You get the level of understanding necessary to create this blog post by already having worked through several textbooks and papers on number theory, elliptic curves, etc. So you don't do it on your own, you do it with help from Poincaré and Euler and Diophantes and whoever else.
Based on your description, you absolutely have the aptitude to do this if you pursued maths further academically. And also by having great teaching and explaining skills - that part might be harder to learn.
this appears to be what sets mathematics appart from science? I mean, it's not like Euler, or Poincaré, and so on, are really there with you when "doing math"
point being, mathematics is not a team game. but everything else is??
Sorry, it’s early, and I can’t tell if you’re being sarcastic. I hope you are? Mathematics is very much a team game.
to me old.reddit.com will always be reddit.com
Pity I'm by far the weakest link in such team-ups. :)
The reasons are complicated but, many people prefer unicode normalization so that different forms of what appear to be the same word are considered the same word. People argue whether or not this is important but it can certainly be argued that it would be frustrating to get an error like
let café = 1;
café += 1; // error, unknown identifier 'café'
The error happens in non-normalizing languages because those to idenifiers are not the same unicode.But, choosing a normalization affects emoji as well. Worse, when new ones are added the normalization rules can change.
Unfortunately most modern languages like Rust and JS follow the XID_Start/XID_Continue recommendation (not very well-motivated imo) which excludes all emoji characters from identifiers.
[1] https://github.com/microsoft/TypeScript/blob/81c951894e93bdc...
Intersecting the curve with lines the way the author does is, perhaps shockingly, a commutative group operation, known as point addition. You define this operation by saying that the three points A,B,C on a line sum to zero: that is A+B+C=0 or in other words, A+B = -C. Reflecting across the curve's line of symmetry is negation (there's an alternative definition that extends to curves without reflection symmetry). Combining the two defines an operation A+B which adds two points on the curve and gives a third one: draw the line from A to B, intersect it with the curve to find a point -A-B (using the same type of formula given in this article) and then reflect it to get A+B. This addition operation obviously commutes (meaning, the line between A and B is the same as the line between B and A), but surprisingly it also associates and you get a group operation.
(For math olympiad nerds out there: so the union of a conic and a line is also a bivariate cubic equation. You can carry out the same "addition" operation there. Again the operation clearly commutes. But it also associates! This is basically Pascal's theorem.)
The theory of elliptic curves is also the basis of elliptic curve cryptography. In that case, instead of the curve being over the reals, all the calculations are done mod some prime p, which destroys structure based on continuity and prevents the numbers from becoming too large. There are a bunch of subtleties here but the key is that you can still straightforwardly compute addition in this context, with basically the same formulas. Then from addition you can get n*A, both for small integers n (eg 5*A = A+A+A+A+A) but also for large n (e.g. 2*A = A+A; 66*A = 2*2*2*2*2*2*A + 2*A). This "scalar multiplication" operation is a one-way operation for appropriately chosen curves: it's easy to calculate n*A from (n,A), but as far as we know it is hard to calculate n from (A,n*A) ... at least if you can't build a large quantum computer.
This gives you mix of easy operations (eg, addition and scalar multiplication) plus problems believed to be hard, which is a great starting point to build cryptography. There are a lot of important technical details, though fewer than with the new lattice schemes.
(Further comment on the olympiad thing: so you can do this with conic+line too, extending from addition to multiplication and using the same formulas mod p. But it's not as good: it's not hard to find a projection that sends the line to infinity and the conic to the unit circle or similar, and then the group operation becomes equivalent to multiplying the points' coordinates as complex numbers or similar. If the group operation is equivalent to multiplication, then scalarmul becomes equivalent to exponentiation, which ends up being in Fp or Fp^2 depending on some Legendre symbol or other. Exponentiation is still potentially secure: it's basically classical Diffie-Hellman. However, more attacks are known on exponentiation in Fp or Fp^2: the attacks don't outright break it but you need p to be much bigger.)
Edit: unescaped stars make italics.
Some more context and related ones here: https://x.com/TheOisinMoran/status/1299124512240398336
154476802108746166441951315019919837485664325669565431700026634898253202035277999
36875131794129999827197811565225474825492979968971970996283137471637224634055579
4373612677928697257861252602371390152816537558161613618621437993378423467772036
the same happened to poe.
that quora article is written by Alon Amit and fwiw, TFA quotes Alon Amit, so his thoughts are ex post.
Sridhar is a pro follow, you don't see many people with PhDs in both math and shitposting.
ykonstant•6h ago