Downloads: 9 | Views: 355 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Mathematics | Uganda | Volume 10 Issue 9, September 2021 | Popularity: 4.9 / 10
The Birch and Swinnerton-Dyer Conjecture
Adriko Bosco
Abstract: This is one of the most challenging Mathematical problems. The conjecture was chosen as one of the seven millennium prize problems listed by the Clay Mathematics Institute, which has offered a $1, 000, 000 prize for the first correct proof. It is named after Mathematicians Bryan Birch and Peter Swinnerton-Dyer, who developed the conjecture during the first half of the 1960s with the help of machine computation. The conjecture is of great economic importance used in cryptology to develop the passwords in machines used for cash transactions and in the study of planetary motions in physics. The conjecture is in number theory about elliptical curves which are equations where one side you have a quadratic equation in y and the other a cubic equation in x. For example, y? = x? - 2.The challenge is to find numbers (x, y) which solve this equation. Here one could take x = 2 and y = 3.
Keywords: Birch and Swinnerton-Dyer conjecture, Elliptic curve, Boscomplex method, Quadratic equation, Concentric circles
Edition: Volume 10 Issue 9, September 2021
Pages: 1662 - 1692
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Mathematics, India, Volume 3 Issue 6, June 2014
Pages: 587 - 589Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography
Vinod Kumar, Adesh Kumari
Downloads: 118
Research Paper, Mathematics, Mali, Volume 8 Issue 11, November 2019
Pages: 1173 - 1178BLS Curves with Embedding Degrees 9, 15, 21 and 27 against Small-Subgroup Attacks
Mahamadou Abdou Toure, Karim Samake, Sinaly Traore
Downloads: 122
Research Paper, Mathematics, Mali, Volume 8 Issue 11, November 2019
Pages: 1659 - 1666Optimal Ate Pairing on Elliptic Curves with Embedding Degree 21
Mahamadou Abdou TOURE, Karim SAMAKE, Sinaly TRAORE
Downloads: 144 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Mathematics, India, Volume 4 Issue 2, February 2015
Pages: 605 - 608An Identity-Based Secure Authenticated Framework by Using ECC in Cloud Computing
Nasheem Khan, Vinod Kumar, Adesh Kumari