Metacommutation of primes in Eichler orders
نویسندگان
چکیده
We study the metacommutation problem in Eichler orders. From this arises a permutation of set locally principal left ideals given prime reduced norm. Previous results on cycle structure were determined for maximal As we ext
منابع مشابه
Binary quadratic forms and Eichler orders
For any Eichler order O(D,N) of level N in an indefinite quaternion algebra of discriminant D there is a Fuchsian group Γ(D,N) ⊆ SL(2,R) and a Shimura curve X(D,N). We associate to O(D,N) a set H(O(D,N)) of binary quadratic forms which have semi-integer quadratic coefficients, and we develop a classification theory, with respect to Γ(D,N), for primitive forms contained in H(O(D,N)). In particul...
متن کاملAn embedding theorem for Eichler orders
Let B be a quaternion algebra over number field K : Assume that B satisfies the Eichler condition (i.e., there is at least one archimedean place which is unramified in B). Let O be an order in a quadratic extension L of K: The Eichler orders of B which admit an embedding of O are determined. This is a generalization of Chinburg and Friedman’s embedding theorem for maximal orders. r 2004 Elsevie...
متن کاملOn Zeros of Eichler Integrals
Eichler integrals play an integral part in the modular parametrizations of elliptic curves. In her master’s thesis, Kodgis conjectures several dozen zeros of Eichler integrals for elliptic curves with conductor ≤ 179. In this paper we prove a general theorem which confirms many of these conjectured zeros. We also provide two ways to generate infinite families of elliptic curves with certain zer...
متن کاملEichler Integrals and String Theory *
In this article, it is shown how to obtain objects called Eichler integrals in the mathematical literature that can be used for calculating scattering amplitudes in String Theory. These Eichler integrals are also new examples of Eichler integrals with poles.
متن کاملOrders of CM elliptic curves modulo p with at most two primes
Nowadays the generation of cryptosystems requires two main aspects. First the security, and then the size of the keys involved in the construction and comunication process. About the former one needs a difficult mathematical assumption which ensures your system will not be broken unless a well known difficult problem is solved. In this context one of the most famous assumption underlying a wide...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Acta Arithmetica
سال: 2021
ISSN: ['0065-1036', '1730-6264']
DOI: https://doi.org/10.4064/aa191031-23-5