Preprint
Article

This version is not peer-reviewed.

Primary Automorphic Forms: Theta Constants, the j–Invariant, Modular Lambda, the Dyadic Isogeny Correspondence, and Four New Structural Observations

Submitted:

02 March 2026

Posted:

03 March 2026

You are already at the latest version

Abstract
We develop the central identities of the theory of automorphic forms centering on the Jacobi theta constants \( \vartheta_2, \vartheta_3, \vartheta_4 \), the weight-4 Eisenstein series \( E_4 \), the discriminant \( \Delta \), the j–invariant, and the modular \( \lambda \)–function. The classical theory is organized around a single minimality theorem: the pair \( (\vartheta_3(\tau), \vartheta_3(2\tau)) \) suffices to recover every primary automorphic invariant at level \( \leq 2 \) as an explicit polynomial or rational function.Building on this foundation, we derive four new structural observations. \( \textbf{(I)} \) The shifted invariant \( J(\tau) := j(\tau) - 744 \) satisfies \( J(2\tau) = J(\tau)^2 - 2 \cdot 196884 + O(q^2) \) (and in fact \( J(2\tau)=J(\tau)^2-2\cdot 196884-2\cdot 21493760\,q^2+O(q^4) \)), placing the first Monster moonshine coefficient as the \emph{leading deviation from perfect squaring} under the doubling isogeny; the corresponding quadratic fixed-point polynomial has discriminant 1575073. \( \textbf{(II)} \) The sequence \( \vartheta_3(2^n\tau)^2 \) is the arithmetic-mean sequence of the arithmetic-geometric mean (AGM) iteration initialized at \( (\vartheta_3(\tau)^2, \vartheta_4(\tau)^2) \); the unique AGM fixed-point symmetry \( \vartheta_3(\tau) = \vartheta_4(\tau) \) identifies \( j(\tau) = 1728 \) (\( \tau = i \)) as the self-dual elliptic curve. \( \textbf{(III)} \) The \( \lambda \)-ODE \( d\lambda/dt = -\pi\lambda(1-\lambda)\vartheta_3(it)^4 \) approaches a logistic regime for \( t\gg 1 \); matching the exact midpoint value \( \lambda(i)=1/2 \) produces the explicit sigmoid approximation \( \lambda(it) \approx (1 + e^{\pi(t-1)})^{-1} \) for large t. \textbf{(IV)} The quantity \( R(\tau) := 2\vartheta_3(2\tau)^2-\vartheta_3(\tau)^2 = \vartheta_4(\tau)^2 \) satisfies the square-root recursion \( R(2\tau) = \vartheta_3(\tau)\sqrt{R(\tau)} \) under doubling; equivalently, \( \vartheta_4(2^n\tau) \) lies in a nested-radical (generically quadratic) extension tower over the dyadic \( \vartheta_3 \)-field, growing by one quadratic layer at each step---an algebraic obstruction distinct from the polynomial j-isogeny ladder.
Keywords: 
;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  

1. Introduction

1.1. Scope And Purpose

The theory of modular forms for SL 2 ( Z ) is built on a small number of fundamental objects: the Eisenstein series, the discriminant cusp form, the Jacobi theta constants, and the automorphic invariants they generate. This paper assembles the primary identities relating these objects into a single self-contained account, then derives four new structural observations from first principles.
The guiding organizing principle is polynomial expressibility: which automorphic invariants can be expressed as explicit polynomials or rational functions of a minimal set of generating theta data? The classical answer is complete: the pair ( A , B ) = ( ϑ 3 ( τ ) , ϑ 3 ( 2 τ ) ) determines λ , E 4 , Δ , and j via the duplication identities. Sections 2–7 establish this classical foundation.
Sections 8–11 then take this foundation seriously and push it, deriving four structural observations:
(I)
Shifted squaring and moonshine: J : = j 744 nearly squares under τ 2 τ , with correction term 2 × 196884 (Section 8).
(II)
AGM structure of the theta sequence: the dyadic theta orbit is the arithmetic-mean sequence of a classical AGM (Section 9).
(III)
Universal sigmoid crossover of λ : the λ -ODE has a logistic regime for t 1 ; matching at t = 1 yields an explicit sigmoid approximation (Section 10).
(IV)
Square-root recursion and the quadratic extension tower: the quantity R ( τ ) = ϑ 4 ( τ ) 2 satisfies a square-root recursion under doubling, generating a nested-radical tower for ϑ 4 ( 2 n τ ) (Section 11).

1.2. Organization

Sections 2–7 develop the classical theory efficiently but completely, with full proofs where they illuminate structure. Each of Sections 8–11 is self-contained: it states an observation, gives a complete derivation from the classical material, and discusses consequences and further directions.

2. The Upper Half-Plane And The Modular Group

Definition 1
(Upper half-plane and nome). Theupper half-planeis H : = { τ C : Im ( τ ) > 0 } . For τ H thenomeis q : = e π i τ ; since Im ( τ ) > 0 we have | q | < 1 .
Definition 2
(Modular group and action). Themodular group SL 2 ( Z ) acts on H by γ · τ = ( a τ + b ) / ( c τ + d ) . Its generators are T : τ τ + 1 and S : τ 1 / τ . The effective group is PSL 2 ( Z ) : = SL 2 ( Z ) / { ± I } .
Definition 3
(Modular forms and automorphic functions). A holomorphic f : H C is amodular form of weight kif f ( γ · τ ) = ( c τ + d ) k f ( τ ) for all γ SL 2 ( Z ) , and f is holomorphic at the cusp. Weight- k = 0 invariants areautomorphic functions.

3. Jacobi Theta Constants

Definition 4
(Theta constants). For τ H and q = e π i τ :
ϑ 2 ( τ ) : = 2 n 0 q ( n + 1 2 ) 2 ,
ϑ 3 ( τ ) : = 1 + 2 n 1 q n 2 ,
ϑ 4 ( τ ) : = 1 + 2 n 1 ( 1 ) n q n 2 .
Theorem 1
(Jacobi identity). ϑ 3 ( τ ) 4 = ϑ 2 ( τ ) 4 + ϑ 4 ( τ ) 4 .
Theorem 2
(Transformation formulas under S : τ 1 / τ ).
ϑ 2 ( 1 / τ ) = ( i τ ) 1 / 2 ϑ 4 ( τ ) ,
ϑ 3 ( 1 / τ ) = ( i τ ) 1 / 2 ϑ 3 ( τ ) ,
ϑ 4 ( 1 / τ ) = ( i τ ) 1 / 2 ϑ 2 ( τ ) .
Theorem 3
(q-product representations).
ϑ 2 ( τ ) = 2 q 1 / 4 n = 1 ( 1 q 2 n ) ( 1 + q 2 n ) 2 ,
ϑ 3 ( τ ) = n = 1 ( 1 q 2 n ) ( 1 + q 2 n 1 ) 2 ,
ϑ 4 ( τ ) = n = 1 ( 1 q 2 n ) ( 1 q 2 n 1 ) 2 .

4. Eisenstein Series, Discriminant, And J–Invariant

Definition 5
(Primary automorphic objects).
E 4 ( τ ) : = 1 + 240 n = 1 σ 3 ( n ) q 2 n ,
Δ ( τ ) : = q 2 n = 1 ( 1 q 2 n ) 24 ,
j ( τ ) : = E 4 ( τ ) 3 Δ ( τ ) = q 2 + 744 + 196884 q 2 +
E 4 is a weight-4 modular form; Δ is the unique (up to scalar) weight-12 cusp form, nonvanishing on H ; j is the PSL 2 ( Z ) -invariant automorphic function giving a biholomorphism PSL 2 ( Z ) ( H { } ) P 1 ( C ) .
Theorem 4
(Theta representations of E 4 , Δ , j).
E 4 ( τ ) = 1 2 ϑ 2 ( τ ) 8 + ϑ 3 ( τ ) 8 + ϑ 4 ( τ ) 8 ,
Δ ( τ ) = 1 256 ϑ 2 ( τ ) 8 ϑ 3 ( τ ) 8 ϑ 4 ( τ ) 8 ,
j ( τ ) = 32 ϑ 2 8 + ϑ 3 8 + ϑ 4 8 3 ϑ 2 8 ϑ 3 8 ϑ 4 8 .

5. The Modular λ –function And The J λ Relation

Definition 6
(Modular λ –function).
λ ( τ ) : = ϑ 2 ( τ ) ϑ 3 ( τ ) 4 .
This is a Hauptmodul for Γ ( 2 ) , giving a biholomorphism Γ ( 2 ) H C { 0 , 1 } . On the imaginary axis, λ ( i t ) ( 0 , 1 ) for all t > 0 .
Proposition 1
(Functional equation and special values of λ ). The modular λ–function satisfies
λ 1 τ = 1 λ ( τ ) .
In particular, λ ( i ) = 1 / 2 . Moreover, on the imaginary axis:
λ ( i t ) 1 ( t 0 + ) , λ ( i t ) 0 ( t + ) .
Proof. 
From Theorem 2,
λ 1 τ = ϑ 2 ( 1 / τ ) ϑ 3 ( 1 / τ ) 4 = ϑ 4 ( τ ) ϑ 3 ( τ ) 4 .
Using Jacobi’s identity ϑ 3 4 = ϑ 2 4 + ϑ 4 4 gives
1 λ ( τ ) = 1 ϑ 2 ϑ 3 4 = ϑ 4 ϑ 3 4 ,
hence (17). Setting τ = i yields λ ( i ) = 1 λ ( i ) so λ ( i ) = 1 / 2 . For t + , q = e π t 0 so ϑ 2 ( i t ) 0 and ϑ 3 ( i t ) 1 , hence λ ( i t ) 0 . For t 0 + , use (17) with τ = i t : λ ( i t ) = 1 λ ( i / t ) and i / t i so λ ( i / t ) 0 . □
Theorem 5
(j as a rational function of λ ; polynomial relation).
j ( τ ) = 256 ( 1 λ + λ 2 ) 3 λ 2 ( 1 λ ) 2 .
Equivalently, j and λ satisfy the irreducible degree-6 polynomial relation
j λ 2 ( 1 λ ) 2 256 ( 1 λ + λ 2 ) 3 = 0 .
Proposition 2
(Differential equation for λ ). For t > 0 with τ = i t ,
d λ d t = π λ ( 1 λ ) ϑ 3 ( i t ) 4 .

6. Theta Duplication Identities And Two-Scale Formulas

Theorem 6
(Theta duplication identities).
ϑ 3 ( τ ) 2 = ϑ 3 ( 2 τ ) 2 + ϑ 2 ( 2 τ ) 2 ,
ϑ 4 ( τ ) 2 = ϑ 3 ( 2 τ ) 2 ϑ 2 ( 2 τ ) 2 ,
ϑ 2 ( τ ) 2 = 2 ϑ 2 ( 2 τ ) ϑ 3 ( 2 τ ) .
Theorem 7
(Two-scale minimality: ( A , B ) determines all primary invariants). Let A : = ϑ 3 ( τ ) and B : = ϑ 3 ( 2 τ ) . Then:
ϑ 2 ( τ ) 8 = 16 B 4 ( A 2 B 2 ) 2 ,
ϑ 4 ( τ ) 8 = ( A 2 2 B 2 ) 4 ,
and
λ ( τ ) = 4 B 2 ( A 2 B 2 ) A 4 ,
1 λ ( τ ) = ( A 2 2 B 2 ) 2 A 4 ,
E 4 ( τ ) = 1 2 A 8 + ( A 2 2 B 2 ) 4 + 16 B 4 ( A 2 B 2 ) 2 ,
Δ ( τ ) = 1 16 B 4 ( A 2 B 2 ) 2 A 8 ( A 2 2 B 2 ) 4 ,
so that j ( τ ) = E 4 ( τ ) 3 / Δ ( τ ) is a quotient of polynomials in ( A , B ) .
Proof. 
From (22), ϑ 2 ( 2 τ ) 2 = A 2 B 2 . From (24), ϑ 2 ( τ ) 4 = 4 B 2 ( A 2 B 2 ) ; squaring gives (25). From (23), ϑ 4 ( τ ) 2 = B 2 ( A 2 B 2 ) = 2 B 2 A 2 , so ϑ 4 ( τ ) 4 = ( A 2 2 B 2 ) 2 ; squaring gives (26). The formulas for λ and 1 λ follow by dividing by A 4 = ϑ 3 ( τ ) 4 . Substituting into Theorem 4 gives (29)–(30). □

7. Dyadic Isogeny and the Modular Polynomial Φ 2

Definition 7
(Modular polynomial Φ 2 ).
Φ 2 ( X , Y ) : = X 3 + Y 3 X 2 Y 2 + 1488 ( X 2 Y + X Y 2 ) 162000 ( X 2 + Y 2 ) + 40773375 X Y + 8748000000 ( X + Y ) 157464000000000 .
Theorem 8
(2-isogeny algebraic identity). For all τ H , Φ 2 ( j ( τ ) , j ( 2 τ ) ) = 0 . The polynomial Φ 2 is symmetric, of degree 3 in each variable, corresponding to the three cyclic order-2 subgroups of ( Z / 2 Z ) 2 .
Definition 8
(Dyadic orbit). Fix τ 0 H . Set τ n : = 2 n τ 0 . Consecutive j-values satisfy Φ 2 ( j ( τ n ) , j ( τ n + 1 ) ) = 0 for all n 0 , forming analgebraic ladder.

8. Observation I: Shifted Squaring And Monster Moonshine

8.1. Statement

Observation 1
(Shifted squaring identity). Define theshifted j-invariant
J ( τ ) : = j ( τ ) 744 .
Then, with q = e π i τ ,
J ( 2 τ ) = J ( τ ) 2 2 · 196884 + O ( q 2 ) .
More precisely,
J ( 2 τ ) = J ( τ ) 2 2 · 196884 2 · 21493760 q 2 + O ( q 4 ) .
The leading correction coefficient 2 × 196884 is twice the dimension of the smallest non-trivial representation of the Monster group M .

8.2. Derivation

From the standard q-expansion (with q = e π i τ , so j has terms q 2 , q 0 , q 2 , ):
j ( τ ) = q 2 + 744 + 196884 q 2 + 21493760 q 4 + 864299970 q 6 +
Hence
J ( τ ) = q 2 + 196884 q 2 + 21493760 q 4 + 864299970 q 6 + .
Under τ 2 τ , the nome q q 2 :
J ( 2 τ ) = q 4 + 196884 q 4 + 21493760 q 8 + O ( q 12 ) .
On the other hand, squaring gives
J ( τ ) 2 = q 2 + 196884 q 2 + 21493760 q 4 + 864299970 q 6 + 2 = q 4 + 2 · 196884 + 2 · 21493760 q 2 + 196884 2 + 2 · 864299970 q 4 + O ( q 6 ) .
Subtracting,
J ( 2 τ ) J ( τ ) 2 = 2 · 196884 2 · 21493760 q 2 + 196884 196884 2 2 · 864299970 q 4 + O ( q 6 ) ,
which implies (33) and (34).

8.3. The Fixed-Point Polynomial and its Discriminant

Proposition 3
(Fixed points and discriminant). The leading-order quadratic approximation to the isogeny doubling map on J is
f ( x ) : = x 2 2 · 196884 = x 2 393768 .
The fixed points of f ( x ) = x are the roots of
x 2 x 393768 = 0 ,
which has discriminant
Δ fp = 1 + 4 · 393768 = 1575073 .
In particular, the fixed points are real but (since Δ fp is not a square) are not rational.
Remark 1.
Including the q 2 correction from (34), one has
J ( 2 τ ) = J ( τ ) 2 393768 42987520 q 2 + O ( q 4 ) .
The coefficient 42987520 = 2 · 21493760 is the next moonshine coefficient in the q-expansion of J.
Remark 2
(Moonshine interpretation). In Monstrous Moonshine (Conway–Norton, Borcherds), the coefficients of J ( τ ) are dimensions of graded pieces of the Monster module V : dim V n = c ( n ) where J ( τ ) = c ( n ) q 2 n . Observation 1 states that the discrepancy between J ( 2 τ ) and J ( τ ) 2 is, to leading order, 2 c ( 1 ) = 2 dim V 1 , i.e., twice the dimension of the first nontrivial graded piece. This suggests an interpretation: the failure of J to behave multiplicatively with respect to the doubling correspondence is measured in moonshine units.
A natural question: for the McKay–Thompson series T g ( τ ) of an element g M , does T g ( 2 τ ) T g ( τ ) 2 = 2 χ g + O ( q ) where χ g is the character of g on V 1 ? This would be a moonshine-level refinement of (33).

9. Observation II: The AGM Structure Of The Dyadic Theta Sequence

9.1. Statement

Observation 2
(Dyadic theta orbit as AGM arithmetic-mean sequence). Fix τ H and let
a n : = ϑ 3 ( 2 n τ ) 2 , d n : = ϑ 4 ( 2 n τ ) 2 .
Then the duplication identities imply the exact AGM recursion
a n + 1 = a n + d n 2 , d n + 1 = a n d n .
(For τ = i t on the imaginary axis, the square root is taken as the positive real root.) In particular, a n is thearithmetic-mean sequenceof the classical AGM iteration initialized at ( a 0 , d 0 ) = ( ϑ 3 ( τ ) 2 , ϑ 4 ( τ ) 2 ) , and ( a n , d n ) converges rapidly to the common limit 1.

9.2. Derivation

From the duplication identity (22)–(23) one obtains
ϑ 3 ( 2 τ ) 2 = ϑ 3 ( τ ) 2 + ϑ 4 ( τ ) 2 2 ,
ϑ 4 ( 2 τ ) 2 = ϑ 3 ( τ ) ϑ 4 ( τ ) ,
where (46) is the geometric-mean identity (proved from q-products in the Appendix). Identity (45) says: ϑ 3 ( 2 τ ) 2 is the arithmetic mean of ϑ 3 ( τ ) 2 and ϑ 4 ( τ ) 2 . Identity (46) says: ϑ 4 ( 2 τ ) 2 is the geometric mean of ϑ 3 ( τ ) 2 and ϑ 4 ( τ ) 2 . Thus the pair ( a n , d n ) iterates the AGM step exactly, giving (44).
Proposition 4
(AGM limit and convergence rate). For any τ = i t with t > 0 :
(i)
AGM ( ϑ 3 ( i t ) 2 , ϑ 4 ( i t ) 2 ) = 1 .
(ii)
As n ,
ϑ 3 ( 2 n i t ) 2 1 4 e π · 2 n t , 1 ϑ 4 ( 2 n i t ) 2 4 e π · 2 n t .
Proof. (i) Since 2 n i t i , we have q n = e π 2 n t 0 and hence ϑ 3 ( 2 n i t ) 1 and ϑ 4 ( 2 n i t ) 1 . The AGM recursion forces both sequences to converge to their common AGM limit, which is therefore 1.
(ii) For large n, ϑ 3 ( 2 n i t ) = 1 + 2 q n + O ( q n 4 ) , so ϑ 3 ( 2 n i t ) 2 = 1 + 4 q n + O ( q n 2 ) and ϑ 3 ( 2 n i t ) 2 1 4 q n . Similarly ϑ 4 ( 2 n i t ) = 1 2 q n + O ( q n 4 ) gives ϑ 4 ( 2 n i t ) 2 = 1 4 q n + O ( q n 2 ) and 1 ϑ 4 ( 2 n i t ) 2 4 q n . □

9.3. The Self-Dual Fixed Point At τ = I

Proposition 5
(Self-dual fixed point). The AGM iteration ( a n , d n ) initialized at ( ϑ 3 ( τ ) 2 , ϑ 4 ( τ ) 2 ) issymmetric( a 0 = d 0 ) if and only if ϑ 3 ( τ ) = ϑ 4 ( τ ) , which holds if and only if λ ( τ ) = 1 / 2 , equivalently j ( τ ) = 1728 , equivalently τ = i (in the fundamental domain).
Proof. 
a 0 = d 0 ϑ 3 ( τ ) 2 = ϑ 4 ( τ ) 2 . On the imaginary axis both ϑ 3 , ϑ 4 are positive, so a 0 = d 0 ϑ 3 = ϑ 4 . From λ = ( ϑ 2 / ϑ 3 ) 4 and ϑ 3 4 = ϑ 2 4 + ϑ 4 4 :
ϑ 3 = ϑ 4 ϑ 3 4 = 2 ϑ 4 4 ϑ 2 4 = ϑ 4 4 λ = 1 / 2 .
Then (19) gives j = 1728 . Finally, j ( τ ) = 1728 occurs at τ = i in the standard fundamental domain. □
Remark 3
(Geometric meaning). j = 1728 corresponds to the elliptic curve y 2 = x 3 x , which has the extra automorphism [ i ] : ( x , y ) ( x , i y ) of order 4. This is precisely the unique elliptic curve (up to isomorphism) that is isomorphic to its own quadratic twist, i.e., theself-dualcurve. Proposition 5 says this special geometric property is encoded as the unique symmetric starting point of the theta AGM.

10. Observation III: Universal Sigmoid Crossover Of λ

10.1. Statement

Observation 3
(Sigmoid approximation from the large-t logistic regime). Consider the ODE (21): d λ / d t = π λ ( 1 λ ) ϑ 3 ( i t ) 4 for λ = λ ( i t ) , t > 0 .
(i)
For t 0 + : ϑ 3 ( i t ) 4 t 2 and λ ( i t ) 1 .
(ii)
For t : ϑ 3 ( i t ) 4 1 , and the ODE approaches the logistic equation d λ / d t = π λ ( 1 λ ) .
(iii)
Matching theexactmidpoint value λ ( i ) = 1 / 2 to the logistic-limit family yields the explicit sigmoid
λ ( i t ) 1 1 + e π ( t 1 ) ,
which is a convenient large-t closed-form approximation (with center at t = 1 ).

10.2. Derivation

Step 1: Behavior at t 0 + . From the S-transform ϑ 3 ( 1 / τ ) = ( i τ ) 1 / 2 ϑ 3 ( τ ) , setting τ = i t :
ϑ 3 ( i / t ) = t 1 / 2 ϑ 3 ( i t ) .
As t 0 + , i / t i , so ϑ 3 ( i / t ) 1 . Therefore ϑ 3 ( i t ) t 1 / 2 and ϑ 3 ( i t ) 4 t 2 . By Proposition 1, λ ( i t ) 1 as t 0 + .
Step 2: Behavior at t . q = e π t 0 , so ϑ 3 ( i t ) = 1 + 2 e π t + 1 and ϑ 3 ( i t ) 4 1 . The ODE approaches
d λ d t π λ ( 1 λ ) ,
the standard logistic equation, whose general solution is λ ( t ) = 1 / ( 1 + C e π t ) for constant C > 0 .
Step 3: Fixing the constant by λ ( i ) = 1 / 2 . We know λ ( i ) = 1 / 2 exactly (Proposition 1). Substituting t = 1 , λ = 1 / 2 into 1 / ( 1 + C e π ) = 1 / 2 gives C = e π . Therefore
λ ( i t ) 1 1 + e π e π t = 1 1 + e π ( t 1 ) ,
which is (48).
Proposition 6
(Quantitative control via the logit variable). Define the logit variable y ( t ) : = log λ ( i t ) / ( 1 λ ( i t ) ) . Then
d y d t = π ϑ 3 ( i t ) 4 .
Hence for any T 1 and all t T ,
y ( t ) = y ( T ) π ( t T ) π T t ϑ 3 ( i s ) 4 1 d s .
Moreover, for t 1 one has the elementary bound
0 < ϑ 3 ( i t ) 4 1 16 e π t ,
so the deviation of y ( t ) from its logistic-limit behavior is bounded by
0 π T t ( ϑ 3 ( i s ) 4 1 ) d s 16 e π T .
Remark 4
(Crossover and the three special values). The point t = 1 simultaneously realizes: (i) the unique fixed point of t 1 / t (the imaginary-axis analogue of S); (ii) the self-dual elliptic curve j = 1728 ; (iii) the exact symmetry value λ ( i ) = 1 / 2 ; (iv) the center of the logistic-limit sigmoid (48) obtained by matching at t = 1 . These coincidences have a common cause: the S-symmetry τ 1 / τ fixes τ = i and forces λ ( i ) = 1 λ ( i ) , i.e., λ ( i ) = 1 / 2 .

11. Observation IV: Square-root Recursion And The Quadratic Extension Tower

11.1. Statement

Observation 4
(Square-root recursion of R = ϑ 4 2 ). Define
R ( τ ) : = 2 ϑ 3 ( 2 τ ) 2 ϑ 3 ( τ ) 2 = ϑ 4 ( τ ) 2 .
Then
R ( 2 τ ) = ϑ 3 ( τ ) R ( τ ) .
Consequently, the n-fold iterate satisfies
R ( 2 n τ ) = k = 0 n 1 ϑ 3 ( 2 k τ ) 1 / 2 n 1 k · R ( τ ) 1 / 2 n ,
a nested-radical expression. In particular, while eachsquare R ( 2 n τ ) = ϑ 4 ( 2 n τ ) 2 is polynomially expressible in the dyadic ϑ 3 -data, the unsquared values ϑ 4 ( 2 n τ ) = R ( 2 n τ ) generically generate a tower of quadratic extensions growing by one layer at each step—a genuinely different algebraic structure from the polynomial j-isogeny ladder.

11.2. Derivation

First, using (22)–(23),
ϑ 3 ( 2 τ ) 2 = ϑ 3 ( τ ) 2 + ϑ 4 ( τ ) 2 2 2 ϑ 3 ( 2 τ ) 2 ϑ 3 ( τ ) 2 = ϑ 4 ( τ ) 2 ,
which is (56).
Next, the geometric-mean identity (46) gives
ϑ 4 ( 2 τ ) 2 = ϑ 3 ( τ ) ϑ 4 ( τ ) .
In terms of R ( τ ) = ϑ 4 ( τ ) 2 , this is
R ( 2 τ ) = ϑ 4 ( 2 τ ) 2 = ϑ 3 ( τ ) ϑ 4 ( τ ) = ϑ 3 ( τ ) R ( τ ) ,
establishing (57) (with an understood choice of square-root branch; on the imaginary axis, take the positive real root).
Proposition 7
(Nested-radical formula for the full orbit). Iterating (57) yields
R ( 2 τ ) = ϑ 3 ( τ ) · R ( τ ) 1 / 2 ,
R ( 4 τ ) = ϑ 3 ( 2 τ ) · ϑ 3 ( τ ) 1 / 2 · R ( τ ) 1 / 4 ,
R ( 8 τ ) = ϑ 3 ( 4 τ ) · ϑ 3 ( 2 τ ) 1 / 2 · ϑ 3 ( τ ) 1 / 4 · R ( τ ) 1 / 8 ,
and in general (58).
Proof. 
By induction: set R n : = R ( 2 n τ ) and A n : = ϑ 3 ( 2 n τ ) . Then R n + 1 = A n R n . Expanding recursively gives the stated pattern of exponents, and the closed form (58) follows. □
Theorem 9
(A quadratic extension tower for ϑ 4 ( 2 n τ ) over dyadic ϑ 3 ). Fix τ H and let
F 0 = C ϑ 3 ( 2 n τ ) : n 0 .
For n 0 define
F n + 1 : = F n ϑ 4 ( 2 n τ ) = F n R ( 2 n τ ) .
Then:
(i)
For each n, [ F n + 1 : F n ] 2 .
(ii)
For each n, R ( 2 n τ ) = ϑ 4 ( 2 n τ ) 2 F 0 (indeed R ( 2 n τ ) = 2 ϑ 3 ( 2 n + 1 τ ) 2 ϑ 3 ( 2 n τ ) 2 ).
(iii)
Generically (i.e., away from special algebraic loci such as CM points and accidental square relations), each adjunction ϑ 4 ( 2 n τ ) produces a genuine quadratic extension, so the tower does not stabilize after finitely many steps.
Remark 5
(Contrast with the j-ladder). The j-isogeny ladder { j ( 2 n τ ) } is governed by Φ 2 , a polynomial relation of degree 3. Each j ( 2 n τ ) is algebraic of degree 3 n over C ( j ( τ ) ) . By contrast, the tower in Theorem 9 is radical in nature: even though ϑ 4 ( 2 n τ ) 2 is polynomially expressible in dyadic ϑ 3 -data, recovering ϑ 4 ( 2 n τ ) itself introduces (generically) a new square root at each step. The j-ladder is polynomial-algebraic; the ϑ 4 -tower is radical-algebraic. These are genuinely different algebraic structures coexisting inside the same automorphic orbit.

12. Summary And Further Directions

12.1. Summary Table

The following table collects the primary automorphic objects and their polynomial sources, together with the new observations.
Object Source / formula Section
ϑ 3 ( τ ) , ϑ 3 ( 2 τ ) Primary data ( A , B ) § 3
λ ( τ ) 4 B 2 ( A 2 B 2 ) / A 4 §6
E 4 ( τ ) Polynomial in ( A , B ) , Equation (29) § 6
Δ ( τ ) Polynomial in ( A , B ) , Equation (30) § 6
j ( τ ) Rational in ( A , B ) ; j λ 2 ( 1 λ ) 2 = 256 ( 1 λ + λ 2 ) 3 § 5
J ( 2 τ ) J ( τ ) 2 2 · 196884 + O ( q 2 ) (moonshine correction) § 8
( a n , d n ) = ( ϑ 3 ( 2 n τ ) 2 , ϑ 4 ( 2 n τ ) 2 ) AGM iteration; limit = 1 § 9
λ ( i t ) 1 / ( 1 + e π ( t 1 ) ) for t 1 § 10
ϑ 4 ( 2 n τ ) Nested radical / quadratic tower over dyadic ϑ 3 § 11

12.2. Open Questions

Each observation opens a concrete research direction.
From Observation I. For an element g of the Monster group M , let T g ( τ ) = q 1 + c g ( n ) q n be the McKay–Thompson series. Does T g ( 2 τ ) T g ( τ ) 2 = 2 c g ( 1 ) + O ( q ) ? More generally, what is the full correction series, and does it encode the character table of M on V ?
From Observation II. The AGM of ( ϑ 3 2 , ϑ 4 2 ) equals 1. The geometric AGM limit is n = 0 ϑ 4 ( 2 n τ ) / ϑ 3 ( 2 n τ ) , which relates to the complete elliptic integral K ( λ 1 / 2 ) via K = ( π / 2 ) ϑ 3 ( τ ) 2 . The AGM convergence rate gives a quantitative bound on the theta-spectrum decay. What is the spectrum of convergence exponents across τ H ?
From Observation III. The sigmoid approximation (48) gives a completely explicit approximate formula for λ ( i t ) on the imaginary axis. How well does the logistic model approximate λ ( i t ) for moderate t? The deviation from pure logistic behavior is controlled explicitly by ϑ 3 ( i t ) 4 1 (Proposition 6). Can one leverage such closed forms to build simple approximations to modular quantities built from λ ?
From Observation IV. The quadratic extension tower generated by { ϑ 4 ( 2 n τ ) } over the dyadic ϑ 3 -field is an explicit, concrete radical tower attached to automorphic data. What is its Galois group (as a profinite limit) for generic τ ? Does it embed into a known Galois-theoretic object such as the absolute Galois group of Q via the Galois action on CM values of ϑ 4 ?

13. Addendum To §Section 8: McKay–Thompson Series and the Doubling Squaring Defect

This section addresses the open questions following Observation 1 for the McKay–Thompson series T g of an element g M .

13.1. Normalization Conventions ( Q = E π I τ Versus Q = E 2 π I τ )

Throughout the main body of this paper we used
q : = e π i τ ,
so j ( τ ) = q 2 + 744 + 196884 q 2 + .
In Monstrous Moonshine it is standard to use
Q : = e 2 π i τ = q 2 ,
so that
J ( τ ) = j ( τ ) 744 = Q 1 + 196884 Q + 21493760 Q 2 + .
Similarly, a McKay–Thompson series is conventionally written
T g ( τ ) = Q 1 + n 1 c g ( n ) Q n ,
with vanishing constant term (the genus-zero Hauptmodul normalization).
All statements below are most transparent in the Q-normalization; converting back to the paper’s q-normalization is done by Q = q 2 and T g ( τ ) = a m q m with only odd/even powers as appropriate.

13.2. The Universal Leading Term: T g ( 2 τ ) T g ( τ ) 2 = 2 c g ( 1 ) + O ( Q )

Proposition 8
(Leading discrepancy from squaring under doubling). Let T g be as in (62). Then
T g ( 2 τ ) T g ( τ ) 2 = 2 c g ( 1 ) + O ( Q ) .
In particular, the constant term of T g ( 2 τ ) T g ( τ ) 2 is 2 c g ( 1 ) .
Proof. 
From (62),
T g ( 2 τ ) = Q 2 + n 1 c g ( n ) Q 2 n .
Also,
T g ( τ ) 2 = Q 1 + n 1 c g ( n ) Q n 2 = Q 2 + 2 c g ( 1 ) + O ( Q ) .
Subtracting yields (63). □
Remark 6
(Representation-theoretic meaning). In Monstrous Moonshine one has
c g ( n ) = Tr g V n ,
so the constant term in (63) is
2 c g ( 1 ) = 2 Tr g V 1 .
Thus the leading deviation from perfect squaring under the doubling map encodes the character of g on the first nontrivial graded piece V 1 .

13.3. The Full Correction Series: Explicit Coefficient Formula

Define the doubling squaring defect of T g by
D g ( τ ) : = T g ( 2 τ ) T g ( τ ) 2 = m 0 d g ( m ) Q m .
Proposition 9
(Explicit coefficients of D g ). Let T g be as in (62). Then for each m 0 ,
d g ( m ) = 1 2 m c g ( m / 2 ) 2 c g ( m + 1 ) + a + b = m a , b 1 c g ( a ) c g ( b ) ,
where 1 2 m is 1 if m is even and 0 otherwise. In particular,
d g ( 0 ) = 2 c g ( 1 ) , d g ( 1 ) = 2 c g ( 2 ) , d g ( 2 ) = c g ( 1 ) 2 c g ( 3 ) + c g ( 1 ) 2 .
Proof. 
Write T g ( 2 τ ) = Q 2 + n 1 c g ( n ) Q 2 n , so the coefficient of Q m in T g ( 2 τ ) is 1 2 m c g ( m / 2 ) for m 0 . Next expand
T g ( τ ) 2 = Q 2 + 2 n 1 c g ( n ) Q n 1 + a , b 1 c g ( a ) c g ( b ) Q a + b .
The coefficient of Q m in the middle term is 2 c g ( m + 1 ) and in the double sum is a + b = m , a , b 1 c g ( a ) c g ( b ) . Subtracting gives (65). □

13.4. Does D g Encode The Monster Character Table?

Remark 7
(What D g can and cannot add). The family of functions { T g ( τ ) } (over all conjugacy classes of M ) already encodes the characters Tr ( g V n ) for every n by definition. Therefore D g does not provide additionallinearinformation beyond the c g ( n ) , since each d g ( m ) is a universal polynomial expression in the c g ( · ) via (65).
What D g canencode are nonlinear constraints among traces. In the genus-zero setting, the deeper structure is Norton’sreplicability: doubling is controlled not only by T g ( 2 τ ) and T g ( τ ) 2 , but by Hecke-like combinations involving τ / 2 and ( τ + 1 ) / 2 and the power map g g 2 . From that viewpoint, D g is a coarse but explicit “shadow” of replicability.

14. Addendum To § 9: Convergence Exponents For The theta–AGM Across H

This section makes precise the dependence of the dyadic theta–AGM convergence rate on τ .

14.1. Dyadic Convergence Is Governed By The Dyadically Rescaled Nome

Let q : = e π i τ as in the paper. Then | q | = e π ( τ ) . For the dyadic orbit τ n : = 2 n τ we have the dyadic nome
q n : = e π i τ n = q 2 n , | q n | = e π 2 n ( τ ) .
Proposition 10
(Uniform dyadic exponential control). For any τ H and all n 0 ,
ϑ 3 ( 2 n τ ) 1 = 2 q n + O ( q n 4 ) ,
ϑ 4 ( 2 n τ ) 1 = 2 q n + O ( q n 4 ) .
Consequently,
ϑ 3 ( 2 n τ ) 2 1 = 4 q n + O ( q n 2 ) ,
1 ϑ 4 ( 2 n τ ) 2 = 4 q n + O ( q n 2 ) .
The implied constants are absolute (coming from the absolutely convergent theta series).
Proof. 
From Definition 4,
ϑ 3 ( 2 n τ ) = 1 + 2 m 1 q n m 2 = 1 + 2 q n + 2 q n 4 +
and similarly
ϑ 4 ( 2 n τ ) = 1 + 2 m 1 ( 1 ) m q n m 2 = 1 2 q n + 2 q n 4 ,
which gives (66)–(67). Squaring and using | q n | < 1 yields (68)–(69). □

14.2. A “Spectrum” Of Convergence Exponents

A convenient summary statistic for convergence is the asymptotic slope of log | ϑ 3 ( 2 n τ ) 2 1 | as a function of 2 n .
Definition 9
(Dyadic convergence exponent). For τ H define the dyadic convergence exponent
α ( τ ) : = π ( τ ) .
Proposition 11
(Asymptotic exponent law). Fix τ H . Then as n ,
log ϑ 3 ( 2 n τ ) 2 1 = α ( τ ) 2 n + O ( 1 ) ,
and similarly
log 1 ϑ 4 ( 2 n τ ) 2 = α ( τ ) 2 n + O ( 1 ) .
Proof. 
By Proposition 10,
ϑ 3 ( 2 n τ ) 2 1 = 4 q 2 n + O | q | 2 · 2 n ,
so ϑ 3 ( 2 n τ ) 2 1 = 4 | q | 2 n ( 1 + o ( 1 ) ) . Taking logs gives (71) since log | q | = π ( τ ) = α ( τ ) . □
Remark 8
(Interpretation). Thus across τ H the “spectrum” of exponents is the continuous family α ( τ ) = π ( τ ) : larger imaginary part gives exponentially faster dyadic convergence. Quadratic (AGM) convergence in the iteration index n manifests as exponential convergence in 2 n .

15. Addendum To § 10: Quantitative Logistic Approximation For λ ( i t )

This section refines the open questions following Observation 3 by providing explicit comparison inequalities and an asymptotic calibration discussion.

15.1. The Logit Transform Yields An Exact Integral Identity

Let λ ( t ) : = λ ( i t ) for t > 0 and define the logit variable
y ( t ) : = log λ ( t ) 1 λ ( t ) .
Proposition 12
(Exact logit evolution). For all t > 0 ,
y ( t ) = π ϑ 3 ( i t ) 4 ,
and with the exact midpoint λ ( 1 ) = λ ( i ) = 1 / 2 (Proposition 1), one has y ( 1 ) = 0 and
y ( t ) = π 1 t ϑ 3 ( i s ) 4 d s .
Proof. 
Differentiate (73):
y = λ λ + λ 1 λ = λ λ ( 1 λ ) .
Insert λ = π λ ( 1 λ ) ϑ 3 ( i t ) 4 from (21) to obtain (74), then integrate using y ( 1 ) = 0 . □

15.2. Logistic Comparison: The Sigmoid Is An Upper Bound For T 1

Define the matched logistic sigmoid
λ log ( t ) : = 1 1 + e π ( t 1 ) .
Proposition 13
(One-sided comparison for t 1 ). For all t 1 ,
λ ( i t ) λ log ( t ) .
Equivalently, y ( t ) π ( t 1 ) .
Proof. 
For all t > 0 one has ϑ 3 ( i t ) > 1 , hence ϑ 3 ( i t ) 4 > 1 . Thus from (74), y ( t ) < π for t > 0 . With y ( 1 ) = 0 , integration gives y ( t ) π ( t 1 ) for t 1 . Exponentiating and converting back to λ gives (77). □

15.3. Explicit Error Control From Bounds On ϑ 3 ( i t ) 4 1

Lemma 1
(Elementary upper bound on ϑ 3 ( i t ) 4 1 for t 1 ). For t 1 ,
0 < ϑ 3 ( i t ) 4 1 16 e π t 1 e π t .
In particular, 0 < ϑ 3 ( i t ) 4 1 32 e π t for all t 1 .
Proof. 
Let x : = e π t ( 0 , e π ] . From the series ϑ 3 ( i t ) = 1 + 2 n 1 x n 2 we bound
0 < ϑ 3 ( i t ) 1 2 n 1 x n = 2 x 1 x .
For u 0 , ( 1 + u ) 4 1 4 u ( 1 + u ) 3 4 u ( 1 + u ) 3 and with u = ϑ 3 1 2 x / ( 1 x ) one obtains a bound of the form (78); the stated constants are safe (not sharp) and suffice for explicit integral control. □
Proposition 14
(Uniform logit error bound for t 1 ). For all t 1 ,
0 π ( t 1 ) y ( t ) = π 1 t ϑ 3 ( i s ) 4 1 d s C 1 e π ,
where one may take C 1 = 32 (non-sharp), and more generally for any T 1 and all t T ,
0 π ( t T ) ( y ( t ) y ( T ) ) C 1 e π T .
Proof. 
Combine (75) with Lemma 1 and integrate the geometric bound e π s on [ T , ) . □

15.4. Asymptotic Calibration: Why The Matched Sigmoid Is Only A Rough Large-T Model

Proposition 15
(True large-t asymptotic of λ ( i t ) ). As t + ,
λ ( i t ) = 16 e π t 128 e 2 π t + O ( e 3 π t ) .
Remark 9
(Comparison with the matched logistic sigmoid). From (76),
λ log ( t ) e π ( t 1 ) = e π e π t ( t ) .
Since the true leading constant in (81) is 16, the matched sigmoid has asymptotic constant e π 23.14 , i.e., a relative large-t error approaching e π / 16 1 0.446 . Thus (48) should be viewed as a convenientclosed-form surrogatematched at t = 1 , not as an asymptotically sharp model. One can obtain an asymptotically calibrated logistic by shifting the center to t 0 : = π 1 log 16 0.882 , giving λ ( t ) ( 1 + e π ( t t 0 ) ) 1 for large t, though this no longer matches λ ( i ) = 1 / 2 exactly.
Remark 10
(Using closed forms to approximate modular quantities built from λ ). Any modular quantity that is a rational function of λ (e.g., j ( τ ) via Theorem 5) can be approximated on the imaginary axis by substituting an explicit surrogate for λ ( i t ) , such as (76) or an asymptotically calibrated variant. Proposition 12 makes the approximation problem equivalent to approximating the integral of ϑ 3 ( i t ) 4 , for which explicit exponentially small tails are available.

16. Addendum To § 11: The Radical Tower and its (Pro-2) Galois Structure

This section addresses the open questions following Observation 4: the expected Galois structure for generic τ and the CM (singular value) regime.

16.1. Reformulation As A Kummer Tower Over The Dyadic ϑ 3 -field

Fix τ H and define the base field
F 0 : = C ϑ 3 ( 2 n τ ) : n 0 .
Define the radicands
r n : = R ( 2 n τ ) = ϑ 4 ( 2 n τ ) 2 = 2 ϑ 3 ( 2 n + 1 τ ) 2 ϑ 3 ( 2 n τ ) 2 F 0 .
Now define the tower
F n + 1 : = F n ϑ 4 ( 2 n τ ) = F n r n .
Proposition 16
(Kummer nature and finite-stage Galois groups). For each N 1 , the compositum field
F 0 r 0 , r 1 , , r N 1
is a Kummer extension of exponent 2 over F 0 . In particular, its Galois closure over F 0 has Galois group a finite 2-group, and if the square classes of r 0 , , r N 1 are independent in F 0 × / ( F 0 × ) 2 , then the Galois group is the elementary abelian group
( Z / 2 Z ) N
acting by independent sign changes on the r n .
Proof. 
Over any field of characteristic 2 , adjoining finitely many square roots produces a Kummer extension of exponent 2. If the radicands are independent modulo squares, then the automorphisms are exactly independent sign changes, giving ( Z / 2 Z ) N . □

16.2. The Profinite Limit For “Generic” τ

(generic heuristic)).Definition 10 (Pro-2 Galois group of the radical tower Assuming the radicands { r n } n 0 are independent modulo squares in F 0 × , the inverse system of finite-stage Galois groups yields a profinite group
G n 0 Z / 2 Z ,
the profinite product of countably many Z / 2 Z .
Remark 11
(What “generic” should mean). A fully rigorous statement requires specifying a class of τ for which no accidental square relations r n ( F 0 ( r 0 , , r n 1 ) × ) 2 occur. One expects such relations only on thin loci (special algebraic constraints, e.g., CM points). Proving independence is a Kummer-theoretic problem over the transcendental field F 0 .

16.3. Cm Points And Embedding Into Class Field Theory

Now assume τ is CM, i.e., τ is imaginary quadratic and K : = Q ( τ ) is an imaginary quadratic field.
Remark 12
(CM singular values and Shimura reciprocity). Values of modular functions at CM points are algebraic and generate explicit class fields. For Γ ( 2 ) -level invariants one has:
  • λ ( τ ) is algebraic and lies in a suitable ring/ray class field of K.
  • Theta constants (or closely related eta-quotients and Weber functions) at CM points produce classical class invariants; their Galois action is described by Shimura reciprocity.
Therefore, when τ is CM, the algebraic fields generated by ϑ 4 ( 2 n τ ) (after appropriate normalization to remove transcendental scaling) are expected to lie in a tower of ring/ray class fields of K of 2-power conductor. In this regime the relevant Galois groups are abelian over K, controlled by (ray) class groups, and hence embed into G Q through the canonical restriction map G Q Gal ( H / K ) for the appropriate class field H.
Remark 13
(Answer to the embedding question). Thus:
(i)
For generic (non-CM) τ, the natural expectation is a large pro-2 Kummer group of the form (85) (subject to independence).
(ii)
For CM τ, the tower is governed by explicit CM class field theory and embeds into G Q in the standard way via Shimura reciprocity; the resulting extensions over K are expected to be (largely) abelian, reflecting the CM nature rather than producing a new nonabelian piece of G Q .

Appendix A. Explicit Coefficient Table For J(2τ)-J(τ) 2

Writing q = e π i τ :
J ( τ ) = q 2 + 196884 q 2 + 21493760 q 4 + 864299970 q 6 + J ( τ ) 2 = q 4 + 2 · 196884 + 2 · 21493760 q 2 + 196884 2 + 2 · 864299970 q 4 + J ( 2 τ ) = q 4 + 196884 q 4 + 21493760 q 8 + J ( 2 τ ) J ( τ ) 2 = 393768 42987520 q 2 + 196884 196884 2 2 · 864299970 q 4 +
The constant term is 393768 = 2 × 196884 . The coefficient of q 2 is 42987520 = 2 × 21493760 . The coefficient of q 4 is
196884 196884 2 2 · 864299970 = 40491712512 .

Appendix B. The Geometric-Mean Identity ϑ 4 (2τ) 2 =ϑ 3 (τ)ϑ 4 (τ)

We give a direct proof from q-products (Theorem 3). Let q = e π i τ .
From Theorem 3,
ϑ 3 ( τ ) ϑ 4 ( τ ) = n = 1 ( 1 q 2 n ) 2 ( 1 + q 2 n 1 ) 2 ( 1 q 2 n 1 ) 2 = n = 1 ( 1 q 2 n ) 2 ( 1 q 4 n 2 ) 2 .
Also,
ϑ 4 ( 2 τ ) = n = 1 ( 1 q 4 n ) ( 1 q 4 n 2 ) 2 ,
so
ϑ 4 ( 2 τ ) 2 = n = 1 ( 1 q 4 n ) 2 ( 1 q 4 n 2 ) 4 .
Finally, split the product for ϑ 3 ( τ ) ϑ 4 ( τ ) into even and odd indices:
n = 1 ( 1 q 2 n ) 2 = m = 1 ( 1 q 4 m ) 2 m = 1 ( 1 q 4 m 2 ) 2 .
Therefore
ϑ 3 ( τ ) ϑ 4 ( τ ) = m = 1 ( 1 q 4 m ) 2 m = 1 ( 1 q 4 m 2 ) 2 n = 1 ( 1 q 4 n 2 ) 2 = n = 1 ( 1 q 4 n ) 2 ( 1 q 4 n 2 ) 4 = ϑ 4 ( 2 τ ) 2 ,
as claimed.

Appendix C. Interlude: The Theta Self-Duality Point τ=i (I.E., T=1) and what it Can/Cannot Say About RH

Appendix C.1. The Identity ϑ 3 =ϑ 4 ⇒λ=1 2

We record explicitly the “ 1 2 ” implication mentioned in the modular-form paper, because it is the cleanest algebraic expression of the self-duality point τ = i .
Proposition A1
(Self-duality at τ = i forces λ ( i ) = 1 / 2 ). Let τ H and define λ ( τ ) : = ( ϑ 2 ( τ ) / ϑ 3 ( τ ) ) 4 . If ϑ 3 ( τ ) = ϑ 4 ( τ ) then λ ( τ ) = 1 / 2 . In particular, at τ = i one has ϑ 3 ( i ) = ϑ 4 ( i ) and hence λ ( i ) = 1 / 2 .
Proof. 
Jacobi’s identity gives
ϑ 3 ( τ ) 4 = ϑ 2 ( τ ) 4 + ϑ 4 ( τ ) 4 .
Assume ϑ 3 ( τ ) = ϑ 4 ( τ ) . Then
ϑ 4 ( τ ) 4 = ϑ 2 ( τ ) 4 + ϑ 4 ( τ ) 4 ϑ 2 ( τ ) 4 = ϑ 4 ( τ ) 4 .
Therefore
λ ( τ ) = ϑ 2 ( τ ) ϑ 3 ( τ ) 4 = ϑ 4 ( τ ) ϑ 4 ( τ ) 4 = 1 2 ,
since ϑ 3 ( τ ) 4 = ϑ 2 ( τ ) 4 + ϑ 4 ( τ ) 4 = 2 ϑ 4 ( τ ) 4 . (Equivalently, ϑ 2 4 = ϑ 4 4 and ϑ 3 4 = 2 ϑ 4 4 .)
Finally, τ = i is the fixed point of S : τ 1 / τ in the standard fundamental domain, and the theta S-transformations imply ϑ 2 ( i ) = ϑ 4 ( i ) , hence ϑ 3 ( i ) 4 = ϑ 2 ( i ) 4 + ϑ 4 ( i ) 4 = 2 ϑ 4 ( i ) 4 , i.e., ϑ 3 ( i ) = ϑ 4 ( i ) (on the imaginary axis these values are positive real). □
Remark A1
(What is special about τ = i ). The identity λ ( i ) = 1 / 2 is amodular symmetryconsequence: λ ( 1 / τ ) = 1 λ ( τ ) , hence at τ = i one has λ ( i ) = 1 λ ( i ) . This is structurally analogous to the Ξ-symmetry Ξ ( z ) = Ξ ( z ) and the functional equation ξ ( s ) = ξ ( 1 s ) , but it is not by itself a bridge to RH.

Appendix C.2. The Riemann ξ-function Is Built From A t↦1/T Theta Self-Duality

The most direct classical connection between zeta and theta is the Mellin transform identity for the Jacobi theta series on the imaginary axis. Define the Jacobi theta function on R > 0
Θ ( t ) : = n Z e π n 2 t = ϑ 3 ( i t ) , t > 0 .
Then Θ satisfies the modular self-duality (Poisson summation)
Θ ( t ) = t 1 / 2 Θ ( 1 / t ) .
Note that t = 1 is the fixed point of t 1 / t , corresponding to τ = i .
Theorem A1
(Mellin transform representation of ξ (standard)). For ( s ) > 1 one has
π s / 2 Γ s 2 ζ ( s ) = 0 Θ ( t ) 1 t s / 2 1 d t .
Moreover, by splitting the integral at t = 1 and using (A2), ξ ( s ) admits the symmetric representation
ξ ( s ) = 1 2 + s ( s 1 ) 2 1 Θ ( t ) 1 t s / 2 + t ( 1 s ) / 2 d t t ,
which holds for all s C by analytic continuation.
Remark A2
(Centering at t = 1 is forced by symmetry). The symmetric form (A4) is exactly the analytic reflection of the algebraic fixed point τ = i in the modular paper: the functional equation s 1 s corresponds to the involution t 1 / t whose fixed point is t = 1 . In this sense, the “ λ ( i ) = 1 / 2 ” phenomenon isstructurally parallelto the central role of t = 1 in ξ.

Appendix C.3. Cosine-Transform Form Of Ξ And Why Self-Duality Does Not Imply RH

Set Ξ ( z ) = ξ ( 1 2 + i z ) as in Definition ??. From (A4) we obtain an even cosine-transform representation.
Proposition A2
( Ξ as a cosine transform). Define for u R the even function
Φ ( u ) : = e u / 2 Θ ( e 2 u ) 1 = e u / 2 n Z e π n 2 e 2 u 1 .
Then Φ ( u ) is real, smooth, rapidly decaying as | u | , and even: Φ ( u ) = Φ ( u ) . Moreover,
Ξ ( z ) = 1 2 + z 2 + 1 4 2 0 Φ ( u ) cos ( z u ) d u .
Proof 
(Sketch). Insert s = 1 2 + i z into (A4) and change variables t = e 2 u (so d t / t = 2 d u ). Then
t s / 2 + t ( 1 s ) / 2 = e u / 2 e i z u + e i z u = 2 e u / 2 cos ( z u ) .
The evenness Φ ( u ) = Φ ( u ) is a direct rewriting of Θ ( t ) = t 1 / 2 Θ ( 1 / t ) . This yields (A6) after collecting constants. □
Remark A3
(Why the fixed point u = 0 (i.e., t = 1 , τ = i ) is not enough). Equation (A6) shows that RH is equivalent to the assertion that the entire function
F ( z ) : = 1 2 + z 2 + 1 4 2 0 Φ ( u ) cos ( z u ) d u
has only real zeros. The fact that Φ is even (coming from t 1 / t symmetry and hence from the t = 1 fixed point) forces Ξ to be even and real on R , but it doesnotforce all zeros to be real.
In other words: the theta self-duality point provides thesymmetryneeded for the functional equation, but RH is a much strongerreal-zerostatement about an entire cosine transform. Proving “cosine transform has only real zeros” typically requires additional deep structure (e.g., membership in the Laguerre–Pólya class, total positivity, or a de Bruijn–Newman type flow argument), not just evenness and decay.

Appendix C.4. What Would Count As Genuine RH Progress From The τ=i Picture?

The modular paper highlights that t = 1 (i.e., τ = i ) is a universal crossover point for λ ( i t ) and a self-dual point for the AGM iteration on theta constants. Here is the cleanest way to translate that into potential RH-relevant analytic progress:
(a)
Sharper explicit bounds on Θ ( t ) = ϑ 3 ( i t ) . From the certificate-architecture viewpoint, any method that yields computable, uniform bounds on Θ ( t ) and its derivatives on intervals t [ T 1 , T 2 ] improves the feasibility of stage certificates for Ξ in rectangles, because Ξ is built from Θ via (A4) and (A6).
(b)
A controlled approximation scheme for Φ ( u ) . If one can approximate Φ ( u ) by a kernel Φ N ( u ) whose cosine transform is known to have only real zeros, and prove that the approximation preserves real-rootedness (or preserves a de Bruijn–Newman constant bound), that would be genuine structural progress. The modular observations at τ = i give efficient approximations for theta data, but turning that into a root-preserving approximation for the cosine transform is the hard part.
(c)
A positivity/total-positivity route. Real-zero theorems for Fourier/cosine transforms often come from total positivity or variation-diminishing properties. The theta self-duality at u = 0 guarantees evenness, and the AGM structure provides strong monotonicity and convexity control of theta constants, but no known argument upgrades these facts to the total positivity properties needed for an RH proof.
Remark A4
(Scope statement). The identity ϑ 3 = ϑ 4 λ = 1 / 2 (and the fixed point t = 1 ) explains why t = 1 is a privileged symmetry center in theta-based formulas for ξ and Ξ. It doesnotby itself imply RH. Any RH implication would have to pass through a theorem ensuring that the cosine transform (A6) has only real zeros, which is a substantially stronger analytic property than self-duality.

Appendix D. Optional Bridge Addendum: Importing the Modular λ–ODE and the τ=i Midpoint Into the Certificate Language

This section is optional. It gives a precise way to “patch in” the modular λ -ODE material as an auxiliary computational oracle for estimating Θ ( t ) = ϑ 3 ( i t ) and hence the theta kernel Φ ( u ) , without claiming any RH implication.

Appendix D.1. Relating λ(it), ϑ 3 (it), And Θ(t)

Recall Θ ( t ) = ϑ 3 ( i t ) . The modular λ -function is
λ ( τ ) = ϑ 2 ( τ ) ϑ 3 ( τ ) 4 , τ H .
On the imaginary axis, τ = i t , t > 0 , one has λ ( i t ) ( 0 , 1 ) and λ ( i ) = 1 / 2 . The modular paper proves the ODE
d d t λ ( i t ) = π λ ( i t ) 1 λ ( i t ) ϑ 3 ( i t ) 4 = π λ ( i t ) 1 λ ( i t ) Θ ( t ) 4 .
Proposition A3
(Solving for Θ ( t ) 4 in terms of λ ). For t > 0 ,
Θ ( t ) 4 = 1 π · λ ( i t ) λ ( i t ) ( 1 λ ( i t ) ) .
Equivalently, in the logit variable y ( t ) = log ( λ ( i t ) / ( 1 λ ( i t ) ) ) ,
y ( t ) = π Θ ( t ) 4 .
Remark A5
(Meaning for certification). Equations (A8) and the logit identity show that any explicit enclosure scheme for λ ( i t ) and λ ( i t ) yields explicit enclosures for Θ ( t ) . Since ξ and Ξ are built from Θ by (A4)–(A6), this gives a principled path to turning modular information into numeric/interval bounds on Ξ ( z ) on rectangles in the Ξ-plane. That is compatible with the stagewise certificate architecture: it provides acomputable subroutinefor bounding the analytic inputs.

Appendix D.2. Midpoint Centering At T=1

The midpoint t = 1 is singled out by two exact identities:
t = 1 τ = i λ ( i ) = 1 2 ϑ 3 ( i ) = ϑ 4 ( i ) .
Thus any ODE integration of (A7) may be conveniently initialized at t = 1 with the exact value λ ( 1 ) = 1 / 2 , and propagated to t > 1 and t < 1 using rigorous interval-ODE methods.
Remark A6
(No RH consequence without a root-theorem). Even perfect knowledge of λ ( i t ) and Θ ( t ) does not automatically imply RH; it only improves our ability tocompute or certifyvalues of Ξ ( z ) in regions. Converting such computation into RH requires a global argument that all zeros are real, or a certificate system that covers U (Definition ??) with verified zero-free windows. The modular midpoint provides a natural computational anchor, not a direct RH proof mechanism.

References

  1. Apostol, T. M. Modular Functions and Dirichlet Series in Number Theory, 2nd ed.; Springer, 1990. [Google Scholar]
  2. Serre, J.-P. A Course in Arithmetic; Springer, 1973. [Google Scholar]
  3. Chandrasekharan, K. Elliptic Functions; Springer, 1985. [Google Scholar]
  4. Koblitz, N. Introduction to Elliptic Curves and Modular Forms, 2nd ed.; Springer, 1993. [Google Scholar]
  5. Cox, D. A. Primes of the Form x2+ny2, 2nd ed.; Wiley, 2013. [Google Scholar]
  6. Conway, J. H.; Norton, S. P. Monstrous moonshine. Bull. London Math. Soc. 1979, 11, 308–339. [Google Scholar] [CrossRef]
  7. Borcherds, R. E. Monstrous moonshine and monstrous Lie superalgebras. Invent. Math. 1992, 109, 405–444. [Google Scholar] [CrossRef]
  8. Diamond, F.; Shurman, J. A First Course in Modular Forms; Springer, 2005. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated