1. Introduction
1.1. Scope And Purpose
The theory of modular forms for is built on a small number of fundamental objects: the Eisenstein series, the discriminant cusp form, the Jacobi theta constants, and the automorphic invariants they generate. This paper assembles the primary identities relating these objects into a single self-contained account, then derives four new structural observations from first principles.
The guiding organizing principle is polynomial expressibility: which automorphic invariants can be expressed as explicit polynomials or rational functions of a minimal set of generating theta data? The classical answer is complete: the pair determines , , , and j via the duplication identities. Sections 2–7 establish this classical foundation.
Sections 8–11 then take this foundation seriously and push it, deriving four structural observations:
- (I)
Shifted squaring and moonshine: nearly squares under , with correction term (Section 8).
- (II)
AGM structure of the theta sequence: the dyadic theta orbit is the arithmetic-mean sequence of a classical AGM (
Section 9).
- (III)
Universal sigmoid crossover of : the
-ODE has a logistic regime for
; matching at
yields an explicit sigmoid approximation (
Section 10).
- (IV)
Square-root recursion and the quadratic extension tower: the quantity
satisfies a square-root recursion under doubling, generating a nested-radical tower for
(
Section 11).
1.2. Organization
Sections 2–7 develop the classical theory efficiently but completely, with full proofs where they illuminate structure. Each of Sections 8–11 is self-contained: it states an observation, gives a complete derivation from the classical material, and discusses consequences and further directions.
2. The Upper Half-Plane And The Modular Group
Definition 1 (Upper half-plane and nome). Theupper half-planeis . For thenomeis ; since we have .
Definition 2 (Modular group and action). Themodular group acts on by . Its generators are and . The effective group is .
Definition 3 (Modular forms and automorphic functions). A holomorphic is amodular form of weight kif for all , and f is holomorphic at the cusp. Weight- invariants areautomorphic functions.
3. Jacobi Theta Constants
Definition 4 (Theta constants).
For and :
Theorem 1 (Jacobi identity).
Theorem 2 (Transformation formulas under
).
Theorem 3 (
q-product representations).
4. Eisenstein Series, Discriminant, And J–Invariant
Definition 5 (Primary automorphic objects).
is a weight-4 modular form; Δ is the unique (up to scalar) weight-12 cusp form, nonvanishing on ; j is the -invariant automorphic function giving a biholomorphism .
Theorem 4 (Theta representations of
,
,
j).
5. The Modular –function And The J– Relation
Definition 6 (Modular
–function).
This is a Hauptmodul for , giving a biholomorphism . On the imaginary axis, for all .
Proposition 1 (Functional equation and special values of
).
The modular λ–function satisfies
In particular, . Moreover, on the imaginary axis:
Proof. From Theorem 2,
Using Jacobi’s identity
gives
hence (
17). Setting
yields
so
. For
,
so
and
, hence
. For
, use (
17) with
:
and
so
. □
Theorem 5 (
j as a rational function of
; polynomial relation).
Equivalently, j and λ satisfy the irreducible degree-6 polynomial relation
Proposition 2 (Differential equation for
).
For with ,
6. Theta Duplication Identities And Two-Scale Formulas
Theorem 6 (Theta duplication identities).
Theorem 7 (Two-scale minimality:
determines all primary invariants).
Let and . Then:
and
so that is a quotient of polynomials in .
Proof. From (
22),
. From (24),
; squaring gives (
25). From (23),
, so
; squaring gives (26). The formulas for
and
follow by dividing by
. Substituting into Theorem 4 gives (29)–(30). □
7. Dyadic Isogeny and the Modular Polynomial
Definition 7 (Modular polynomial
).
Theorem 8 (2-isogeny algebraic identity). For all , . The polynomial is symmetric, of degree 3 in each variable, corresponding to the three cyclic order-2 subgroups of .
Definition 8 (Dyadic orbit). Fix . Set . Consecutive j-values satisfy for all , forming analgebraic ladder.
8. Observation I: Shifted Squaring And Monster Moonshine
8.1. Statement
Observation 1 (Shifted squaring identity).
Define theshifted
j-invariant
Then, with ,
More precisely,
The leading correction coefficient is twice the dimension of the smallest non-trivial representation of the Monster group .
8.2. Derivation
From the standard
q-expansion (with
, so
j has terms
):
Hence
Under
, the nome
:
On the other hand, squaring gives
Subtracting,
which implies (
33) and (
34).
8.3. The Fixed-Point Polynomial and its Discriminant
Proposition 3 (Fixed points and discriminant).
The leading-order quadratic approximation to the isogeny doubling map on J is
The fixed points of are the roots of
which has discriminant
In particular, the fixed points are real but (since is not a square) are not rational.
Remark 1.
Including the correction from (34), one has
The coefficient is the next moonshine coefficient in the q-expansion of J.
Remark 2 (Moonshine interpretation). In Monstrous Moonshine (Conway–Norton, Borcherds), the coefficients of are dimensions of graded pieces of the Monster module : where . Observation 1 states that the discrepancy between and is, to leading order, , i.e., twice the dimension of the first nontrivial graded piece. This suggests an interpretation: the failure of J to behave multiplicatively with respect to the doubling correspondence is measured in moonshine units.
A natural question: for the McKay–Thompson series of an element , does where is the character of g on ? This would be a moonshine-level refinement of (33).
9. Observation II: The AGM Structure Of The Dyadic Theta Sequence
9.1. Statement
Observation 2 (Dyadic theta orbit as AGM arithmetic-mean sequence).
Fix and let
Then the duplication identities imply the exact AGM recursion
(For on the imaginary axis, the square root is taken as the positive real root.) In particular, is thearithmetic-mean sequence
of the classical AGM iteration initialized at , and converges rapidly to the common limit 1.
9.2. Derivation
From the duplication identity (
22)–(23) one obtains
where (46) is the geometric-mean identity (proved from
q-products in the Appendix). Identity (
45) says:
is the arithmetic mean of and . Identity (46) says:
is the geometric mean of and . Thus the pair
iterates the AGM step exactly, giving (
44).
Proposition 4 (AGM limit and convergence rate). For any with :
- (i)
.
- (ii)
Proof. (i) Since , we have and hence and . The AGM recursion forces both sequences to converge to their common AGM limit, which is therefore 1.
(ii) For large n, , so and . Similarly gives and . □
9.3. The Self-Dual Fixed Point At
Proposition 5 (Self-dual fixed point). The AGM iteration initialized at issymmetric() if and only if , which holds if and only if , equivalently , equivalently (in the fundamental domain).
Proof.
. On the imaginary axis both
are positive, so
. From
and
:
Then (
19) gives
. Finally,
occurs at
in the standard fundamental domain. □
Remark 3 (Geometric meaning). corresponds to the elliptic curve , which has the extra automorphism of order 4. This is precisely the unique elliptic curve (up to isomorphism) that is isomorphic to its own quadratic twist, i.e., theself-dualcurve. Proposition 5 says this special geometric property is encoded as the unique symmetric starting point of the theta AGM.
10. Observation III: Universal Sigmoid Crossover Of
10.1. Statement
Observation 3 (Sigmoid approximation from the large-
t logistic regime).
Consider the ODE (21): for , .
- (i)
For : and .
- (ii)
For : , and the ODE approaches the logistic equation .
- (iii)
-
Matching theexact
midpoint value to the logistic-limit family yields the explicit sigmoid
which is a convenient large-t closed-form approximation (with center at ).
10.2. Derivation
Step 1: Behavior at . From the
S-transform
, setting
:
As
,
, so
. Therefore
and
. By Proposition 1,
as
.
Step 2: Behavior at ., so
and
. The ODE approaches
the standard logistic equation, whose general solution is
for constant
.
Step 3: Fixing the constant by . We know
exactly (Proposition 1). Substituting
,
into
gives
. Therefore
which is (
48).
Proposition 6 (Quantitative control via the logit variable).
Define the logit variable . Then
Hence for any and all ,
Moreover, for one has the elementary bound
so the deviation of from its logistic-limit behavior is bounded by
Remark 4 (Crossover and the three special values).
The point simultaneously realizes: (i) the unique fixed point of (the imaginary-axis analogue of S); (ii) the self-dual elliptic curve ; (iii) the exact symmetry value ; (iv) the center of the logistic-limit sigmoid (48) obtained by matching at . These coincidences have a common cause: the S-symmetry fixes and forces , i.e., .
11. Observation IV: Square-root Recursion And The Quadratic Extension Tower
11.1. Statement
Observation 4 (Square-root recursion of
).
Define
Then
Consequently, the n-fold iterate satisfies
a nested-radical expression. In particular, while eachsquare
is polynomially expressible in the dyadic -data, the unsquared values generically generate a tower of quadratic extensions growing by one layer at each step—a genuinely different algebraic structure from the polynomial j-isogeny ladder.
11.2. Derivation
First, using (
22)–(23),
which is (
56).
Next, the geometric-mean identity (46) gives
In terms of
, this is
establishing (
57) (with an understood choice of square-root branch; on the imaginary axis, take the positive real root).
Proposition 7 (Nested-radical formula for the full orbit).
Iterating (57) yields
and in general (58).
Proof. By induction: set
and
. Then
. Expanding recursively gives the stated pattern of exponents, and the closed form (
58) follows. □
Theorem 9 (A quadratic extension tower for
over dyadic
).
Fix and let
For define
Then:
- (i)
For each n, .
- (ii)
For each n, (indeed ).
- (iii)
Generically (i.e., away from special algebraic loci such as CM points and accidental square relations), each adjunction produces a genuine quadratic extension, so the tower does not stabilize after finitely many steps.
Remark 5 (Contrast with the j-ladder). The j-isogeny ladder is governed by , a polynomial relation of degree 3. Each is algebraic of degree over . By contrast, the tower in Theorem 9 is radical in nature: even though is polynomially expressible in dyadic -data, recovering itself introduces (generically) a new square root at each step. The j-ladder is polynomial-algebraic; the -tower is radical-algebraic. These are genuinely different algebraic structures coexisting inside the same automorphic orbit.
12. Summary And Further Directions
12.1. Summary Table
The following table collects the primary automorphic objects and their polynomial sources, together with the new observations.
| Object |
Source / formula |
Section |
|
Primary data
|
§ 3 |
|
|
§6 |
|
Polynomial in , Equation (29) |
§ 6 |
|
Polynomial in , Equation (30) |
§ 6 |
|
Rational in ;
|
§ 5 |
|
(moonshine correction) |
§ 8 |
|
AGM iteration; limit
|
§ 9 |
|
for
|
§ 10 |
|
Nested radical / quadratic tower over dyadic
|
§ 11 |
12.2. Open Questions
Each observation opens a concrete research direction.
From Observation I. For an element g of the Monster group , let be the McKay–Thompson series. Does ? More generally, what is the full correction series, and does it encode the character table of on ?
From Observation II. The AGM of equals 1. The geometric AGM limit is , which relates to the complete elliptic integral via . The AGM convergence rate gives a quantitative bound on the theta-spectrum decay. What is the spectrum of convergence exponents across ?
From Observation III. The sigmoid approximation (
48) gives a completely explicit approximate formula for
on the imaginary axis. How well does the logistic model approximate
for moderate
t? The deviation from pure logistic behavior is controlled explicitly by
(Proposition 6). Can one leverage such closed forms to build simple approximations to modular quantities built from
?
From Observation IV. The quadratic extension tower generated by over the dyadic -field is an explicit, concrete radical tower attached to automorphic data. What is its Galois group (as a profinite limit) for generic ? Does it embed into a known Galois-theoretic object such as the absolute Galois group of via the Galois action on CM values of ?
13. Addendum To §Section 8: McKay–Thompson Series and the Doubling Squaring Defect
This section addresses the open questions following Observation 1 for the McKay–Thompson series of an element .
13.1. Normalization Conventions ( Versus )
Throughout the main body of this paper we used
so
.
In Monstrous Moonshine it is standard to use
so that
Similarly, a McKay–Thompson series is conventionally written
with vanishing constant term (the genus-zero Hauptmodul normalization).
All statements below are most transparent in the Q-normalization; converting back to the paper’s q-normalization is done by and with only odd/even powers as appropriate.
13.2. The Universal Leading Term:
Proposition 8 (Leading discrepancy from squaring under doubling).
Let be as in (62). Then
In particular, the constant term of is .
Proof. From (
62),
Also,
Subtracting yields (
63). □
Remark 6 (Representation-theoretic meaning).
In Monstrous Moonshine one has
so the constant term in (63) is
Thus the leading deviation from perfect squaring under the doubling map encodes the character of g on the first nontrivial graded piece .
13.3. The Full Correction Series: Explicit Coefficient Formula
Define the
doubling squaring defect of
by
Proposition 9 (Explicit coefficients of
).
Let be as in (62). Then for each ,
where is 1 if m is even and 0 otherwise. In particular,
Proof. Write
, so the coefficient of
in
is
for
. Next expand
The coefficient of
in the middle term is
and in the double sum is
. Subtracting gives (
65). □
13.4. Does Encode The Monster Character Table?
Remark 7 (What
can and cannot add).
The family of functions (over all conjugacy classes of ) already encodes the characters for every n by definition. Therefore does not provide additionallinear
information beyond the , since each is a universal polynomial expression in the via (65).
What canencode are nonlinear constraints among traces. In the genus-zero setting, the deeper structure is Norton’sreplicability: doubling is controlled not only by and , but by Hecke-like combinations involving and and the power map . From that viewpoint, is a coarse but explicit “shadow” of replicability.
14. Addendum To § 9: Convergence Exponents For The theta–AGM Across
This section makes precise the dependence of the dyadic theta–AGM convergence rate on .
14.1. Dyadic Convergence Is Governed By The Dyadically Rescaled Nome
Let
as in the paper. Then
. For the dyadic orbit
we have the dyadic nome
Proposition 10 (Uniform dyadic exponential control).
For any and all ,
Consequently,
The implied constants are absolute (coming from the absolutely convergent theta series).
Proof. From Definition 4,
and similarly
which gives (
66)–(67). Squaring and using
yields (
68)–(69). □
14.2. A “Spectrum” Of Convergence Exponents
A convenient summary statistic for convergence is the asymptotic slope of as a function of .
Definition 9 (Dyadic convergence exponent).
For define the dyadic convergence exponent
Proposition 11 (Asymptotic exponent law).
Fix . Then as ,
and similarly
Proof. By Proposition 10,
so
. Taking logs gives (
71) since
. □
Remark 8 (Interpretation). Thus across the “spectrum” of exponents is the continuous family : larger imaginary part gives exponentially faster dyadic convergence. Quadratic (AGM) convergence in the iteration index n manifests as exponential convergence in .
15. Addendum To § 10: Quantitative Logistic Approximation For
This section refines the open questions following Observation 3 by providing explicit comparison inequalities and an asymptotic calibration discussion.
15.1. The Logit Transform Yields An Exact Integral Identity
Let
for
and define the logit variable
Proposition 12 (Exact logit evolution).
For all ,
and with the exact midpoint (Proposition 1), one has and
Proof. Differentiate (
73):
Insert
from (
21) to obtain (
74), then integrate using
. □
15.2. Logistic Comparison: The Sigmoid Is An Upper Bound For
Define the matched logistic sigmoid
Proposition 13 (One-sided comparison for
).
For all ,
Equivalently, .
Proof. For all
one has
, hence
. Thus from (
74),
for
. With
, integration gives
for
. Exponentiating and converting back to
gives (
77). □
15.3. Explicit Error Control From Bounds On
Lemma 1 (Elementary upper bound on
for
).
For ,
In particular, for all .
Proof. Let
. From the series
we bound
For
,
and with
one obtains a bound of the form (
78); the stated constants are safe (not sharp) and suffice for explicit integral control. □
Proposition 14 (Uniform logit error bound for
).
For all ,
where one may take (non-sharp), and more generally for any and all ,
Proof. Combine (
75) with Lemma 1 and integrate the geometric bound
on
. □
15.4. Asymptotic Calibration: Why The Matched Sigmoid Is Only A Rough Large-T Model
Proposition 15 (True large-
t asymptotic of
).
As ,
Remark 9 (Comparison with the matched logistic sigmoid).
From (76),
Since the true leading constant in (81) is 16, the matched sigmoid has asymptotic constant , i.e., a relative large-t error approaching . Thus (48) should be viewed as a convenientclosed-form surrogate
matched at , not as an asymptotically sharp model. One can obtain an asymptotically calibrated logistic by shifting the center to , giving for large t, though this no longer matches exactly.
Remark 10 (Using closed forms to approximate modular quantities built from
).
Any modular quantity that is a rational function of λ (e.g., via Theorem 5) can be approximated on the imaginary axis by substituting an explicit surrogate for , such as (76) or an asymptotically calibrated variant. Proposition 12 makes the approximation problem equivalent to approximating the integral of , for which explicit exponentially small tails are available.
16. Addendum To § 11: The Radical Tower and its (Pro-2) Galois Structure
This section addresses the open questions following Observation 4: the expected Galois structure for generic and the CM (singular value) regime.
16.1. Reformulation As A Kummer Tower Over The Dyadic -field
Fix
and define the base field
Define the radicands
Now define the tower
Proposition 16 (Kummer nature and finite-stage Galois groups).
For each , the compositum field
is a Kummer extension of exponent 2 over . In particular, its Galois closure over has Galois group a finite 2-group, and if the square classes of are independent in , then the Galois group is the elementary abelian group
acting by independent sign changes on the .
Proof. Over any field of characteristic , adjoining finitely many square roots produces a Kummer extension of exponent 2. If the radicands are independent modulo squares, then the automorphisms are exactly independent sign changes, giving . □
16.2. The Profinite Limit For “Generic”
(generic heuristic)).
Definition 10 (Pro-2 Galois group of the radical tower Assuming the radicands are independent modulo squares in , the inverse system of finite-stage Galois groups yields a profinite group
the profinite product of countably many .
Remark 11 (What “generic” should mean). A fully rigorous statement requires specifying a class of τ for which no accidental square relations occur. One expects such relations only on thin loci (special algebraic constraints, e.g., CM points). Proving independence is a Kummer-theoretic problem over the transcendental field .
16.3. Cm Points And Embedding Into Class Field Theory
Now assume is CM, i.e., is imaginary quadratic and is an imaginary quadratic field.
Remark 12 (CM singular values and Shimura reciprocity). Values of modular functions at CM points are algebraic and generate explicit class fields. For -level invariants one has:
is algebraic and lies in a suitable ring/ray class field of K.
Theta constants (or closely related eta-quotients and Weber functions) at CM points produce classical class invariants; their Galois action is described by Shimura reciprocity.
Therefore, when τ is CM, the algebraic fields generated by (after appropriate normalization to remove transcendental scaling) are expected to lie in a tower of ring/ray class fields of K of 2-power conductor. In this regime the relevant Galois groups are abelian over K, controlled by (ray) class groups, and hence embed into through the canonical restriction map for the appropriate class field H.
Remark 13 (Answer to the embedding question). Thus:
- (i)
For generic (non-CM) τ, the natural expectation is a large pro-2 Kummer group of the form (85) (subject to independence).
- (ii)
For CM τ, the tower is governed by explicit CM class field theory and embeds into in the standard way via Shimura reciprocity; the resulting extensions over K are expected to be (largely) abelian, reflecting the CM nature rather than producing a new nonabelian piece of .
Appendix A. Explicit Coefficient Table For J(2τ)-J(τ) 2
Writing
:
The constant term is
. The coefficient of
is
. The coefficient of
is
Appendix B. The Geometric-Mean Identity ϑ 4 (2τ) 2 =ϑ 3 (τ)ϑ 4 (τ)
We give a direct proof from q-products (Theorem 3). Let .
From Theorem 3,
Also,
so
Finally, split the product for
into even and odd indices:
Therefore
as claimed.
Appendix C. Interlude: The Theta Self-Duality Point τ=i (I.E., T=1) and what it Can/Cannot Say About RH
Appendix C.1. The Identity ϑ 3 =ϑ 4 ⇒λ=1 2
We record explicitly the “” implication mentioned in the modular-form paper, because it is the cleanest algebraic expression of the self-duality point .
Proposition A1 (Self-duality at forces ). Let and define . If then . In particular, at one has and hence .
Proof.
Assume
. Then
Therefore
since
. (Equivalently,
and
.)
Finally, is the fixed point of in the standard fundamental domain, and the theta S-transformations imply , hence , i.e., (on the imaginary axis these values are positive real). □
Remark A1 (What is special about ). The identity is amodular symmetryconsequence: , hence at one has . This is structurally analogous to the Ξ-symmetry and the functional equation , but it is not by itself a bridge to RH.
Appendix C.2. The Riemann ξ-function Is Built From A t↦1/T Theta Self-Duality
The most direct classical connection between zeta and theta is the Mellin transform identity for the Jacobi theta series on the imaginary axis. Define the
Jacobi theta function on Then
satisfies the modular self-duality (Poisson summation)
Note that
is the fixed point of
, corresponding to
.
Theorem A1 (Mellin transform representation of
(standard)).
For one has
Moreover, by splitting the integral at and using (A2), admits the symmetric representation
which holds for all by analytic continuation.
Remark A2 (Centering at
is forced by symmetry).
The symmetric form (A4) is exactly the analytic reflection of the algebraic fixed point in the modular paper: the functional equation corresponds to the involution whose fixed point is . In this sense, the “” phenomenon isstructurally parallel
to the central role of in ξ.
Appendix C.3. Cosine-Transform Form Of Ξ And Why Self-Duality Does Not Imply RH
Set
as in Definition ??. From (
A4) we obtain an even cosine-transform representation.
Proposition A2 (
as a cosine transform).
Define for the even function
Then is real, smooth, rapidly decaying as , and even: . Moreover,
Proof (Sketch). Insert
into (
A4) and change variables
(so
). Then
The evenness
is a direct rewriting of
. This yields (
A6) after collecting constants. □
Remark A3 (Why the fixed point
(i.e.,
,
) is not enough).
Equation (A6) shows that RH is equivalent to the assertion that the entire function
has only real zeros. The fact that Φ is even (coming from symmetry and hence from the fixed point) forces Ξ to be even and real on , but it doesnotforce all zeros to be real.
In other words: the theta self-duality point provides thesymmetryneeded for the functional equation, but RH is a much strongerreal-zerostatement about an entire cosine transform. Proving “cosine transform has only real zeros” typically requires additional deep structure (e.g., membership in the Laguerre–Pólya class, total positivity, or a de Bruijn–Newman type flow argument), not just evenness and decay.
Appendix C.4. What Would Count As Genuine RH Progress From The τ=i Picture?
The modular paper highlights that (i.e., ) is a universal crossover point for and a self-dual point for the AGM iteration on theta constants. Here is the cleanest way to translate that into potential RH-relevant analytic progress:
- (a)
Sharper explicit bounds on . From the certificate-architecture viewpoint, any method that yields computable, uniform bounds on
and its derivatives on intervals
improves the feasibility of stage certificates for
in rectangles, because
is built from
via (
A4) and (
A6).
- (b)
A controlled approximation scheme for . If one can approximate by a kernel whose cosine transform is known to have only real zeros, and prove that the approximation preserves real-rootedness (or preserves a de Bruijn–Newman constant bound), that would be genuine structural progress. The modular observations at give efficient approximations for theta data, but turning that into a root-preserving approximation for the cosine transform is the hard part.
- (c)
A positivity/total-positivity route. Real-zero theorems for Fourier/cosine transforms often come from total positivity or variation-diminishing properties. The theta self-duality at guarantees evenness, and the AGM structure provides strong monotonicity and convexity control of theta constants, but no known argument upgrades these facts to the total positivity properties needed for an RH proof.
Remark A4 (Scope statement).
The identity (and the fixed point ) explains why is a privileged symmetry center in theta-based formulas for ξ and Ξ. It doesnot
by itself imply RH. Any RH implication would have to pass through a theorem ensuring that the cosine transform (A6) has only real zeros, which is a substantially stronger analytic property than self-duality.
Appendix D. Optional Bridge Addendum: Importing the Modular λ–ODE and the τ=i Midpoint Into the Certificate Language
This section is optional. It gives a precise way to “patch in” the modular -ODE material as an auxiliary computational oracle for estimating and hence the theta kernel , without claiming any RH implication.
Appendix D.1. Relating λ(it), ϑ 3 (it), And Θ(t)
Recall
. The modular
-function is
On the imaginary axis,
,
, one has
and
. The modular paper proves the ODE
Proposition A3 (Solving for
in terms of
).
For ,
Equivalently, in the logit variable ,
Remark A5 (Meaning for certification).
Equations (A8) and the logit identity show that any explicit enclosure scheme for and yields explicit enclosures for . Since ξ and Ξ are built from Θ by (A4)–(A6), this gives a principled path to turning modular information into numeric/interval bounds on on rectangles in the Ξ-plane. That is compatible with the stagewise certificate architecture: it provides acomputable subroutine
for bounding the analytic inputs.
Appendix D.2. Midpoint Centering At T=1
The midpoint
is singled out by two exact identities:
Thus any ODE integration of (
A7) may be conveniently initialized at
with the exact value
, and propagated to
and
using rigorous interval-ODE methods.
Remark A6 (No RH consequence without a root-theorem). Even perfect knowledge of and does not automatically imply RH; it only improves our ability tocompute or certifyvalues of in regions. Converting such computation into RH requires a global argument that all zeros are real, or a certificate system that covers U (Definition ??) with verified zero-free windows. The modular midpoint provides a natural computational anchor, not a direct RH proof mechanism.
References
- Apostol, T. M. Modular Functions and Dirichlet Series in Number Theory, 2nd ed.; Springer, 1990. [Google Scholar]
- Serre, J.-P. A Course in Arithmetic; Springer, 1973. [Google Scholar]
- Chandrasekharan, K. Elliptic Functions; Springer, 1985. [Google Scholar]
- Koblitz, N. Introduction to Elliptic Curves and Modular Forms, 2nd ed.; Springer, 1993. [Google Scholar]
- Cox, D. A. Primes of the Form x2+ny2, 2nd ed.; Wiley, 2013. [Google Scholar]
- Conway, J. H.; Norton, S. P. Monstrous moonshine. Bull. London Math. Soc. 1979, 11, 308–339. [Google Scholar] [CrossRef]
- Borcherds, R. E. Monstrous moonshine and monstrous Lie superalgebras. Invent. Math. 1992, 109, 405–444. [Google Scholar] [CrossRef]
- Diamond, F.; Shurman, J. A First Course in Modular Forms; Springer, 2005. [Google Scholar]
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).