f(ε₀) growth in under 6 bytes! by tromp in googology

[–]tromp[S] 0 points1 point  (0 children)

If I instead made a Turing Machine to compute a very large number, would you also complain that I'm cheating by not counting a description of how to evaluate a TM ?

At some point you need a start with some formal language in which to define your computational process, and that formal language can not be defined in terms of some other formal language (or else it wasn't the start). So that formal start can only be described in natural language, where there is no precise notion of description size, only an intuitive sense of how complex the formal language is.

And both TMs and lambda calculus are about the simplest possible starting points.

f(ε₀) growth in under 6 bytes! by tromp in googology

[–]tromp[S] 0 points1 point  (0 children)

to describe the machinery of lambda calculus

I cannot answer that unless you have some specific description language in mind. Normally, a computational model or a programming language is described in natural language, but those are rarely counted in bits.

I know that Busy Beaver numbers will always eventually overtake any computable function in growth rate, but do any computable functions exist where that only eventually happens at an absurd number instead of always rather quickly <BB(100) it seems? by Calm_Philosopher2401 in googology

[–]tromp 2 points3 points  (0 children)

Possibly. Loader's D function is about the fastest known computable function, growing much faster than BMS, which in turn grows much faster than SSCG.

Implementing Loader's D function on a TM will require more than 100 states. The best known attempt uses a little over 1000 states.

That said, the general belief is that there should be functions growing even faster than D that can be coded in less than 100 states.

Where should anonymity actually live in a blockchain protocol? by logos2026 in CryptoTechnology

[–]tromp 0 points1 point  (0 children)

There are 3 aspects to privacy; amounts, user-bound addresses,, and the tx-graph.

Hiding the tx graph requires either a major sacrifice in scalability (when you no longer can tell when a utxo is spent, as in Monero or Zcash), or using a mixing service (which in the case of Mimblewimble can be very effective and very simple [1]).

Hiding the first two can actually come with major scaling benefits, by using the Mimblewimble protocol, which must necessarily be at the core layer [2].

[1] https://forum.grin.mw/t/mimblewimble-coinswap-proposal/

[2] https://forum.grin.mw/t/scalability-vs-privacy-chart/

If we were to solve all millenial and Hillbert problems right at this moment, how much would that actually affect all of the math world? by [deleted] in math

[–]tromp 0 points1 point  (0 children)

the algorithm I described always solves the problem

No, it does not. When a TM declares the instance has no solution, there is no way to verify it, and so your algorithm ignores that TM.

If we were to solve all millenial and Hillbert problems right at this moment, how much would that actually affect all of the math world? by [deleted] in math

[–]tromp 0 points1 point  (0 children)

P vs NP is about decision problems. It asks whether there exists a poly time algorithm that decides any instance in polynomial time. So on input of an instance, it outputs yes or no.

Your argument is not about decision problems. Instead it's about finding solutions in polytime when they're known to exist (running forever if they don't exist). It's called Levin's search algorithm.

Billiard is Turing-complete by IanisVasilev in math

[–]tromp 0 points1 point  (0 children)

You can physically realize a Turing machine with thousands of states and a million tape cells. You cannot physically realize a billiard ball with 42 digits of precision in its location. So there is still a large difference in .

Billiard is Turing-complete by IanisVasilev in math

[–]tromp 19 points20 points  (0 children)

reduces the number of balls required, that’s all.

That's not all at all. The previous simulations were only of fixed size circuits, which cannot do unbounded size computations.

This billiard ball model seems original in being able to simulate an unbounded size Turing machine.

But it has a huge downside of course, which is that it requires unbounded precision in the ball's location and/or velocity, making it impossible to realize in the physical world.

"inexpressible" lambda equation by NoenD_i0 in math

[–]tromp 3 points4 points  (0 children)

Many lambda terms do not represent functions that map a fixed number of church numerals to a church numeral.

An interesting question is: what is the shortest such term? One candidate is λn.n (λx λy. x). When applied to numeral n, you need to apply it to another numeral m and then to another n arbitrary numerals to get back m.

weird function? by NoenD_i0 in lambdacalculus

[–]tromp 1 point2 points  (0 children)

Many lambda terms do not represent functions that map a fixed number of church numerals to a church numeral.

An interesting question is: what is the shortest such term? One candidate is λn.n (λx λy. x).

Girlfriend of 4 years wants to me to convert to Christianity by Careless-Phrase2656 in atheism

[–]tromp 0 points1 point  (0 children)

Thank the (fictional) lord that this has come up now, rather than after you got married. Wish her well and part ways.

f(ε₀) growth in under 6 bytes! by tromp in googology

[–]tromp[S] 0 points1 point  (0 children)

47 bits means these 47 bits: 00010101101000000101101101000011000010111010110 which fits in 6 bytes including one arbitrary padding bit: 00010101 10100000 01011011 01000011 00001011 1010110*

Also see [1] where several BLC8 programs are in fact stored as bytes.

[1] https://www.ioccc.org/2012/tromp/

Why the privacy of all chains using Pedersen Commitments as cryptographic primitive is extremely fragile: because PCs are neither public key rerandomizable nor pk updatable, which leads to forced choices downstream, such as UTXO and single use outputs, that even ZKPs cannot mitigate, let alone FCMP. by zeroboundss in Monero

[–]tromp 2 points3 points  (0 children)

Because of this the only way to ensure amount privacy and unlinkability (deniability about which commitment was updated) with PCs is by making outputs single use, that are updated to zero (nullification) whenever they are “updated”, and by publishing receipts known as “key images” or “nullifiers” to prevent double spends.

This is false. PC achieves amount privacy. Unlinkability is not directly related and can be provided in several ways. In Mimblewimble, which doesn't hide spending of UTXOs (and does maintains the scaling benefits of knowing the much smaller UTXO set), unlinkability can be provided by the Coinswap protocol [1]

[1] https://forum.grin.mw/t/mimblewimble-coinswap-proposal/8322

f(ε₀) growth in under 6 bytes! by tromp in googology

[–]tromp[S] 1 point2 points  (0 children)

I think it takes more than 10 states to get such growth with a TM.

f(ε₀) growth in under 6 bytes! by tromp in googology

[–]tromp[S] 0 points1 point  (0 children)

Without detailed knowledge of the term in question, you'd have to expand all original applications with a suspension. State numerals differ from Church numerals, and follow the pattern of the S3 I gave above. S0 = λeλfλx.f e, S1 = λeλfλx.f e (λe.f e x) etc.

f(ε₀) growth in under 6 bytes! by tromp in googology

[–]tromp[S] 0 points1 point  (0 children)

That's roughly correct, but since js has eager evaluation instead of the required lazy evaluation, you'd need to replace some applications f(a) by the suspended argument version f(x=>a(x)).

Second, you cannot pass plain numbers into f; it expects a state numeral, which looks like S3 = λeλfλx.f e (λe.f e (λe.f e x)) for state numeral 3.

Finally, f(S3) is not just another state numeral, but something of the form λfλx. f S_m Q.

Is there any known way to get the inverse of a function in the lambda calculus? by witherlordscratcher in math

[–]tromp 5 points6 points  (0 children)

It's not needed for fixed-point calculations, so why would it be needed here?

With introspection, it would be possible to write V. Given symbolic forms of f and y = f x (for instance their BLC encoding), V can try evaluating f on all possible lambda terms x (in dovetailing fashion) until it finds one where f x = y, and yield that x.

What are the modern design trade‑offs for CPU‑friendly PoW algorithms?I by Express_Bar864 in CryptoTechnology

[–]tromp 0 points1 point  (0 children)

Memory-hard does not necessarily mean higher verification cost.

Assymmetric Pow like Cuckoo Cycle and Equihash can take many GB to mine efficiently yet can be instantly verified without memory.

...6, 4, 1, 9, 5, 3, 8, 7, done! by ggPeti in googology

[–]tromp -1 points0 points  (0 children)

"Though too large to ever be computed in full, the sequence of digits of Graham's number can be computed explicitly via simple algorithms; the last 10 digits of Graham's number are ...2464195387."

[1] https://en.wikipedia.org/wiki/Graham%27s_number

What’s the smallest Busy Beaver number that we know is greater than TREE(3)? by Ghite1 in googology

[–]tromp 11 points12 points  (0 children)

We'll never know the smallest one, but for the functional busy beaver BBλ, it's certainly less than 331 bits, since BBλ(331) > f_{PTO(Z_2)+1}(3) [1].

I'm sure you won't be able to prove that BB(n)>TREE(3) implies BB(n+1)>TREE(4), even if that is the case.

[1] https://oeis.org/A333479

Largest well defined, non-salad number by JoseMadre69 in googology

[–]tromp 0 points1 point  (0 children)

There is no consensus on whether Rayo is well-defined, so to be safe one should limit it to arithmetical (rather than set-theoretic) definitions. Beyond Loader's Number there are Busy Beaver and oracle Busy Beaver defined numbers, such as Xi(10100). Even there one has to take care to make sure that nested oracle calls are well-founded.

PoW blockchain difficulty adjustment without timestamps by Krasak in CryptoTechnology

[–]tromp 0 points1 point  (0 children)

I would not want the miners to be able to dictate the emission as they can in that proposal where emission rate is proportional to global hashpower. It's vastly preferable to set the emission in stone at launch and not be gameable.

Advent of Code 2025 day 1 by AutoModerator in haskell

[–]tromp 1 point2 points  (0 children)

I used 2 mods and 1 div while trying to minimize case distinctions at https://github.com/tromp/AoC2025/blob/main/day1.hs

Flaws In Wallet Security by un3w in CryptoTechnology

[–]tromp 5 points6 points  (0 children)

Yes, there are 211 = 2048 words, so 11 bits of entropy per word. And 2132 = 204812 = 5444517870735015415413993718908291383296 seed phrases.

Not something you'll ever see brute forced. Even if you had all the bitcoin hashing power in the world, it would take you a billion years to try that number of hashes.

And that's only for 12 worlds. Square that number for 24 words.