-
Ground state energy of a dilute Bose gas with three-body hard-core interactions
Authors:
Lukas Junge,
François Louis Antoine Visconti
Abstract:
We consider a gas of bosons interacting through a three-body hard-core potential in the thermodynamic limit. We derive an upper bound on the ground state energy of the system at the leading order using a Jastrow factor. Our result matches the lower bound proven by Nam-Ricaud-Triay and therefore resolves the leading order. Moreover, a straightforward adaptation of our proof can be used for systems…
▽ More
We consider a gas of bosons interacting through a three-body hard-core potential in the thermodynamic limit. We derive an upper bound on the ground state energy of the system at the leading order using a Jastrow factor. Our result matches the lower bound proven by Nam-Ricaud-Triay and therefore resolves the leading order. Moreover, a straightforward adaptation of our proof can be used for systems interacting via combined two-body and three-body interactions to generalise Theorem 1.2. from arXiv:2402.05646 to hard-core potentials.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Ground state energy of the low density Bose gas with two-body and three-body interactions
Authors:
François L. A. Visconti
Abstract:
In the present paper we study the low density Bose gas in the thermodynamic limit interacting via two-body and three-body interaction potentials. We prove that the leading order of the ground state energy is entirely characterised by both the scattering length of the two-body potential and the scattering energy of the three-body potential. The corresponding result for two-body interactions was pro…
▽ More
In the present paper we study the low density Bose gas in the thermodynamic limit interacting via two-body and three-body interaction potentials. We prove that the leading order of the ground state energy is entirely characterised by both the scattering length of the two-body potential and the scattering energy of the three-body potential. The corresponding result for two-body interactions was proven in seminal papers of Dyson (1957) and of Lieb-Yngvason (1998), and the result for three-body interactions was proven by Nam-Ricaud-Triay (arXiv:2201.13440). The present result resolves a conjecture of Nam--Ricaud--Triay (arXiv:2202.1396).
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium
Authors:
Roberto La Scala,
Federico Pintore,
Sharwan K. Tiwari,
Andrea Visconti
Abstract:
In this paper we introduce a multistep generalization of the guess-and-determine or hybrid strategy for solving a system of multivariate polynomial equations over a finite field. In particular, we propose performing the exhaustive evaluation of a subset of variables stepwise, that is, by incrementing the size of such subset each time that an evaluation leads to a polynomial system which is possibl…
▽ More
In this paper we introduce a multistep generalization of the guess-and-determine or hybrid strategy for solving a system of multivariate polynomial equations over a finite field. In particular, we propose performing the exhaustive evaluation of a subset of variables stepwise, that is, by incrementing the size of such subset each time that an evaluation leads to a polynomial system which is possibly unfeasible to solve. The decision about which evaluation to extend is based on a preprocessing consisting in computing an incomplete Grobner basis after the current evaluation, which possibly generates linear polynomials that are used to eliminate further variables. If the number of remaining variables in the system is deemed still too high, the evaluation is extended and the preprocessing is iterated. Otherwise, we solve the system by a complete Grobner basis computation.
Having in mind cryptanalytic applications, we present an implementation of this strategy in an algorithm called MultiSolve which is designed for polynomial systems having at most one solution. We prove explicit formulas for its complexity which are based on probability distributions that can be easily estimated by performing the proposed preprocessing on a testset of evaluations for different subsets of variables. We prove that an optimal complexity of MultiSolve is achieved by using a full multistep strategy with a maximum number of steps and in turn the standard guess-and-determine strategy, which essentially is a strategy consisting of a single step, is the worst choice. Finally, we extensively study the behaviour of MultiSolve when performing an algebraic attack on the well-known stream cipher Trivium.
△ Less
Submitted 5 June, 2024; v1 submitted 16 April, 2023;
originally announced April 2023.
-
An algebraic attack to the Bluetooth stream cipher E0
Authors:
Roberto La Scala,
Sergio Polese,
Sharwan K. Tiwari,
Andrea Visconti
Abstract:
In this paper we study the security of the Bluetooth stream cipher E0 from the viewpoint it is a "difference stream cipher", that is, it is defined by a system of explicit difference equations over the finite field GF(2). This approach highlights some issues of the Bluetooth encryption such as the invertibility of its state transition map, a special set of 14 bits of its 132-bit state which when g…
▽ More
In this paper we study the security of the Bluetooth stream cipher E0 from the viewpoint it is a "difference stream cipher", that is, it is defined by a system of explicit difference equations over the finite field GF(2). This approach highlights some issues of the Bluetooth encryption such as the invertibility of its state transition map, a special set of 14 bits of its 132-bit state which when guessed implies linear equations among the other bits and finally a small number of spurious keys, with 83 guessed bits, which are compatible with a keystream of about 60 bits. Exploiting these issues, we implement an algebraic attack using Gröbner bases, SAT solvers and Binary Decision Diagrams. Testing activities suggest that the version based on Gröbner bases is the best one and it is able to attack E0 in about 2^79 seconds on an Intel i9 CPU. To the best of our knowledge, this work improves any previous attack based on a short keystream, hence fitting with Bluetooth specifications.
△ Less
Submitted 8 August, 2022; v1 submitted 4 January, 2022;
originally announced January 2022.
-
Accessible Data Curation and Analytics for International-Scale Citizen Science Datasets
Authors:
Benjamin Murray,
Eric Kerfoot,
Mark S. Graham,
Carole H. Sudre,
Erika Molteni,
Liane S. Canas,
Michela Antonelli,
Kerstin Klaser,
Alessia Visconti,
Andrew T. Chan,
Paul W. Franks,
Richard Davies,
Jonathan Wolf,
Tim Spector,
Claire J. Steves,
Marc Modat,
Sebastien Ourselin
Abstract:
The Covid Symptom Study, a smartphone-based surveillance study on COVID-19 symptoms in the population, is an exemplar of big data citizen science. Over 4.7 million participants and 189 million unique assessments have been logged since its introduction in March 2020. The success of the Covid Symptom Study creates technical challenges around effective data curation for two reasons. Firstly, the scal…
▽ More
The Covid Symptom Study, a smartphone-based surveillance study on COVID-19 symptoms in the population, is an exemplar of big data citizen science. Over 4.7 million participants and 189 million unique assessments have been logged since its introduction in March 2020. The success of the Covid Symptom Study creates technical challenges around effective data curation for two reasons. Firstly, the scale of the dataset means that it can no longer be easily processed using standard software on commodity hardware. Secondly, the size of the research group means that replicability and consistency of key analytics used across multiple publications becomes an issue. We present ExeTera, an open source data curation software designed to address scalability challenges and to enable reproducible research across an international research group for datasets such as the Covid Symptom Study dataset.
△ Less
Submitted 17 February, 2021; v1 submitted 2 November, 2020;
originally announced November 2020.
-
To $d$, or not to $d$: Recent developments and comparisons of regularization schemes
Authors:
C. Gnendiger,
A. Signer,
D. Stöckinger,
A. Broggio,
A. L. Cherchiglia,
F. Driencourt-Mangin,
A. R. Fazio,
B. Hiller,
P. Mastrolia,
T. Peraro,
R. Pittau,
G. M. Pruna,
G. Rodrigo,
M. Sampaio,
G. Sborlini,
W. J. Torres Bobadilla,
F. Tramontano,
Y. Ulrich,
A. Visconti
Abstract:
We give an introduction to several regularization schemes that deal with ultraviolet and infrared singularities appearing in higher-order computations in quantum field theories. Comparing the computation of simple quantities in the various schemes, we point out similarities and differences between them.
We give an introduction to several regularization schemes that deal with ultraviolet and infrared singularities appearing in higher-order computations in quantum field theories. Comparing the computation of simple quantities in the various schemes, we point out similarities and differences between them.
△ Less
Submitted 7 November, 2017; v1 submitted 4 May, 2017;
originally announced May 2017.
-
Regularization-scheme dependence of QCD amplitudes in the massive case
Authors:
Christoph Gnendiger,
Adrian Signer,
Andrea Visconti
Abstract:
We investigate QCD amplitudes with massive quarks computed in the four-dimensional helicity scheme (FDH) and dimensional reduction at NNLO and describe how they are related to the corresponding amplitudes computed in conventional dimensional regularization. To this end, the scheme dependence of the heavy quark and the velocity-dependent cusp anomalous dimensions is determined using soft-collinear…
▽ More
We investigate QCD amplitudes with massive quarks computed in the four-dimensional helicity scheme (FDH) and dimensional reduction at NNLO and describe how they are related to the corresponding amplitudes computed in conventional dimensional regularization. To this end, the scheme dependence of the heavy quark and the velocity-dependent cusp anomalous dimensions is determined using soft-collinear effective theory. The results are checked against explicit computations of massive form factors in FDH at NNLO. Our results complete the description of the scheme dependence of QCD amplitudes at NNLO.
△ Less
Submitted 5 October, 2016; v1 submitted 27 July, 2016;
originally announced July 2016.
-
SCET approach to regularization-scheme dependence of QCD amplitudes
Authors:
A. Broggio,
Ch. Gnendiger,
A. Signer,
D. Stöckinger,
A. Visconti
Abstract:
We investigate the regularization-scheme dependence of scattering amplitudes in massless QCD and find that the four-dimensional helicity scheme (FDH) and dimensional reduction (DRED) are consistent at least up to NNLO in the perturbative expansion if renormalization is done appropriately. Scheme dependence is shown to be deeply linked to the structure of UV and IR singularities. We use jet and sof…
▽ More
We investigate the regularization-scheme dependence of scattering amplitudes in massless QCD and find that the four-dimensional helicity scheme (FDH) and dimensional reduction (DRED) are consistent at least up to NNLO in the perturbative expansion if renormalization is done appropriately. Scheme dependence is shown to be deeply linked to the structure of UV and IR singularities. We use jet and soft functions defined in soft-collinear effective theory (SCET) to efficiently extract the relevant anomalous dimensions in the different schemes. This result allows us to construct transition rules for scattering amplitudes between different schemes (CDR, HV, FDH, DRED) up to NNLO in massless QCD. We also show by explicit calculation that the hard, soft and jet functions in SCET are regularization-scheme independent.
△ Less
Submitted 17 June, 2015;
originally announced June 2015.
-
Computation of $H\to gg$ in FDH and DRED: renormalization, operator mixing, and explicit two-loop results
Authors:
A. Broggio,
Ch. Gnendiger,
A. Signer,
D. Stöckinger,
A. Visconti
Abstract:
The $H\to gg$ amplitude relevant for Higgs production via gluon fusion is computed in the four-dimensional helicity scheme (FDH) and in dimensional reduction (DRED) at the two-loop level. The required renormalization is developed and described in detail, including the treatment of evanescent $ε$-scalar contributions. In FDH and DRED there are additional dimension-5 operators generating the…
▽ More
The $H\to gg$ amplitude relevant for Higgs production via gluon fusion is computed in the four-dimensional helicity scheme (FDH) and in dimensional reduction (DRED) at the two-loop level. The required renormalization is developed and described in detail, including the treatment of evanescent $ε$-scalar contributions. In FDH and DRED there are additional dimension-5 operators generating the $H g g$ vertices, where $g$ can either be a gluon or an $ε$-scalar. An appropriate operator basis is given and the operator mixing through renormalization is described. The results of the present paper provide building blocks for further computations, and they allow to complete the study of the infrared divergence structure of two-loop amplitudes in FDH and DRED.
△ Less
Submitted 31 March, 2015;
originally announced March 2015.