منابع مشابه
Cryptanalysis of GGH Map
Multilinear map is a novel primitive which has many cryptographic applications, and GGH map is a major candidate of K-linear maps for K > 2. GGH map has two classes of applications, which are respectively applications with public tools of encoding and with hidden tools of encoding. In this paper we show that applications of GGH map with public tools of encoding are not secure, and that one appl...
متن کاملN-string vertices in string field theory.
We give the general form of the vertex corresponding to the interaction of an arbitrary number of strings. The technique employed relies on the “comma” representation of String Field Theory where string fields and interactions are represented as matrices and operations between them such as multiplication and trace. The general formulation presented here shows that the interaction vertex of N st...
متن کاملthe search for the self in becketts theatre: waiting for godot and endgame
this thesis is based upon the works of samuel beckett. one of the greatest writers of contemporary literature. here, i have tried to focus on one of the main themes in becketts works: the search for the real "me" or the real self, which is not only a problem to be solved for beckett man but also for each of us. i have tried to show becketts techniques in approaching this unattainable goal, base...
15 صفحه اولEffective β-functions for Effective Field Theory
We consider the problem of determining the beta-functions for any reduced effective field theory. Even though not all the Green’s functions of a reduced effective field theory are renormalizable, unlike the full effective field theory, certain effective beta-functions for the reduced set of couplings may be calculated without having to introduce vertices in the Feynman rules for redundant opera...
متن کاملString Field Theory Vertices for Fermions of Integral Weight
We construct Witten-type string field theory vertices for a fermionic first order system with conformal weights (0, 1) in the operator formulation using delta-function overlap conditions as well as the Neumann function method. The identity, the reflector and the interaction vertex are treated in detail paying attention to the zero mode conditions and the U(1) charge anomaly. The Neumann coeffic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of High Energy Physics
سال: 2013
ISSN: 1029-8479
DOI: 10.1007/jhep09(2013)078