Elliptic Curves, Modular Forms, and L-Functions Allison F
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Euler Product Asymptotics on Dirichlet L-Functions 3
EULER PRODUCT ASYMPTOTICS ON DIRICHLET L-FUNCTIONS IKUYA KANEKO Abstract. We derive the asymptotic behaviour of partial Euler products for Dirichlet L-functions L(s,χ) in the critical strip upon assuming only the Generalised Riemann Hypothesis (GRH). Capturing the behaviour of the partial Euler products on the critical line is called the Deep Riemann Hypothesis (DRH) on the ground of its importance. Our result manifests the positional relation of the GRH and DRH. If χ is a non-principal character, we observe the √2 phenomenon, which asserts that the extra factor √2 emerges in the Euler product asymptotics on the central point s = 1/2. We also establish the connection between the behaviour of the partial Euler products and the size of the remainder term in the prime number theorem for arithmetic progressions. Contents 1. Introduction 1 2. Prelude to the asymptotics 5 3. Partial Euler products for Dirichlet L-functions 6 4. Logarithmical approach to Euler products 7 5. Observing the size of E(x; q,a) 8 6. Appendix 9 Acknowledgement 11 References 12 1. Introduction This paper was motivated by the beautiful and profound work of Ramanujan on asymptotics for the partial Euler product of the classical Riemann zeta function ζ(s). We handle the family of Dirichlet L-functions ∞ L(s,χ)= χ(n)n−s = (1 χ(p)p−s)−1 with s> 1, − ℜ 1 p X Y arXiv:1902.04203v1 [math.NT] 12 Feb 2019 and prove the asymptotic behaviour of partial Euler products (1.1) (1 χ(p)p−s)−1 − 6 pYx in the critical strip 0 < s < 1, assuming the Generalised Riemann Hypothesis (GRH) for this family. -
Generalization of a Theorem of Hurwitz
J. Ramanujan Math. Soc. 31, No.3 (2016) 215–226 Generalization of a theorem of Hurwitz Jung-Jo Lee1,∗ ,M.RamMurty2,† and Donghoon Park3,‡ 1Department of Mathematics, Kyungpook National University, Daegu 702-701, South Korea e-mail: [email protected] 2Department of Mathematics and Statistics, Queen’s University, Kingston, Ontario, K7L 3N6, Canada e-mail: [email protected] 3Department of Mathematics, Yonsei University, 50 Yonsei-Ro, Seodaemun-Gu, Seoul 120-749, South Korea e-mail: [email protected] Communicated by: R. Sujatha Received: February 10, 2015 Abstract. This paper is an exposition of several classical results formulated and unified using more modern terminology. We generalize a classical theorem of Hurwitz and prove the following: let 1 G (z) = k (mz + n)k m,n be the Eisenstein series of weight k attached to the full modular group. Let z be a CM point in the upper half-plane. Then there is a transcendental number z such that ( ) = 2k · ( ). G2k z z an algebraic number Moreover, z can be viewed as a fundamental period of a CM elliptic curve defined over the field of algebraic numbers. More generally, given any modular form f of weight k for the full modular group, and with ( )π k /k algebraic Fourier coefficients, we prove that f z z is algebraic for any CM point z lying in the upper half-plane. We also prove that for any σ Q Q ( ( )π k /k)σ = σ ( )π k /k automorphism of Gal( / ), f z z f z z . 2010 Mathematics Subject Classification: 11J81, 11G15, 11R42. -
Examples from Complex Geometry
Examples from Complex Geometry Sam Auyeung November 22, 2019 1 Complex Analysis Example 1.1. Two Heuristic \Proofs" of the Fundamental Theorem of Algebra: Let p(z) be a polynomial of degree n > 0; we can even assume it is a monomial. We also know that the number of zeros is at most n. We show that there are exactly n. 1. Proof 1: Recall that polynomials are entire functions and that Liouville's Theorem says that a bounded entire function is in fact constant. Suppose that p has no roots. Then 1=p is an entire function and it is bounded. Thus, it is constant which means p is a constant polynomial and has degree 0. This contradicts the fact that p has positive degree. Thus, p must have a root α1. We can then factor out (z − α1) from p(z) = (z − α1)q(z) where q(z) is an (n − 1)-degree polynomial. We may repeat the above process until we have a full factorization of p. 2. Proof 2: On the real line, an algorithm for finding a root of a continuous function is to look for when the function changes signs. How do we generalize this to C? Instead of having two directions, we have a whole S1 worth of directions. If we use colors to depict direction and brightness to depict magnitude, we can plot a graph of a continuous function f : C ! C. Near a zero, we'll see all colors represented. If we travel in a loop around any point, we can keep track of whether it passes through all the colors; around a zero, we'll pass through all the colors, possibly many times. -
Of the Riemann Hypothesis
A Simple Counterexample to Havil's \Reformulation" of the Riemann Hypothesis Jonathan Sondow 209 West 97th Street New York, NY 10025 [email protected] The Riemann Hypothesis (RH) is \the greatest mystery in mathematics" [3]. It is a conjecture about the Riemann zeta function. The zeta function allows us to pass from knowledge of the integers to knowledge of the primes. In his book Gamma: Exploring Euler's Constant [4, p. 207], Julian Havil claims that the following is \a tantalizingly simple reformulation of the Rie- mann Hypothesis." Havil's Conjecture. If 1 1 X (−1)n X (−1)n cos(b ln n) = 0 and sin(b ln n) = 0 na na n=1 n=1 for some pair of real numbers a and b, then a = 1=2. In this note, we first state the RH and explain its connection with Havil's Conjecture. Then we show that the pair of real numbers a = 1 and b = 2π=ln 2 is a counterexample to Havil's Conjecture, but not to the RH. Finally, we prove that Havil's Conjecture becomes a true reformulation of the RH if his conclusion \then a = 1=2" is weakened to \then a = 1=2 or a = 1." The Riemann Hypothesis In 1859 Riemann published a short paper On the number of primes less than a given quantity [6], his only one on number theory. Writing s for a complex variable, he assumes initially that its real 1 part <(s) is greater than 1, and he begins with Euler's product-sum formula 1 Y 1 X 1 = (<(s) > 1): 1 ns p 1 − n=1 ps Here the product is over all primes p. -
A Review on Elliptic Curve Cryptography for Embedded Systems
International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011 A REVIEW ON ELLIPTIC CURVE CRYPTOGRAPHY FOR EMBEDDED SYSTEMS Rahat Afreen 1 and S.C. Mehrotra 2 1Tom Patrick Institute of Computer & I.T, Dr. Rafiq Zakaria Campus, Rauza Bagh, Aurangabad. (Maharashtra) INDIA [email protected] 2Department of C.S. & I.T., Dr. B.A.M. University, Aurangabad. (Maharashtra) INDIA [email protected] ABSTRACT Importance of Elliptic Curves in Cryptography was independently proposed by Neal Koblitz and Victor Miller in 1985.Since then, Elliptic curve cryptography or ECC has evolved as a vast field for public key cryptography (PKC) systems. In PKC system, we use separate keys to encode and decode the data. Since one of the keys is distributed publicly in PKC systems, the strength of security depends on large key size. The mathematical problems of prime factorization and discrete logarithm are previously used in PKC systems. ECC has proved to provide same level of security with relatively small key sizes. The research in the field of ECC is mostly focused on its implementation on application specific systems. Such systems have restricted resources like storage, processing speed and domain specific CPU architecture. KEYWORDS Elliptic curve cryptography Public Key Cryptography, embedded systems, Elliptic Curve Digital Signature Algorithm ( ECDSA), Elliptic Curve Diffie Hellman Key Exchange (ECDH) 1. INTRODUCTION The changing global scenario shows an elegant merging of computing and communication in such a way that computers with wired communication are being rapidly replaced to smaller handheld embedded computers using wireless communication in almost every field. This has increased data privacy and security requirements. -
Contents 5 Elliptic Curves in Cryptography
Cryptography (part 5): Elliptic Curves in Cryptography (by Evan Dummit, 2016, v. 1.00) Contents 5 Elliptic Curves in Cryptography 1 5.1 Elliptic Curves and the Addition Law . 1 5.1.1 Cubic Curves, Weierstrass Form, Singular and Nonsingular Curves . 1 5.1.2 The Addition Law . 3 5.1.3 Elliptic Curves Modulo p, Orders of Points . 7 5.2 Factorization with Elliptic Curves . 10 5.3 Elliptic Curve Cryptography . 14 5.3.1 Encoding Plaintexts on Elliptic Curves, Quadratic Residues . 14 5.3.2 Public-Key Encryption with Elliptic Curves . 17 5.3.3 Key Exchange and Digital Signatures with Elliptic Curves . 20 5 Elliptic Curves in Cryptography In this chapter, we will introduce elliptic curves and describe how they are used in cryptography. Elliptic curves have a long and interesting history and arise in a wide range of contexts in mathematics. The study of elliptic curves involves elements from most of the major disciplines of mathematics: algebra, geometry, analysis, number theory, topology, and even logic. Elliptic curves appear in the proofs of many deep results in mathematics: for example, they are a central ingredient in the proof of Fermat's Last Theorem, which states that there are no positive integer solutions to the equation xn + yn = zn for any integer n ≥ 3. Our goals are fairly modest in comparison, so we will begin by outlining the basic algebraic and geometric properties of elliptic curves and motivate the addition law. We will then study the behavior of elliptic curves modulo p: ultimately, there is a fairly strong analogy between the structure of the points on an elliptic curve modulo p and the integers modulo n. -
An Efficient Approach to Point-Counting on Elliptic Curves
mathematics Article An Efficient Approach to Point-Counting on Elliptic Curves from a Prominent Family over the Prime Field Fp Yuri Borissov * and Miroslav Markov Department of Mathematical Foundations of Informatics, Institute of Mathematics and Informatics, Bulgarian Academy of Sciences, 1113 Sofia, Bulgaria; [email protected] * Correspondence: [email protected] Abstract: Here, we elaborate an approach for determining the number of points on elliptic curves 2 3 from the family Ep = fEa : y = x + a (mod p), a 6= 0g, where p is a prime number >3. The essence of this approach consists in combining the well-known Hasse bound with an explicit formula for the quantities of interest-reduced modulo p. It allows to advance an efficient technique to compute the 2 six cardinalities associated with the family Ep, for p ≡ 1 (mod 3), whose complexity is O˜ (log p), thus improving the best-known algorithmic solution with almost an order of magnitude. Keywords: elliptic curve over Fp; Hasse bound; high-order residue modulo prime 1. Introduction The elliptic curves over finite fields play an important role in modern cryptography. We refer to [1] for an introduction concerning their cryptographic significance (see, as well, Citation: Borissov, Y.; Markov, M. An the pioneering works of V. Miller and N. Koblitz from 1980’s [2,3]). Briefly speaking, the Efficient Approach to Point-Counting advantage of the so-called elliptic curve cryptography (ECC) over the non-ECC is that it on Elliptic Curves from a Prominent requires smaller keys to provide the same level of security. Family over the Prime Field Fp. -
The Mobius Function and Mobius Inversion
Ursinus College Digital Commons @ Ursinus College Transforming Instruction in Undergraduate Number Theory Mathematics via Primary Historical Sources (TRIUMPHS) Winter 2020 The Mobius Function and Mobius Inversion Carl Lienert Follow this and additional works at: https://digitalcommons.ursinus.edu/triumphs_number Part of the Curriculum and Instruction Commons, Educational Methods Commons, Higher Education Commons, Number Theory Commons, and the Science and Mathematics Education Commons Click here to let us know how access to this document benefits ou.y Recommended Citation Lienert, Carl, "The Mobius Function and Mobius Inversion" (2020). Number Theory. 12. https://digitalcommons.ursinus.edu/triumphs_number/12 This Course Materials is brought to you for free and open access by the Transforming Instruction in Undergraduate Mathematics via Primary Historical Sources (TRIUMPHS) at Digital Commons @ Ursinus College. It has been accepted for inclusion in Number Theory by an authorized administrator of Digital Commons @ Ursinus College. For more information, please contact [email protected]. The Möbius Function and Möbius Inversion Carl Lienert∗ January 16, 2021 August Ferdinand Möbius (1790–1868) is perhaps most well known for the one-sided Möbius strip and, in geometry and complex analysis, for the Möbius transformation. In number theory, Möbius’ name can be seen in the important technique of Möbius inversion, which utilizes the important Möbius function. In this PSP we’ll study the problem that led Möbius to consider and analyze the Möbius function. Then, we’ll see how other mathematicians, Dedekind, Laguerre, Mertens, and Bell, used the Möbius function to solve a different inversion problem.1 Finally, we’ll use Möbius inversion to solve a problem concerning Euler’s totient function. -
Prime Factorization, Zeta Function, Euler Product
Analytic Number Theory, undergrad, Courant Institute, Spring 2017 http://www.math.nyu.edu/faculty/goodman/teaching/NumberTheory2017/index.html Section 2, Euler products version 1.2 (latest revision February 8, 2017) 1 Introduction. This section serves two purposes. One is to cover the Euler product formula for the zeta function and prove the fact that X p−1 = 1 : (1) p The other is to develop skill and tricks that justify the calculations involved. The zeta function is the sum 1 X ζ(s) = n−s : (2) 1 We will show that the sum converges as long as s > 1. The Euler product formula is Y −1 ζ(s) = 1 − p−s : (3) p This formula expresses the fact that every positive integers has a unique rep- resentation as a product of primes. We will define the infinite product, prove that this one converges for s > 1, and prove that the infinite sum is equal to the infinite product if s > 1. The derivative of the zeta function is 1 X ζ0(s) = − log(n) n−s : (4) 1 This formula is derived by differentiating each term in (2), as you would do for a finite sum. We will prove that this calculation is valid for the zeta sum, for s > 1. We also can differentiate the product (3) using the Leibnitz rule as 1 though it were a finite product. In the following calculation, r is another prime: 8 9 X < d −1 X −1= ζ0(s) = 1 − p−s 1 − r−s ds p : r6=p ; 8 9 X <h −2i X −1= = − log(p)p−s 1 − p−s 1 − r−s p : r6=p ; ( ) X −1 = − log(p) p−s 1 − p−s ζ(s) p ( 1 !) X X ζ0(s) = − log(p) p−ks ζ(s) : (5) p 1 If we divide by ζ(s), the sum on the right is a sum over prime powers (numbers n that have a single p in their prime factorization). -
4 L-Functions
Further Number Theory G13FNT cw ’11 4 L-functions In this chapter, we will use analytic tools to study prime numbers. We first start by giving a new proof that there are infinitely many primes and explain what one can say about exactly “how many primes there are”. Then we will use the same tools to proof Dirichlet’s theorem on primes in arithmetic progressions. 4.1 Riemann’s zeta-function and its behaviour at s = 1 Definition. The Riemann zeta function ζ(s) is defined by X 1 1 1 1 1 ζ(s) = = + + + + ··· . ns 1s 2s 3s 4s n>1 The series converges (absolutely) for all s > 1. Remark. The series also converges for complex s provided that Re(s) > 1. 2 4 P 1 Example. From the last chapter, ζ(2) = π /6, ζ(4) = π /90. But ζ(1) is not defined since n diverges. However we can still describe the behaviour of ζ(s) as s & 1 (which is my notation for s → 1+, i.e. s > 1 and s → 1). Proposition 4.1. lim (s − 1) · ζ(s) = 1. s&1 −s R n+1 1 −s Proof. Summing the inequality (n + 1) < n xs dx < n for n > 1 gives Z ∞ 1 1 ζ(s) − 1 < s dx = < ζ(s) 1 x s − 1 and hence 1 < (s − 1)ζ(s) < s; now let s & 1. Corollary 4.2. log ζ(s) lim = 1. s&1 1 log s−1 Proof. Write log ζ(s) log(s − 1)ζ(s) 1 = 1 + 1 log s−1 log s−1 and let s & 1. -
Riemann Hypothesis and Random Walks: the Zeta Case
Riemann Hypothesis and Random Walks: the Zeta case Andr´e LeClaira Cornell University, Physics Department, Ithaca, NY 14850 Abstract In previous work it was shown that if certain series based on sums over primes of non-principal Dirichlet characters have a conjectured random walk behavior, then the Euler product formula for 1 its L-function is valid to the right of the critical line <(s) > 2 , and the Riemann Hypothesis for this class of L-functions follows. Building on this work, here we propose how to extend this line of reasoning to the Riemann zeta function and other principal Dirichlet L-functions. We apply these results to the study of the argument of the zeta function. In another application, we define and study a 1-point correlation function of the Riemann zeros, which leads to the construction of a probabilistic model for them. Based on these results we describe a new algorithm for computing very high Riemann zeros, and we calculate the googol-th zero, namely 10100-th zero to over 100 digits, far beyond what is currently known. arXiv:1601.00914v3 [math.NT] 23 May 2017 a [email protected] 1 I. INTRODUCTION There are many generalizations of Riemann's zeta function to other Dirichlet series, which are also believed to satisfy a Riemann Hypothesis. A common opinion, based largely on counterexamples, is that the L-functions for which the Riemann Hypothesis is true enjoy both an Euler product formula and a functional equation. However a direct connection between these properties and the Riemann Hypothesis has not been formulated in a precise manner. -
Congruences Between Modular Forms
CONGRUENCES BETWEEN MODULAR FORMS FRANK CALEGARI Contents 1. Basics 1 1.1. Introduction 1 1.2. What is a modular form? 4 1.3. The q-expansion priniciple 14 1.4. Hecke operators 14 1.5. The Frobenius morphism 18 1.6. The Hasse invariant 18 1.7. The Cartier operator on curves 19 1.8. Lifting the Hasse invariant 20 2. p-adic modular forms 20 2.1. p-adic modular forms: The Serre approach 20 2.2. The ordinary projection 24 2.3. Why p-adic modular forms are not good enough 25 3. The canonical subgroup 26 3.1. Canonical subgroups for general p 28 3.2. The curves Xrig[r] 29 3.3. The reason everything works 31 3.4. Overconvergent p-adic modular forms 33 3.5. Compact operators and spectral expansions 33 3.6. Classical Forms 35 3.7. The characteristic power series 36 3.8. The Spectral conjecture 36 3.9. The invariant pairing 38 3.10. A special case of the spectral conjecture 39 3.11. Some heuristics 40 4. Examples 41 4.1. An example: N = 1 and p = 2; the Watson approach 41 4.2. An example: N = 1 and p = 2; the Coleman approach 42 4.3. An example: the coefficients of c(n) modulo powers of p 43 4.4. An example: convergence slower than O(pn) 44 4.5. Forms of half integral weight 45 4.6. An example: congruences for p(n) modulo powers of p 45 4.7. An example: congruences for the partition function modulo powers of 5 47 4.8.