7,021 research outputs found

    AX-GADGET: a new code for cosmological simulations of Fuzzy Dark Matter and Axion models

    Get PDF
    We present a new module of the parallel N-Body code P-GADGET3 for cosmological simulations of light bosonic non-thermal dark matter, often referred as Fuzzy Dark Matter (FDM). The dynamics of the FDM features a highly non-linear Quantum Potential (QP) that suppresses the growth of structures at small scales. Most of the previous attempts of FDM simulations either evolved suppressed initial conditions, completely neglecting the dynamical effects of QP throughout cosmic evolution, or resorted to numerically challenging full-wave solvers. The code provides an interesting alternative, following the FDM evolution without impairing the overall performance. This is done by computing the QP acceleration through the Smoothed Particle Hydrodynamics (SPH) routines, with improved schemes to ensure precise and stable derivatives. As an extension of the P-GADGET3 code, it inherits all the additional physics modules implemented up to date, opening a wide range of possibilities to constrain FDM models and explore its degeneracies with other physical phenomena. Simulations are compared with analytical predictions and results of other codes, validating the QP as a crucial player in structure formation at small scales.Comment: 18 page

    Assessing and countering reaction attacks against post-quantum public-key cryptosystems based on QC-LDPC codes

    Full text link
    Code-based public-key cryptosystems based on QC-LDPC and QC-MDPC codes are promising post-quantum candidates to replace quantum vulnerable classical alternatives. However, a new type of attacks based on Bob's reactions have recently been introduced and appear to significantly reduce the length of the life of any keypair used in these systems. In this paper we estimate the complexity of all known reaction attacks against QC-LDPC and QC-MDPC code-based variants of the McEliece cryptosystem. We also show how the structure of the secret key and, in particular, the secret code rate affect the complexity of these attacks. It follows from our results that QC-LDPC code-based systems can indeed withstand reaction attacks, on condition that some specific decoding algorithms are used and the secret code has a sufficiently high rate.Comment: 21 pages, 2 figures, to be presented at CANS 201

    How alternative food networks work in a metropolitan area? An analysis of Solidarity Purchase Groups in Northern Italy

    Get PDF
    Our paper focuses on Solidarity Purchase Group (SPG) participants located in a highly urbanized area, with the aim to investigate the main motivations underlining their participation in a SPG and provide a characterization of them. To this end, we carried out a survey of 795 participants involved in 125 SPGs in the metropolitan area of Milan (Italy). Taking advantage of a questionnaire with 39 questions, we run a factor analysis and a two-step cluster analysis to identify different profiles of SPG participants. Our results show that the system of values animating metropolitan SPG practitioners does not fully conform to that traditionally attributed to an alternative food network (AFN). In fact, considerations linked to food safety and healthiness prevail on altruistic motives such as environmental sustainability and solidarity toward small producers. Furthermore, metropolitan SPGs do not consider particularly desirable periurban and local food products. Observing the SPGs from this perspective, it emerges as such initiatives can flourish also in those places where the lack of connection with the surrounding territory is counterbalanced by the high motivation to buy products from trusted suppliers who are able to guarantee genuine and safe products, not necessarily located nearby

    LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes

    Full text link
    This work presents a new code-based key encapsulation mechanism (KEM) called LEDAkem. It is built on the Niederreiter cryptosystem and relies on quasi-cyclic low-density parity-check codes as secret codes, providing high decoding speeds and compact keypairs. LEDAkem uses ephemeral keys to foil known statistical attacks, and takes advantage of a new decoding algorithm that provides faster decoding than the classical bit-flipping decoder commonly adopted in this kind of systems. The main attacks against LEDAkem are investigated, taking into account quantum speedups. Some instances of LEDAkem are designed to achieve different security levels against classical and quantum computers. Some performance figures obtained through an efficient C99 implementation of LEDAkem are provided.Comment: 21 pages, 3 table

    Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures

    Full text link
    In this paper, we address the problem of achieving efficient code-based digital signatures with small public keys. The solution we propose exploits sparse syndromes and randomly designed low-density generator matrix codes. Based on our evaluations, the proposed scheme is able to outperform existing solutions, permitting to achieve considerable security levels with very small public keys.Comment: 16 pages. The final publication is available at springerlink.co

    The impact of coupled dark energy cosmologies on the high-redshift intergalactic medium

    Get PDF
    We present an analysis of high-resolution hydrodynamical N-body simulations of coupled dark energy cosmologies which focuses on the statistical properties of the transmitted Lyman alpha flux in the high-redshift intergalactic medium (IGM). In these models the growth of the diffuse cosmic web differs from the standard Lambda CDM case: the density distribution is skewed towards underdense regions and the matter power spectra are typically larger (in a scale-dependent way). These differences are also appreciable in the Lyman alpha flux and are larger than 5 per cent (10 per cent) at z = 2-4 in the flux probability distribution function (pdf) for high-transmissivity regions and for values of the coupling parameter beta = 0.08 (beta = 0.2). The flux power spectrum is also affected at the similar to 2 per cent (similar to 5-10 per cent) level for beta = 0.08 (beta = 0.2) in a redshift-dependent way. We infer the behaviour of flux pdf and flux power for a reasonable range of couplings and present constraints using present high-and low-resolution data sets. We find an upper limit beta less than or similar to 0.15 (at 2 sigma confidence level), which is obtained using only IGM data and is competitive with those inferred from other large-scale structure probes

    Progetto e realizzazione di un setup per l’analisi del rolling contact: risultati preliminari

    Get PDF
    Presso il Dipartimento di Ingegneria Meccanica dell’Università di Cagliari (DIMECA) è attiva, da alcuni anni, una linea di ricerca orientata alla valutazione dei principali parametri di contatto (forma e dimensioni dell’area nominale di contatto, area reale di contatto, distribuzione delle pressioni di contatto) in interfacce metalliche, mediante una tecnica sperimentale basata sull’impiego di onde ultrasoniche. L’applicazione di questo metodo ha consentito di ottenere informazioni su contatti a geometria semplice quali, ad esempio, quelli sfera-piano [1-2] su casi più complessi di rilevante impatto ingegneristico come quello relativo all’interazione tra ruota e rotaia ferroviaria [3-4]. Il principale punto di forza dell’indagine ultrasonica risiede nella sua capacità di fornire informazioni sullo stato del contatto a partire da misure del coefficiente di riflessione all’interfaccia, garantendo in tal modo sia la più completa non-invasività (nessun mezzo viene ad interporsi tra i corpi a contatto) e sia la possibilità di investigare “in process”. In particolare quest’ultima peculiarità permette di monitorare le variazioni del parametri di contatto in tempo reale (ad esempio a seguito di variazioni nel carico applicato o nella configurazione geometrica dell’accoppiamento) senza che sia necessario rimuovere i corpi per esaminare gli effetti che tali modifiche hanno generato. Appare importante sottolineare che, a tutt’oggi, la letteratura riporta esempi di impiego de metodo ultrasonico a problemi di contatto quasi esclusivamente nell’analisi di situazioni statiche. Tuttavia, è facilmente intuibile che la possibilità di estendere il campo di applicazione della tecnica a situazioni dinamiche, aumenterebbe in misura considerevole il range di casi di interesse ingegneristico potenzialmente testabili. In considerazione di ciò, il presente studio si pone come obiettivo principale quello di verificare la validità ed affidabilità del metodo ultrasonico per lo studio di situazioni dinamiche, con particolare riferimento a problemi di “rolling contact”

    Rotation in galaxy clusters from MUSIC simulations with the kinetic Sunyaev-Zel'dovich effect

    Get PDF
    We propose in this work its application for the detection of possible coherent rotational motions in the hot intra-cluster medium. We select a sample of massive, relaxed and rotating galaxy clusters from Marenostrum-mUltidark SImulations of galaxy Clusters (MUSIC), and we produce mock maps of the temperature distortion produced by the kinetic Sunyaev-Zel'dovich effect by exploring six different lines of sight, in the best observational condition. These maps are compared with the expected signal computed from a suitable theoretical model in two cases: (i) focusing only on the contribution from the rotation, and (ii) accounting also for the cluster bulk motion. We find that the parameters of the model assumed for the radial profile of the rotational velocity, averaged over the considered lines of sight, are in agreement within two standard deviations at most with independent estimates from the simulation data, without being significantly affected by the presence of the cluster bulk term. The amplitude of the rotational signal is, on average, of the order of 23 per cent of the total signal accounting also for the cluster bulk motion, and its values are consistent with the literature. The projected bulk velocity of the cluster is also recovered at the different lines of sight, with values in agreement with the simulation dataASB acknowledges funding from Sapienza Università di Roma - Progetti per Avvio alla Ricerca Anno 2017, prot. AR11715C82402BC

    Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes

    Full text link
    In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-check codes, which encompass low-density parity-check (LDPC) codes and moderate-density parity-check (MDPC) codes. We show that the feasibility of these attacks is not strictly associated to the quasi-cyclic (QC) structure of the code but is related to the intrinsically probabilistic decoding of any sparse parity-check code. So, these attacks not only work against QC codes, but can be generalized to broader classes of codes. We provide a novel algorithm that, in the case of a QC code, allows recovering a larger amount of information than that retrievable through existing attacks and we use this algorithm to characterize new side-channel information leakages. We devise a theoretical model for the decoder that describes and justifies our results. Numerical simulations are provided that confirm the effectiveness of our approach
    corecore