5,226 research outputs found
Probing leptogenesis with GeV-scale sterile neutrinos at LHCb and BELLE II
We show that existing laboratory experiments have the potential to unveil the
origin of matter by probing leptogenesis in the type-I seesaw model with three
right-handed neutrinos and Majorana masses in the GeV range. The baryon
asymmetry is generated by CP-violating flavour oscillations during the
production of the right-handed neutrinos. In contrast to the case with only two
right-handed neutrinos, no degeneracy in the Majorana masses is required. The
right-handed neutrinos can be found in meson decays at BELLE II and LHCb.Comment: Title changed, discussion extended and references added. 12 pages,
one figur
EasyUC: using EasyCrypt to mechanize proofs of universally composable security
We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of cryptographic schemes and protocols) to mechanize proofs of security of cryptographic protocols within the universally composable (UC) security framework. This allows, for the first time, the mechanization and formal verification of the entire sequence of steps needed for proving simulation-based security in a modular way: Specifying a protocol and the desired ideal functionality; Constructing a simulator and demonstrating its validity, via reduction to hard computational problems; Invoking the universal composition operation and demonstrating that it indeed preserves security. We demonstrate our methodology on a simple example: stating and proving the security of secure message communication via a one-time pad, where the key comes from a Diffie-Hellman key-exchange, assuming ideally authenticated communication. We first put together EasyCrypt-verified proofs that: (a) the Diffie-Hellman protocol UC-realizes an ideal key-exchange functionality, assuming hardness of the Decisional Diffie-Hellman problem, and (b) one-time-pad encryption, with a key obtained using ideal key-exchange, UC-realizes an ideal secure-communication functionality. We then mechanically combine the two proofs into an EasyCrypt-verified proof that the composed protocol realizes the same ideal secure-communication functionality. Although formulating a methodology that is both sound and workable has proven to be a complex task, we are hopeful that it will prove to be the basis for mechanized UC security analyses for significantly more complex protocols and tasks.Accepted manuscrip
Matter and Antimatter in the Universe
We review observational evidence for a matter-antimatter asymmetry in the
early universe, which leads to the remnant matter density we observe today. We
also discuss observational bounds on the presence of antimatter in the present
day universe, including the possibility of a large lepton asymmetry in the
cosmic neutrino background. We briefly review the theoretical framework within
which baryogenesis, the dynamical generation of a matter-antimatter asymmetry,
can occur. As an example, we discuss a testable minimal model that
simultaneously explains the baryon asymmetry of the universe, neutrino
oscillations and dark matter.Comment: Invited contribution to the New Journal of Physics Focus Issue
"Origin of Matter" (New J. Phys. 14 (2012) 095012); this version is identical
to the published article up to a few updates in the reference
Baryon Asymmetry of the Universe in the NuMSM
We perform a detailed analysis of baryon asymmetry generation in the NuMSM
(an extension of the Standard Model by three singlet Majorana fermions with
masses below the Fermi scale). Fixing a number of parameters of the NuMSM by
the neutrino oscillation data, we determine the remaining domain of the
parameter space from the requirement of successful baryogenesis. We derive, in
particular, the constraints on the mass splitting of a pair of singlet
fermions, and on the strength of their coupling to ordinary leptons, essential
for searches of these particles in rare decays of mesons and in beam-dump
experiments with intensive proton beams
Dark Matter, Baryogenesis and Neutrino Oscillations from Right Handed Neutrinos
We show that, leaving aside accelerated cosmic expansion, all experimental
data in high energy physics that are commonly agreed to require physics beyond
the Standard Model can be explained when completing it by three right handed
neutrinos that can be searched for using current day experimental techniques.
The model that realises this scenario is known as Neutrino Minimal Standard
Model (\nu MSM). In this article we give a comprehensive summary of all known
constraints in the \nu MSM, along with a pedagogical introduction to the model.
We present the first complete quantitative study of the parameter space of the
model where no physics beyond the \nu MSM is needed to simultaneously explain
neutrino oscillations, dark matter and the baryon asymmetry of the universe.
This requires to track the time evolution of left and right handed neutrino
abundances from hot big bang initial conditions down to temperatures below the
QCD scale. We find that the interplay of resonant amplifications, CP-violating
flavour oscillations, scatterings and decays leads to a number of previously
unknown constraints on the sterile neutrino properties. We furthermore
re-analyse bounds from past collider experiments and big bang nucleosynthesis
in the face of recent evidence for a non-zero neutrino mixing angle
\theta_{13}. We combine all our results with existing constraints on dark
matter properties from astrophysics and cosmology. Our results provide a
guideline for future experimental searches for sterile neutrinos. A summary of
the constraints on sterile neutrino masses and mixings has appeared in
arXiv:1204.3902 [hep-ph]. In this article we provide all details of our
calculations and give constraints on other model parameters.Comment: We extended the discussion in several sections, in particular 2, 3
and 8, in response to comments we received after submission of version 1. We
added appendix
The Relationship Between Acute: Chronic Workload Ratios and Injury Risk in Sports: A Systematic Review
Sterile Neutrinos as the Origin of Dark and Baryonic Matter
We demonstrate for the first time that three sterile neutrinos alone can
simultaneously explain neutrino oscillations, the observed dark matter and the
baryon asymmetry of the Universe without new physics above the Fermi scale. The
key new point of our analysis is leptogenesis after sphaleron freeze-out, which
leads to resonant dark matter production, evading thus the constraints on
sterile neutrino dark matter from structure formation and x-ray searches. We
identify the range of sterile neutrino properties that is consistent with all
known constraints. We find a domain of parameters where the new particles can
be found with present day experimental techniques, using upgrades to existing
experimental facilities.Comment: 4 pages, 2 figures; identical to published versio
Diseño de aislante térmico no convencional para vivienda
Se identificó un potencial nicho de mercado a nivel local: aislantes térmicos para vivienda, mediante el desarrollo de materiales no tradicionales. Su producción puede considerarse un paso estratégico, tanto para empresas presentes en el sector, u organizaciones de menor escala que planeen entrar al mercado. El objetivo general esproponer un producto aislante térmico que cumpla con los requisitos de diseño identificados. Los objetivos específicos son proponer alternativas; producir, verificar y analizar las muestras materiales considerando normativa existente;evaluar la factibilidad productiva en el marco de la región.Área: Ingeniería, Arquitectura y Tecnologí
The Random Oracle Methodology, Revisited
We take a critical look at the relationship between the security of
cryptographic schemes in the Random Oracle Model, and the security of the
schemes that result from implementing the random oracle by so called
"cryptographic hash functions". The main result of this paper is a negative
one: There exist signature and encryption schemes that are secure in the Random
Oracle Model, but for which any implementation of the random oracle results in
insecure schemes.
In the process of devising the above schemes, we consider possible
definitions for the notion of a "good implementation" of a random oracle,
pointing out limitations and challenges.Comment: 31 page
- …
