Pell’s Equation, Ii
نویسنده
چکیده
In Part I we met Pell’s equation x2−dy2 = 1 for nonsquare positive integers d. We stated Lagrange’s theorem that every Pell equation has a nontrivial solution (an integral solution besides (±1, 0)) and saw what all solutions to Pell’s equation look like if there’s a nontrivial solution. As in Part I, “solution” means integral solution. Here we will prove Lagrange’s theorem in Section 2 and show in Section 3 how to find all the solutions of a generalized Pell equation x2 − dy2 = n. Examples are in Section 4.
منابع مشابه
Polynomial Pell’s Equation
Consider the polynomial Pell’s equation X2 − DY 2 = 1, where D = A2 + 2C is a monic polynomial in Z[x] and degC < degA. Then for A,C ∈ Q[x], degC < 2, and B = A/C ∈ Q[x], a necessary and sufficient condition for the polynomial Pell’s equation to have a nontrivial solution in Z[x] is obtained.
متن کاملApplication of Balancing Numbers in Effectively Solving Generalized Pell’s Equation
Solving a generalized Pell’s equation of the form , basically involves two steps. The first step is to find out the primitive solutions for the same, and the second step is to solve related Pell’s equation ; and combine the two solutions. Therefore it is evident that the number of independent primitive solutions determines the number of independent solution sets. In our work, we have tried to r...
متن کاملMulti-variable Polynomial Solutions to Pell’s Equation and Fundamental Units in Real Quadratic Fields
Solving Pell’s equation is of relevance in finding fundamental units in real quadratic fields and for this reason polynomial solutions are of interest in that they can supply the fundamental units in infinite families of such fields. In this paper an algorithm is described which allows one to construct, for each positive integer n, a finite collection, {Fi}, of multi-variable polynomials (with ...
متن کاملPublic Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library
Protection of data is the utmost thing for any company related to digital information. There are several malicious methods adapted, based on the priority of demand of that piece of information. There are several cryptosystems implementing various algorithms. We are developing a cryptosystem based on Pell’s Equation. RSA algorithm is extensively used in the popular implementations of Public Key ...
متن کاملThe Pell Equation
Leonhard Euler called (1) Pell’s Equation after the English mathematician John Pell (1611-1685). This terminology has persisted to the present day, despite the fact that it is well known to be mistaken: Pell’s only contribution to the subject was the publication of some partial results of Wallis and Brouncker. In fact the correct names are the usual ones: the problem of solving the equation was...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015