Elliptic curves and modularity

ثبت نشده
چکیده

The discriminant Define b2 := a1 + 4a2, b4 := 2a4 + a1a3, b6 := a3 + 4a6, b8 := a1a6 + 4a2a6 − a1a3a4 + a2a3 − a4. Note that if char(K) 6= 2, then we can perform the coordinate transformation y 7→ (y− a1x− a3)/2 to arrive at an equation y = 4x + b2x +2b4x+ b6. Now for any Weierstrass equation we define its discriminant ∆ := −b2b8 − 8b4 − 27b6 + 9b2b4b6. Proposition 1. A curve C/K given by a Weierstrass equation ((1) or (2)) has ∆ 6= 0 if and only if C is smooth.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

2 9 A ug 2 00 7 On the modularity of supersingular elliptic curves over certain totally real number fields

We study generalisations to totally real fields of the methods originating with Wiles and Taylor-Wiles ([32], [31]). In view of the results of Skinner-Wiles [26] on elliptic curves with ordinary reduction, we focus here on the case of supersingular reduction. Combining these, we then obtain some partial results on the modularity problem for semistable elliptic curves, and end by giving some app...

متن کامل

Complete characterization of the Mordell-Weil group of some families of elliptic curves

 The Mordell-Weil theorem states that the group of rational points‎ ‎on an elliptic curve over the rational numbers is a finitely‎ ‎generated abelian group‎. ‎In our previous paper, H‎. ‎Daghigh‎, ‎and S‎. ‎Didari‎, On the elliptic curves of the form $ y^2=x^3-3px$‎, ‎‎Bull‎. ‎Iranian Math‎. ‎Soc‎.‎‎ 40 (2014)‎, no‎. ‎5‎, ‎1119--1133‎.‎, ‎using Selmer groups‎, ‎we have shown that for a prime $p...

متن کامل

An Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves

‎In a (t,n)-threshold secret sharing scheme‎, ‎a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together‎, ‎but no group of fewer than t participants can do‎. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao‎, ‎and the intractability of the elliptic curve discrete logar...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Elliptic Curves and Algebraic Topology

Elliptic curves enter algebraic topology through “Elliptic cohomology”–really a family of cohomology theories–and their associated “elliptic genera”. • Arithmetic aspect: Modularity of elliptic genera, The spectrum TMF of “topological modular forms” and the calculation of π∗TMF →MF (Z), Hopkins’s proof of Borcherds’ congruences. • Physical aspect: Witten’s approach to elliptic genera via string...

متن کامل

On Modular Forms and Elliptic Curves over Q(ζ5)

We survey our joint work with Paul Gunnells and Farshid Hajir on a computational investigation of the modularity of elliptic curves over the cyclotomic field Q(ζ5), including the techniques we developed for describing the action of the Hecke operators using Voronoï theory.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012