1,957 research outputs found

    Photon and electron spectra in hot and dense QED

    Get PDF
    Photon and electron spectra in hot and dense QED are found in the high temperature limit for all |\q| using the Feynman gauge and the one-loop self-energy. All spectra are split by the medium and their branches develop the gap (the dynamical mass) at zero momentum. The photon spectrum has two branches (longitudinal and transverse) with the common mass; but electron spectrum is split on four branches which are well-separated for any |\q| including their |\q|=0 limits (their effective masses). These masses and the photon thermal mass are calculated explicitly and the different limits of spectrum branches are established in detail. The gauge invariance of the high-temperature spectra is briefly discussed.Comment: 9 pages, latex, no figure

    MV3: A new word based stream cipher using rapid mixing and revolving buffers

    Full text link
    MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new components and principles, as well as mathematical analysis to justify their use. Our approach, like RC4's, is based on rapidly mixing random walks on directed graphs (that is, walks which reach a random state quickly, from any starting point). We begin with some well understood walks, and then introduce nonlinearity in their steps in order to improve security and show long term statistical correlations are negligible. To minimize the short term correlations, as well as to deter attacks using equations involving successive outputs, we provide a method for sequencing the outputs derived from the walk using three revolving buffers. The cipher is fast -- it runs at a speed of less than 5 cycles per byte on a Pentium IV processor. A word based cipher needs to output more bits per step, which exposes more correlations for attacks. Moreover we seek simplicity of construction and transparent analysis. To meet these requirements, we use a larger state and claim security corresponding to only a fraction of it. Our design is for an adequately secure word-based cipher; our very preliminary estimate puts the security close to exhaustive search for keys of size < 256 bits.Comment: 27 pages, shortened version will appear in "Topics in Cryptology - CT-RSA 2007

    Spontaneous emission of an atom placed near a nanobelt of elliptical cross-section

    Get PDF
    Spontaneous emission of an atom (molecule) placed near a nanocylinder of elliptical cross-section of an arbitrary composition is studied. The analytical expressions have been obtained for the radiative and nonradiative channels of spontaneous decay and investigated in details.Comment: 35 pages, 11 figure

    Atom Nanooptics Based on Photon Dots and Photon Holes

    Full text link
    New types of light fields localized in nanometer-sized regions of space were suggested and analyzed. The possibility of using these nanolocalized fields in atom optics for atom focusing and localization is discussed
    • …
    corecore