3,605 research outputs found
Scaling of Magneto-Quantum-Radiative Hydrodynamic Equations: From Laser-produced Plasmas to Astrophysics
We introduce here the equations of magneto-quantum-radiative hydrodynamics.
By rewriting them in a dimensionless form, we obtain a set of parameters that
describe scale-dependent ratios of all the characteristic hydrodynamic
quantities. We discuss how these dimensionless parameters relate to the scaling
between astrophysical observations and laboratory experiments.Comment: 12 page
Non-malleable secret sharing against joint tampering attacks
Since thousands of years ago, the goal of cryptography has been to hide messages from prying eyes. In recent times, cryptography two important changes: first, cryptography itself evolved from just being about encryption to a broader class of situations coming from the digital era; second, the way of studying cryptography evolved from creating ``seemingly hard'' cryptographic schemes to constructing schemes which are provably secure.
However, once the mathematical abstraction of cryptographic primitives started to be too hard to break, attackers found another way to defeat security. Side channel attacks have been proved to be very effective in this task, breaking the security of otherwise provably secure schemes. Because of this, recent trends in cryptography aim to capture this situation and construct schemes that are secure even against such powerful attacks.
In this setting, this thesis specializes in the study of secret sharing, an important cryptographic primitive that allows to balance privacy and integrity of data and also has applications to multi-party protocols. Namely, continuing the trend which aims to protect against side channel attacks, this thesis brings some contributions to the state of the art of the so-called leakage-resilient and non-malleable secret sharing schemes, which have stronger guarantees against attackers that are able to learn information from possibly all the shares and even tamper with the shares and see the effects of the tampering.
The main contributions of this thesis are twofold. First, we construct secret sharing schemes that are secure against a very powerful class of attacks which, informally, allows the attacker to jointly leak some information and tamper with the shares in a continuous fashion. Second, we study the capacity of continuously non-malleable secret sharing schemes, that is, the maximum achievable information rate. Roughly speaking, we find some lower bounds to the size that the shares must have in order to achieve some forms of non-malleability
Axion driven cosmic magneto-genesis during the QCD crossover
We propose a mechanism for the generation of a magnetic field in the early
universe during the QCD crossover assuming that dark matter is made of axions.
Thermoelectric fields arise at pressure gradients in the primordial plasma due
to the difference in charge, energy density and equation of state between the
quark and lepton components. The axion field is coupled to the EM field, so
when its spatial gradient is misaligned with the thermoelectric field, an
electric current is driven. Due to the finite resistivity of the plasma an
electric field appears that is generally rotational. For a QCD axion mass
consistent with observational constraints and a conventional efficiency for
turbulent dynamo amplification --- driven by the same pressure gradients
responsible for the thermoelectric fields --- a magnetic field is generated on
subhorizon scales. After significant Alfv\'enic unwinding it reaches a present
day strength of G on a characteristic scale 20
pc. The resulting combination of is significantly stronger than in
any astrophysical scenario, providing a clear test for the cosmological origin
of the field through -ray observations of distant blazars. The
amplitude of the pressure gradients may be inferred from the detection of
concomitant gravitational waves, while several experiments are underway to
confirm or rule out the existence of axions.Comment: Published in PR
Time-dependent CP asymmetries in D and B decays
The measurement of time-dependent CP asymmetries in charm decays can provide
a unique insight into the flavor changing structure of the Standard Model. We
examine a number of different CP eigenstate decays of D mesons and describe a
method that can be used to measure time-dependent CP asymmetries at existing
and future experiments, with a preliminary assessment, based on statistical
considerations, of their various capabilities. Any asymmetry observed in
time-dependent analysis of neutral D mesons could signify new physics. We
discuss the measurements required to perform direct and indirect tests of the
charm unitarity triangle and the relationship between this and the B_d
unitarity triangle.
We also highlight that current experimental bounds on DeltaGamma(B_d)
translate into a significant systematic uncertainty on the measurement of beta
from b to c c-bar s decays.Comment: 19 pages, 7 figures, 3 table
On the mechanical properties of melt-blended nylon 6/ethylene-octene copolymer/graphene nanoplatelet nanocomposites.
Ethylene-octene copolymer (EOC) with a loading level of 20 wt%, maleated EOC (EOC-g-MA) with a loading level of 3 wt% and graphene nanoplatelets (GnPs) at four different loading levels, i.e., 3 wt%, 5 wt%, 10 wt% and 15 wt% were added to nylon 6 to prepare nanocomposites using a twin-screw extruder with a high shear rate screw running at 300 rpm. Increased stiffness was observed with the addition of GnPs while tensile strength of nanocomposites was only slightly influenced. Addition of GnPs into nylon 6 and nylon 6/EOC blend caused either a reduction in the Charpy impact strength or it remained unaffected. Similarly, the Izod impact strength of compatibilized nylon 6/EOC blend increased while that of nylon 6/EOC blend-based nanocomposites decreased. An increase was observed in the compressive Izod impact strength of compatibilized nylon 6/EOC blend. Addition of GnPs to nylon 6/EOC blend caused an increase in the fracture toughness due to their influence on the morphology and fracture mechanisms. This study shows that simultaneous addition of high surface area GnPs and an impact modifier to neat nylon 6 can help achieve enhancement and tailoring of stiffness and toughness
Analytical estimates of proton acceleration in laser-produced turbulent plasmas
With the advent of high power lasers, new opportunities have opened up for
simulating astrophysical processes in the laboratory. We show that 2nd-order
Fermi acceleration can be directly investigated at the National Ignition
Facility, Livermore. This requires measuring the momentum-space diffusion of 3
MeV protons produced within a turbulent plasma generated by a laser. Treating
Fermi acceleration as a biased diffusion process, we show analytically that a
measurable broadening of the initial proton distribution is then expected for
particles exiting the plasma.Comment: 7 pages, 6 figures; Added missing plasma parameters in Table 1,
improved consideration of additional broadenin
From Random Probing to Noisy Leakages Without Field-Size Dependence
Side channel attacks are devastating attacks targeting cryptographic implementations. To protect against these attacks, various countermeasures have been proposed -- in particular, the so-called masking scheme. Masking schemes work by hiding sensitive information via secret sharing all intermediate values that occur during the evaluation of a cryptographic implementation. Over the last decade, there has been broad interest in designing and formally analyzing such schemes. The random probing model considers leakage where the value on each wire leaks with some probability . This model is important as it implies security in the noisy leakage model via a reduction by Duc et al. (Eurocrypt 2014). Noisy leakages are considered the gold-standard for analyzing masking schemes as they accurately model many real-world physical leakages. Unfortunately, the reduction of Duc et al. is non-tight, and in particular requires that the amount of noise increases by a factor of for circuits that operate over (where is a finite field). In this work, we give a generic transformation from random probing to average probing, which avoids this loss of . Since the average probing is identical to the noisy leakage model (Eurocrypt 2014), this yields for the first time a security analysis of masked circuits where the noise parameter in the noisy leakage model is independent of . The latter is particularly important for cryptographic schemes operating over large fields, e.g., the AES or the recently standardized post-quantum schemes
Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity
We study non-malleable secret sharing against joint leakage and joint tampering attacks.
Our main result is the first threshold secret sharing scheme in the plain model achieving resilience to noisy-leakage and continuous tampering. The above holds under (necessary) minimal computational assumptions (i.e., the existence of one-to-one one-way functions), and in a model where the adversary commits to a fixed partition of all the shares into non-overlapping subsets of at most shares (where is the reconstruction threshold), and subsequently jointly leaks from and tampers with the shares within each partition.
We also study the capacity (i.e., the maximum achievable asymptotic information rate) of continuously non-malleable secret sharing against joint continuous tampering attacks. In particular, we prove that whenever the attacker can tamper jointly with shares, the capacity is at most . The rate of our construction matches this upper bound.
An important corollary of our results is the first non-malleable secret sharing scheme against independent tampering attacks breaking the rate-one barrier (under the same computational assumptions as above)
Hexagonal honeycombs with zero Poisson's ratios and enhanced stiffness
In view of their potential applications in sandwich structures, there has been increasing interest in honeycomb networks. Several different types of honeycomb systems have been proposed each exhibiting different mechanical properties. Here we propose a new hexagonal honeycomb structure composed of two different geometrical features: a re-entrant feature which is known to generate auxetic behavior, and a non re-entrant feature found in regular hexagonal honeycombs which leads to conventional behavior. This results in a “semi re-entrant honeycomb” built of alternate conventional and auxetic layers. Finite element analysis and analytical modeling of these honeycombs show that they exhibit a zero Poisson ratio in one direction and a higher than normal Young's modulus in the orthogonal direction. We also show that by virtue of its zero Poisson's ratio, this honeycomb has a natural tendency to form cylindrical shaped curvatures, something which is very difficult to achieve with conventional or auxetic honeycombs.peer-reviewe
- …