Cryptography Reference
In-Depth Information
(b) Suppose t ( x 0 ) = 0. Use the facts that x 3 + Ax + B has no multiple
roots and all roots of t 2 are multiple roots to show that q ( x 0 )=0.
This shows that if q ( x 0 )
=0then α ( x 0 ,y 0 ) is defined.
2.20 Consider the singular curve y 2 = x 3 + ax 2 with a =0. Let y = mx
be a line through (0 , 0). Show that the line always intersects the curve
to order at least 2, and show that the order is 3 exactly w hen m 2 = a .
This may be interpreted as saying that the lines y = ± ax are the two
tangents to the curve at (0 , 0).
(a) Apply the method of Section 2.5.4 to the circle u 2 + v 2
2.21
=1and
the point (
1 , 0) to obtain the parameterization
u = 1 t 2
2 t
1+ t 2 .
1+ t 2 ,
v =
(b) Suppose x, y, z are integers such that x 2 + y 2 = z 2 ,gcd( x, y, z )=1,
and x is even. Use (a) to show that there are integers m, n such
that
y = m 2
− n 2 ,
z = m 2 + n 2 .
x =2 mn,
Also, show that gcd( x, y, z ) = 1 implies that gcd( m, n )=1and
that m ≡ n (mod 2).
2.22 Let p ( x )and q ( x ) be polynomials with no common roots. Show that
p ( x )
q ( x )
=0
d
dx
(that is, the identically 0 rational function) if and only if both p ( x )=0
and q ( x )=0. (If p or q is nonconstant, then this can happen only in
positive characteristic.)
2.23 Let E be given by y 2 = x 3 + Ax + B over a field K and let d
K × .The
twist of E by d is the elliptic curve E ( d ) given by y 2 = x 3 + Ad 2 x + Bd 3 .
(a) Show that j ( E ( d ) )= j ( E ).
(b) Show that E ( d ) can be transformed into E over K ( d ).
(c) Show that E ( d )
can be transformed over K to the form dy 1
=
x 1 + Ax 1 + B .
2.24 Let α, β
Z be such that gcd( α, β ) = 1. Assume that α
≡−
1(mod4)
0 (mod 32). Let E be given by y 2 = x ( x
and β
α )( x
β ).
(a) Let p be prime. Show that the cubic polynomial x ( x − α )( x − β )
cannot have a triple root mod p .
 
Search WWH ::




Custom Search