5,170 research outputs found
New results on twinlike models
In this work we study the presence of kinks in models described by a single
real scalar field in bidimensional spacetime. We work within the first-order
framework, and we show how to write first-order differential equations that
solve the equations of motion. The first-order equations strongly simplify the
study of linear stability, which is implemented on general grounds. They also
lead to a direct investigation of twinlike theories, which is used to introduce
a family of models that support the same defect structure, with the very same
energy density and linear stability.Comment: 6 pages, 1 figur
Varying Alpha Monopoles
We study static magnetic monopoles in the context of varying alpha theories
and show that there is a group of models for which the t'Hooft-Polyakov
solution is still valid. Nevertheless, in general static magnetic monopole
solutions in varying alpha theories depart from the classical t'Hooft-Polyakov
solution with the electromagnetic energy concentrated inside the core seeding
spatial variations of the fine structure constant. We show that Equivalence
Principle constraints impose tight limits on the allowed variations of alpha
induced by magnetic monopoles which confirms the difficulty to generate
significant large-scale spatial variation of the fine structure constant found
in previous works. This is true even in the most favorable case where magnetic
monopoles are the source for these variations.Comment: 8 pages, 10 figures; Version to be published in Phys. Rev.
Efficient algorithms for pairing-based cryptosystems
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In particular, our techniques improve pairing evaluation speed by a factor of about 55 compared to previously known methods in characteristic 3, and attain performance comparable
to that of RSA in larger characteristics.We also propose faster algorithms for scalar multiplication in characteristic 3 and square root extraction
over Fpm, the latter technique being also useful in contexts other than that of pairing-based cryptography
- âŠ