International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 9 | Views: 355 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Mathematics | Uganda | Volume 10 Issue 9, September 2021 | Popularity: 4.9 / 10


     

The Birch and Swinnerton-Dyer Conjecture

Adriko Bosco


Abstract: This is one of the most challenging Mathematical problems. The conjecture was chosen as one of the seven millennium prize problems listed by the Clay Mathematics Institute, which has offered a $1, 000, 000 prize for the first correct proof. It is named after Mathematicians Bryan Birch and Peter Swinnerton-Dyer, who developed the conjecture during the first half of the 1960s with the help of machine computation. The conjecture is of great economic importance used in cryptology to develop the passwords in machines used for cash transactions and in the study of planetary motions in physics. The conjecture is in number theory about elliptical curves which are equations where one side you have a quadratic equation in y and the other a cubic equation in x. For example, y? = x? - 2.The challenge is to find numbers (x, y) which solve this equation. Here one could take x = 2 and y = 3.


Keywords: Birch and Swinnerton-Dyer conjecture, Elliptic curve, Boscomplex method, Quadratic equation, Concentric circles


Edition: Volume 10 Issue 9, September 2021


Pages: 1662 - 1692



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Adriko Bosco, "The Birch and Swinnerton-Dyer Conjecture", International Journal of Science and Research (IJSR), Volume 10 Issue 9, September 2021, pp. 1662-1692, https://www.ijsr.net/getabstract.php?paperid=MR21826001842, DOI: https://www.doi.org/10.21275/MR21826001842



Similar Articles

Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Mathematics, India, Volume 3 Issue 6, June 2014

Pages: 587 - 589

Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography

Vinod Kumar, Adesh Kumari

Share this Article

Downloads: 118

Research Paper, Mathematics, Mali, Volume 8 Issue 11, November 2019

Pages: 1173 - 1178

BLS Curves with Embedding Degrees 9, 15, 21 and 27 against Small-Subgroup Attacks

Mahamadou Abdou Toure, Karim Samake, Sinaly Traore

Share this Article

Downloads: 122

Research Paper, Mathematics, Mali, Volume 8 Issue 11, November 2019

Pages: 1659 - 1666

Optimal Ate Pairing on Elliptic Curves with Embedding Degree 21

Mahamadou Abdou TOURE, Karim SAMAKE, Sinaly TRAORE

Share this Article

Downloads: 144 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Mathematics, India, Volume 4 Issue 2, February 2015

Pages: 605 - 608

An Identity-Based Secure Authenticated Framework by Using ECC in Cloud Computing

Nasheem Khan, Vinod Kumar, Adesh Kumari

Share this Article



Top