Elliptic curve involving subfamilies of rank at least 5 over $\mathbb{Q}(t)$ or $\mathbb{Q}(t,k)$
نویسندگان
چکیده
Motivated by the work of Zargar and Zamani, we introduce a family elliptic curves containing several one- (respectively two-) parameter subfamilies high rank over function field $\mathbb{Q}(t)$ $\mathbb{Q}(t,k)$). Following approach Moody, construct two infinitely many at least 5 $\mathbb{Q}(t,k)$. Secondly, deduce other this family, induced edges rational cuboid five independent $\mathbb{Q}(t)$-rational points. Finally, give new subfamily Diophantine triples with $\mathbb{Q}(t)$. By specialization, obtain some specific examples $\mathbb{Q}$ (8, 9, 10 11).
منابع مشابه
Twists of elliptic curves of rank at least four
We give infinite families of elliptic curves over Q such that each curve has infinitely many non-isomorphic quadratic twists of rank at least 4. Assuming the Parity Conjecture, we also give elliptic curves over Q with infinitely many non-isomorphic quadratic twists of odd rank at least 5.
متن کاملEfficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملTHE RANK AND GENERATORS OF KIHARA’S ELLIPTIC CURVE WITH TORSION Z/4Z OVER Q(t)
For the elliptic curve E overQ(t) found by Kihara, with torsion group Z/4Z and rank ≥ 5, which is the current record for the rank of such curves, by using a suitable injective specialization, we determine exactly the rank and generators of E(Q(t)).
متن کاملAn example of elliptic curve over Q with rank equal to 15
We construct an elliptic curve over Q with non-trivial 2-torsion point and rank exactly equal to 15.
متن کاملPlatform Independent Elliptic Curve Cryptography over
Elliptic curve cryptography has long since moved into several wellknown standards like IEEE’s 1363, SEC and X9.62. With its small key sizes it is just right for many crypto applications, in particular for mobile computing and communication devices. To make ECC easily available for all these different applications, a highly efficient and platformindependent implementation of ECC is necessary. Th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Hacettepe journal of mathematics and statistics
سال: 2021
ISSN: ['1303-5010']
DOI: https://doi.org/10.15672/hujms.708945