total 1457took 0.09s

Secure gated detection scheme for quantum cryptographyJan 29 2011Several attacks have been proposed on quantum key distribution systems with gated single-photon detectors. The attacks involve triggering the detectors outside the center of the detector gate, and/or using bright illumination to exploit classical photodiode ... More

Controlling passively-quenched single photon detectors by bright lightJul 26 2007Apr 17 2009Single photon detectors based on passively-quenched avalanche photodiodes can be temporarily blinded by relatively bright light, of intensity less than a nanowatt. I describe a bright-light regime suitable for attacking a quantum key distribution system ... More

Finite-key-size effect in commercial plug-and-play QKD systemOct 21 2016We demonstrate the ability of an eavesdropper to control the sifted-key size in a commercial plug-and-play QKD system Clavis2 from ID Quantique, and its effect on security analysis. Experimentally, we could consistently force the system to generate the ... More

Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocolsFeb 27 2007Nov 23 2007In quantum cryptosystems, variations in detector efficiency can be exploited to stage a successful attack. This happens when the efficiencies of Bob's two detectors are different functions of a control parameter accessible to Eve (e.g., timing of the ... More

Ultra-low noise single-photon detector based on Si avalanche photodiodeMay 04 2011Sep 22 2011We report operation and characterization of a lab-assembled single-photon detector based on commercial silicon avalanche photodiodes (PerkinElmer C30902SH, C30921SH). Dark count rate as low as 5 Hz was achieved by cooling the photodiodes down to -80 C. ... More

Reply to "Avoiding the Detector Blinding Attack on Quantum Cryptography"Dec 02 2010This is a reply to the comment by Yuan et al. [arXiv:1009.6130v1] on our publication [arXiv:1008.4593].

Thermal blinding of gated detectors in quantum cryptographySep 14 2010It has previously been shown that the gated detectors of two commercially available quantum key distribution (QKD) systems are blindable and controllable by an eavesdropper using continuous-wave illumination and short bright trigger pulses, manipulating ... More

A universal setup for active control of a single-photon detectorJul 23 2013Dec 15 2013The influence of bright light on a single-photon detector has been described in a number of recent publications. The impact on quantum key distribution (QKD) is important, and several hacking experiments have been tailored to fully control single-photon ... More

Experimentally faking the violation of Bell's inequalitiesJun 16 2011Oct 23 2011Entanglement witnesses such as Bell inequalities are frequently used to prove the non-classicality of a light source and its suitability for further tasks. By demonstrating Bell inequality violations using classical light in common experimental arrangements, ... More

After-gate attack on a quantum cryptosystemSep 14 2010We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack ... More

The singularly continuous spectrum and non-closed invariant subspacesMar 05 2004Jul 28 2004Let $\mathbf{A}$ be a bounded self-adjoint operator on a separable Hilbert space $\mathfrak{H}$ and $\mathfrak{H}_0\subset\mathfrak{H}$ a closed invariant subspace of $\mathbf{A}$. Assuming that $\mathfrak{H}_0$ is of codimension 1, we study the variation ... More

On Krein's ExampleJun 10 2006In his 1953 paper [Matem.~Sbornik \textbf{33} (1953), 597 -- 626] Mark Krein presented an example of a symmetric rank one perturbation of a self-adjoint operator such that for all values of the spectral parameter in the interior of the spectrum, the difference ... More

Experimental quantum key distribution with source flawsAug 15 2014Apr 15 2015Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the ... More

Secure detection in quantum key distribution by real-time calibration of receiverNov 23 2016The single photon detection efficiency of the detector unit is crucial for the security of common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value for the efficiency indicates a possible eavesdropping attack that exploits ... More

Effects of detector efficiency mismatch on security of quantum cryptosystemsNov 03 2005Mar 06 2007We suggest a type of attack on quantum cryptosystems that exploits variations in detector efficiency as a function of a control parameter accessible to an eavesdropper. With gated single-photon detectors, this control parameter can be the timing of the ... More

Quantum cryptographyAug 08 2011This is a chapter on quantum cryptography for the book "A Multidisciplinary Introduction to Information Security" to be published by CRC Press in 2011/2012. The chapter aims to introduce the topic to undergraduate-level and continuing-education students ... More

Tailored bright illumination attack on distributed-phase-reference protocolsDec 20 2010Detector control attacks on quantum key distribution systems exploit the linear mode of avalanche photodiode in single photon detectors. So far, the protocols under consideration have been the BB84 protocol and its derivatives. Here we present how bright ... More

Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"Jun 19 2011This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98, 231104 (2011); arXiv:1106.2675v1 [quant-ph]].

The Birman-Schwinger principle in von Neumann algebras of finite typeOct 09 2006We introduce a relative index for a pair of dissipative operators in a von Neumann algebra of finite type and prove an analog of the Birman-Schwinger principle in this setting. As an application of this result, revisiting the Birman-Krein formula in the ... More

On the accuracy of slow-roll inflation given current observational constraintsJun 14 2005Oct 19 2005We investigate the accuracy of slow-roll inflation in light of current observational constraints, which do not allow for a large deviation from scale invariance. We investigate the applicability of the first and second order slow-roll approximations for ... More

Existence and uniqueness of solutions to the operator Riccati equation. A geometric approachJul 15 2002We introduce a new concept of unbounded solutions to the operator Riccati equation $A_1 X - X A_0 - X V X + V^\ast = 0$ and give a complete description of its solutions associated with the spectral graph subspaces of the block operator matrix $\mathbf{B} ... More

Perturbation of spectra and spectral subspacesJun 01 2003Jul 23 2007We consider the problem of variation of spectral subspaces for linear self-adjoint operators under off-diagonal perturbations. We prove a number of new optimal results on the shift of the spectrum and obtain (sharp) estimates on the norm of the difference ... More

On the existence of solutions to the operator Riccati equation and the tanΘtheoremOct 02 2002May 29 2003Let A and C be self-adjoint operators such that the spectrum of A lies in a gap of the spectrum of C and let d>0 be the distance between the spectra of A and C. We prove that under these assumptions the sharp value of the constant c in the condition ||B||<cd ... More

A generalization of the $tan 2Θ$ TheoremFeb 03 2003Let $\mathbf{A}$ be a bounded self-adjoint operator on a separable Hilbert space $\mathfrak{H}$ and $\mathfrak{H}_0\subset\mathfrak{H}$ a closed invariant subspace of $\mathbf{A}$. Assuming that $\sup\spec(A_0)\leq \inf\spec(A_1)$, where $A_0$ and $A_1$ ... More

The TAN $2Θ$ Theorem for Indefinite Quadratic FormsJun 16 2010A version of the Davis-Kahan Tan $2\Theta$ theorem [SIAM J. Numer. Anal. \textbf{7} (1970), 1 -- 46] for not necessarily semibounded linear operators defined by quadratic forms is proven. This theorem generalizes a recent result by Motovilov and Selin ... More

On a Subspace Perturbation ProblemMar 22 2002Jun 27 2002We discuss the problem of perturbation of spectral subspaces for linear self-adjoint operators on a separable Hilbert space. Let $A$ and $V$ be bounded self-adjoint operators. Assume that the spectrum of $A$ consists of two disjoint parts $\sigma$ and ... More

Representation Theorems for Indefinite Quadratic Forms RevisitedMar 09 2010Apr 10 2012The first and second representation theorems for sign-indefinite, not necessarily semi-bounded quadratic forms are revisited. New straightforward proofs of these theorems are given. A number of necessary and sufficient conditions ensuring the second representation ... More

Optimised quantum hacking of superconducting nanowire single-photon detectorsMay 26 2013Apr 07 2014We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical ... More

Controlling an actively-quenched single photon detector with bright lightSep 19 2008Oct 23 2011We control using bright light an actively-quenched avalanche single-photon detector. Actively-quenched detectors are commonly used for quantum key distribution (QKD) in the visible and near-infrared range. This study shows that these detectors are controllable ... More

Homodyne-detector-blinding attack in continuous-variable quantum key distributionMay 04 2018Jul 06 2018We propose an efficient strategy to attack a continuous-variable quantum key distribution (CV-QKD) system, that we call homodyne detector blinding. This attack strategy takes advantage of a generic vulnerability of homodyne receivers: a bright light pulse ... More

Implementation vulnerabilities in general quantum cryptographyMay 17 2018Oct 24 2018Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security ... More

An optimal local model to practically emulate Bell inequalitiesFeb 08 2019We show how an adversary can emulate a Bell inequality using existing detector control methods if the Bell test is not loophole-free. For a Clauser-Horne-Shimony-Holt inequality, our model fakes a maximum violation predicted by quantum mechanics for a ... More

Quantum Hele-Shaw flowNov 19 2004In this note, we discuss the quantum Hele-Shaw flow, a random measure process in the complex plane introduced by the physicists P.Wiegmann, A. Zabrodin, et al. This process arises in the theory of electronic droplets confined to a plane under a strong ... More

Around Hilbert-Arnold ProblemNov 06 2001This lectures notes consists of four lectures. The first lecture discusses questions around Hilbert-Arnold Problem which is naturally arises from Quantitative Hilbert 16-th problem. In the second lecture we outline author's solution of a weak form of ... More

Ideal DatabasesDec 30 2015From algebraic geometry perspective database relations are succinctly defined as Finite Varieties. After establishing basic framework, we give analytic proof of Heath theorem from Database Dependency theory. Next, we leverage Algebra/Geometry dictionary ... More

Algorithm for multivariate data standardization up to third momentApr 18 2012An algorithm for transforming multivariate data to a form with normalized first, second and third moments is presented.

Kondo resonance in the case of strong Coulomb screeningNov 05 1995The effect of Coulomb screening on the magnetic impurity behavior is analysed. Two types of the behavior corresponding to either integer or fractional occupation numbers of the low lying magnetic level are described. The features in the dependence of ... More

Pentagramma Mirificum and elliptic functionsJun 18 2011We give an exposition of fragments from Gauss [G] where he discovered, with the help of some work of Jacobi, a remarkable connection between Napier pentagons on the sphere and Poncelet pentagons on the plane. As a corollary we find a parametrization in ... More

Local structure of moduli spacesAug 05 1997Aug 06 1997We describe the algebra of a universal formal deformation as the zeroth cohomology of the dg Lie algebra corresponding to this deformation problem. A report at Arbeitstagung 1997 on the joint work with V.Hinich.

A remark on virtual orientations for complete intersectionsAug 03 1997The aim of this note is to give a simple definition of genus zero virtual orientation classes (or fundamental classes) for projective complete intersections or, more generally, for complete intersections in convex varieties, and to prove a push forward ... More

Some applications of weight structures of BondarkoFeb 02 2011Dec 10 2011We construct a functor from the triangulated category of Voevodsky motives to a certain derived category of mixed Hodge structures enriched with integral weight filtration. We use this construction to prove a strong integral version of the Deligne conjecture ... More

Nuclear matrix elements for double beta decayOct 30 2009The present status of calculations of the nuclear matrix elements for neutrinoless double beta decay is reviewed. A proposal which allows in principle to measure the neutrinoless double beta decay Fermi matrix element is briefly described.

Formation of filament-like structures in the pulsar magnetosphere and the short-term variability of pulsar emissionJan 10 2014Magnetohydrodynamic (MHD) instabilities can play an important role in the dynamics of the pulsar magnetosphere and can be responsible for the formation of various structures. We consider the instability caused by a gradient of the magnetic pressure which ... More

On generalized resolvents and characteristic matrices of first-order symmetric systemsMar 16 2014We study general (not necessarily Hamiltonian) first-order symmetric system $J y'-B(t)y=\D(t) f(t)$ on an interval $\cI=[a,b) $ with the regular endpoint $a$ and singular endpoint $b$. It is assumed that the deficiency indices $n_\pm(\Tmi)$ of the corresponding ... More

Boundary relations and boundary conditions for general (not necessarily definite) canonical systems with possibly unequal deficiency indicesSep 10 2011Sep 13 2011We investigate in the paper general (not necessarily definite) canonical systems of differential equation in the framework of extension theory of symmetric linear relations. For this aim we first introduce the new notion of a boundary relation $\G:\gH^2\to\HH$ ... More

Minimal spectral functions of an ordinary differential operatorOct 06 2010Oct 12 2010Let $l[y]$ be a formally selfadjoint differential expression of an even order on the interval $[0,b> \;(b\leq \infty)$ and let $L_0$ be the corresponding minimal operator. By using the concept of a decomposing boundary triplet we consider the boundary ... More

On spectral and pseudospectral functions of first-order symmetric systemsJul 21 2014We consider general (not necessarily Hamiltonian) first-order symmetric system $J y'-B(t)y=\D(t) f(t)$ on an interval $\cI=[a,b) $ with the regular endpoint $a$. A distribution matrix-valued function $\Si(s), \; s\in\bR,$ is called a spectral (pseudospectral) ... More

Sur les algèbres vertex attachées aux variétés algébriquesApr 21 2003Sganarelle: ... Mais encore faut-il croire quelque chose dans le monde: qu'est-ce donc que vous croyez? Dom Juan: Ce que je crois? Sganarelle: Oui. Dom Juan: Je crois que deux et deux sont quatre, Sganarelle, et que quatre et quatre sont huit. [Moli\`ere, ... More

The Hilbert 16-th problem and an estimate for cyclicity of an elementary polycycleOct 17 2000Hilbert-Arnold (HA) problem, motivated by Hilbert 16-th problem, is to prove that for a generic k-parameter family of smooth vector fields {\dot x=v(x,\eps)}_{\eps\in B^k} on the 2-dimensional sphere S^2 has uniformly bounded number of limit cycles (isolated ... More

Generic Diffeomorphisms with Superexponential Growth of Number of Periodic OrbitsFeb 26 1999Consider a compact manifold M of dimension at least 2 and the space of C^r-smooth diffeomorphisms Diff^r(M). The classical Artin-Mazur theorem says that for a dense subset D of Diff^r(M) the number of isolated periodic points grows at most exponentially ... More

Fisher information and quantum mechanical models for financeApr 15 2015The probability distribution function (PDF) for prices on financial markets is derived by extremization of Fisher information. It is shown how on that basis the quantum-like description for financial markets arises and different financial market models ... More

Moments of the ARPES spectral function of an undoped Mott insulatorMar 15 2000We derive analytic expressions for the first three frequency moments of the single particle spectral function for one hole in a Mott insulator in terms of equilibrium spin correlation functions of the insulating state. We show that the ``remnant Fermi ... More

On the derived DG functorsApr 12 2010Jan 05 2011Assume that abelian categories $A, B$ over a field admit countable direct limits and that these limits are exact. Let $F: D^+_{dg}(A) --> D^+_{dg}(B)$ be a DG quasi-functor such that the functor $Ho(F): D^+(A) \to D^+(B)$ carries $D^{\geq 0}(A)$ to $D^{\geq ... More

Hilbert series and Berezin-Gelfand dualityAug 31 2009Mar 13 2010We give an example showing how Jacobi polynomials and their discrete counterparts (Hahn polynomials) appear in the Hilbert series of some homogeneous spaces.

On hypergeometric functions connected with quantum cohomology of flag spacesDec 20 1997Givental's recursion relations for the flag varieties $G/B$ are established.

MediaWiki Grammar RecoveryJul 23 2011The paper describes in detail the recovery effort of one of the official MediaWiki grammars. Over two hundred grammar transformation steps are reported and annotated, leading to delivery of a level 2 grammar, semi-automatically extracted from a community ... More

The Class of Purely Unrectifiable Sets in the Hilbert Space is coanalytic-completeMar 14 2013The space $F(\ell_2)$ of all closed subsets of $\ell_2$ is a Polish space. We show that the subset $P\subset F(\ell_2)$ consisting of the purely 1-unrectifiable sets is $\Pii$-complete.

Borel Reductions and Cub GamesJul 09 2012It is shown that the power set of $\k$ ordered by the subset relation modulo various versions of the non-stationary deal can be embedded into the partial order of Borel equivalence relations on $2^\k$ under Borel reducibility. Here $\k$ is uncountable ... More

The Grammar Hammer of 2012Dec 17 2012This document is a case study in aggressive self-archiving. It collects all initiatives undertaken by its author in 2012, including unpublished ones, explains their relevance and relation with one another. Discussed topics include guided convergence of ... More

Triangulated endofunctors of the derived category of coherent sheaves which do not admit DG liftingsApr 29 2016Recently, Rizzardo and Van den Bergh constructed an example of a triangulated functor between the derived categories of coherent sheaves on smooth projective varieties over a field $k$ of characteristic $0$ which is not of the Fourier-Mukai type. The ... More

On the properties of nodal price response matrix in electricity marketsApr 14 2014Jan 24 2015We establish sufficient conditions for nodal price response matrix in electric power system to be symmetric and negative (semi-)definite. The results are applicable for electricity markets with nonlinear and intertemporal constraints.

Remarks on formal deformations and Batalin-Vilkovisky algebrasFeb 02 1998Feb 10 1998This note consists of two parts. Part I is an exposition of (a part of) the V.Drinfeld's letter, [D]. The sheaf of algebras of polyvector fields on a Calabi-Yau manifold, equipped with the Schouten bracket, admits a structure of a Batalin-Vilkovisky algebra. ... More

On the possibility to measure nuclear matrix element for neutrinoless double beta decay of Ca48Aug 25 2011As shown in Ref. \cite{Rod09}, the Fermi part $M_{F}^{0\nu}$ of the total $0\nu\beta\beta$-decay nuclear matrix element $M^{0\nu}$ can be related to the single Fermi transition matrix element between the isobaric analog state (IAS) of the ground state ... More

Explicit Solutions to Boundary Problems for 2+1-Dimensional Integrable SystemsDec 16 2010Nonlinear integrable models with two spatial and one temporal variables: Kadomtsev-Petviashvili equation and two-dimensional Toda lattice are investigated on the subject of correct formulation for boundary problem that can be solved within the framework ... More

Guided Grammar ConvergenceMar 29 2015Relating formal grammars is a hard problem that balances between language equivalence (which is known to be undecidable) and grammar identity (which is trivial). In this paper, we investigate several milestones between those two extremes and propose a ... More

Translating photobiology to electrophysiology: A brief overview of several photobiological processes with accent on electrophysiologyJun 28 2013The mini-review gives special attention to holistic approach and mechanisms of processes. The physical and chemical frames and background for visual perception and signalling are discussed. Perception of photons by retinal rod cells is described in more ... More

Simplicissimus' InquiriesJun 27 2009This is a kind of essay dedicated to Lev Borisovich Okun. I would like to ask some questions which I can not answer. However I suspect I know how to answer them. Questions are as follows: 1. Particle identity. 2. Information storage. 3. Information read-out ... More

$\Ughr$ invariant quantization on some homogeneous manifoldsNov 05 2002We consider a class of homogeneous manifolds over a simple Lie group which appears in the problem of classification of homogeneous manifolds with reductive subgroups of maximal rank as stabilizer of a point. We prove that any manifold of this class possesses ... More

Symbolic Algorithm of the Functional-Discrete Method for a Sturm-Liouville Problem with a Polynomial PotentialAug 11 2017Sep 04 2017A new symbolic algorithmic implementation of the general scheme of the exponentially convergent functional-discrete (FD-) method is developed and justified for the Sturm-Liouville problem on a finite interval for the Schr\"odinger equation with a polynomial ... More

Implementation of the Programming Language Dino -- A Case Study in Dynamic Language PerformanceApr 05 2016The article gives a brief overview of the current state of programming language Dino in order to see where its stands between other dynamic programming languages. Then it describes the current implementation, used tools and major implementation decisions ... More

A numeric-analytical method for solving the Cauchy problem for ordinary differential equationsAug 31 2010In the paper we offer a functional-discrete method for solving the Cauchy problem for the first order ordinary differential equations (ODEs). This method (FD-method) is in some sense similar to the Adomian Decomposition Method. But it is shown that for ... More

Bulk universality for random lozenge tilings near straight boundaries and for tensor productsMar 08 2016We prove that the asymptotic of the bulk local statistics in models of random lozenge tilings is universal in the vicinity of straight boundaries of the tiled domains. The result applies to uniformly random lozenge tilings of large polygonal domains on ... More

A geometric proof of the existence of Whitney stratificationsOct 13 2000A stratification of a singular set, e.g. an algebraic or analytic variety, is, roughly, a partition of it into manifolds so that these manifolds fit together "regularly". A classical theorem of Whitney says that any complex analytic set has a stratification. ... More

Hodge realizations of 1-motives and the derived AlbaneseSep 17 2008Dec 08 2011We prove that the embedding of the derived category of 1-motives into the triangulated category of effective Voevodsky motives, as well as its left adjoint functor $LAlb$, commute with the Hodge realization.

Cepheid Kinematics and the Galactic WarpOct 27 2013The space velocities of 200 long-period ($P>5$ days) classical Cepheids with known proper motions and line-of-sight velocities whose distances were estimated from the period--luminosity relation have been analyzed. The linear Ogorodnikov-Milne model has ... More

Orientation Parameters of the Cepheid System in the GalaxyOct 27 2013Based on the distribution of long-period Cepheids, we have redetermined the orientation parameters of their principal plane in the Galaxy. Based on 299 Cepheids with heliocentric distances $r<20$ kpc and pulsation periods $P\geq5^d$, we have found the ... More

Neutron Skin and Giant Resonances in NucleiApr 02 2007Some aspects, both experimental and theoretical, of extracting the neutron skin $\Delta R$ from properties of isovector giant resonances are discussed. Existing proposals are critically reviewed. The method relying on the energy difference between the ... More

One-Loop Threshold Effects in String UnificationMay 19 1992Like grand unification of old, string unification predicts simple tree-level relations between the couplings of all unbroken gauge groups such as $SU(3)_C$ or $SU(2)_W\)$. I show here how to compute one-loop corrections to these relations for any four-dimensional ... More

Pseudo-random number generators for Monte Carlo simulations on Graphics Processing UnitsMar 09 2010Basic uniform pseudo-random number generators are implemented on ATI Graphics Processing Units (GPU). The performance results of the realized generators (multiplicative linear congruential (GGL), XOR-shift (XOR128), RANECU, RANMAR, RANLUX and Mersenne ... More

Pion reactions with few-nucleon systemsOct 08 2009We report about the recent results for s- and p-wave pion production in NN -> NNpi within effective field theory and discuss how the charge symmetry breaking in pn -> d pi^0 can be used to extract the strong contribution to the neutron-proton mass difference. ... More

Cosmology and semi-conservation of computations in the universeApr 30 2007Resent works of Hawking and Susskind suggested that information is conserved in the universe. We extend this thesis and propose that dynamics of information - computations can conserve in Anti-de-Sitter cosmological model. Information geometry formalism ... More

Graph Parameters and Ramsey TheoryAug 27 2016Ramsey's Theorem tells us that there are exactly two minimal hereditary classes containing graphs with arbitrarily many vertices: the class of complete graphs and the class of edgeless graphs. In other words, Ramsey's Theorem characterizes the graph vertex ... More

Compositional waves and variations in the atmospheric abundances of magnetic starsFeb 01 2016The stars of the middle main sequence often have relatively quiescent outer layers and spot-like chemical structures may develope in their atmospheres. Recent observations show that abundance peculiarities can change as stars evolve on the main sequence ... More

Element spots in Ap- and HgMn-stars from current-driven diffusionJan 25 2016The stars of the middle main sequence often have spot-like chemical structures at their surfaces. We consider the diffusion process caused by electric currents that can lead to the formation of such chemical spots. Diffusion is considered using the partial ... More

On the first continuous $L^2$-cohomology of free group factorsDec 19 2013Jan 06 2014We prove that the first continuous $L^2$-cohomology of free group factors vanishes. This answers a question by Andreas Thom regarding continuity properties of free difference quotients and shows that one can not distinguish free group factors by means ... More

A Non-classification Result for Wild KnotsApr 09 2015Apr 21 2016Using methods of descriptive theory it is shown that the classification problem for wild knots is strictly harder than that for countable structures.

Using Information Semantic Systems for Absolutely Secure ProcessingFeb 24 2010Propose a new cryptographic information concept. It allows : - to create absolutely algorithmic unbreakable ciphers for communication through open digital channels; - to create new code-breaking methods. They will be the most efficient decoding methods ... More

Antimonopoly regulation method based on perfect price discriminationJul 16 2015We propose a method of antimonopoly regulation in a day-ahead power market with locational marginal pricing which forms economic incentives for a producer, operating a portfolio of generating units, to submit an offer indicating its true cost and faithful ... More

Optimal Polynomial-Time Estimators: A Bayesian Notion of Approximation AlgorithmAug 14 2016Sep 15 2016The concept of an "approximation algorithm" is usually only applied to optimization problems since in optimization problems the performance of the algorithm on any given input is a continuous parameter. We introduce a new concept of approximation applicable ... More

Emergent quantum mechanics of financesDec 11 2013This paper is an attempt at understanding the quantum-like dynamics of financial markets in terms of non-differentiable price-time continuum having fractal properties. The main steps of this development are the statistical scaling, the non-differentiability ... More

Dynamics of Inhomogeneous Tomonaga-Luttinger Liquid WireNov 05 1995Dynamics of the 1D electron transport between two reservoirs are studied based on the inhomogeneous Tomonaga- Luttinger Liquid (ITLL) model in the case when the effect of the electron backscattering on the impurities is negligible. The inhomogeneities ... More

Umklapp scattering in transport through a 1D wire of finite lengthJul 05 1999Suppression of electron current $ \Delta I$ through a 1D channel of length $L$ connecting two Fermi liquid reservoirs is studied taking into account the Umklapp interaction induced by a periodic potential. This interaction opens band gaps at the integer ... More

Vertex algebras and elliptic generaJun 27 1999A report at Arbeitstagung, June 1999, Bonn, on the joint work with V.Gorbounov, F.Malikov and A.Vaintrob.

ERRATA for "One-Loop Threshold Effects in String Unification"May 19 1992The original paper, as published in Nuclear Physics B in 1988, had a few factor-of-two errors. Some people got confused by those errors. The purpose of these errata is to make things clear. The revised version of the complete article is also posted to ... More

Relation of isospin-symmetry breaking correction for superallowed beta decay to energy of charge-exchange giant monopole resonanceJun 03 2012Dec 15 2013After application of an analytical transformation, a new exact representation for the nuclear isospin-symmetry breaking correction $\delta_C$ to superallowed beta decay is obtained. The correction is shown to be essentially the reciprocal of the square ... More

Guided Grammar Convergence. Full Case Study Report. Generated by converge::GuidedJul 27 2012This report is meant to be used as auxiliary material for the guided grammar convergence technique proposed earlier as problem-specific improvement in the topic of convergence of grammars. It contains a narrated MegaL megamodel, as well as full results ... More

Investigation of heavy ions diffusion under the influence of current-driven mechanism and compositional waves in plasmaMay 25 2016We consider diffusion caused by a combined influence of the Hall effect and electric currents, and argue that such diffusion forms chemical inhomogeneities in plasma. The considered mechanism can be responsible for the formation of element spots in laboratory ... More

Diffusion in plasma: the Hall effect, compositional waves, and chemical spotsSep 12 2016We consider diffusion caused by a combined influence of the electric current and the Hall effect, and argue that such diffusion can form inhomogeneities of the chemical composition in plasma. The considered mechanism can be responsible for a formation ... More

Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatchFeb 10 2015Jun 10 2015In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector channels may depend differently on the spatial mode of incoming photons. Consequently, an attacker can control the spatial mode to break security. We experimentally ... More

Trojan-horse attacks threaten the security of practical quantum cryptographyJun 23 2014A quantum key distribution system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack. We ... More