5,170 research outputs found

    New results on twinlike models

    Full text link
    In this work we study the presence of kinks in models described by a single real scalar field in bidimensional spacetime. We work within the first-order framework, and we show how to write first-order differential equations that solve the equations of motion. The first-order equations strongly simplify the study of linear stability, which is implemented on general grounds. They also lead to a direct investigation of twinlike theories, which is used to introduce a family of models that support the same defect structure, with the very same energy density and linear stability.Comment: 6 pages, 1 figur

    Varying Alpha Monopoles

    Full text link
    We study static magnetic monopoles in the context of varying alpha theories and show that there is a group of models for which the t'Hooft-Polyakov solution is still valid. Nevertheless, in general static magnetic monopole solutions in varying alpha theories depart from the classical t'Hooft-Polyakov solution with the electromagnetic energy concentrated inside the core seeding spatial variations of the fine structure constant. We show that Equivalence Principle constraints impose tight limits on the allowed variations of alpha induced by magnetic monopoles which confirms the difficulty to generate significant large-scale spatial variation of the fine structure constant found in previous works. This is true even in the most favorable case where magnetic monopoles are the source for these variations.Comment: 8 pages, 10 figures; Version to be published in Phys. Rev.

    Efficient algorithms for pairing-based cryptosystems

    Get PDF
    We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In particular, our techniques improve pairing evaluation speed by a factor of about 55 compared to previously known methods in characteristic 3, and attain performance comparable to that of RSA in larger characteristics.We also propose faster algorithms for scalar multiplication in characteristic 3 and square root extraction over Fpm, the latter technique being also useful in contexts other than that of pairing-based cryptography
    • 

    corecore