610 research outputs found
-adic Hodge theory in rigid analytic families
We study the functors \D_{\B_\ast}(V), where \B_\ast is one of Fontaine's
period rings and is a family of Galois representations with coefficients in
an affinoid algebra . We show that
\D_{\HT}(V)=\oplus_{i\in\Z}(\D_{\Sen}(V)\cdot t^i)^{\Gamma_K},
\D_{\dR}(V)=\D_{\dif}(V)^{\Gamma_K}, and
\D_{\cris}(V)=\D_{\rig}(V)[1/t]^{\Gamma_K}, generalizing results of Sen,
Fontaine, and Berger. The modules \D_{\HT}(V) and \D_{\dR}(V) are coherent
sheaves on \Sp(A), and \Sp(A) is stratified by the ranks of submodules
\D_{\HT}^{[a,b]}(V) and \D_{\dR}^{[a,b]}(V) of "periods with Hodge-Tate
weights in the interval ". Finally, we construct functorial
\B_\ast-admissible loci in \Sp(A), generalizing a result of Berger-Colmez
to the case where is not necessarily reduced.Comment: Final version. 44 page
Galois representations over pseudorigid spaces
We study -adic Hodge theory for families of Galois representations over
pseudorigid spaces. Such spaces are non-archimedean analytic spaces which may
be of mixed characteristic, and which arise naturally in the study of
eigenvarieties at the boundary of weight space. We introduce perfect and
imperfect overconvergent period rings, and we use the Tate--Sen method to
construct overconvergent -modules for Galois representations
over pseudorigid spaces.Comment: Revision; some material moved to 2102.0482
Recommended from our members
Using Bloom Filters for Authenticated Yes/No Answers in the DNS
Some aspects of DNSSEC, such as NXDOMAIN error messages, require an authenticated answer. Producing this answer requires complex mechanisms, online storage of the zone's secret key, expensive online computations, or massive zone files. As an alternative, we propose storage of authenticated pointers to Bloom filters. This scheme provides large reductions in the size of, and computational expense to produce, partially-signed zone files
Recommended from our members
A Technique for Counting NATted Hosts
There have been many attempts to measure how many hosts are on the Internet. Many of those end-points, however, are NAT boxes (Network Address Translators), and actually represent several different computers. We describe a technique for detecting NATs and counting the number of active hosts behind them. The technique is based on the observation that on many operating systems, the IP header's ID field is a simple counter. By suitable processing of trace data, packets emanating from individual machines can be isolated, and the number of machines determined. Our implementation, tested on aggregated local trace data, demonstrates the feasibility (and limitations) of the scheme
Cohomology of -modules over pseudorigid spaces
We study the cohomology of families of -modules with
coefficients in pseudoaffinoid algebras. We prove that they have finite
cohomology, and we deduce an Euler characteristic formula and Tate local
duality. We classify rank- -modules and deduce that
triangulations of pseudorigid families of -modules can be
interpolated, extending a result of [KPX14]. We then apply this to study
extended eigenvarieties at the boundary of weight space, proving in particular
that the eigencurve is proper at the boundary and that Galois representations
attached to certain characteristic points are trianguline.Comment: Minor revisions; submitte
Modularity of trianguline Galois representations
We use the theory of trianguline -modules over pseudorigid
spaces to prove a modularity lifting theorem for certain Galois representations
which are trianguline at , including those with characteristic
coefficients. The use of pseudorigid spaces lets us construct integral models
of the trianguline varieties of [BHS17b], [Che13] after bounding the slope, and
we carry out a Taylor--Wiles patching argument for families of overconvergent
modular forms. This permits us to construct a patched quaternionic eigenvariety
and deduce our modularity results.Comment: Revised following referee comment
Recommended from our members
Security and Privacy: Enemies or Allies?
We show ID cards at every juncture. Is this necessary? Is it helpful? Or is it actually harmful, not just to our privacy but to security as well
Recommended from our members
On Many Addresses per Host
This document was submitted to the IETF IPng area in response to RFC 1550. Publication of this document does not imply acceptance by the IPng area of any ideas expressed within. Comments should be submitted to the [email protected] mailing list
Recommended from our members
Further Information on Miller's 1882 One-Time Pad
New information has been discovered about Frank Miller's 1882 one-time pad. These documents explain Miller's threat model and show that he had a reasonably deep understanding of the problem; they also suggest that his scheme was used more than had been supposed
Recommended from our members
The "Session Tty" Manager
In many UNIX systems, it is possible for a program to retain access to the login terminal after the user has logged out. This poses obvious security risks and can also confuse the modem control signals. We solve this for System V by adding a layer of indirection known as the session tty driver. At login time, a session device is linked to the physical terminal. User programs have access to the session device only, and may not open the physical line. Upon logout or carrier drop, the link is severed. New login sessions are given new session devices, and are thus insulated from persistent processes. Use of session devices is controlled by a new system process known as the session manager; by means of suitable plumbing primitives, a "reconnect after line drop" facility can easily be implemented
- …