defined in
      Lemma 6.3) as follows:
 (defined in
      Lemma 6.3) as follows:
    
 
    
      We set  to be the opposite of the unique slope of
      the Newton polygon of
 to be the opposite of the unique slope of
      the Newton polygon of
    
 
    
      Note that  . Let
. Let
    
|  | (7.5) | 
      with  prime to
 prime to  and let
 and let
       . Note that
. Note that  is an integer. In the next subsection we shall see that the notation is
      consistent since
      is an integer. In the next subsection we shall see that the notation is
      consistent since  will be the “next
      ramification index”.
 will be the “next
      ramification index”.
    
      We compute  with
 with  ,
      for
,
      for  , and construct
, and construct
    
 
    so we have
|  | (7.6) | 
We factor
 
    
      where each  is a power of a monic irreducible
      factor and the
 is a power of a monic irreducible
      factor and the  are pairwise coprime. For
 are pairwise coprime. For  , we let
, we let  and
      and
    
|  | (7.7) | 
      We compute  using
 using
    
 
    
      where  stands for the coefficient of
 stands for the coefficient of  in
 in  .
.
    
         , the polynomial
, the polynomial  defined in
 defined in  , and
        of valuation
, and
        of valuation  . In addition,
        we have
. In addition,
        we have
      
 
        
      Proof. The first assertion is clear by
      construction. The second assertion follows from the fact that  is a ring isomorphism that preserves the valuation.
 is a ring isomorphism that preserves the valuation. 
    
We next compute the modular inverses
 
    
      for  . Let us write the
      expansion of
. Let us write the
      expansion of  as follows
 as follows
    
 
    
      let  be the smallest integer such that
 be the smallest integer such that  is a multiple of
 is a multiple of  and set
 and set
    
 
    
      From 
 
    
      Recall from Definition 6.2 that  . We further set
. We further set
    
so we have
 
    From
 
    we deduce that
 
    whence
 
    
      After a division by a suitable power of  ,
      we deduce the normalized initial inverse of
,
      we deduce the normalized initial inverse of  modulo
      modulo  for
 for  .
.
    
The following algorithm makes use of the separable factorization of univariate polynomials: see [60]. In the case of characteristic zero or sufficiently large, that holds in the present paper, the separable factorization coincides with the squarefree factorization.
        Algorithm 
 along with its initial expansion; a contact polynomial
          along with its initial expansion; a contact polynomial
           modulo
          modulo
           clustered at
          clustered at
           ,
          with
,
          with
           ;
          the Newton polygon of
;
          the Newton polygon of
           ,
          with a single edge of finite slope
,
          with a single edge of finite slope
           .
.
        
        
              A factorization of  into clustered
              polynomials
 into clustered
              polynomials  at
 at  modulo
              modulo  , each
, each  has a single edge of slope
 has a single edge of slope  in its Newton polygon and the associated Newton polygon is the
              initial power of an irreducible polynomial.
              in its Newton polygon and the associated Newton polygon is the
              initial power of an irreducible polynomial.
            
              The characteristic of  is zero or
 is zero or  .
.
            
              Compute  and
 and  such
              that
 such
              that  .
.
            
              Factor  , where
, where  are pairwise coprime powers of irreducible
              factors of
 are pairwise coprime powers of irreducible
              factors of  : this can
              be done by computing the separable factorization of
: this can
              be done by computing the separable factorization of  and then the irreducible factors of the separable
              ones.
 and then the irreducible factors of the separable
              ones.
            
              For  compute
 compute  .
.
            
              For  compute
 compute  as
              defined in
 as
              defined in 
              For  compute
 compute  as
              defined in
 as
              defined in  .
.
            
              Lift the initial factorization of  into
 into
               to precision
 to precision  by
              using Corollary 4.23 at precision
 by
              using Corollary 4.23 at precision  .
.
            
              Return  modulo
 modulo  .
.
            
        
 
        
        operations in  , where
, where
         is the degree of the separable part of
 is the degree of the separable part of  .
.
      
Proof. From the above discussion the required initial Hensel context is known when entering step 6, so lifting is possible thanks to Corollary 4.23. Using Lemma 3.23 we verify that
      It follows that the Newton polygon of  modulo
 modulo
       has a single edge of slope
 has a single edge of slope  . We are done with the correctness of the
      algorithm.
. We are done with the correctness of the
      algorithm.
    
      Let  . Steps 1, 4, and 5 take
. Steps 1, 4, and 5 take
    
 
    
      by Proposition 6.4. For the factorization of  in step 2, as indicated we first compute the separable
      factorization
 in step 2, as indicated we first compute the separable
      factorization  using
 using  operations in
      operations in  by [60], and then
      factor
 by [60], and then
      factor  (which are pairwise coprime).
      Consequently the cost of factoring over
 (which are pairwise coprime).
      Consequently the cost of factoring over  is
 is
    
 
    Step 3 contributes to
 
    
      operations in  : this includes
      the computation of
: this includes
      the computation of  via [31, chapter
      10, Theorem 10.10], the remainders by the
 via [31, chapter
      10, Theorem 10.10], the remainders by the  via
      [31, chapter 10, Theorem 10.6], and
 via
      [31, chapter 10, Theorem 10.6], and  modular inversions. Finally, the cost of step 6 follows from Corollary
      4.23 and
      modular inversions. Finally, the cost of step 6 follows from Corollary
      4.23 and  .
. 
    
         be an effectively
        separable, regular, and irreducible contact tower, and let a be a
        contact polynomial clustered at
 be an effectively
        separable, regular, and irreducible contact tower, and let a be a
        contact polynomial clustered at  having a
        single edge in its Newton polygon. The equal-slope
        factorization of
 having a
        single edge in its Newton polygon. The equal-slope
        factorization of  is made of contact
        polynomials
 is made of contact
        polynomials  clustered at
 clustered at  such that
        such that  , the Newton
        polygon of
, the Newton
        polygon of  admits a single edge of the same
        slope as
 admits a single edge of the same
        slope as  and its Newton polynomial is the
        initial of a power of an irreducible homogeneous polynomial for
 and its Newton polynomial is the
        initial of a power of an irreducible homogeneous polynomial for  . These irreducible homogeneous
        polynomials are pairwise distinct.
. These irreducible homogeneous
        polynomials are pairwise distinct. 
      
         be an effectively
        separable, regular, and irreducible contact tower, and let a be a
        contact polynomial clustered at
 be an effectively
        separable, regular, and irreducible contact tower, and let a be a
        contact polynomial clustered at  having a
        single edge in its Newton polygon. Then, there exists a unique
        equal-slope factorization of
 having a
        single edge in its Newton polygon. Then, there exists a unique
        equal-slope factorization of  ,
        up to a permutation of the factors.
,
        up to a permutation of the factors.
      
      Proof. The existence follows from Proposition 7.14. As for the uniqueness, assume that  is an equal-slope factorization of
      is an equal-slope factorization of  .
      In the same way as we constructed
.
      In the same way as we constructed  from
 from  in equation
 in equation  of degree
 of degree  by
      by
    
 
    
      for  . The
. The  are powers of pairwise distinct irreducible polynomials, so they
      coincide with those computed in Algorithm 7.2.
      are powers of pairwise distinct irreducible polynomials, so they
      coincide with those computed in Algorithm 7.2. 
    
      After distinct-slope and equal-slope factorizations, we have reduced the
      general situation to the case where the Newton polygon of  has a single edge and the associated Newton polynomial is
      an initial power of an irreducible homogeneous polynomial. This allows
      us to increment the underlying contact tower with a new contact
      coordinate at level
 has a single edge and the associated Newton polynomial is
      an initial power of an irreducible homogeneous polynomial. This allows
      us to increment the underlying contact tower with a new contact
      coordinate at level  and then to pursue the
      factorization of
 and then to pursue the
      factorization of  with respect to the extended
      tower. In order to ensure that the extended contact tower is separable,
      we assume from now on that the characteristic of
 with respect to the extended
      tower. In order to ensure that the extended contact tower is separable,
      we assume from now on that the characteristic of  is zero or sufficiently large.
      is zero or sufficiently large.
    
        Algorithm 
 along with its initial expansion; a contact polynomial
          along with its initial expansion; a contact polynomial
           clustered at
          clustered at
           modulo
          modulo
           with
          with
           ,
          whose Newton polygon has a single edge of finite slope
,
          whose Newton polygon has a single edge of finite slope
           ,
          and such that the associated Newton polynomial is the initial power
          of an irreducible homogeneous polynomial.
,
          and such that the associated Newton polynomial is the initial power
          of an irreducible homogeneous polynomial.
        
        
              An extended tower  modulo
 modulo  , still effectively separable, regular,
              and irreducible, and such that
, still effectively separable, regular,
              and irreducible, and such that  is
              clustered at it of degree
 is
              clustered at it of degree  in
 in  .
.
            
              The characteristic of  is zero or
 is zero or  .
.
            
              Compute  into the form
 into the form  , with
, with  .
.
            
              Compute the separable factorization  , where
, where  is
              irreducible and separable, according to the assumptions.
 is
              irreducible and separable, according to the assumptions.
            
              Set  ,
,  as above, and compute
 as above, and compute
            
 
            
              Extend the contact tower with  and extend
              the initial expansion accordingly.
 and extend
              the initial expansion accordingly.
            
              Make level  of the tower effectively
              separable by computing the inverse of
 of the tower effectively
              separable by computing the inverse of  modulo
              modulo  .
.
            
      Proof. By construction,  is homogeneous of valuation
      is homogeneous of valuation  in
 in  , and
, and  satisfies all the
      requirements of Definition 3.1. The incremented tower
      remains effectively regular, since the known initial inverse of
 satisfies all the
      requirements of Definition 3.1. The incremented tower
      remains effectively regular, since the known initial inverse of  straightforwardly yields an initial inverse of
 straightforwardly yields an initial inverse of  . We extend the initial expansion
      at level
. We extend the initial expansion
      at level  accordingly. The initial inverse in
      step 5 does exist because
 accordingly. The initial inverse in
      step 5 does exist because  is separable.
 is separable.
    
Steps 1 and 3 contribute to
 
    
      by Proposition 6.4. Step 2 takes  operations in
      operations in  by [60]. The cost of
      step 5 is
 by [60]. The cost of
      step 5 is  by Lemma 7.4. Finally,
 by Lemma 7.4. Finally,
       is initially equal to
 is initially equal to  whenever
      whenever  , which means that
, which means that
       is clustered at
 is clustered at  .
. 
    
      In principle, Algorithm 7.3 might introduce a new contact
      coordinate  of degree one in
 of degree one in  . For complexity reasons it is better to avoid
      this from happening. As outlined in the introductory sections 2.5
      and 2.6, we now work out the central shift algorithm.
. For complexity reasons it is better to avoid
      this from happening. As outlined in the introductory sections 2.5
      and 2.6, we now work out the central shift algorithm.
    
      Let  be an effectively separable, regular, and
      irreducible contact tower. Let
 be an effectively separable, regular, and
      irreducible contact tower. Let  be clustered at
 be clustered at
       . An initial
      root of
. An initial
      root of  is an element
 is an element  such that
      such that
    
 
    
      If  is a Newton polynomial of
 is a Newton polynomial of  , then an initial root of
, then an initial root of  is an initial root of
 is an initial root of  regarded
      with
 regarded
      with  set to the opposite of the slope of
 set to the opposite of the slope of  . One key idea behind the central
      shift algorithm is the following lemma, that will be used in a
      “divide and conquer” fashion in the subsequent algorithm.
. One key idea behind the central
      shift algorithm is the following lemma, that will be used in a
      “divide and conquer” fashion in the subsequent algorithm.
    
         be a contact polynomial clustered
        at
 be a contact polynomial clustered
        at  , and let
, and let  be a non-zero initial root of
 be a non-zero initial root of  of
        multiplicity
 of
        multiplicity  . If the
        characteristic of
. If the
        characteristic of  is zero or
 is zero or  , then
, then  is an initial
        root of
 is an initial
        root of  of multiplicity
 of multiplicity  , for
, for  .
.
      
      Proof. Set  .
      Lemma 5.7 implies
.
      Lemma 5.7 implies
    
|  | (7.10) | 
      Since the tower is separable, we know from Lemma 5.4 that
       is initially invertible, hence
 is initially invertible, hence  is an initial root of
      is an initial root of  of multiplicity
 of multiplicity  .
. 
    
        Algorithm 
              An effectively separable, regular, and irreducible tower  ; a contact polynomial
; a contact polynomial  clustered at
 clustered at  and of
              degree
 and of
              degree  in
 in  modulo
 modulo
               , with
, with  ; we assume that
; we assume that  , where
, where  is initially
              invertible in
 is initially
              invertible in  .
.
            
              An effectively separable, regular, and irreducible tower  such that
 such that  for
 for  , and the non-zero initial
              roots of the Newton polynomials of
, and the non-zero initial
              roots of the Newton polynomials of  have
              multiplicity
 have
              multiplicity  .
.
            
              If  then replace
 then replace  by
              by  and return
 and return  .
.
            
              Let  and compute the Weierstraß
              normalization
 and compute the Weierstraß
              normalization  of
 of  modulo
              modulo  via Corollary 4.14.
              The initial context is made of
 via Corollary 4.14.
              The initial context is made of
            
 
            
              and the normalized initial inverse  of
 of
               in
 in  .
.
            
              Call the algorithm recursively with input  and
              and  modulo
 modulo  .
              Let
.
              Let  be the tower obtained in return.
 be the tower obtained in return.
            
              Compute the effectively regular Newton polygon of  in
 in  modulo
 modulo  via Lemma 7.9.
              via Lemma 7.9.
            
              Compute the distinct-slope factorization of  in
              in  modulo
 modulo  with
              Algorithm 7.1.
 with
              Algorithm 7.1.
            
              If all the non-zero initial roots of the Newton polynomials of
               have multiplicity
 have multiplicity  , then return
, then return  modulo
 modulo
               .
.
            
              Otherwise, compute the factor  modulo
 modulo
               of
 of  of degree
 of degree
               in
 in  whose initial is the
              whose initial is the  -th power of a linear factor
-th power of a linear factor  with
 with  ,
,
               non-zero, and where
 non-zero, and where  is set to
              is set to  .
.
            
              Let  and compute the Weierstraß
              normalization
 and compute the Weierstraß
              normalization  of
 of  modulo
              modulo  via Corollary 4.14.
              The initial context is made of
 via Corollary 4.14.
              The initial context is made of
            
 
            
              and the normalized initial inverse  of
 of
               in
 in  .
.
            
              Call the algorithm recursively with input  and
              and  modulo
 modulo  .
              Return the tower
.
              Return the tower  obtained in the output.
 obtained in the output.
            
      Proof. If the algorithm exits at step 1, then
       when regarded in the returned tower. Since
 when regarded in the returned tower. Since  the initial form of the returned
 the initial form of the returned  is the same as the initial form of the input value of
      is the same as the initial form of the input value of  , hence the returned tower is effectively
      separable, regular, and irreducible. The Newton polynomial of
, hence the returned tower is effectively
      separable, regular, and irreducible. The Newton polynomial of  cannot have non-zero initial roots with respect to the
      returned contact tower, so the output is correct.
 cannot have non-zero initial roots with respect to the
      returned contact tower, so the output is correct.
    
      The initial Weierstraß context in step 2 follows from equation
      
      In step 7, Lemma 7.18 ensures that  is a non-zero initial root of a Newton polynomial of
      is a non-zero initial root of a Newton polynomial of  of multiplicity
      of multiplicity  , regarded in
, regarded in
       . Since
. Since  ,
,  is a non-zero initial
      root of a Newton polynomial of
 is a non-zero initial
      root of a Newton polynomial of  of multiplicity
 of multiplicity
       . As a non-zero initial root
      of a Newton polynomial of
. As a non-zero initial root
      of a Newton polynomial of  modulo
 modulo  we necessarily have
 we necessarily have  ,
      hence
,
      hence
    
 
    by Lemma 3.23. From Lemma 4.3, we deduce that
 
    and consequently that
 
    
      It follows that  is a non-zero initial root of a
      Newton polynomial of
 is a non-zero initial root of a
      Newton polynomial of  of multiplicity
 of multiplicity  modulo
 modulo  , hence
      that
, hence
      that  . Consequently,
. Consequently,
    
|  | (7.11) | 
      We verify that  , so
, so  . In step 8, the contact polynomial
. In step 8, the contact polynomial
       has degree
 has degree  in
 in  . By Lemma 7.18,
      inequality
. By Lemma 7.18,
      inequality  , a
      non-zero initial root of a Newton polynomial of
, a
      non-zero initial root of a Newton polynomial of  in
      in  has multiplicity
 has multiplicity
    
 
    
      Let us now examine the Newton polynomials of  in
 in
       . For this purpose, by means
      of Corollaries 7.12 and 7.16, we may decompose
. For this purpose, by means
      of Corollaries 7.12 and 7.16, we may decompose
       into
 into
    
 
    
      where  has Newton polynomials with slopes
 has Newton polynomials with slopes  , where
, where  has
      Newton polynomials with slope
 has
      Newton polynomials with slope  ,
      and where
,
      and where  has a single Newton polynomial of
      slope
 has a single Newton polynomial of
      slope  but that does not admit
 but that does not admit  for initial root.
      for initial root.
    
      The initial of  is
 is  ,
      so its valuation is
,
      so its valuation is  .
      Therefore the Newton polygon of
.
      Therefore the Newton polygon of  in
 in  has a single edge of slope
 has a single edge of slope  .
      We also verify that the Newton polygon of
.
      We also verify that the Newton polygon of  in
 in
       admits a single edge of slope
 admits a single edge of slope  . Then, the Newton polygon of
. Then, the Newton polygon of  in
      in  is the same as in
 is the same as in  . Finally the Newton polygon of
. Finally the Newton polygon of  in
      in  has slopes
 has slopes  .
      Consequently the non-zero initial roots of the Newton polynomials of
.
      Consequently the non-zero initial roots of the Newton polynomials of
       in
 in  cannot have
      multiplicities
 cannot have
      multiplicities  . We are done
      with the proof of the correctness.
. We are done
      with the proof of the correctness.
    
From Lemma 5.4 we have
 
    
      Therefore, by using Proposition 3.20, the initial inverse
      of  can be obtained with
 can be obtained with  operations in
      operations in  from the precomputations attached
      to
 from the precomputations attached
      to  . The needed initial
      Weierstraß contexts in steps 2 and 8 can be obtained with
. The needed initial
      Weierstraß contexts in steps 2 and 8 can be obtained with  operations in
 operations in  thanks to
      Proposition 3.20 again. The corresponding Weierstraß
      normalizations take further
 thanks to
      Proposition 3.20 again. The corresponding Weierstraß
      normalizations take further  operations in
 operations in  by Corollary 4.14.
 by Corollary 4.14.
    
      Let  represent the cost of the algorithm with
      input
 represent the cost of the algorithm with
      input  of degree
 of degree  .
      In step 1, the cost is
.
      In step 1, the cost is  . In
      step 4 the effectively regular Newton polygon can be determined with
      cost
. In
      step 4 the effectively regular Newton polygon can be determined with
      cost  by Lemma 7.9. Step 5 amounts
      to
 by Lemma 7.9. Step 5 amounts
      to  by using distinct-slope factorization and
      Proposition 7.10. In step 6, we appeal to the equal-slope
      factorization but discarding the irreducible factorizations: in fact,
      having a root of multiplicity
 by using distinct-slope factorization and
      Proposition 7.10. In step 6, we appeal to the equal-slope
      factorization but discarding the irreducible factorizations: in fact,
      having a root of multiplicity  is equivalent to
      having a separable factor of multiplicity
 is equivalent to
      having a separable factor of multiplicity  ,
      that can thus be read off from the separable factorization. So
      Proposition 7.14 provides us with a cost
,
      that can thus be read off from the separable factorization. So
      Proposition 7.14 provides us with a cost  for steps 6 and 7. Consequently the cost
      for steps 6 and 7. Consequently the cost  of the
      algorithm in degree
 of the
      algorithm in degree  in
 in  satisfies
      satisfies
    
 
    
      We conclude by a standard induction. 
    
We are now in a position to present our top level algorithm for contact factorization. The distinct-slope and equal-slope factorizations are intertwined in order to increase the current contact tower and split the input polynomials. The process finishes once the polynomial to be factored is a power of the top level contact coordinate, up to the input precision. The central shift algorithm ensures that the “divide and conquer” approach only incurs a logarithmic complexity overhead.
The main step of the contact factorization is summarized in the following algorithm.
        Algorithm 
               effectively separable, regular, and
              irreducible; a contact polynomial
 effectively separable, regular, and
              irreducible; a contact polynomial  modulo
 modulo
               clustered at
 clustered at  , with
, with  .
.
            
              A set  of contact factors
 of contact factors  with precision
 with precision  for
 for  such that:
 such that:
            
                   , for
, for  ;
;
                
                   ;
;
                
                   is clustered at
 is clustered at  , for
, for  ;
;
                
                  The Newton polygon of  with respect
                  to
 with respect
                  to  has a single edge whose Newton
                  polynomial is an initial power of an homogeneous polynomial
                  of degree
 has a single edge whose Newton
                  polynomial is an initial power of an homogeneous polynomial
                  of degree  in
 in  ;
;
                
                  If the Newton polygon of  has a
                  non-zero initial root, then its multiplicity is
 has a
                  non-zero initial root, then its multiplicity is
                   .
.
                
              The characteristic of  is zero or
 is zero or  .
.
            
              Initialize  with the empty
              set.
 with the empty
              set.
            
              Compute the effectively regular Newton polygon of  modulo
 modulo  via Lemma 7.9,
              and then the distinct-slope factorization of
 via Lemma 7.9,
              and then the distinct-slope factorization of  modulo
              modulo  by using Algorithm 7.1.
              Let
 by using Algorithm 7.1.
              Let  be the set of factors obtained in
              return.
 be the set of factors obtained in
              return.
            
              For each  in
 in  , compute the equal-slope factorization of
, compute the equal-slope factorization of
               over
 over  by using
              Algorithm 7.2. Let
 by using
              Algorithm 7.2. Let  be the
              set of all resulting factors along with their multiplicities.
 be the
              set of all resulting factors along with their multiplicities.
            
              For each  in
 in  of
              multiplicity written
 of
              multiplicity written  :
:
            
                  If  , then insert
, then insert
                   in
 in  .
.
                
                  If  (so
 (so  is an
                  initial power of a polynomial of degree one in
 is an
                  initial power of a polynomial of degree one in  ), then call Algorithm 7.4
                  and append the resulting factorization to
), then call Algorithm 7.4
                  and append the resulting factorization to  .
.
                
              Return  .
.
            
      Proof. Properties (a) to (e) are satisfied by
      construction. Step 2 takes  by Lemma 7.9
      and Proposition 7.10. Step 3 totalizes
 by Lemma 7.9
      and Proposition 7.10. Step 3 totalizes  by Proposition 7.14. Step 4 contributes to
      by Proposition 7.14. Step 4 contributes to  by Proposition 7.19.
      by Proposition 7.19. 
    
Our top level algorithm finally makes a repeated use of Algorithm 8.1.
        Algorithm 
              Initialize  and
 and  with the empty set.
              with the empty set.
            
              Call Algorithm 8.1 and let  denote the returned contact factors for
              denote the returned contact factors for  .
.
            
              For  :
:
            
                  If  is a power of
 is a power of  then insert
                  then insert  into
 into  .
.
                
                  Otherwise, call Algorithm 7.3 with  and
 and  and let
 and let  be the returned tower.
 be the returned tower.
                
                  If  equals
 equals  then insert
                  then insert  into
 into  .
.
                
                  If  has degree
 has degree  in
                  in  and writes
 and writes  , then replace
, then replace  by
                  by  and insert the pair
 and insert the pair  into
 into  .
.
                
                  Otherwise insert the pair  into
 into  .
.
                
              Call the algorithm recursively for each element of  . Include the returned factors into
. Include the returned factors into
               .
.
            
              Return  .
.
            
      Proof. On the one hand, if the initial of  is a power of a degree one polynomial, then according
      to the specification of Algorithm 8.1 we have
 is a power of a degree one polynomial, then according
      to the specification of Algorithm 8.1 we have
    
 
    
      On the other hand, if  is an initial power of a
      polynomial
 is an initial power of a
      polynomial  of degree
 of degree  , then
, then
    
 
    
      Consequently the depth of the recursive calls is  . Let us analyze the valuation of
. Let us analyze the valuation of  . If
. If  comes from a
      proper distinct-slope factor or a proper equal-slope factor of
 comes from a
      proper distinct-slope factor or a proper equal-slope factor of  then inequalities
 then inequalities 
 
    
      Otherwise  has a single slope and its initial is
      separable, so
 has a single slope and its initial is
      separable, so  ,
,  and this case does not yield a recursive call. We conclude
      that the algorithm behaves as specified.
 and this case does not yield a recursive call. We conclude
      that the algorithm behaves as specified.
    
      Discarding factorization costs, step 2 takes  operations in
      operations in  , by
      Proposition 8.1. In step 3, by Proposition 6.5,
      for each
, by
      Proposition 8.1. In step 3, by Proposition 6.5,
      for each  the initial expansion of
 the initial expansion of  takes
 takes  , where
, where
       represents the degree of
 represents the degree of  . By Proposition 7.17, the cost of
      Algorithm 7.3 is
. By Proposition 7.17, the cost of
      Algorithm 7.3 is  ,
      where
,
      where  denotes the degree of
 denotes the degree of  in its main variable
      in its main variable  . The
      total cost of steps 3 is
. The
      total cost of steps 3 is
    
 
    
      Let  for
 for  denote the
      elements of
 denote the
      elements of  when entering step 4. By
      construction we have
 when entering step 4. By
      construction we have
    
 
    
      If  represents the cost function of the algorithm
      (still discarding factorizations), we have shown that
 represents the cost function of the algorithm
      (still discarding factorizations), we have shown that
    
 
    
      and that  . Unrolling the
      recursion
. Unrolling the
      recursion  times leads to
 times leads to
    
 
    
      Let us now turn to the cumulated cost  of
      factoring separable polynomials over algebraic extensions of
 of
      factoring separable polynomials over algebraic extensions of  during the execution of Algorithm 8.2. Let us
      show by induction on
 during the execution of Algorithm 8.2. Let us
      show by induction on  and
 and  that
      that
    
|  | (8.1) | 
      This is easy if  , so assume
      that
, so assume
      that  . We recall that
. We recall that
    
 
    
      holds for any positive integers  .
      Assume first that
.
      Assume first that  has a non-trivial
      distinct-slope factorization
 has a non-trivial
      distinct-slope factorization  during Algorithm 8.1 and let
 during Algorithm 8.1 and let  be the degrees of
 be the degrees of  in
 in  . Then
      the induction hypothesis implies
. Then
      the induction hypothesis implies
    
 
    
      Assume next that the Newton polygon of  has a
      unique slope and that the associated Newton polynomial is the
 has a
      unique slope and that the associated Newton polynomial is the  -th power of an irreducible
      polynomial of degree
-th power of an irreducible
      polynomial of degree  , for
      some
, for
      some  . Then the induction
      hypothesis yields
. Then the induction
      hypothesis yields
    
 
    
      Assume finally that the Newton polygon of  has a
      unique slope and that the associated Newton polynomial
 has a
      unique slope and that the associated Newton polynomial  has at least two distinct prime factors. Consider the separable
      factorization
      has at least two distinct prime factors. Consider the separable
      factorization
    
 
    
      and let  be the degrees of
 be the degrees of  in
      in  . Note that
. Note that  and
 and
    
 
    Applying the induction hypothesis, this again yields
 
    
      We conclude by induction that (8.1) indeed holds. 
    
      Proof of Theorem 1.1. Theorem 1.1 is a consequence of Proposition 8.2 by
      applying Algorithm 8.2 with input  and the trivial contact tower of height zero.
      and the trivial contact tower of height zero. 
    
      We explain how Abhyankar's approximate roots theory could improve our
      contact factorization algorithm in some cases. If  is a monic polynomial of degree
      is a monic polynomial of degree  and if
 and if  is a divisor of
 is a divisor of  that is invertible
      in
 that is invertible
      in  , then there exists a
      unique polynomial
, then there exists a
      unique polynomial  of degree
 of degree  such that
      such that
    
|  | (8.2) | 
      This polynomial  is called the
 is called the  -th approximate root of
-th approximate root of  . In particular,
. In particular,  is
      monic and the
 is
      monic and the  -adic expansion
      of
-adic expansion
      of  is of the form
 is of the form
    
 
    
      where  . Let
. Let  , that is the reverse of
, that is the reverse of  , and
, and  .
      Condition
.
      Condition 
 
    
      which means that  is uniquely determined by
 is uniquely determined by  , whenever
, whenever  is a perfect field. The computation of the
      is a perfect field. The computation of the  -th
      approximate root of
-th
      approximate root of  can be done using the Newton
      operator if
 can be done using the Newton
      operator if  is not
 is not  in
 in
       : we define the sequence
: we define the sequence  
    
 
    
      A standard computation shows that this sequence converges quadratically
      to  . The computation of
. The computation of  by this method takes
 by this method takes  operations in
      operations in  . Let us now
      extend this construction to contact coordinates.
. Let us now
      extend this construction to contact coordinates.
    
         be monic of degree
 be monic of degree  in
 in  , and let
, and let
         be a divisor of
 be a divisor of  that
        is invertible in
 that
        is invertible in  . Then,
        there exists a unique
. Then,
        there exists a unique  monic of degree
 monic of degree  in
 in  such that
 such that
      
 
        Proof. The condition rewrites
 
    
      and we have  ,
,  . Therefore
. Therefore  is uniquely
      determined as the
 is uniquely
      determined as the  -th
      approximate root of
-th
      approximate root of  .
. 
    
      In the context of Lemma 8.3, the  -adic expansion of
-adic expansion of  has the
      form
 has the
      form
    
 
    The algorithmic purpose of approximate roots is as follows. Suppose that
 
    
      for some  monic in
 monic in  .
      We can add one level to
.
      We can add one level to  with
 with
    
 
    
      We write  for the image of
 for the image of  in
      in  and examine the Newton polygon of
 and examine the Newton polygon of  . If we had
. If we had
    
 
    
      with some  , this would mean
      that
, this would mean
      that
    
 
    
      for some sufficiently small positive value of  . In particular, the
. In particular, the  -adic
      expansion of
-adic
      expansion of  would be
 would be
    
 
    whence
 
    
      The latter equality is not possible since it contradicts the fact that
       is an approximate root of
 is an approximate root of  .
.
    
      Consequently, the Newton polygon of  cannot have
      a single edge with a Newton polynomial of the form
 cannot have
      a single edge with a Newton polynomial of the form  . Either it has at least two edges, or a single
      edge but the initial factors of the Newton polynomial have multiplicity
. Either it has at least two edges, or a single
      edge but the initial factors of the Newton polynomial have multiplicity
       . For the situations similar
      to the one of section 2.5 these computations are expected
      to be faster and easier than the central shift method.
. For the situations similar
      to the one of section 2.5 these computations are expected
      to be faster and easier than the central shift method.
    
      In this section we consider a monic and separable polynomial  . We are interested in computing
      the irreducible factorization of
. We are interested in computing
      the irreducible factorization of  modulo
 modulo  for some requested precision
 for some requested precision  . Our strategy naturally relies on computing a
      contact factorization of
. Our strategy naturally relies on computing a
      contact factorization of  for a sufficiently
      large precision. We begin with analyzing the precision loss induced by
      the distinct slope and equal-slope factorizations.
 for a sufficiently
      large precision. We begin with analyzing the precision loss induced by
      the distinct slope and equal-slope factorizations.
    
      Let  be monic and separable, and let
 be monic and separable, and let  be a contact tower. Let (
 be a contact tower. Let ( )¯
      denote an algebraic closure of
)¯
      denote an algebraic closure of  ,
      we still write
,
      we still write  for the extended valuation.
 for the extended valuation.
    
      Proof. From Lemma 7.5 we know that
       is clustered at
 is clustered at  ,
      hence
,
      hence
    
 
    
      where  . Since
. Since  , necessarily
, necessarily  holds.
 holds.
    
      Assume that the lemma holds up to some index  . From Lemma 7.5, the contact
      polynomial
. From Lemma 7.5, the contact
      polynomial  is clustered at
 is clustered at  . Let us canonically write
. Let us canonically write
    
 
    
      where  and
 and  .
      By induction we have
.
      By induction we have
    
 
    
      for  . Since
. Since
    
 
    
      necessarily  holds. Let
 holds. Let  be canonically written
      be canonically written
    
 
    
      with  . Thanks to the
      induction hypothesis, we verify that
. Thanks to the
      induction hypothesis, we verify that
    
 
    
      Finally the lemma holds for index  .
. 
    
      If  is a separable, regular, and irreducible
      contact tower, then Lemmas 4.3 and 7.3 imply
      that
 is a separable, regular, and irreducible
      contact tower, then Lemmas 4.3 and 7.3 imply
      that  is a valuation of
 is a valuation of  that extends
      that extends  .
.
    
         be a separable,
        regular, and irreducible contact tower and let
 be a separable,
        regular, and irreducible contact tower and let  . Then
. Then  is the unique
        valuation of
 is the unique
        valuation of  that extends
 that extends  and we have
        and we have
      
 
        
        for all  in
 in  .
.
      
      Proof. Proposition 7.2 ensures that
       is irreducible. By setting
 is irreducible. By setting  to infinity we obtain that
      to infinity we obtain that  is a valuation of
 is a valuation of
       . The uniqueness and the
      resultant-based expression are well known; for instance, see [59,
      chapter XII, Corollary 6.2].
. The uniqueness and the
      resultant-based expression are well known; for instance, see [59,
      chapter XII, Corollary 6.2]. 
    
      Let  be monic in
 be monic in  and
      clustered at an effectively separable, regular, and irreducible contact
      tower
 and
      clustered at an effectively separable, regular, and irreducible contact
      tower  . We assume that
. We assume that  is larger than or equal to the smallest slope of the
      Newton polygon of
 is larger than or equal to the smallest slope of the
      Newton polygon of  . As
      before,
. As
      before,  stands for the image
 stands for the image  of
      of  in
 in  ,
      whose degree in
,
      whose degree in  is written
 is written  .
.
    
Proof. Poisson's formula for resultants yields
 
    Thanks to Lemma 5.7, we deduce:
|  | |||
|  |  | ||
|  |  | (by Lemma 9.1) | |
|  |  | ||
|  |  |  | 
      Next, we consider  and
 and  monic in
      monic in  . Let
. Let  and
 and  stand for the canonical
      representatives of
 stand for the canonical
      representatives of  and
 and  in
      in  , of respective degrees
, of respective degrees
       and
 and  in
 in  . In the sequel, we define
. In the sequel, we define  to be the constant coefficient of
      to be the constant coefficient of  ,
      when regarded as a univariate polynomial in
,
      when regarded as a univariate polynomial in  .
.
    
         are
 are  and the slopes
        of the Newton polygon of
 and the slopes
        of the Newton polygon of  are
 are  , then we have
, then we have
      
 
        Proof. Again, we use Poisson's formula for the resultants:
 
    It follows that
 
    
      Let  be the distinct-slope factors of
 be the distinct-slope factors of  (as in Definition 7.11) and let
 (as in Definition 7.11) and let  stand for their image in
 stand for their image in  .
      We verify that:
.
      We verify that:
    
 
    
      By Lemma 9.1, if  is a root of
 is a root of  then
 then  is larger or equal to
      the opposite of the slope of the single edge of the Newton polygon of
 is larger or equal to
      the opposite of the slope of the single edge of the Newton polygon of
       , that is
, that is
    
 
    It follows that
|  |  |  | |
|  |  | ||
|  |  | 
            (by Lemma 4.3)
             | 
      In the rest of the section, we study the precision loss encountered in
      each Newton factorization. For a partial factorization  with monic
      with monic  and
 and  ,
      the following well known formula will be used several times:
,
      the following well known formula will be used several times:
    
|  | (9.1) | 
      In the sequel  represents the precision at which
      the irreducible factors of the input polynomial are required. Let
 represents the precision at which
      the irreducible factors of the input polynomial are required. Let  in
 in  be given modulo
 be given modulo  with
 with
    
 
    
      where  . We assume that the
      Newton polygon of
. We assume that the
      Newton polygon of  has been computed. Following
      Definition 7.11, we let
 has been computed. Following
      Definition 7.11, we let  stand for
      the product of factors of
 stand for
      the product of factors of  with slopes
 with slopes  and let
 and let  stand for the product of
      factors of
 stand for the product of
      factors of  with slopes
 with slopes  , hence
, hence  .
      Let
.
      Let  and
 and  ,
      let
,
      let  represent the normalized initial inverse of
 represent the normalized initial inverse of
       .
.
    
      According to Corollary 4.11, we may obtain  with precision
 with precision  ,
      where
,
      where
    
 
    
      Setting  for
 for  ,
      equation
,
      equation 
 
    
      Since  we have
 we have  ,
      that yields
,
      that yields 
    
 
    
      We also compute  with precision
 with precision  , where
, where  ,
      and the same calculation yields
,
      and the same calculation yields
    
 
    
         be given
        with precision
 be given
        with precision  such that
 such that
      
 
        
        Then, Algorithm 7.1 computes truncations of the
        distinct slope factors  of
 of  modulo some
        modulo some  such that
 such that
      
 
        
        for  .
.
      
      Proof. We apply the above precision analysis in
      the “divide and conquer” fashion used in Algorithm 7.1. 
    
      Now we examine the precision loss during the equal-slope factorization.
      The input is a polynomial  clustered at
 clustered at  and which has a single slope
 and which has a single slope  and
      known with precision
 and
      known with precision  such that
 such that
    
 
    
      Let  represent the equal slope factors of
 represent the equal slope factors of  as in Definition 7.15, and set
 as in Definition 7.15, and set  . By Corollary 4.23
      the contact polynomial
. By Corollary 4.23
      the contact polynomial  can be computed with
      relative precision
 can be computed with
      relative precision  where
 where
    
 
    
      for  . Setting
. Setting  and
 and  for
 for  , Lemma 9.4 implies that
, Lemma 9.4 implies that
    
 
    Since
 
    
      and  , we obtain that
, we obtain that
    
 
    
      for  .
.
    
         be given
        with precision
 be given
        with precision
      
 
        
        Then Algorithm 7.2 computes the equal-slope factors
         modulo
 modulo  such that
 such that
      
 
        
      Proof. In fact Algorithm 7.2
      computes the equal-slope factors of  with a
      precision higher than the one requested here, but the above discussion
      leads to the lower bounds.
 with a
      precision higher than the one requested here, but the above discussion
      leads to the lower bounds. 
    
      We are now ready to prove Theorem 1.3. We assume that  is monic and separable of degree
 is monic and separable of degree  in
      in  and known modulo
 and known modulo  where
      where  . We combine Theorem 1.1 with the above precision analyses.
. We combine Theorem 1.1 with the above precision analyses. 
    
      Proof of Theorem 1.3. We apply
      Algorithm 8.2 with entry  modulo
 modulo
       , and with the trivial
      contact tower of height zero. The above precision analyses for the
      intermediate steps of the contact factorization algorithm, namely Lemmas
      9.5 and 9.6, show by induction that all
      intermediate factors
, and with the trivial
      contact tower of height zero. The above precision analyses for the
      intermediate steps of the contact factorization algorithm, namely Lemmas
      9.5 and 9.6, show by induction that all
      intermediate factors  of
 of  occurring in the top level algorithm are computed along with a contact
      tower
      occurring in the top level algorithm are computed along with a contact
      tower  of degree
 of degree  with
      precision
 with
      precision  such that
 such that
    
 
    
      Such a factor is proved to be irreducible when it has degree one in
       . In this case, by inequality
      (3.3), the coefficients of
. In this case, by inequality
      (3.3), the coefficients of  are
      uniquely determined up to precision in
 are
      uniquely determined up to precision in  at least
 at least
    
 
    which equals
 
    by Lemma 5.4. On the other hand, Lemma 9.3 yields
 
    
      so the precision of  is at least
 is at least  as claimed. Note that the central shift algorithm does not produce
      factors, so it does not involve any loss of precision.
      as claimed. Note that the central shift algorithm does not produce
      factors, so it does not involve any loss of precision. 
    
      The contact factorization presented in this paper is subject to further
      improvements. A first research direction concerns the design of a
      contact factorization algorithm that would not rely on univariate
      irreducible factorization, by using the directed evaluation
      paradigm of [52] instead; so the computed contact towers
      would not be necessarily irreducible any longer. Another research
      direction concerns the design of fast algorithms for the contact
      coordinates in the vein of [51, 52]: we could
      avoid the conversions to plain coordinates and their precision loss.
      Another research direction concerns fields of small positive
      characteristic  .
.
    
S. Abelard, E. Berardini, A. Couvreur, and G. Lecerf. Computing Riemann–Roch spaces via Puiseux expansions. J. Complexity, 73:101666, 2022.
S. S. Abhyankar. Irreducibility criterion for germs of analytic functions of two complex variables. Adv. Math., 74(2):190–257, 1989.
S. S. Abhyankar and T. Moh. Newton–Puiseux expansion and generalized Tschirnhausen transformation. I. J. Reine Angew. Math., 260:47–83, 1973.
S. S. Abhyankar and T. Moh. Newton–Puiseux expansion and generalized Tschrinhausen transformation. II. J. Reine Angew. Math., 261:29–54, 1973.
M. Alberich-Carramiñana, J. Guàrdia, E. Nart, A. Poteaux, J. Roé, and M. Weimann. Polynomial factorization over henselian fields. Found. Comput. Math., 2024. https://doi.org/10.1007/s10208-024-09646-x.
M. E. Alonso, F. J. Castro-Jiménez, and H. Hauser. Encoding algebraic power series. J. Found. Comput. Math., 18(3):789–833, 2018.
M. Aschenbrenner, L. van den Dries, and J. van der Hoeven. Asymptotic Differential Algebra and Model Theory of Transseries. Number 195 in Annals of Mathematics studies. Princeton University Press, 2017.
J.-D. Bauch, E. Nart, and H. D. Stainsby. Complexity of OM factorizations of polynomials over local fields. LMS J. Comput. Math., 16:139–171, 2013.
J. Berthomieu, G. Lecerf, and G. Quintin. Polynomial root finding over local rings and application to error correcting codes. Appl. Algebra Engrg. Comm. Comput., 24(6):413–443, 2013.
A. Bostan, G. Christol, and Ph. Dumas. Fast computation of the Nth term of an algebraic series over a finite prime field. In M. Rosenkranz, editor, Proceedings of the 2016 ACM International Symposium on Symbolic and Algebraic Computation, ISSAC '16, pages 119–126. New York, NY, USA, 2016. ACM.
A. Bostan, F. Chyzak, G. Lecerf, B. Salvy, and É. Schost. Differential equations for algebraic functions. In C. W. Brown, editor, Proceedings of the 2007 International Symposium on Symbolic and Algebraic Computation, ISSAC '07. New York, NY, USA, 2007. ACM.
A. Bostan, G. Lecerf, B. Salvy, É. Schost, and B. Wiebelt. Complexity issues in bivariate polynomial factorization. In J. Schicho, editor, Proceedings of the 2004 International Symposium on Symbolic and Algebraic Computation, ISSAC '04, pages 42–49. New York, NY, USA, 2004. ACM Press.
A. Campillo and J. I. Farrán. Symbolic Hamburger–Noether expressions of plane curves and applications to AG codes. Math. Comp., 71(240):1759–1780, 2002.
              D. G. Cantor and D. M. Gordon. Factoring polynomials
              over  -adic fields. In
              W. Bosma, editor, Algorithmic Number Theory. 4th
              International Symposium, ANTS-IV Leiden, The Netherlands, July
              2-7, 2000. Proceedings, volume 1838 of Lecture Notes in
              Comput. Sci., pages 185–208. Springer-Verlag, 2000.
-adic fields. In
              W. Bosma, editor, Algorithmic Number Theory. 4th
              International Symposium, ANTS-IV Leiden, The Netherlands, July
              2-7, 2000. Proceedings, volume 1838 of Lecture Notes in
              Comput. Sci., pages 185–208. Springer-Verlag, 2000.
            
D. G. Cantor and E. Kaltofen. On fast multiplication of polynomials over arbitrary algebras. Acta Inform., 28:693–701, 1991.
D. G. Cantor and H. Zassenhaus. A new algorithm for factoring polynomials over finite fields. Math. Comput., 36(154):587–592, 1981.
A. L. Chistov. Polynomial complexity of the Newton–Puiseux algorithm. In Mathematical Foundations of Computer Science 1986. Proceedings of the 12th Symposium Bratislava, Czechoslovakia August 25–29, 1986, volume 233 of Lecture Notes in Comput. Sci., pages 247–255. Springer-Verlag, 1986.
A. L. Chistov. Efficient factoring polynomials over local fields and its applications. In Proceedings of the International Congress of Mathematicians, Kyoto, Japan, 1990, volume 1, pages 1509–1519. Springer-Verlag, 1991.
D. V. Chudnovsky and G. V. Chudnovsky. On expansion of algebraic functions in power and Puiseux series, I. J. Complexity, 2(4):271–294, 1986.
D. V. Chudnovsky and G. V. Chudnovsky. On expansion of algebraic functions in power and Puiseux series, II. J. Complexity, 3(1):1–25, 1987.
H. Cohen. A course in computational algebraic number theory. Graduate Texts in Mathematics. Springer, Berlin, Heidelberg, 1993.
V. Cossart and G. Moreno-Socías. Racines approchées, suites génératrices, suffisance des jets. Annales de la Faculté des sciences de Toulouse 6e série, 14(3):353–394, 2005.
D. Duval. Rational Puiseux expansions. Compos. Math., 70(2):119–154, 1989.
A. Dwivedi and N. Saxena. Computing Igusa's local zeta function of univariates in deterministic polynomial-time. In S. D. Galbraith, editor, ANTS XIV. Proceedings of the Fourteenth Algorithmic Number Theory Symposium, volume 4 of The Open Book Series, pages 197–214. Berkeley, CA, USA, 2020. MSP.
J. Fernández, J. Guàrdia, J. Montes, and E. Nart. Residual ideals of MacLane valuations. J. Algebra, 427:30–75, 2015.
D. Ford and P. Letard. Implementing the Round Four maximal order algorithm. J. Théor. Nombres Bordeaux, 6(1):39–80, 1994.
              D. Ford, S. Pauli, and X.-F. Roblot. A fast algorithm
              for polynomial factorization over  .
              J. Théor. Nombres Bordeaux, 14(1):151–169,
              2002.
.
              J. Théor. Nombres Bordeaux, 14(1):151–169,
              2002.
            
D. Ford and O. Veres. On the complexity of the Montes ideal factorization algorithm. In G. Hanrot, F. Morain, and E. Thomé, editors, Algorithmic Number Theory. 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010. Proceedings, volume 6197 of Lecture Notes in Comput. Sci., pages 174–185. Springer-Verlag, 2010.
A. Fröhlich and J. C. Shepherdson. On the factorisation of polynomials in a finite number of steps. Math. Z., 62:331–334, 1955.
A. Fröhlich and J. C. Shepherdson. Effective procedures in field theory. Philos. Trans. Roy. Soc. London. Ser. A., 248:407–432, 1956.
J. von zur Gathen and J. Gerhard. Modern computer algebra. Cambridge University Press, New York, 3rd edition, 2013.
J. von zur Gathen and V. Shoup. Computing Frobenius maps and factoring polynomials. Comput. complexity, 2(3):187–224, 1992.
G.-M. Greuel and G. Pfister. A Singular introduction to commutative algebra. Springer-Verlag Berlin Heidelberg, 2002.
J. Guàrdia, J. Montes, and E. Nart. Okutsu invariants and Newton polygons. Acta Arith., 145(1):83–108, 2010.
J. Guàrdia, J. Montes, and E. Nart. Higher Newton polygons in the computation of discriminants and prime ideal decomposition in number fields. J. Théor. Nombres Bordeaux, 23(3):667–696, 2011.
J. Guàrdia, J. Montes, and E. Nart. Newton polygons of higher order in algebraic number theory. Trans. Amer. Math. Soc., 364(1):361–416, 2012.
J. Guàrdia, J. Montes, and E. Nart. A new computational approach to ideal theory in number fields. Found. Comput. Math., 13(5):729–762, 2013.
J. Guàrdia, J. Montes, and E. Nart. Higher Newton polygons and integral bases. J. Number Theory, 147:549–589, 2015.
J. Guàrdia, E. Nart, and S. Pauli. Single-factor lifting and factorization of polynomials over local fields. J. Symbolic Comput., 47(11):1318–1346, 2012.
              D. Harvey and J. van der Hoeven. Polynomial
              multiplication over finite fields in time  . J. ACM, 69(2):1–40, 2022.
              Article 12.
. J. ACM, 69(2):1–40, 2022.
              Article 12.
            
J. P. G. Henry and M. Merle. Complexity of computation of embedded resolution of algebraic curves. In J. H. Davenport, editor, Eurocal '87. European Conference on Computer Algebra. Leipzig, GDR, June 2–5, 1987. Proceedings, volume 378 of Lect. Notes Comput. Sci., pages 381–390. Springer Berlin Heidelberg, 1989.
H. Hironaka. Resolution of singularities of an algebraic variety over a field of characteristic zero. Annals of Math., 79:109–326, 1964.
J. van der Hoeven. Automatic asymptotics. PhD thesis, École polytechnique, Palaiseau, France, 1997.
J. van der Hoeven. Relax, but don't be too lazy. J. Symbolic Comput., 34:479–542, 2002.
J. van der Hoeven. Newton's method and FFT trading. J. Symbolic Comput., 45(8):857–878, 2010.
J. van der Hoeven. Faster Chinese remaindering. Technical Report, HAL, 2016. https://hal.archives-ouvertes.fr/hal-01403810.
J. van der Hoeven. Computing with D-algebraic power series. Appl. Algebra Engrg. Comm. Comput., 30(1):17–49, 2019.
J. van der Hoeven. Effective power series computations. Found. Comput. Math., 19(3):623–651, 2019.
J. van der Hoeven. The Jolly Writer. Your Guide to GNU TeXmacs. Scypress, 2020.
J. van der Hoeven and G. Lecerf. Modular composition via factorization. J. Complexity, 48:36–68, 2018.
J. van der Hoeven and G. Lecerf. Accelerated tower arithmetic. J. Complexity, 55:101402, 2019.
J. van der Hoeven and G. Lecerf. Directed evaluation. J. Complexity, 60:101498, 2020.
J. van der Hoeven and G. Lecerf. Univariate polynomial factorization over finite fields with large extension degree. Appl. Algebra Eng. Commun. Comput., 35:121–149, 2024.
E. Kaltofen and V. Shoup. Fast polynomial factorization over high algebraic extensions of finite fields. In Proceedings of the 1997 International Symposium on Symbolic and Algebraic Computation, ISSAC '97, pages 184–188. New York, NY, USA, 1997. ACM.
E. Kaltofen and V. Shoup. Subquadratic-time factoring of polynomials over finite fields. Math. Comput., 67(223):1179–1197, 1998.
K. S. Kedlaya. On the algebraicity of generalized power series. Beitr. Algebra Geom., 58:499–527, 2017.
K. S. Kedlaya and C. Umans. Fast polynomial factorization and modular composition. SIAM J. Comput., 40(6):1767–1802, 2011.
H. T. Kung and J. F. Traub. All algebraic functions can be computed fast. J. ACM, 25(2):245–260, 1979.
S. Lang. Algebra, volume 211 of Graduate Texts in Mathematics. Springer-Verlag, New York, 3rd edition, 2002.
G. Lecerf. Fast separable factorization and applications. Appl. Algebra Engrg. Comm. Comput., 19(2):135–160, 2008.
G. Lecerf. New recombination algorithms for bivariate polynomial factorization based on Hensel lifting. Appl. Algebra Engrg. Comm. Comput., 21(2):151–176, 2010.
S. MacLane. A construction for absolute values in polynomial rings. Trans. Am. Math. Soc., 40(3):363–395, 1936.
S. MacLane. A construction for prime ideals as absolute values of an algebraic field. Duke Math. J., 2(3):492–510, 1936.
J. Montes. Polígonos de Newton de orden superior y aplicaciones aritméticas. PhD thesis, Universitat de Barcelona, Spain, 1999.
F. Mora. An algorithm to compute the equations of tangent cones. In J. Calmet, editor, Computer Algebra. EUROCAM '82, European Computer Algebra Conference, Marseilles, France, April 5-7, 1982, volume 144 of Lect. Notes in Computer Sc., pages 158–165. Springer-Verlag Berlin Heidelberg, 1982.
G. Moroz. New data structure for univariate polynomial approximation and applications to root isolation, numerical multipoint evaluation, and other problems. In 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS), pages 1090–1099. Los Alamitos, CA, USA, 2022. IEEE.
G. Moroz and É. Schost. A fast algorithm for computing the truncated resultant. In M. Rosenkranz, editor, Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, ISSAC '16, pages 341–348. New York, NY, USA, 2016. ACM.
E. Nart. Okutsu–Montes representations of prime ideals of one-dimensional integral closures. Publicacions Matemàtiques, 55(2):261–294, 2011.
V. Neiger, J. Rosenkilde, and É. Schost. Fast computation of the roots of polynomials over the ring of power series. In Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, ISSAC '17, pages 349–356. New York, NY, USA, 2017. ACM Press.
I. Newton. De methodis serierum et Fluxionum. Manuscript, 1671.
K. Okutsu. Construction of integral basis. I. Proc. Japan Acad. Ser. A Math. Sci., 58(1):47–49, 1982.
K. Okutsu. Construction of integral basis. II. Proc. Japan Acad. Ser. A Math. Sci., 58(2):87–89, 1982.
K. Okutsu. Construction of integral basis. III. Proc. Japan Acad. Ser. A Math. Sci., 58(3):117–119, 1982.
K. Okutsu. Construction of integral basis. IV. Proc. Japan Acad. Ser. A Math. Sci., 58(4):167–169, 1982.
Ö. Ore. Zur Theorie der Algebraischen Körper. Acta Math., 44:219–314, 1923.
Ö. Ore. Bestimmung der Diskriminanten algebraischer Körper. Acta Math., 45:303–344, 1925.
Ö. Ore. Newtonsche Polygone in der Theorie der algebraischen Körper. Math. Ann., 99:84–117, 1928.
A. M. Ostrowski. Über die Bedeutung der Theorie der konvexen Polyeder für die formale Algebra. Jahresber. Deutsch. Math.-Verein., 30(2):98–99, 1921. Talk given at Der Deutsche Mathematikertag vom 18–24 September 1921 in Jena.
A. M. Ostrowski. On multiplication and factorization of polynomials. I. Lexicographic orderings and extreme aggregates of terms. Aequationes Math., 13(3):201–228, 1975.
A. M. Ostrowski. On the significance of the theory of convex polyhedra for formal algebra. SIGSAM Bull., 33(1):5, 1999. Translated from [78].
V. Y. Pan. Univariate polynomials: nearly optimal algorithms for numerical factorization and root-finding. J. Symbolic Comput., 33(5):701–733, 2002.
S. Pauli. Factoring polynomials over local fields. J. Symbolic Comput., 32(5):533–547, 2001.
A. Poteaux. Calcul de développements de Puiseux et application au calcul de groupe de monodromie d'une courbe algébrique plane. PhD thesis, Université de Limoges, France, 2008.
A. Poteaux and M. Rybowicz. Improving complexity bounds for the computation of Puiseux series over finite fields. In Proceedings of the 2015 ACM on International Symposium on Symbolic and Algebraic Computation, ISSAC'15, pages 299–306. New York, NY, USA, 2015. ACM.
A. Poteaux and É. Schost. Modular composition modulo triangular sets and applications. Comput. Complex., 22(3):463–516, 2013.
              A. Poteaux and M. Weimann. Using approximate roots
              for irreducibility and equi-singularity issues in  . Technical Report, arXiv:1904.00286,
              2019.
. Technical Report, arXiv:1904.00286,
              2019.
            
A. Poteaux and M. Weimann. Computing Puiseux series: a fast divide and conquer algorithm. Ann. Henri Lebesgue, 5:1061–1102, 2021.
              A. Poteaux and M. Weimann. A quasi-linear
              irreducibility test in  .
              Comput. Complex., 31:6, 2022.
.
              Comput. Complex., 31:6, 2022.
            
A. Poteaux and M. Weimann. Local polynomial factorisation: improving the Montes algorithm. In A. Hashemi, editor, Proceedings of the 2022 International Symposium on Symbolic and Algebraic Computation, ISSAC '22, pages 149–157. New York, NY, USA, 2022. ACM.
M. V. Puiseux. Recherches sur les fonctions algébriques. J. Math. Pures et Appliquées, 15:365–480, 1850.
P. Russell. Hamburger–Noether expansions and approximate roots of polynomials. Manuscripta Math., 31:25–95, 1980.
A. Schönhage. Schnelle Multiplikation von Polynomen über Körpern der Charakteristik 2. Acta Inform., 7:395–398, 1977.
A. Schönhage. The fundamental theorem of algebra in terms of computational complexity. Technical Report, Math. Inst. Univ. of Tübingen, 1982.
V. Shoup. New algorithms for finding irreducible polynomials over finite fields. Math. Comp., 54(189):435–447, 1990.
S. Smith. On the higher singularities of plane curves. Prod. London Math. Soc., 6:153–182, 1875.
E. W. von Tschirnhaus. Nova methodus auferendi omnes terminos intermedios ex data æquatione. Acta Eriditorium, 2:204–207, 1683.
B. L. van der Waerden. Algebra. Springer, 7th edition, 1991. Based in part on lectures by E. Artin and E. Noether.
R. J. Walker. Algebraic Curves, volume 13 of Princeton mathematical series. Princeton University Press, 1950.
P. Walsh. A polynomial-time complexity bound for the computation of the singular part of a Puiseux expansion of an algebraic function. Math. Comp., 69(231):1167–1182, 2000.
P. G. Walsh. On the complexity of rational Puiseux expansions. Pacific J. Math., 188(2):369–387, 1999.
S. M. Watt. A fixed point method for power series computation. In P. Gianni, editor, Symbolic and Algebraic Computation. International Symposium ISSAC' 88, Rome, Italy, July 4-8, 1988. Proceedings, volume 358 of Lect. Notes in Computer Sc., pages 206–217. Springer-Verlag, 1989.
O. Zariski. Le problème des modules pour les branches planes. Hermann, Paris, 1986.
           polynomials in
 polynomials in  of
          degree
 of
          degree  3
  3
        
           cost function for univariate polynomial
          factorization  3
 cost function for univariate polynomial
          factorization  3
        
           homogeneous component of
 homogeneous component of  of degree
          of degree  10
  10
        
           homogeneous components of
 homogeneous components of  from degree
          from degree  to
 to  10
  10
        
           initial form of
 initial form of  11
           11
        
           valuation semi-group of the
 valuation semi-group of the  -th level of a contact tower 
          17
-th level of a contact tower 
          17
        
           group generated by
 group generated by  17
           17
        
           ramification index of
 ramification index of  17
           17
        
           
  -th
          defining polynomial of a contact tower  17
-th
          defining polynomial of a contact tower  17
        
           defining ideal of a contact tower of height
 defining ideal of a contact tower of height
           18
  18
        
           level
 level  of a contact
          tower  18
 of a contact
          tower  18
        
           degree of
 degree of  with
          respect to the contact variable
 with
          respect to the contact variable  22
 
          22
        
           polynomials at the level
 polynomials at the level  of a contact tower  24
          of a contact tower  24
        
           expression of
 expression of  in
          terms of the plain coordinates  24
 in
          terms of the plain coordinates  24
        
           conversion to plain coordinates 
          24
 conversion to plain coordinates 
          24
        
           valuation of
 valuation of  with
          respect to
 with
          respect to  27
  27
        
           derivative of
 derivative of  with
          respect to
 with
          respect to  42
  42
        
           valuation of
 valuation of  regarded in
          regarded in  53
  53
        
           homogeneous components of
 homogeneous components of  regarded in
          regarded in  53
  53
        
algebraic tower 3
approximate root 71
canonical representation 21
central shift 65
clustered polynomial 22
contact coordinates 17
contact factorization 56
contact polynomial 24
contact representation 24
contact slope 17
contact tower 17
degree 17
irreducible 54
reduced 17
regular 45
separable 41
distinct-slope factorization 60
equal-slope factorization 63
graded ring 10
Hensel context 36
initial 36
homogeneous component 10
initial expansion 46
initial form 11
initial root 65
initially reducible 54
leading monomial 18
        monic in  22
  22
      
Newton polygon 11
contact 56
regular 56
Newton polynomial 11
normalized inverse
initial 29
modulo 29
plain coordinates 24
regular
effectively 45
relative precision 11
semi-valuation 11
separable
effectively 41
slope 11
standard basis 18
reduced 18
uniformizing parameter 47
Weierstraß context 31
initial 32
Weierstraß
normalization 28
part 33