-
Manipulating the wavelength of single photons in insulating van der Waals heterostructures: theory and application to bilayer hexagonal boron nitride
Abstract: Van der Waals heterostructures are promising for adding new functionalities to two-dimensional materials. In this study, we focus on single photon emitters hosted in one layer and adjacent to other insulating two-dimensional material. Specifically, we show how the emission energy is modified by such a heterostructure. We developed a general approach to elucidate the mechanisms affecting the emissi… ▽ More
Submitted 5 March, 2024; v1 submitted 27 November, 2023; originally announced November 2023.
Comments: ACS Appl. Nano Mater
-
arXiv:2307.15465 [pdf, ps, other]
Provably secure KEM-based protocols over unauthenticated channels
Abstract: In this paper we propose a number of KEM-based protocols to establish a shared secret between two parties, and study their resistance over unauthenticated channels. This means analyzing the security of the protocol itself, and its robustness against Man-in-the-Middle attacks. We do this by constructing a variation of known unauthenticated models that applies the techniques used to constructed the… ▽ More
Submitted 9 December, 2023; v1 submitted 28 July, 2023; originally announced July 2023.
-
arXiv:2001.10891 [pdf, ps, other]
On the RLWE/PLWE equivalence for cyclotomic number fields
Abstract: We study the equivalence between the Ring Learning With Errors and Polynomial Learning With Errors problems for cyclotomic number fields,namely: we prove that both problems are equivalent via a polynomial noise increase as long as the number of distinct primes dividing the conductor is kept constant. We refine our bound in the case where the conductor is divisible by at most three primes and we gi… ▽ More
Submitted 15 April, 2020; v1 submitted 29 January, 2020; originally announced January 2020.
Comments: Accepted in: Applicable Algebra in Engineering, Communications and Computing
MSC Class: 68P25; 11T22; 11Z05
-
arXiv:1902.08551 [pdf, ps, other]
Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory
Abstract: The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory. The survey is based to a certain extent on an invited course given by the author at the Basque Center for Applied Mathematics in September 2018.
Submitted 2 August, 2020; v1 submitted 21 February, 2019; originally announced February 2019.
Comments: arXiv admin note: text overlap with arXiv:1508.01375 by other authors/ comment of the author: quotation has been added to Theorem 5.8
-
arXiv:1801.04189 [pdf, ps, other]
Divisibility of L-Polynomials for a Family of Curves
Abstract: We consider the question of when the L-polynomial of one curve divides the L-polynomial of another curve. A theorem of Tate gives an answer in terms of jacobians. We consider the question in terms of the curves. The last author gave an invited talk at the 12th International Conference on Finite Fields and Their Applications on this topic, and stated two conjectures. In this article we prove one of… ▽ More
Submitted 12 January, 2018; originally announced January 2018.
MSC Class: 14H40
Journal ref: in Contemporary Developments in Finite Fields and Applications, eds A. Canteaut, G. Effinger, S. Huczynska, D. Panario, L. Storme, World Scientific 2016