Results 1 to 10 of about 130 (32)
Non‐vanishing theorems for central L‐values of some elliptic curves with complex multiplication
Abstract The paper uses Iwasawa theory at the prime p=2 to prove non‐vanishing theorems for the value at s=1 of the complex L‐series of certain quadratic twists of the Gross family of elliptic curves with complex multiplication by the field K=Q(−q), where q is any prime ≡7mod8.
John Coates, Yongxiong Li
wiley +1 more source
L‐equivalence for degree five elliptic curves, elliptic fibrations and K3 surfaces
Abstract We construct non‐trivial L‐equivalence between curves of genus one and degree five, and between elliptic surfaces of multisection index five. These results give the first examples of L‐equivalence for curves (necessarily over non‐algebraically closed fields) and provide a new bit of evidence for the conjectural relationship between L ...
Evgeny Shinder, Ziyu Zhang
wiley +1 more source
Abstract Recently, there has been much interest in studying the torsion subgroups of elliptic curves base‐extended to infinite extensions of Q. In this paper, given a finite group G, we study what happens with the torsion of an elliptic curve E over Q when changing base to the compositum of all number fields with Galois group G.
Harris B. Daniels+2 more
wiley +1 more source
Genetic snapshots of the Rhizobium species NGR234 genome. [PDF]
Viprey V+3 more
europepmc +1 more source
Tate module and bad reduction [PDF]
Let C/K be a curve over a local field. We study the natural semilinear action of Galois on the minimal regular model of C over a field F where it becomes semistable.
Dokchitser, Tim+2 more
core +3 more sources
On the distribution of Atkin and Elkies primes for reductions of elliptic curves on average [PDF]
For an elliptic curve E/Q without complex multiplication we study the distribution of Atkin and Elkies primes l, on average, over all good reductions of E modulo primes p.
Andrew+2 more
core +1 more source
AN IDENTITY-BASED ENCRYPTION SCHEME USING ISOGENY OF ELLIPTIC CURVES [PDF]
Identity-Based Encryption is a public key cryptosystem that uses the receiver identifier information such as email address, IP address, name and etc, to compute a public and a private key in a cryptosystem and encrypt a message.
Bahramian, Mojtaba, Hajirezaei, Elham
core +1 more source
Supercongruences and Complex Multiplication [PDF]
We study congruences involving truncated hypergeometric series of the form_rF_{r-1}(1/2,...,1/2;1,...,1;\lambda)_{(mp^s-1)/2} = \sum_{k=0}^{(mp^s-1)/2} ((1/2)_k/k!)^r \lambda^k where p is a prime and m, s, r are positive integers.
Kibelbek, Jonas+4 more
core +1 more source
The difference between the ordinary height and the canonical height on elliptic curves [PDF]
We estimate the bounds for the difference between the ordinary height and the canonical height on elliptic curves over number fields. Our result is an improvement of the recent result of Cremona, Prickett, and Siksek [J.E. Cremona, M. Prickett, S. Siksek,
Uchida, Yukihiro
core +1 more source
On Types of Elliptic Pseudoprimes
We generalize the notions of elliptic pseudoprimes and elliptic Carmichael numbers introduced by Silverman to analogues of Euler-Jacobi and strong pseudoprimes.
Babinkostova, L.+2 more
core +1 more source