Preprint
Article

This version is not peer-reviewed.

Geometric Constraints and Combinatorial Complexity in the Toroidal N-Queens Problem: Part II

Submitted:

13 May 2025

Posted:

14 May 2025

You are already at the latest version

Abstract
The toroidal N-Queens problem imposes modular constraints on queen placements, modeled as a simplicial complex XN where edges encode conflict-free pairs and simplices represent consistent configurations. We prove solutions exist if and only if gcd(N, 6) = 1, leveraging modular arithmetic and toroidal symmetries. Topological obstructions, analyzed via cohomology, limit global solutions for composite N, while elliptic curve embeddings reveal geometric structure. The solution space TN grows exponentially (|T5| = 10, |T7| = 28), challenging enumeration for N > 200 due to the torus’s periodic constraints. An energy function ε(π) identifies hyperstable solutions as isolated minima, offering insights into combinatorial complexity and high-dimensional discrete optimization.
Keywords: 
;  ;  ;  ;  ;  ;  

1. Introduction

The toroidal N-Queens problem extends the classic combinatorial puzzle by introducing modular arithmetic constraints on an N × N board. This article, as Part II, builds on Part I [21] by exploring geometric constraints and combinatorial complexity, including simplicial complexes, cohomology, elliptic curve embeddings, and energy-based stability analyses. We address the structural properties arising from the torus’s periodic symmetries, with implications for discrete optimization.

1.1. Historical Context and Motivation

The N-Queens problem, a cornerstone of combinatorial mathematics since its inception in the 19th century, challenges us to place N queens on an N × N chessboard such that no two queens attack each other along rows, columns, or diagonals [2]. This problem has served as a benchmark for algorithmic efficiency, constraint satisfaction, and combinatorial enumeration [2,15]. However, the classical formulation, while rich, overlooks the structural richness introduced by periodic boundary conditions, as in the toroidal N-Queens problem. In this variant, the board is modeled as a torus ( Z / N Z ) 2 , where diagonals wrap around modulo N, introducing complex modular constraints that reveal deep connections to number theory, algebraic topology, and geometry [13].
The toroidal N-Queens problem is not merely a mathematical curiosity; it has applications in coding theory, cryptography, and periodic systems, where modular symmetries model real-world constraints [27]. By reformulating this problem through modern mathematical lenses, we uncover structural properties that transcend traditional combinatorial approaches, offering new tools for constraint-based problems. This work (Part II) builds on the dynamic and ergodic analyses of Part I [21], which provides permutation-based optimization techniques that inform our topological and algebraic perspectives.

1.2. Objectives and Methodological Approach

This article aims to reimagine the toroidal N-Queens problem as a nexus of three mathematical domains: number theory, algebraic topology, and arithmetic geometry. Our objectives are threefold:
(1)
To establish precise existence conditions for toroidal solutions, leveraging modular orthomorphisms and number-theoretic constraints (Section 4).
(2)
To reformulate the problem topologically, modeling the board as a simplicial complex X N and analyzing solutions via cohomological obstructions (Section 5).
(3)
To embed solutions in algebraic structures, mapping configurations to elliptic curves and defining a modular variety V N that encodes stability properties (Section 6 and Section 7).
We introduce an energy function E ( π ) to quantify stability, providing a bridge to dynamic analyses in Part I [21]. Our approach synthesizes these disciplines to reveal the problem’s hidden structure, setting the stage for multidimensional generalizations where boards extend to ( Z / N Z ) d .
Our work extends Hsiang’s foundational result by introducing novel topological and algebraic perspectives, as summarized in Table 1.
Figure 1. (a) A subset of the simplicial complex X 5 , showing vertices ( i , a ) and edges for the solution π = ( 2 , 4 , 1 , 5 , 3 ) . The connected cycle indicates a global section. (b) The 5 × 5 toroidal board as a 2D grid ( Z / 5 Z ) 2 , with queen placements ( i , π ( i ) ) marked. Dashed edges suggest modular wrap-around.
Figure 1. (a) A subset of the simplicial complex X 5 , showing vertices ( i , a ) and edges for the solution π = ( 2 , 4 , 1 , 5 , 3 ) . The connected cycle indicates a global section. (b) The 5 × 5 toroidal board as a 2D grid ( Z / 5 Z ) 2 , with queen placements ( i , π ( i ) ) marked. Dashed edges suggest modular wrap-around.
Preprints 159349 g001

1.3. Structure of the Article

This article is organized into eight sections, each designed to be self-contained yet interconnected:
  • Section 2 surveys prior work, positioning our interdisciplinary approach against combinatorial, stochastic, and algebraic studies.
  • Section 3 defines notations and foundational concepts, such as the simplicial complex X N and energy function E ( π ) .
  • Section 4 to Section 7 present our technical contributions, from existence conditions to topological and algebraic reformulations.
  • Section 8 summarizes our findings and outlines future directions, including dynamic and multidimensional extensions.
  • An appendix provides formal proofs and computational examples, such as Table A1.
Our contributions are original, building on foundational works like [12,13,23] without reproducing their results, ensuring academic integrity.
Transition: To contextualize our novel contributions, we first review the theoretical landscape in Section 2, highlighting the gaps our work addresses.

2. Related Work and Theoretical Foundations

The N-Queens problem, a classic challenge in combinatorial mathematics, seeks to place N queens on an N × N chessboard without mutual attacks along rows, columns, or diagonals [2]. The toroidal variant, where the board is modeled as a torus ( Z / N Z ) 2 , introduces modular diagonal constraints, revealing connections to number theory, topology, and algebraic geometry [13]. This section surveys prior work across six thematic areas, critically evaluating 24 references to highlight their contributions, limitations, and relationships to each other and our results. We position our work as a unified framework that synthesizes these disciplines, addressing gaps in prior studies and setting the stage for dynamic and multidimensional extensions in Part I [21].

2.1. Enumerative Combinatorics

Enumerative combinatorics has long provided tools for counting N-Queens solutions. Early works by [2] explored combinatorial puzzles using arithmetic methods, laying the groundwork for permutation-based analyses. [19] advanced this field with generating functions and group actions, offering recursive techniques to count classical solutions, but both ignored toroidal constraints. Compared to [2]’s ad hoc approach, [19] introduced symmetry via the symmetric group S N , a concept we extend to modular symmetries in Section 3. Later, [25] refined these methods with algebraic combinatorics, providing generating function frameworks, while [15] developed backtracking algorithms for classical boards. [2] surveyed these approaches, cataloging solution counts (e.g., via [24]), but all three neglected the modular constraints central to our toroidal variety V N (Section 7). These works inform our enumeration of T N (Section 5) but lack the geometric insight we provide.

2.2. Stochastic and Ergodic Models

Probabilistic approaches have modeled N-Queens solution spaces as random processes. [1] used Markov chains to estimate solution counts via Monte Carlo methods, focusing on classical boards, while [8] analyzed permutation spaces as ergodic systems, studying mixing times. Unlike [1]’s statistical focus, [8] offered theoretical insights into state transitions, but both lack determinism and fail to address toroidal symmetries. These stochastic models contrast with our deterministic energy function E ( π ) (Section 7), which quantifies stability without randomization. While their probabilistic tools are orthogonal to our algebraic approach, they inspire the dynamic analyses in Part I [21], which explores attractors and convergence.

2.3. Toroidal Variants

The toroidal N-Queens problem, with its periodic boundary conditions, has received less attention. [13] established the landmark condition gcd ( N , 6 ) = 1 for the existence of toroidal solutions T N , a result central to Section 4. This number-theoretic approach, building on modular orthomorphisms [11], contrasts with [20]’s combinatorial enumeration of modular permutations, which extended [13] numerically but offered limited structural insight. Neither work explores topological or algebraic properties, unlike our simplicial complex X N (Section 5) and variety V N (Section 7). By integrating [13]’s arithmetic with topological tools, we address these gaps, providing a richer framework.

2.4. Topological and Algebraic Approaches

Topological and algebraic methods offer powerful tools for reformulating combinatorial problems. [12] provides a comprehensive framework for algebraic topology, which we adapt to model the chessboard as a simplicial complex X N (Section 5), using cohomology to detect solution obstructions. [22] on group representations informs our analysis of permutation symmetries (Section 3), complementing [12]’s focus on cycles. In algebraic geometry, [23] and [14] provide the arithmetic foundation for our elliptic curve embeddings (Section 6). While [23] emphasizes general elliptic curves, [14] focuses on modular rings, directly supporting our mappings over Z / N Z . These works, though not puzzle-specific, enable our novel reformulations, unlike the combinatorial focus of [25] or [15].

2.5. Graph-Theoretic Models

Graph theory has been applied to model N-Queens constraints, but with limitations for toroidal cases. [10] and [4] use algebraic graph theory to analyze constraint graphs, informing our variety V N (Section 7), but their planar focus fails to capture modular diagonals. [9], [26], and [29] emphasize connectivity and structure, supporting our simplicial complex construction (Section 5), yet they lack mechanisms for modular constraints. [5] and [7] explore adjacency matrices for classical layouts, but their acyclic assumptions collapse under toroidal periodicity. Compared to [10]’s algebraic approach, [9] is more topological, but neither addresses the periodic symmetries we model, highlighting the need for our integrated framework.

2.6. Combinatorial Systems and Finite Geometry

Finite field techniques provide tools for modular analyses. [27] develops residue systems and combinatorial designs, supporting our modular orthomorphisms (Section 4) and multidimensional generalizations (Section 8). [3] explores permutation groups, complementing [27] with group-theoretic insights into S N , while [6] offers algorithmic perspectives on combinatorial structures. These works underpin our use of Z / N Z and anticipate Part I’s d-dimensional boards [21]. However, their focus on finite fields lacks the topological depth of [12] or the geometric insight of [23], necessitating our synthesis.

2.7. Additional Combinatorial Works

Other works provide supplementary context. [24] catalogs classical solution counts, serving as a reference but lacking analytical depth. [28] and [27] offer introductory graph and combinatorial frameworks, overlapping with [5] but less focused on puzzles. These works, while foundational, are less directly relevant than [13] or [23], as they do not address toroidal constraints or algebraic structures.

2.8. Positioning Our Work

Our work stands at the intersection of enumerative combinatorics, cohomological topology, and arithmetic geometry, offering a unified framework absent in prior studies. Unlike [2] or [15]’s classical focus, we address toroidal constraints, extending [13]’s number-theoretic results with topological insights from [12] (Section 5). Our elliptic curve embeddings (Section 6), inspired by [23], go beyond [20]’s combinatorial approach, while our variety V N and energy function E ( π ) (Section 7) provide a geometric and stability perspective missing in [10] or [8]. By synthesizing these disciplines, we not only characterize toroidal solutions T N but also lay the groundwork for dynamic and multidimensional analyses in Part I [21], addressing gaps in prior work and opening new research avenues.
Transition: Having surveyed the theoretical landscape, we now formalize the notations and concepts underpinning our contributions in Section 3.

3. Mathematical Preliminaries and Notations

To address the toroidal N-Queens problem, where queens are placed on an N × N board modeled as a torus ( Z / N Z ) 2 , we require a robust mathematical framework that bridges combinatorics, topology, and algebraic geometry. This section establishes the notations, symbols, and foundational definitions underpinning our contributions, from existence conditions (Section 4) to topological reformulations (Section 5), elliptic embeddings (Section 6), and stability analyses (Section 7). Each concept is contextualized to highlight its role in our interdisciplinary approach, formally defined, and exemplified to ensure clarity. These preliminaries also lay the groundwork for dynamic and multidimensional extensions in Part I [21].

3.1. Basic Notations

We begin by defining the core mathematical objects used throughout the article, ensuring consistency across combinatorial, topological, and geometric analyses.
  • N = { 1 , 2 , 3 , } : The set of positive integers.
  • [ N ] = { 1 , 2 , , N } : The index set for an N × N board, for any N N .
  • Z / N Z = { 0 , 1 , , N 1 } : The ring of integers modulo N, modeling the toroidal board’s periodicity.
  • S N : The symmetric group of all permutations on [ N ] , representing queen configurations.
  • T N S N : The set of toroidal solutions, defined in Section 4 as conflict-free permutations.
  • gcd ( a , b ) : The greatest common divisor of integers a , b , critical for existence conditions (Section 4).
Remark 3.1.
The choice of [ N ] = { 1 , 2 , , N } aligns with combinatorial indexing, while Z / N Z = { 0 , 1 , , N 1 } reflects modular arithmetic conventions. These notations unify our analyses across Section 4, Section 5, Section 6 and Section 7.
Transition: With notations established, we now model board configurations as permutations, a cornerstone of our framework.

3.2. Board Configurations as Permutations

A configuration of N queens on an N × N board is represented by a permutation π S N , where the queen in column i occupies row π ( i ) . This approach, rooted in classical N-Queens studies [15], extends naturally to toroidal boards by incorporating modular constraints.
Definition 3.2
(Classical and Toroidal Conflicts). A pair of queens at positions ( i , π ( i ) ) and ( j , π ( j ) ) , with i j , is in:
  • Classical diagonal conflict if | π ( i ) π ( j ) | = | i j | .
  • Toroidal conflict if π ( j ) π ( i ) ± ( j i ) ( mod N ) .
A configuration π is toroidal conflict-free if it avoids both classical row/column conflicts (via bijectivity of π) and toroidal diagonal conflicts.
Example 3.3.
For N = 5 , the permutation π = ( 1 , 3 , 5 , 2 , 4 ) (i.e., queens at ( 1 , 1 ) , ( 2 , 3 ) , ( 3 , 5 ) , ( 4 , 2 ) , ( 5 , 4 ) ) is checked for toroidal conflicts. For i = 1 , j = 2 , we compute π ( 2 ) π ( 1 ) = 3 1 = 2 ± ( 2 1 ) = ± 1 ( mod 5 ) , indicating no conflict. Note that π ( 3 ) = 5 0 ( mod 5 ) , aligning with toroidal periodicity. Similar checks confirm π T N , as shown in Figure 1.
Remark 3.4.
Classical conflicts rely on absolute differences, while toroidal conflicts model periodic diagonals via modular arithmetic, a key distinction driving our existence conditions in Section 4.

3.3. Energy Function

To analyze the stability of configurations, particularly in the context of hyperstability (Section 7), we define an energy function that measures toroidal conflicts.
Definition 3.5
(Energy Function). For a permutation π S N , the energy function is:
E ( π ) = # { ( i , j ) : 1 i < j N , π ( j ) π ( i ) ± ( j i ) ( mod N ) } .
Example 3.6.
For N = 5 , consider π = ( 1 , 3 , 5 , 2 , 4 ) , a toroidal solution (Section 4). Checking all pairs ( i , j ) , no pair satisfies π ( j ) π ( i ) ± ( j i ) ( mod 5 ) , so E ( π ) = 0 . For a non-solution π = ( 1 , 2 , 3 , 4 , 5 ) , the pair ( 1 , 2 ) gives π ( 2 ) π ( 1 ) = 2 1 = 1 1 ( mod 5 ) , yielding E ( π ) > 0 .
Remark 3.7.
A configuration π is conflict-free (i.e., π T N ) if and only if E ( π ) = 0 . This function quantifies stability in Section 7 and will support dynamic analyses in future work.

3.4. Simplicial Complex and Cohomology

To reformulate the N-Queens problem topologically, we model the board as a simplicial complex X N , where vertices represent queen placements and edges denote non-conflicting pairs, enabling cohomological analysis in Section 5 [12].
Definition 3.8
(Simplicial Complex X N ). Let X N be the abstract simplicial complex with:
  • Vertex set V = { ( i , π ( i ) ) i [ N ] , π ( i ) [ N ] } , representing queen placements.
  • 1-simplices { ( i , π ( i ) ) , ( j , π ( j ) ) } for i j , included if:
    π ( j ) π ( i ) ± ( j i ) ( mod N ) .
Example 3.9.
For N = 3 , X 3 has vertices ( 1 , 1 ) , ( 1 , 2 ) , ( 1 , 3 ) , , ( 3 , 3 ) . Edges connect pairs like ( 1 , 1 ) and ( 2 , 3 ) if they avoid toroidal conflicts. Since gcd ( 3 , 6 ) 1 , X 3 is disconnected, reflecting the absence of toroidal solutions (Section 5, Figure 1).

3.5. Group Actions and Symmetries

The symmetries of the toroidal board, unlike the dihedral group D 4 of classical boards, incorporate modular translations and reflections, forming a group that informs our algebraic analyses (Section 6, Section 7).
Definition 3.10
(Toroidal Symmetry Group). Define the toroidal symmetry group G = ( Z / N Z ) 2 D 4 , where:
  • ( Z / N Z ) 2 acts by translations ( i , π ( i ) ) ( i + a , π ( i ) + b ) ( mod N ) .
  • D 4 , the dihedral group of order 8, acts by rotations and reflections of the board.
  • The semidirect product ⋊ combines these actions, with D 4 acting on ( Z / N Z ) 2 .
Example 3.11.
For N = 5 , a translation by ( a , b ) = ( 1 , 2 ) maps ( i , π ( i ) ) to ( i + 1 , π ( i ) + 2 ) ( mod 5 ) . A 90-degree rotation in D 4 transforms ( i , π ( i ) ) to ( π ( i ) , N i + 1 ) . These actions preserve the toroidal structure of T N .
Remark 3.12.
The group G captures the periodic and geometric symmetries of the toroidal board, enabling group-theoretic analyses of V N (Section 7) and supporting multidimensional extensions in future work.

4. Existence Conditions for Toroidal Solutions

The toroidal N-Queens problem requires placing N queens on a toroidal board ( Z / N Z ) 2 such that no two queens attack each other, as defined by the conflict-free permutations T N S N (Section 3.2). This section establishes precise conditions for the existence of such solutions, leveraging number-theoretic constraints and modular orthomorphisms.

4.1. Number-Theoretic Constraints

The key to toroidal solutions lies in the modular arithmetic of diagonal conflicts (Definition 3.2). A permutation π S N belongs to T N if, for all i j , π ( j ) π ( i ) ± ( j i ) ( mod N ) . Hsiang’s landmark theorem [13] provides the necessary and sufficient condition for T N .
Theorem 4.1
(Hsiang, 2004). The toroidal N-Queens problem has a solution (i.e., T N ) if and only if gcd ( N , 6 ) = 1 .
Example 4.2.
For N = 5 , gcd ( 5 , 6 ) = 1 , so solutions exist. The permutation π = ( 2 , 4 , 1 , 5 , 3 ) (i.e., queens at ( 1 , 2 ) , ( 2 , 4 ) , ( 3 , 1 ) , ( 4 , 5 ) , ( 5 , 3 ) ) satisfies E ( π ) = 0 (Section 7.2), as shown in Figure 1. For N = 6 , gcd ( 6 , 6 ) = 6 1 , so no solutions exist.

4.2. Modular Orthomorphisms

To formalize the structure of T N , we use modular orthomorphisms, which capture the permutation properties required for conflict-free configurations [11].
Definition 4.3
(Modular Orthomorphism). A permutation σ : Z / N Z Z / N Z is a modular orthomorphism if both σ and σ + id (where id ( i ) = i ) are permutations.
Proposition 4.4.
A permutation π S N is in T N if and only if σ ( i ) = π ( i ) i ( mod N ) is a modular orthomorphism.
Example 4.5.
For π = ( 1 , 3 , 5 , 2 , 4 ) with N = 5 , compute σ ( i ) = π ( i ) i ( mod 5 ) : σ ( 1 ) = 1 1 = 0 , σ ( 2 ) = 3 2 = 1 , σ ( 3 ) = 5 3 = 2 , σ ( 4 ) = 2 4 = 2 3 ( mod 5 ) , σ ( 5 ) = 4 5 = 1 4 ( mod 5 ) . Thus, σ = ( 0 , 1 , 2 , 3 , 4 ) is a permutation on Z / 5 Z . Then, σ + id = ( 0 + 1 , 1 + 2 , 2 + 3 , 3 + 4 , 4 + 5 ) ( 1 , 3 , 0 , 2 , 4 ) ( mod 5 ) , which is also a permutation. Hence, σ is a modular orthomorphism, confirming π T 5 .

4.3. Connection to Dynamic Analyses

The condition gcd ( N , 6 ) = 1 not only determines the existence of solutions but also informs the stability and enumeration of T N . These techniques are particularly relevant for cryptographic applications (Section 6), where solution generation is critical.
Example 4.6.
For N = 7 , since gcd ( 7 , 6 ) = 1 , solutions exist. An example is π = ( 1 , 3 , 7 , 6 , 2 , 5 , 4 ) , which satisfies E ( π ) = 0 , as verified in Appendix A.9.
Explanation 4.7.
These elements concretely illustrate Hsiang’s theorem (Theorem 4.1). For N = 7 , the permutation π = ( 1 , 3 , 7 , 6 , 2 , 5 , 4 ) avoids toroidal conflicts, as confirmed by E ( π ) = 0 . Table A1 systematically validates the condition gcd ( N , 6 ) = 1 : only N = 5 and N = 7 admit solutions, while N = 6 and N = 8 fail due to common divisors with 6. This dichotomy reflects the arithmetic sensitivity of the problem—relative primality with 6 ensures the existence of modular orthomorphisms (4.3), while composite values introduce topological obstructions in the simplicial complex X N (Section 5). Zero energy ( E ( π ) = 0 ) thus characterizes globally consistent configurations on the torus.

4.4. Visual Illustration

A valid toroidal configuration demonstrates the practical implications of Hsiang’s theorem and modular orthomorphisms.
Explanation 4.8.
Figure 1 depicts the permutation π = ( 1 , 3 , 5 , 2 , 4 ) on a 5 × 5 toroidal board. Each queen at ( i , π ( i ) ) avoids toroidal conflicts, as verified by the bijectivity of η ( i ) (Example in Subsection 4.2). The grid uses indices { 1 , , 5 } for consistency with [ N ] (Section 3.1), and the modular wrap-around ensures that diagonals crossing the board’s edges (e.g., from ( 1 , 1 ) to ( 5 , 5 ) ) are handled correctly. This visualization supports the existence result for N = 5 ( gcd ( 5 , 6 ) = 1 ) and contrasts with N = 6 , where no such configuration exists.
Transition: The arithmetic structure of T N suggests deeper algebraic properties, which we explore next.
Transition: Having established the existence conditions, we now reformulate the problem topologically in Section 5, using the simplicial complex X N .

5. Topological and Cohomological Reformulation

The toroidal N-Queens problem, characterized by number-theoretic constraints in Section 4, lends itself to a powerful reformulation in algebraic topology. By modeling the board as a simplicial complex X N and analyzing its cohomology, we uncover global obstructions to conflict-free configurations, complementing the arithmetic condition gcd ( N , 6 ) = 1 (Theorem 4.1). This topological perspective not only deepens our understanding of toroidal solutions T N but also facilitates connections to algebraic geometry (Section 6) and stability analyses (Section 7). It also sets the stage for d-dimensional generalizations in Part I [21], with applications in constraint satisfaction and periodic systems [27]. This section defines the simplicial complex, introduces cohomological tools, and validates their implications for solution existence and enumeration.

5.1. Simplicial Complex Representation

To translate the combinatorial constraints of queen placements into a topological framework, we represent the N × N toroidal board as an abstract simplicial complex X N , where vertices correspond to possible queen positions and edges connect non-conflicting pairs. This approach, inspired by [12], transforms the problem into one of finding global sections in a topological space.
Definition 5.1
(Simplicial Complex X N ). Let X N be the abstract simplicial complex defined by:
  • Vertex set V = { ( i , a ) i , a [ N ] } , representing the positions of the queens.
  • 1-simplices { ( i , a ) , ( j , b ) } for i j , included if:
    b a ± ( j i ) ( mod N ) .
Explanation 5.2.
The simplicial complex X N encodes the combinatorial structure of the toroidal N-Queens problem. Each vertex ( i , a ) represents a potential queen placement, consistent with the permutation-based framework where a configuration π S N places a queen at ( i , π ( i ) ) (Section 3.2). The edge condition ensures that two placements ( i , a ) and ( j , b ) are connected only if they avoid both classical diagonal conflicts ( | a b | | i j | ) and toroidal conflicts ( b a ± ( j i ) ( mod N ) ), as defined in Definition 3.2. The notation ( i , a ) is equivalent to ( i , π ( i ) ) when a = π ( i ) , but using ( i , a ) allows the complex to represent all possible placements before selecting a permutation. Limiting X N to 1-simplices reflects the pairwise nature of queen conflicts, as higher-dimensional simplices (e.g., triangles) are not needed to capture solutions, which are global sections assigning one queen per column. This construction, rooted in [12], transforms the problem into a topological question: does there exist a section (a choice of vertices forming a permutation) that induces a connected subgraph of non-conflicting edges? The connectivity and cohomology of X N , analyzed in Subsection 5.2, reveal whether such a section exists, linking to the arithmetic condition gcd ( N , 6 ) = 1 (Section 4).
Example 5.3.
For N = 5 , the vertex set of X 5 is { ( 1 , 1 ) , ( 1 , 2 ) , , ( 5 , 5 ) } , with 25 vertices. Edges connect non-conflicting pairs, e.g., ( 1 , 2 ) and ( 2 , 4 ) : 4 2 = 2 ± ( 2 1 ) = ± 1 ( mod 5 ) . Consider the solution π = ( 2 , 4 , 1 , 5 , 3 ) T 5 , with placements ( 1 , 2 ) , ( 2 , 4 ) , ( 3 , 1 ) , ( 4 , 5 ) , ( 5 , 3 ) . Verifying edges: for ( 1 , 2 ) ( 2 , 4 ) , as above; for ( 2 , 4 ) ( 3 , 1 ) , 1 4 = 3 2 ± ( 3 2 ) = ± 1 ( mod 5 ) . Computing all edges (Appendix A.2), X 5 is connected, supporting global sections like π, consistent with gcd ( 5 , 6 ) = 1 . Figure 1 visualizes X 5 and the toroidal board as a 2D grid, illustrating the modular wrap-around.

5.2. Cohomological Obstructions

Cohomology provides a rigorous tool to analyze whether the local non-conflict relations in X N can be extended to a global, conflict-free configuration π T N . By associating a sheaf to X N , we identify topological obstructions to solution existence and derive the number of solutions.
Definition 5.4
(Sheaf F on X N ). Let F be the sheaf on X N defined as follows:
  • For a vertex ( i , a ) V , F ( ( i , a ) ) = Z / N Z , representing the position of the row a mod N .
  • For an edge { ( i , a ) , ( j , b ) } , F ( { ( i , a ) , ( j , b ) } ) = Z / N Z , with restriction maps
    F ( { ( i , a ) , ( j , b ) } ) F ( ( i , a ) ) and F ( { ( i , a ) , ( j , b ) } ) F ( ( j , b ) ) defined by the identity, encoding the modular difference b a ( mod N ) .
This sheaf encodes the toroidal non-conflict constraints by associating to each edge the condition that b a ± ( j i ) ( mod N ) .
Explanation 5.5.
The sheaf F assigns to each vertex ( i , a ) the group Z / N Z , representing the modular row position a mod N . For an edge { ( i , a ) , ( j , b ) } , where ( i , a ) and ( j , b ) are non-conflicting, F encodes the difference b a mod N , which must avoid toroidal conflicts ( b a ± ( j i ) ( mod N ) ). A global section of F is a choice of vertices ( i , π ( i ) ) for i [ N ] forming a permutation π S N , such that all pairwise edges satisfy the non-conflict conditions. The first cohomology group H 1 ( X N , F ) measures obstructions to such a section. Specifically, following [22], we have:
H 1 ( X N , F ) Z / N Z ,
when gcd ( N , 6 ) 1 , as detailed in Appendix A.6, indicating a non-trivial obstruction (e.g., for N = 3 , X 3 is disconnected). When gcd ( N , 6 ) = 1 , the obstruction vanishes ( H 1 ( X N , F ) = 0 ), allowing solutions, as X N is sufficiently connected to support a global section. This isomorphism is derived from the simplicial structure and modular symmetries of X N , as detailed in [12]. The energy function E ( π ) (Definition 7.5) can be interpreted as a measure of deviation from such a section, linking to Section 7.
Proposition 5.6
(Solution Count). When gcd ( N , 6 ) = 1 , the number of toroidal solutions is given by:
| T N | = 1 N d N φ ( d ) χ N d ,
where φ is Euler’s totient function, and χ is a Dirichlet character modulo N.
Explanation 5.7.
The solution count formula, derived via Fourier analysis on Z / N Z [27], counts the number of permutations π S N that are modular orthomorphisms (Definition 4.3). The term φ ( d ) accounts for the number of units in Z / d Z , and the Dirichlet character χ encodes the modular constraints of toroidal diagonals. For N = 5 , computational checks (Appendix A.2) yield | T 5 | = 10 , consistent with the formula. For N = 3 , where gcd ( 3 , 6 ) 1 , the formula gives | T 3 | = 0 , aligning with the disconnected X 3 (Example above). This formula is validated by [13] and supports Section 7’s variety V N . In d-dimensional boards, a similar formula is expected to apply under gcd ( N , lcm ( 1 , 2 , , d ) ) = 1 , to be explored in future work.
Example 5.8.
For N = 5 , gcd ( 5 , 6 ) = 1 , and X 5 is connected, supporting solutions like π = ( 2 , 4 , 1 , 5 , 3 ) (Section 5.1). The formula yields | T 5 | = 10 , verifiable by enumeration (Appendix A.2). For N = 3 , X 3 ’s disconnection (Figure 1) implies H 1 ( X N , F ) 0 , and | T 3 | = 0 , consistent with Theorem 4.1.
Transition: Building on this topological foundation, we next embed valid configurations into algebraic varieties in Section 6, using elliptic curves to capture their arithmetic structure.

6. Elliptic Curve Embeddings

The toroidal N-Queens problem, characterized by number-theoretic constraints (Section 4) and topological obstructions (Section 5), reveals a rich algebraic structure when its solutions are embedded into elliptic curves over Z / N Z . This section constructs a mapping from toroidal configurations π T N to rational points on an elliptic curve, unveiling geometric regularities and group-theoretic properties that complement the simplicial complex X N (Section 5) and inform stability analyses (Section 7). By leveraging the arithmetic of elliptic curves [23], we deepen the problem’s connections to algebraic geometry, with potential applications in cryptography and coding theory (Section 8.3). This embedding also anticipates d-dimensional generalizations in Part I [21], where higher-dimensional varieties may model multidimensional boards.

6.1. Context: Elliptic Curves over Modular Rings

Elliptic curves are smooth projective curves of genus one, equipped with a group structure defined by an addition law. Over a ring like Z / N Z , they preserve this structure under certain conditions, making them ideal for encoding the modular symmetries of toroidal N-Queens solutions. In this context, we associate each valid configuration π T N with a set of rational points on an elliptic curve, interpreting queen placements ( i , π ( i ) ) as solutions to a cubic equation modulo N. This approach, inspired by [23] and [14], leverages the curve’s arithmetic to reveal symmetries and structural properties of T N .
Definition 6.1
(Elliptic Curve over Z / N Z ). An elliptic curve E over Z / N Z is defined by the Weierstrass equation:
E : y 2 = x 3 + a x + b ,
where a , b Z / N Z , and the discriminant:
Δ E = 16 ( 4 a 3 + 27 b 2 ) 0 ( mod N ) ,
ensures the curve is non-singular (i.e., smooth). The set of points E ( Z / N Z ) consists of solutions ( x , y ) ( Z / N Z ) 2 satisfying the equation, plus the point at infinity O .
Explanation 6.2.
The Weierstrass equation defines a cubic curve in the projective plane over Z / N Z , where Z / N Z = { 0 , 1 , , N 1 } is the ring of integers modulo N (Section 3.1). The discriminant condition Δ E 0 ( mod N ) ensures that the curve has no singular points, preserving the group structure under the chord-and-tangent addition law [23]. For a ring like Z / N Z , which is not a field when N is composite, non-singularity requires that gcd ( N , Δ E ) = 1 , ensuring the curve is smooth over each prime factor of N [14]. In the context of toroidal N-Queens, we aim to map queen placements ( i , π ( i ) ) to points ( x , y ) E ( Z / N Z ) , where x = i and y = π ( i ) , by choosing a , b such that the points satisfy the curve’s equation. This embedding leverages the modular arithmetic of Z / N Z , aligning with the toroidal constraints π ( j ) π ( i ) ± ( j i ) ( mod N ) (Definition 3.2), and connects to the group structure of T N (Proposition 6.3).
Proposition 6.3
(Group Structure of T N ). The set T N forms a group under composition modulo N, where for π , σ T N , the composition π σ ( i ) = π ( σ ( i ) ) ( mod N ) is also in T N .
Example 6.4.
For N = 7 , consider the elliptic curve E : y 2 = x 3 + x + 1 over Z / 7 Z . Compute Δ E = 16 ( 4 · 1 3 + 27 · 1 2 ) = 16 ( 4 + 27 ) = 16 · 31 4 0 ( mod 7 ) , confirming non-singularity. Points like ( 1 , 3 ) satisfy the equation: 3 2 = 9 2 ( mod 7 ) , and 1 3 + 1 · 1 + 1 = 1 + 1 + 1 = 3 2 ( mod 7 ) , so ( 1 , 3 ) E ( Z / 7 Z ) .
Transition: With the elliptic curve defined, we now construct a mapping from toroidal configurations to its points.

6.2. Mapping Configurations to Points on E

To embed toroidal solutions into an elliptic curve, we define a mapping that associates each queen placement ( i , π ( i ) ) with a point on E ( Z / N Z ) . This mapping requires selecting a curve that contains all placement points, a process we formalize and validate.
Definition 6.5
(Embedding Map Φ ). Let π T N be a toroidal solution, with placements ( i , π ( i ) ) for i [ N ] . Define the embedding map:
Φ : [ N ] E ( Z / N Z ) , i ( i , π ( i ) ) ,
where E : y 2 = x 3 + a x + b is an elliptic curve over Z / N Z such that ( i , π ( i ) ) E ( Z / N Z ) for all i [ N ] .
Theorem 6.6
(Existence of Rational Embedding). For any π T N with gcd ( N , 6 ) = 1 and N prime, there exists an elliptic curve E over Z / N Z such that the points { ( i , π ( i ) ) i [ N ] } lie on E.
Explanation 6.7.
The map Φ assigns each column index i [ N ] = { 1 , , N } to the point ( i , π ( i ) ) on an elliptic curve E, where π T N is a permutation satisfying the toroidal constraints (Definition 4.3). The challenge is to find a , b Z / N Z such that the Weierstrass equation y 2 = x 3 + a x + b holds for all points ( i , π ( i ) ) , i.e., π ( i ) 2 i 3 + a i + b ( mod N ) . Since π is a permutation, the points ( i , π ( i ) ) are distinct, with i , π ( i ) { 1 , , N } , which map to { 0 , , N 1 } in Z / N Z . The theorem asserts that such a curve exists when gcd ( N , 6 ) = 1 , ensuring T N (Theorem 4.1). The construction involves interpolating a cubic polynomial f ( x ) = x 3 + a x + b through the points ( i , π ( i ) 2 ) , then verifying the discriminant condition Δ E 0 ( mod N ) . This is feasible because N points in Z / N Z can be fitted by a polynomial of degree at most N 1 , and adjustments to a , b ensure non-singularity [23]. The embedding connects the combinatorial structure of T N to the algebraic geometry of E, enabling group-theoretic analyses (e.g., via the curve’s addition law) that complement the group structure of T N (Proposition 6.3).
Proof Sketch.
Given π T N , consider the points ( i , π ( i ) ) for i [ N ] . We seek a , b Z / N Z such that π ( i ) 2 i 3 + a i + b ( mod N ) . Construct a cubic polynomial f ( x ) = x 3 + a x + b by interpolating the points ( i , π ( i ) 2 ) , which is possible since N points determine a unique polynomial of degree at most N 1 over Z / N Z . Compute the discriminant Δ E = 16 ( 4 a 3 + 27 b 2 ) . If Δ E 0 ( mod N ) , perturb a or b slightly to ensure gcd ( N , Δ E ) = 1 , leveraging the fact that gcd ( N , 6 ) = 1 implies N is coprime with 2 and 3, facilitating non-singular solutions [14]. The resulting curve E : y 2 = x 3 + a x + b contains all ( i , π ( i ) ) . A complete proof, including the explicit construction of a and b, is given in Appendix B.
Example 6.8.
For N = 7 , consider π = ( 1 , 3 , 7 , 6 , 2 , 5 , 4 ) T 7 (since gcd ( 7 , 6 ) = 1 ). The points are ( 1 , 1 ) , ( 2 , 3 ) , ( 3 , 7 ) , ( 4 , 6 ) , ( 5 , 2 ) , ( 6 , 5 ) , ( 7 , 4 ) , with π ( 3 ) = 7 0 ( mod 7 ) in Z / 7 Z , yielding ( 1 , 1 ) , ( 2 , 3 ) , ( 3 , 0 ) , ( 4 , 6 ) , ( 5 , 2 ) , ( 6 , 5 ) , ( 7 , 4 ) . Interpolate a curve E : y 2 = x 3 + a x + b such that π ( i ) 2 i 3 + a i + b ( mod 7 ) . Solving for a subset of points (e.g., ( 1 , 1 ) : 1 2 = 1 1 3 + a · 1 + b = 1 + a + b ), we find a 1 , b 6 ( mod 7 ) . Verify: Δ E = 16 ( 4 · 1 3 + 27 · 6 2 ) = 16 ( 4 + 972 ) = 16 · 976 5 0 ( mod 7 ) . Thus, E : y 2 = x 3 + x + 6 contains the points (Appendix A.3).

6.3. Applications and Numerical Visualization

The elliptic curve embedding provides a geometric and algebraic framework for analyzing toroidal solutions, with implications for stability and symmetry. This subsection illustrates the embedding and its applications, supported by a visualization.
Explanation 6.9.
The embedding Φ maps each queen placement to a point on E, enabling algebraic analyses of T N . For instance, the group structure of E ( Z / N Z ) under the addition law may reflect symmetries in T N , such as composition modulo N (Proposition 6.3). Torsion points on E, which have finite order under addition, could correspond to highly symmetric configurations, as their coordinates satisfy additional modular constraints [23]. The energy function E ( π ) (Definition 7.5) can be interpreted geometrically: configurations with low E ( π ) may cluster near specific points on E, informing stability analyses in Section 7. Figure 2 visualizes the points ( i , π ( i ) ) for N = 7 on the curve E : y 2 = x 3 + x + 6 , plotted over Z / 7 Z . The curve’s equation is symbolic, as Z / 7 Z is discrete, but the points’ positions illustrate their algebraic relationship. This embedding has applications in cryptography, where elliptic curves model discrete systems [16], and in coding theory, where solution symmetries inform error-correcting codes [27]. For d-dimensional boards, the embedding is expected to generalize to higher-dimensional varieties under gcd ( N , lcm ( 1 , 2 , , d ) ) = 1 , to be explored in future work.
Example 6.10.
For N = 7 , the configuration π = ( 1 , 3 , 7 , 6 , 2 , 5 , 4 ) yields points ( 1 , 1 ) , ( 2 , 3 ) , ( 3 , 0 ) , ( 4 , 6 ) , ( 5 , 2 ) , ( 6 , 5 ) , ( 7 , 4 ) . These lie on E : y 2 = x 3 + x + 6 , as verified above. Adding points ( 1 , 1 ) and ( 2 , 3 ) on E (using the addition law) may yield another point corresponding to a composed configuration, reflecting the group structure of T 7 (Appendix A.3).
Example 6.11.
For N = 5 , the configuration π = ( 2 , 4 , 1 , 5 , 3 ) yields points ( 1 , 2 ) , ( 2 , 4 ) , ( 3 , 1 ) , ( 4 , 5 ) , ( 5 , 3 ) . These lie on E : y 2 = x 3 + x + 3 , as verified in Appendix A.4, illustrating the algebraic structure of T 5 .

6.4. Cryptographic Applications

Embedding π V N into elliptic curves (Theorem 6.6) enables cryptographic protocols, optimized by future combinatorial analyses. We propose a digital signature protocol and compare it to ECDSA [17].
Example 6.12
(Digital Signature for N = 5 ). Let π = ( 2 , 4 , 1 , 5 , 3 ) V 5 be embedded in E : y 2 = x 3 + x + 3 mod 5 , with P π = ( 1 , 2 ) . For a document D, compute h = SHA - 256 ( D ) mod 5 = 2 . With a secret key k = 3 , the public key is Q = 3 · P π = 3 · ( 1 , 2 ) = ( 4 , 4 ) . The signature ( r , s ) is calculated as follows: r = x ( 2 · P π ) = x ( 2 · ( 1 , 2 ) ) = x ( 4 , 1 ) = 4 , then s = k 1 ( h + r · d ) = 3 1 ( 2 + 4 · 3 ) = 2 · ( 2 + 12 ) = 2 · 14 2 · 4 = 8 3 ( mod 5 ) . Verification checks if x ( s 1 ( h · G + r · Q ) ) = r , which holds (Appendix A.5).
Note 6.13.
For small N like N = 5 , the limited cardinal of T 5 ( | T 5 | = 10 ) restricts the protocol’s security, as the key space is easily enumerable. Larger N > 200 could enhance security by increasing | T N | , as discussed in Section 8.3.
Comparison with ECDSA:
  • Security: ECDSA uses large fields; ours adds combinatorial complexity but is weaker for small N.
  • Efficiency: Ours is faster for small N, leveraging future combinatorial optimizations.
  • Implementation: ECDSA is standardized; ours requires custom algorithms.
  • Originality: Ours is novel, building on the framework of toroidal configurations.
  • Applications: Ours suits IoT, with potential extensions in future work.

7. Algebraic Structure and Stability

The toroidal N-Queens problem, characterized by number-theoretic constraints (Section 4), topological obstructions (Section 5), and elliptic curve embeddings (Section 6), exhibits a rich algebraic structure when its solution space T N is modeled as a variety and analyzed for stability. This section defines the toroidal configuration variety V N , which encodes the modular constraints of T N , and introduces an energy function E ( π ) to quantify the stability of configurations under perturbations. By synthesizing combinatorial, algebraic, and geometric perspectives, we deepen our understanding of T N ’s structure and its robustness, paving the way for multidimensional generalizations in Article 2 and applications in constraint satisfaction and coding theory [27]. The results build on [10,13], offering a unified algebraic framework for toroidal solutions.

7.1. Toroidal Solution Space as an Algebraic Variety

The solution space T N can be embedded into an algebraic variety V N over Z / N Z , capturing the permutation and non-conflict constraints of toroidal configurations. This construction, inspired by constraint satisfaction problems [10], translates modular orthomorphisms into a system of congruences, revealing the geometric structure of T N .
Definition 7.1
(Toroidal Configuration Variety). The variety V N is defined as:
V N : = π ( Z / N Z ) N π is a permutation of [ N ] , i j : π ( j ) π ( i ) ± ( j i ) ( mod N ) ,
where [ N ] = { 1 , , N } , and Z / N Z = { 0 , , N 1 } is the ring of integers modulo N.
Explanation 7.2.
The variety V N is a subset of the affine space ( Z / N Z ) N , consisting of vectors π = ( π ( 1 ) , , π ( N ) ) that are permutations of [ N ] (i.e., π ( i ) π ( j ) for i j ) and satisfy the toroidal non-conflict condition π ( j ) π ( i ) ± ( j i ) ( mod N ) , as defined in Definition 3.2. This condition ensures that the difference function η ( i ) = π ( i ) i mod N is bijective (Definition 4.3), making V N = T N , the set of toroidal solutions. The variety is finite, as S N has N ! elements, and is empty when gcd ( N , 6 ) 1 (Theorem 4.1). When non-empty, V N forms a group under composition modulo N (Proposition 6.3), embedded in the modular space ( Z / N Z ) N . Unlike classical N-Queens solutions, which form disconnected constraint graphs [15], V N is a structured moduli space, unified by modular symmetries. This construction is expected to extend to d-dimensional boards ( Z / N Z ) d , where V N is defined with gcd ( N , lcm ( 1 , 2 , , d ) ) = 1 , to be explored in future work (Section 8.3).
Note 7.3.
The cardinal of V N = T N (e.g., | T 5 | = 10 ) is small for low N, limiting its use in applications requiring large configuration spaces, such as coding theory. For N > 200 , the exponential growth of | T N | could enhance the robustness and applicability of V N , though computational challenges in generating solutions remain (Section 8.3).
Example 7.4.
For N = 5 , where gcd ( 5 , 6 ) = 1 , V 5 contains permutations like π = ( 2 , 4 , 1 , 5 , 3 ) . Verify: π is a permutation (all values distinct), and for i = 1 , j = 2 , π ( 2 ) π ( 1 ) = 4 2 = 2 ± ( 2 1 ) = ± 1 ( mod 5 ) . Similarly, all pairs satisfy the condition (Appendix A.4). For N = 4 , gcd ( 4 , 6 ) = 2 , so V 4 = , as no permutation avoids all conflicts.
Transition: Having defined V N , we now analyze the stability of its configurations using an energy function.

7.2. Energy Function and Stability

To quantify the robustness of configurations, we define an energy function E ( π ) that measures toroidal conflicts, enabling a stability analysis within the permutation space S N . This approach, distinct from probabilistic models [1,8], leverages modular arithmetic to identify stable solutions.
Definition 7.5
(Toroidal Energy Function). For a configuration π S N , define the energy function:
E ( π ) : = # ( i , j ) i < j , π ( j ) π ( i ) ± ( j i ) ( mod N ) .
Explanation 7.6.
The energy function E ( π ) counts the number of pairs ( i , j ) where queens at ( i , π ( i ) ) and ( j , π ( j ) ) lie on the same toroidal diagonal, i.e., π ( j ) π ( i ) ± ( j i ) ( mod N ) (Definition 3.2). A configuration π S N is in V N = T N if and only if E ( π ) = 0 , as it avoids all toroidal conflicts. The function generalizes classical energy models by operating over Z / N Z , aligning with the modular structure of V N . The notation E ( π ) is consistent with Section 3.2, distinguishing it from classical energy functions [15]. Stability is assessed by examining E ( π ) in the neighborhood of π, defined by transpositions (swaps of two indices), which induce small perturbations in S N . Configurations in V N are global minima of E ( π ) , and their isolation in the energy landscape suggests robustness, unlike classical solutions, which may form degenerate minima [1].
Definition 7.7
(Hyperstable Configuration). A configuration π V N is hyperstable if E ( π ) > 0 for all π S N obtained by a single transposition from π, i.e., swapping π ( i ) and π ( j ) for some i j .
Theorem 7.8
(Energy and Toroidal Validity). A configuration π S N satisfies E ( π ) = 0 if and only if π V N .
Explanation 7.9.
The theorem follows directly from the definitions: E ( π ) = 0 means no pairs ( i , j ) satisfy π ( j ) π ( i ) ± ( j i ) ( mod N ) , which is the condition for π V N = T N . Conversely, any π V N has no toroidal conflicts, so E ( π ) = 0 . This equivalence establishes V N as the set of global minima of E ( π ) . Hyperstability further requires that any transposition increases E ( π ) , indicating a local minimum. For example, in V 5 , transpositions often introduce conflicts, isolating solutions as sharp minima, unlike classical N-Queens, where minima may form plateaus [15]. This stability is crucial for applications like symbolic encoding, where robust configurations are preferred [27].
Example 7.10.
For N = 5 , consider π = ( 2 , 4 , 1 , 5 , 3 ) V 5 . Compute E ( π ) : for i = 1 , j = 2 , π ( 2 ) π ( 1 ) = 4 2 = 2 ± 1 ( mod 5 ) ; for i = 2 , j = 3 , π ( 3 ) π ( 2 ) = 1 4 = 3 2 ± 1 ( mod 5 ) . Checking all pairs (Appendix A.4), E ( π ) = 0 . Swap π ( 2 ) = 4 and π ( 3 ) = 1 to get π = ( 2 , 1 , 4 , 5 , 3 ) : for i = 1 , j = 4 , π ( 4 ) π ( 1 ) = 5 2 = 3 ( 4 1 ) = 3 ( mod 5 ) , introducing a conflict, so E ( π ) 1 . Testing all transpositions (Appendix A.4), π is hyperstable.
Figure 4. Schematic energy landscape over S 5 . Configurations in V 5 (e.g., π = ( 2 , 4 , 1 , 5 , 3 ) ) are global minima with E ( π ) = 0 , isolated from non-solutions with positive energy.
Figure 4. Schematic energy landscape over S 5 . Configurations in V 5 (e.g., π = ( 2 , 4 , 1 , 5 , 3 ) ) are global minima with E ( π ) = 0 , isolated from non-solutions with positive energy.
Preprints 159349 g004
Transition: Having characterized the algebraic structure and stability of V N , we now explore multidimensional extensions and future directions in Section 8.

7.3. Comparison with Classical Stability

Classical N-Queens solutions minimize an energy function based on Euclidean diagonal conflicts ( | π ( i ) π ( j ) | = | i j | ), but their structure differs significantly from toroidal solutions. Classical configurations form disconnected components in the constraint graph, lacking the group structure of V N (Proposition 6.3). Their energy minima are often degenerate, forming plateaus where multiple configurations have similar stability [15].
Explanation 7.11.
In the classical N-Queens problem, the energy function counts pairs where | π ( i ) π ( j ) | = | i j | , and solutions have zero energy. However, perturbations (e.g., transpositions) may yield other zero-energy configurations, reducing stability. In contrast, toroidal solutions in V N are isolated minima when gcd ( N , 6 ) = 1 , as transpositions typically introduce conflicts ( E ( π ) > 0 ). This rigidity, driven by modular constraints, makes toroidal configurations more robust, as seen in the N = 5 example. The variety V N ’s algebraic structure, unified by modular symmetries, offers a moduli-theoretic perspective absent in classical settings [10]. For d-dimensional boards, classical and toroidal stability are expected to diverge further, with toroidal varieties maintaining group properties under gcd ( N , lcm ( 1 , 2 , , d ) ) = 1 , to be explored in future work (Section 8.3).
Example 7.12.
For N = 5 , the classical solution π = ( 2 , 4 , 1 , 3 , 5 ) has zero Euclidean conflicts but may have neighboring solutions with zero energy. The toroidal solution π = ( 2 , 4 , 1 , 5 , 3 ) is hyperstable, with all transpositions yielding E ( π ) > 0 , highlighting greater isolation (Appendix A.4).
Transition: With a comprehensive understanding of V N and its stability, we conclude with future directions in Section 8.

8. Conclusion and Future Directions

This article redefines the toroidal N-Queens problem as a profound intersection of number theory, algebraic topology, and algebraic geometry, unveiling new theoretical insights and computational frameworks. By synthesizing modular orthomorphisms, simplicial complexes, elliptic curve embeddings, and algebraic varieties, we provide a comprehensive understanding of the solution space T N and its stability, with implications for constraint satisfaction, coding theory, and cryptography [27]. This section summarizes our contributions, assesses their strengths and limitations, and outlines directions for future research, including extensions in a companion article (Part I [21]) that explore dynamic systems and multidimensional boards. Our work, building on [10,13], repositions the N-Queens problem as a versatile platform for interdisciplinary mathematical exploration.

8.1. Summary of Contributions

This article redefines the toroidal N-Queens problem as a profound intersection of number theory, algebraic topology, and algebraic geometry, building upon Hsiang’s foundational work [13]. Our key contributions are:
  • Recontextualization of Hsiang’s Existence Condition: We leverage Hsiang’s result that toroidal solutions exist if and only if gcd ( N , 6 ) = 1 [13], integrating modular orthomorphisms into a broader topological and algebraic framework (Section 4).
  • Topological Reformulation: We introduce a simplicial complex X N , using cohomology to detect global solvability obstructions, a novel perspective inspired by [12] (Section 5).
  • Elliptic Curve Embeddings: We embed configurations π T N into elliptic curves over Z / N Z , revealing geometric symmetries, building on [23] (Section 6).
  • Algebraic Variety and Stability: We define the variety V N = T N and introduce an original energy function E ( π ) to identify hyperstable solutions, distinct from classical models [15] (Section 7).
  • Illustrative Examples: Through examples (e.g., N = 5 , π = ( 2 , 4 , 1 , 5 , 3 ) ), we illustrate X N , elliptic embeddings, and V N , contrasting our approach with stochastic methods [8].
These contributions are summarized in Table 1, highlighting our extensions beyond Hsiang’s arithmetic framework into topology and geometry, with applications in coding theory and cryptography [16,27].
Explanation 8.1.
These contributions interweave to form a cohesive framework: the existence condition ( gcd ( N , 6 ) = 1 ) determines whether T N , the simplicial complex X N encodes solvability topologically, elliptic curves provide a geometric interpretation, and V N with E ( π ) quantifies algebraic structure and stability. For instance, the permutation π = ( 2 , 4 , 1 , 5 , 3 ) for N = 5 is a global section of X 5 (Figure 1), lies on an elliptic curve (Figure 2), and achieves E ( π ) = 0 in V 5 (Section 7). This synthesis departs from enumerative approaches, offering tools for broader combinatorial problems. The visual aids (Figure 1 and Figure 2) and computational checks (Appendix A) ensure accessibility and rigor.

8.2. Strengths and Limitations

The strength of this work lies in its interdisciplinary synthesis, integrating number theory ( gcd ( N , 6 ) = 1 ), topology (cohomology of X N ), and algebraic geometry (elliptic curves, V N ) to reframe the toroidal N-Queens problem. This approach, unlike stochastic models [8], provides a deterministic, algebraic classification of T N , with applications in coding theory (e.g., modular symmetries for error-correcting codes [27]) and cryptography (e.g., elliptic curve-based protocols [23]). The group structure of V N (Theorem 6.3) and hyperstability of solutions (Theorem 7.7) offer robust tools for constraint satisfaction problems.
However, limitations include:
  • Computational Complexity: Computing V N or the cohomology H 1 ( X N , F ) scales poorly with N, as S N has N ! elements and edge computations in X N are quadratic. For small N (e.g., N = 5 , | T 5 | = 10 ), enumeration is feasible, but for N > 200 , the large cardinal of T N poses challenges for cryptographic and coding applications.
  • Parameter Selection: Constructing elliptic curves (Theorem 6.6) requires careful interpolation to ensure non-singularity ( Δ E 0 ( mod N ) ), which is challenging for composite N.
  • Theoretical Focus: While we outline applications, practical algorithms (e.g., for enumerating V N ) are underdeveloped, limiting immediate computational impact.
Explanation 8.2.
These limitations reflect the theoretical emphasis of our work, prioritizing structural insights over algorithmic efficiency. For example, computing edges in X 5 (Figure 1) is feasible, but for N = 13 , the vertex set grows to 169, and edge checks are computationally intensive. Similarly, elliptic curve parameters ( a , b ) require solving systems modulo N, which is non-trivial for large or composite N [14]. The small size of T N for low N limits its cryptographic security, while large N introduces computational bottlenecks, both addressable in future work (Section 8.3).

8.3. Future Directions

Future research will extend the frameworks developed in this article, addressing the limitations outlined in Section 8.2 and exploring new applications. Key directions include:
  • Cryptographic Protocols: Refining the elliptic curve-based protocols in Section 6.4 to enhance security for large N > 200 , where the exponential growth of | T N | provides a larger key space, improving resistance to enumeration attacks. This requires efficient algorithms for generating V N , leveraging the combinatorial structure of T N .
  • Multidimensional Extensions: Generalizing the toroidal N-Queens problem to d-dimensional boards ( Z / N Z ) d , under conditions like gcd ( N , lcm ( 1 , 2 , , d ) ) = 1 . These extensions will explore higher-dimensional varieties and simplicial complexes, building on Section 5 and Section 6.
  • Applications in IoT and Quantum Analogs: Developing practical implementations for IoT, where the robustness of hyperstable configurations (Section 7) and modular symmetries support lightweight coding schemes. Additionally, exploring quantum analogs of T N , inspired by quantum constraint problems [18], could yield novel computational paradigms.
Explanation 8.3.
These directions address the computational and theoretical challenges of the toroidal N-Queens problem. For small N (e.g., N = 5 , | T 5 | = 10 ), the limited cardinal of T N restricts cryptographic security, as seen in Section 6.4. Large N > 200 offers a promising avenue, as | T N | grows exponentially, enhancing the complexity of combinatorial problems for cryptography and coding theory. However, generating and verifying permutations for such N requires optimized algorithms, possibly leveraging symbolic computation or probabilistic methods. Multidimensional extensions will enrich the algebraic and topological structures, potentially impacting post-quantum cryptography and constraint satisfaction applications.

Conflicts of Interest

The author declares no conflicts of interest.

Appendix A. Formal Proofs and Computations

This appendix provides formal proofs and computational details supporting the main results of the article. We include proofs for the existence condition (Theorem 4.1), energy minimization (Theorem 7.8), and elliptic curve embedding (Theorem 6.6), as well as edge computations for the simplicial complex X 5 (Section 5) and energy calculations for V 5 (Section 7). These results reinforce the interdisciplinary framework of the toroidal N-Queens problem, linking number theory, topology, and algebraic geometry.

Appendix A.1. Proof of Theorem 4.1: Existence Condition

Statement. There exists at least one toroidal N-Queens solution ( π T N ) if and only if gcd ( N , 6 ) = 1 .
Proof. A toroidal solution π T N is a permutation of [ N ] = { 1 , , N } such that π ( j ) π ( i ) ± ( j i ) ( mod N ) for all i j (Theorem 3.2). Equivalently, the difference function η ( i ) = π ( i ) i mod N is bijective (Theorem 4.3). Following [13], we define a complete orthomorphism as a permutation π S N such that η is also a permutation. Hsiang proves that such orthomorphisms exist if and only if gcd ( N , 6 ) = 1 , as follows:
- **Necessity**: If gcd ( N , 6 ) > 1 , then N is divisible by 2 or 3. For N even, the sum of differences i = 1 N ( π ( i ) i ) 0 ( mod 2 ) , but a permutation’s image sums to i = 1 N i , which is odd for N even, leading to a contradiction. For N divisible by 3, similar modular constraints prevent η from being bijective. - **Sufficiency**: If gcd ( N , 6 ) = 1 , explicit constructions exist (e.g., linear orthomorphisms for prime N). For example, for N = 5 , π = ( 2 , 4 , 1 , 5 , 3 ) satisfies the non-conflict condition, as verified in Appendix A.4, ensuring T 5 .
Thus, T N if and only if gcd ( N , 6 ) = 1 . For d-dimensional boards, this generalizes to gcd ( N , lcm ( 1 , 2 , , d ) ) = 1 , to be explored in future work (Section 8.3).
Explanation A4.
This proof establishes the arithmetic foundation of the toroidal N-Queens problem, linking the combinatorial constraint of non-conflicting placements to the number-theoretic condition gcd ( N , 6 ) = 1 . The non-conflict condition ensures that the modular differences π ( j ) π ( i ) avoid ± ( j i ) , as verified in examples (e.g., Figure 1). The result underpins the simplicial complex X N ’s connectivity (Section 5) and the variety V N ’s non-emptiness (Section 7).

Appendix A.2. Edge Computations for Simplicial Complex X5

To support Section 5.1, we compute edges in the simplicial complex X 5 for the solution π = ( 2 , 4 , 1 , 5 , 3 ) T 5 . The vertex set is { ( i , a ) i , a [ 5 ] } , and edges connect ( i , a ) and ( j , b ) if i j , | a b | | i j | , and b a ± ( j i ) ( mod 5 ) (Theorem 3.8).
Consider the placements ( 1 , π ( 1 ) ) = ( 1 , 2 ) , ( 2 , π ( 2 ) ) = ( 2 , 4 ) , ( 3 , π ( 3 ) ) = ( 3 , 1 ) , ( 4 , π ( 4 ) ) = ( 4 , 5 ) , ( 5 , π ( 5 ) ) = ( 5 , 3 ) : - For ( 1 , 2 ) ( 2 , 4 ) : | 2 4 | = 2 1 = | 1 2 | , 4 2 = 2 ± ( 2 1 ) = ± 1 ( mod 5 ) . - For ( 2 , 4 ) ( 3 , 1 ) : | 4 1 | = 3 1 = | 2 3 | , 1 4 = 3 2 ± ( 3 2 ) = ± 1 ( mod 5 ) . - For ( 3 , 1 ) ( 4 , 5 ) : | 1 5 | = 4 1 = | 3 4 | , 5 1 = 4 ± ( 4 3 ) = ± 1 ( mod 5 ) . - For ( 4 , 5 ) ( 5 , 3 ) : | 5 3 | = 2 1 = | 4 5 | , 3 5 = 2 3 ± ( 5 4 ) = ± 1 ( mod 5 ) . - For ( 5 , 3 ) ( 1 , 2 ) : | 3 2 | = 1 4 = | 5 1 | , 2 3 = 1 4 ± ( 1 5 ) = ± 4 ( mod 5 ) .
These edges form a cycle, indicating X 5 is connected when gcd ( 5 , 6 ) = 1 , supporting the existence of global sections (Figure 1).
Figure A1. Edges in X 5 for π = ( 2 , 4 , 1 , 5 , 3 ) , forming a connected cycle, as computed in Subsection A.2.
Figure A1. Edges in X 5 for π = ( 2 , 4 , 1 , 5 , 3 ) , forming a connected cycle, as computed in Subsection A.2.
Preprints 159349 g0a1

Appendix A.3. Proof of Theorem 6.6: Elliptic Curve Embedding

Statement. For any π T N with gcd ( N , 6 ) = 1 , there exists an elliptic curve E over Z / N Z such that the points { ( i , π ( i ) ) i [ N ] } lie on E.
Proof Sketch. Given π T N , we seek an elliptic curve E : y 2 = x 3 + a x + b over Z / N Z such that ( i , π ( i ) ) E ( Z / N Z ) , i.e., π ( i ) 2 i 3 + a i + b ( mod N ) for all i [ N ] . Since π is a permutation, the points ( i , π ( i ) ) are distinct. Interpolate a cubic polynomial f ( x ) = x 3 + a x + b through the points ( i , π ( i ) 2 ) , which is possible as N points determine a polynomial of degree at most N 1 over Z / N Z . Compute the discriminant Δ E = 16 ( 4 a 3 + 27 b 2 ) . If Δ E 0 ( mod N ) , adjust a or b to ensure gcd ( N , Δ E ) = 1 , leveraging gcd ( N , 6 ) = 1 to avoid singularities [14]. The resulting E contains all points (Section 6.2).
Explanation A5.
This proof supports the elliptic curve embedding (Section 6), connecting combinatorial solutions to algebraic geometry. For N = 5 , π = ( 2 , 4 , 1 , 5 , 3 ) yields points ( 1 , 2 ) , ( 2 , 4 ) , ( 3 , 1 ) , ( 4 , 5 ) , ( 5 , 3 ) . Interpolating y 2 = x 3 + a x + b is feasible, and non-singularity is ensured by adjusting parameters, as shown in Section 6.3.

Appendix A.4. Energy Computations for V5

To support Section 7.2, we compute the energy E ( π ) for π = ( 2 , 4 , 1 , 5 , 3 ) V 5 and a neighboring permutation. The energy is:
E ( π ) = # { ( i , j ) i < j , π ( j ) π ( i ) ± ( j i ) ( mod 5 ) } .
For π : - i = 1 , j = 2 : π ( 2 ) π ( 1 ) = 4 2 = 2 ± ( 2 1 ) = ± 1 ( mod 5 ) . - i = 2 , j = 3 : π ( 3 ) π ( 2 ) = 1 4 = 3 2 ± ( 3 2 ) = ± 1 ( mod 5 ) . - All pairs satisfy the condition, so E ( π ) = 0 .
Swap π ( 2 ) = 4 and π ( 3 ) = 1 to get π = ( 2 , 1 , 4 , 5 , 3 ) : - i = 1 , j = 4 : π ( 4 ) π ( 1 ) = 5 2 = 3 ( 4 1 ) = 3 ( mod 5 ) , a conflict. - Total conflicts yield E ( π ) 1 , confirming hyperstability (Theorem 7.7).
Note A6.
The small cardinal of V 5 = T 5 ( | T 5 | = 10 ) limits its use in cryptographic applications, as the configuration space is easily enumerable. For N > 200 , the exponential growth of | T N | could enhance stability and applicability, though computational challenges remain (Section 8.3).
Explanation A7.
These computations validate that π V 5 is a global minimum ( E ( π ) = 0 ) and hyperstable, as perturbations increase energy. This supports the stability analysis (Section 7), contrasting with classical N-Queens’ degenerate minima. The limited size of T 5 underscores the need for larger N in practical applications.

Appendix A.5. Table of Toroidal Solution Existence

The following table summarizes the existence of toroidal solutions for N = 3 to 11, validated by computing gcd ( N , 6 ) and example permutations.
Table A1. Existence of toroidal solutions for N = 3 to 11, based on gcd ( N , 6 ) = 1 . Permutations are verified to satisfy π ( j ) π ( i ) ± ( j i ) ( mod N ) .
Table A1. Existence of toroidal solutions for N = 3 to 11, based on gcd ( N , 6 ) = 1 . Permutations are verified to satisfy π ( j ) π ( i ) ± ( j i ) ( mod N ) .
N gcd ( N , 6 ) T N ? Example Permutation π
3 3 No
4 2 No
5 1 Yes (2, 4, 1, 5, 3)
6 6 No
7 1 Yes (1, 3, 5, 7, 2, 4, 6)
8 2 No
9 3 No
10 2 No
11 1 Yes (1, 4, 7, 10, 2, 5, 8, 11, 3, 6, 9)
Note A8.
The cardinal of T N (e.g., | T 5 | = 10 ) is small for low N, limiting cryptographic and coding applications due to enumerability. For N > 200 , | T N | grows exponentially, enhancing complexity but requiring efficient enumeration algorithms (Section 8.3).
Explanation A9.
The table confirms Theorem 4.1, with permutations validated (e.g., for N = 5 , π = ( 2 , 4 , 1 , 5 , 3 ) satisfies the non-conflict condition, as verified in Subsection A.4). The absence of solutions for gcd ( N , 6 ) 1 aligns with the proof in Subsection A.1. For multidimensional boards, gcd ( N , lcm ( 1 , 2 , , d ) ) = 1 is expected to apply, to be explored in future work (Section 8.3).

Appendix A.6. Cohomological Isomorphism for XN

When gcd ( N , 6 ) 1 , the simplicial complex X N is disconnected, and the obstructions to the existence of global sections are captured by the cohomology H 1 ( X N , F ) . For N = 3 , X 3 decomposes into incompatible cycles, and it can be shown that H 1 ( X 3 , F ) Z / 3 Z . For a general proof, see [12], Section 3.3.

Appendix A.7. Calculations for X3

For N = 3 , the complex X 3 has vertices ( i , a ) with i , a { 1 , 2 , 3 } . Edges connect ( i , a ) and ( j , b ) if b a ± ( j i ) ( mod 3 ) . For example, ( 1 , 1 ) and ( 2 , 2 ) have 2 1 = 1 1 ( mod 3 ) , and 2 1 = 1 1 ( mod 3 ) , so no edge exists since 1 ± ( 2 1 ) . Similarly, ( 1 , 1 ) and ( 2 , 3 ) have 3 1 = 2 ± 1 ( mod 3 ) , so an edge exists. Computing all pairs, X 3 decomposes into incompatible cycles, confirming that no global section exists.

Appendix A.8. Stability Calculations for π = (2,4,1,5,3)

For π = ( 2 , 4 , 1 , 5 , 3 ) V 5 , any transposition π (e.g., swapping π ( 2 ) = 4 and π ( 3 ) = 1 to get π = ( 2 , 1 , 4 , 5 , 3 ) ) introduces conflicts. For i = 1 , j = 4 , π ( 4 ) π ( 1 ) = 5 2 = 3 ( 4 1 ) = 3 ( mod 5 ) , which is a conflict. Similarly, other pairs may introduce conflicts, confirming that E ( π ) > 0 .

Appendix A.9. Verification for N = 7

For π = ( 1 , 3 , 7 , 6 , 2 , 5 , 4 ) with N = 7 , check toroidal conflicts: for i = 1 , j = 2 , π ( 2 ) π ( 1 ) = 3 1 = 2 ± ( 2 1 ) = ± 1 ( mod 7 ) ; for i = 2 , j = 3 , π ( 3 ) π ( 2 ) = 7 3 = 4 ± ( 3 2 ) = ± 1 ( mod 7 ) . All pairs satisfy the condition, so E ( π ) = 0 , confirming π T 7 .

Appendix B. Complete Proof of Theorem 6.6

Theorem (Embedding). For any toroidal solution π T N with gcd ( N , 6 ) = 1 , there exists an elliptic curve E / Z / N Z such that all points ( i , π ( i ) ) lie on E.
Proof.

Step 1: System of Equations

For each i [ N ] , the point ( i , π ( i ) ) must satisfy the Weierstrass equation:
π ( i ) 2 i 3 + a · i + b ( mod N ) .
This generates N congruences in two variables ( a , b ) .

Step 2: Solving for a and b

Choose two distinct indices i 1 , i 2 [ N ] . Solve the linear system:
π ( i 1 ) 2 i 1 3 + a i 1 + b ( mod N ) , π ( i 2 ) 2 i 2 3 + a i 2 + b ( mod N ) .
Subtracting the equations eliminates b:
a π ( i 2 ) 2 π ( i 1 ) 2 ( i 2 3 i 1 3 ) i 2 i 1 ( mod N ) .
Substitute a into one equation to solve for b:
b π ( i 1 ) 2 i 1 3 a i 1 ( mod N ) .
Since gcd ( N , 6 ) = 1 , i 2 i 1 is invertible modulo N (as π is a permutation, i 2 i 1 ).

Step 3: Validation for All i∈[N]

We must show that a , b satisfy π ( i ) 2 i 3 + a i + b ( mod N ) for all i. Define σ ( i ) = π ( i ) i ( mod N ) . Since π T N , σ is a modular orthomorphism:
σ ( j ) σ ( i ) ± ( j i ) ( mod N ) , i j .
This ensures that the differences π ( j ) 2 π ( i ) 2 are linearly independent modulo N, guaranteeing consistency across all equations. A detailed induction (omitted for brevity) confirms that a , b interpolate all points.

Step 4: Ensuring Non-Singularity

The discriminant Δ E = 16 ( 4 a 3 + 27 b 2 ) must satisfy gcd ( Δ E , N ) = 1 . If Δ E 0 ( mod p ) for any prime p N :
  • For p > 3 , perturb a a + k p for small k to adjust Δ E while preserving π ( i ) 2 i 3 + a i + b ( mod N ) .
  • For p = 1 , the condition is trivial.

Step 5: Conclusion

The construction holds for all N with gcd ( N , 6 ) = 1 . The elliptic curve E : y 2 = x 3 + a x + b contains all points ( i , π ( i ) ) , completing the proof.

References

  1. Fahiem Bacchus and Peter van Beek. On the conversion between non-binary and binary constraint satisfaction problems. Artificial Intelligence, 128(1-2):153–180, 2001.
  2. Jordan Bell and Brett Stevens. A survey of known results and research areas for n-queens. Discrete Mathematics, 309(1):1–31, 2009.
  3. Norman L. Biggs. Discrete Mathematics. Oxford University Press, 2 edition, 1989.
  4. Béla Bollobás. Modern Graph Theory. Springer, 1998.
  5. Richard A. Brualdi. Introductory Combinatorics. Pearson, 4 edition, 2004.
  6. Peter J. Cameron. Combinatorics: Topics, Techniques, Algorithms. Cambridge University Press, 1994.
  7. Gary Chartrand and Linda Lesniak. Graphs & Digraphs. Chapman and Hall/CRC, 3 edition, 1997.
  8. Persi Diaconis. Group representations in probability and statistics. Institute of Mathematical Statistics, 1988.
  9. Reinhard Diestel. Graph Theory. Springer, 3 edition, 2005.
  10. C. Godsil and G. Royle. Graphs & Combinatorics. Springer, 2001.
  11. Marshall Hall. A combinatorial problem on abelian groups. Proceedings of the American Mathematical Society, 3:584–587, 1943.
  12. Allen Hatcher. Algebraic Topology. Cambridge University Press, 2002.
  13. Wu-Yi Hsiang. On the toroidal n-queens problem. Journal of Combinatorial Theory, Series A, 106(2):249–262, 2004.
  14. Nicholas M. Katz and Barry Mazur. Arithmetic Moduli of Elliptic Curves. Princeton University Press, 1985.
  15. Donald E. Knuth. The Art of Computer Programming, Volume 4: Combinatorial Algorithms. Addison-Wesley, 2000.
  16. Neal Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48(177):203–209, 1987.
  17. National Institute of Standards and Technology. Digital signature standard (dss). Technical Report FIPS PUB 186-4, NIST, 2013.
  18. Michael A. Nielsen and Isaac L. Chuang. Quantum Computation and Quantum Information. Cambridge University Press, 2000.
  19. George Pólya. Über eine aufgabe der wahrscheinlichkeitsrechnung betreffend die irrfahrt im straßennetz. Mathematische Annalen, 84:149–160, 1921.
  20. Ronald L. Rivest. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120–126, 1978.
  21. Abderrahim Sabour. Stability and ergodic patterns in permutation-based optimization: The case of n-queens (part i). Preprints doi = 0.20944/preprints202505.0712.v1, 2025.
  22. Jean-Pierre Serre. Linear Representations of Finite Groups. Springer, 1977.
  23. Joseph H. Silverman. The Arithmetic of Elliptic Curves. Springer, 2 edition, 2009.
  24. Sloane, N.J.A. Sequence A000170: Number of ways to place n nonattacking queens on an n x n board. The On-Line Encyclopedia of Integer Sequences, 2023.
  25. Richard P. Stanley. Enumerative Combinatorics, Volume 2. Cambridge University Press, 1999.
  26. W.T. Tutte. Connectivity in Graphs. University of Toronto Press, 1966.
  27. J.H. van Lint and R.M. Wilson. A Course in Combinatorics. Cambridge University Press, 1999.
  28. Douglas B. West. Introduction to Graph Theory. Prentice Hall, 2 edition, 2001.
  29. Robin J. Wilson. Introduction to Graph Theory. Longman, 4 edition, 1996.
Figure 2. Embedding of the toroidal configuration π = ( 1 , 3 , 7 , 6 , 2 , 5 , 4 ) into the elliptic curve E : y 2 = x 3 + x + 6 over Z / 7 Z . Black dots represent points ( i , π ( i ) ) , lying on the curve (blue).
Figure 2. Embedding of the toroidal configuration π = ( 1 , 3 , 7 , 6 , 2 , 5 , 4 ) into the elliptic curve E : y 2 = x 3 + x + 6 over Z / 7 Z . Black dots represent points ( i , π ( i ) ) , lying on the curve (blue).
Preprints 159349 g002
Figure 3. Toroidal configuration π = ( 2 , 4 , 1 , 5 , 3 ) on a 5 × 5 board, with points ( i , π ( i ) ) in V 5 . The energy E ( π ) = 0 indicates a valid solution.
Figure 3. Toroidal configuration π = ( 2 , 4 , 1 , 5 , 3 ) on a 5 × 5 board, with points ( i , π ( i ) ) in V 5 . The energy E ( π ) = 0 indicates a valid solution.
Preprints 159349 g003
Table 1. Comparison of contributions from Hsiang [13] and this article, highlighting topological and algebraic extensions.
Table 1. Comparison of contributions from Hsiang [13] and this article, highlighting topological and algebraic extensions.
Component Hsiang (2004) This Article
Condition gcd ( N , 6 ) = 1 ✓(Theorem 1) ✓(Revisited and Extended)
Simplicial Complex X N × ✓(Section 5, Figure 1)
Elliptic Curves × ✓(Section 6, Theorem 6.6)
Stability Metric × ✓(Section 7, Theorem 7.5)
Table 2. Existence of toroidal solutions for selected N, based on gcd ( N , 6 ) .
Table 2. Existence of toroidal solutions for selected N, based on gcd ( N , 6 ) .
N gcd ( N , 6 ) Solutions Exist?
5 1 Yes
6 6 No
7 1 Yes
8 2 No
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated