1,759 research outputs found

    A very low temperature STM for the local spectroscopy of mesoscopic structures

    Full text link
    We present the design and operation of a very-low temperature Scanning Tunneling Microscope (STM) working at 60mK60 mK in a dilution refrigerator. The STM features both atomic resolution and micron-sized scanning range at low temperature. This work is the first experimental realization of a local spectroscopy of mesoscopic structures at very low temperature. We present high-resolution current-voltage characteristics of tunnel contacts and the deduced local density of states of hybrid Superconductor-Normal metal systems.Comment: 5 pages, 5 figures, slightly corrected versio

    Recoil and momentum diffusion of an atom close to a vacuum-dielectric interface

    Get PDF
    We derive the quantum-mechanical master equation (generalized optical Bloch equation) for an atom in the vicinity of a flat dielectric surface. This equation gives access to the semiclassical radiation pressure force and the atomic momentum diffusion tensor, that are expressed in terms of the vacuum field correlation function (electromagnetic field susceptibility). It is demonstrated that the atomic center-of-mass motion provides a nonlocal probe of the electromagnetic vacuum fluctuations. We show in particular that in a circularly polarized evanescent wave, the radiation pressure force experienced by the atoms is not colinear with the evanescent wave's propagation vector. In a linearly polarized evanescent wave, the recoil per fluorescence cycle leads to a net magnetization for a Jg = 1/2 ground state atom

    Two philosophies for solving non-linear equations in algebraic cryptanalysis

    Get PDF
    Algebraic Cryptanalysis [45] is concerned with solving of particular systems of multivariate non-linear equations which occur in cryptanalysis. Many different methods for solving such problems have been proposed in cryptanalytic literature: XL and XSL method, Gröbner bases, SAT solvers, as well as many other. In this paper we survey these methods and point out that the main working principle in all of them is essentially the same. One quantity grows faster than another quantity which leads to a “phase transition” and the problem becomes efficiently solvable. We illustrate this with examples from both symmetric and asymmetric cryptanalysis. In this paper we point out that there exists a second (more) general way of formulating algebraic attacks through dedicated coding techniques which involve redundancy with addition of new variables. This opens numerous new possibilities for the attackers and leads to interesting optimization problems where the existence of interesting equations may be somewhat deliberately engineered by the attacker

    Systematic Construction of Nonlinear Product Attacks on Block Ciphers

    Get PDF
    A major open problem in block cipher cryptanalysis is discovery of new invariant properties of complex type. Recent papers show that this can be achieved for SCREAM, Midori64, MANTIS-4, T-310 or for DES with modified S-boxes. Until now such attacks are hard to find and seem to happen by some sort of incredible coincidence. In this paper we abstract the attack from any particular block cipher. We study these attacks in terms of transformations on multivariate polynomials. We shall demonstrate how numerous variables including key variables may sometimes be eliminated and at the end two very complex Boolean polynomials will become equal. We present a general construction of an attack where multiply all the polynomials lying on one or several cycles. Then under suitable conditions the non-linear functions involved will be eliminated totally. We obtain a periodic invariant property holding for any number of rounds. A major difficulty with invariant attacks is that they typically work only for some keys. In T-310 our attack works for any key and also in spite of the presence of round constants

    Resistive transport in a mesoscopic proximity superconductor

    Full text link
    We review transport measurements in a normal metal (N) in contact with one or two superconducting (S) islands. From the experiment, we distinguish the Josephson coupling, the mesoscopic fluctuations and the proximity effect. In a loop-shaped N conductor, we observe large h/2e-periodic magnetoresistance oscillations that decay with temperature T with a 1/T power-law. This behaviour is the signature of the long-range coherence of the low-energy electron pairs induced by the Andreev reflection at the S interface. At temperature and voltage below the Thouless energy D/L2\hbar D / L^2, we observe the re-entrance of the metallic resistance. Experimental results agree with the linearized quasiclassical theory.Comment: 8 pages, 6 included epsf figures, Invited paper at the LT21 Conference, Praha, August 1996. To appear in Czech. J. of Phys. 46, Part S6 (1996

    Brillouin propagation modes in optical lattices: Interpretation in terms of nonconventional stochastic resonance

    Get PDF
    We report the first direct observation of Brillouin-like propagation modes in a dissipative periodic optical lattice. This has been done by observing a resonant behavior of the spatial diffusion coefficient in the direction corresponding to the propagation mode with the phase velocity of the moving intensity modulation used to excite these propagation modes. Furthermore, we show theoretically that the amplitude of the Brillouin mode is a nonmonotonic function of the strength of the noise corresponding to the optical pumping, and discuss this behavior in terms of nonconventional stochastic resonance

    Predictors of compulsive cyberporn use: A machine learning analysis.

    Get PDF
    Compulsive cyberporn use (CCU) has previously been reported among people who use cyberporn. However, most of the previous studies included convenience samples of students or samples of the general adult population. Research examining the factors that predict or are associated with CCU are still scarce.In this study, we aimed to (a) assess compulsive cyberporn consumption in a broad sample of people who had used cyberporn and (b) determine, among a diverse range of predictor variables, which are most important in CCU scores, as assessed with the eight-item Compulsive Internet Use Scale adapted for cyberporn. Overall, 1584 adult English speakers (age: 18-75 years, M = 33.18; sex: 63.1 % male, 35.2 % female, 1.7 % nonbinary) who used cyberporn during the last 6 months responded to an online questionnaire that assessed sociodemographic, sexual, psychological, and psychosocial variables. Their responses were subjected to correlation analysis, analysis of variance, and machine learning analysis. Among the participants, 21.96% (in the higher quartile) presented CCU symptoms in accordance with their CCU scores. The five most important predictors of CCU scores were related to the users' strength of craving for pornography experiences, suppression of negative emotions porn use motive, frequency of cyberporn use over the past year, acceptance of rape myths, and anxious attachment style. From a large and diverse pool of variables, we determined the most important predictors of CCU scores. The findings contribute to a better understanding of problematic pornography use and could enrich compulsive cyberporn treatment and prevention
    corecore