mirror theory
Recently Published Documents


TOTAL DOCUMENTS

32
(FIVE YEARS 7)

H-INDEX

6
(FIVE YEARS 0)

2021 ◽  
pp. 194084472110495
Author(s):  
Alan Hodkinson

This article reflects upon initial teacher education programme’s employment of reflection. The article argues that the orginary ground of educational reflection, dominated by theorists such as Dewey and Schon, has been colonised by a form of ‘Total Reflection’ that is conceptualised and manufactured within the Teacher Standards and its associated discourse. Through employment of the concept of Abbau, the work of Borges and mirror theory, the article reveals how student teachers are not enabled to be reflective but instead are created as the celebrated automata whose professional image is shrouded, codified and solidified by a Master Weaving machine. The article suggests that if educational reflection is to become useful in teacher development, then it must return to its past incarnations.


Author(s):  
Nilanjan Datta ◽  
Avijit Dutta ◽  
Kushankur Dutta

In CRYPTO’16, Cogliati and Seurin proposed a block cipher based nonce based MAC, called Encrypted Wegman-Carter with Davies-Meyer (EWCDM), that gives 2n/3 bit MAC security in the nonce respecting setting and n/2 bit security in the nonce misuse setting, where n is the block size of the underlying block cipher. However, this construction requires two independent block cipher keys. In CRYPTO’18, Datta et al. came up with a single-keyed block cipher based nonce based MAC, called Decrypted Wegman-Carter with Davies-Meyer (DWCDM), that also provides 2n/3 bit MAC security in the nonce respecting setting and n/2 bit security in the nonce misuse setting. However, the drawback of DWCDM is that it takes only 2n/3 bit nonce. In fact, authors have shown that DWCDM cannot achieve beyond the birthday bound security with n bit nonces. In this paper, we prove that DWCDM with 3n/4 bit nonces provides MAC security up to O(23n/4) MAC queries against all nonce respecting adversaries. We also improve the MAC bound of EWCDM from 2n/3 bit to 3n/4 bit. The backbone of these two results is a refined treatment of extended mirror theory that systematically estimates the number of solutions to a system of bivariate affine equations and non-equations, which we apply on the security proofs of the constructions to achieve 3n/4 bit security.


Entropy ◽  
2021 ◽  
Vol 23 (8) ◽  
pp. 1032
Author(s):  
James E. Cooke

Any successful naturalistic account of consciousness must state what consciousness is, in terms that are compatible with the rest of our naturalistic descriptions of the world. Integrated Information Theory represents a pioneering attempt to do just this. This theory accounts for the core features of consciousness by holding that there is an equivalence between the phenomenal experience associated with a system and its intrinsic causal power. The proposal, however, fails to provide insight into the qualitative character of consciousness and, as a result of its proposed equivalence between consciousness and purely internal dynamics, into the intentional character of conscious perception. In recent years, an alternate group of theories has been proposed that claims consciousness to be equivalent to certain forms of inference. One such theory is the Living Mirror theory, which holds consciousness to be a form of inference performed by all living systems. The proposal of consciousness as inference overcomes the shortcomings of Integrated Information Theory, particularly in the case of conscious perception. A synthesis of these two perspectives can be reached by appreciating that conscious living systems are self-organising in nature. This mode of organization requires them to have a high level of integration. From this perspective, we can understand consciousness as being dependent on a system possessing non-trivial amounts of integrated information while holding that the process of inference performed by the system is the fact of consciousness itself.


2021 ◽  
Vol 10 (4) ◽  
Author(s):  
Chi-Ming Chang ◽  
Martin Fluder ◽  
Ying-Hsuan Lin ◽  
Shu-Heng Shao ◽  
Yifan Wang

We investigate the non-BPS realm of 3d {N} = 4N=4 superconformal field theory by uniting the non-perturbative methods of the conformal bootstrap and supersymmetric localization, and utilizing special features of 3d {N} = 4N=4 theories such as mirror symmetry and a protected sector described by topological quantum mechanics (TQM). Supersymmetric localization allows for the exact determination of the conformal and flavor central charges, and the latter can be fed into the mini-bootstrap of the TQM to solve for a subset of the OPE data. We examine the implications of the Z_2Z2 mirror action for the SCFT single- and mixed-branch crossing equations for the moment map operators, and apply numerical bootstrap to obtain universal constraints on OPE data for given flavor symmetry groups. A key ingredient in applying the bootstrap analysis is the determination of the mixed-branch superconformal blocks. Among other results, we show that the simplest known self-mirror theory with SU(2) \times SU(2)SU(2)×SU(2) flavor symmetry saturates our bootstrap bounds, which allows us to extract the non-BPS data and examine the self-mirror Z_2Z2 symmetry thereof.


2021 ◽  
Vol 2021 (3) ◽  
Author(s):  
Tadashi Okazaki

Abstract We evaluate half-indices of $$ \mathcal{N} $$ N = (2, 2) half-BPS boundary conditions in 3d $$ \mathcal{N} $$ N = 4 supersymmetric Abelian gauge theories. We confirm that the Neumann boundary condition is dual to the generic Dirichlet boundary condition for its mirror theory as the half-indices perfectly match with each other. We find that a naive mirror symmetry between the exceptional Dirichlet boundary conditions defining the Verma modules of the quantum Coulomb and Higgs branch algebras does not always hold. The triangular matrix obtained from the elliptic stable envelope describes the precise mirror transformation of a collection of half-indices for the exceptional Dirichlet boundary conditions.


2020 ◽  
Vol 2020 (9) ◽  
Author(s):  
Emanuele Beratto ◽  
Simone Giacomelli ◽  
Noppadol Mekareeya ◽  
Matteo Sacchi

Abstract Mirror symmetry has proven to be a powerful tool to study several properties of higher dimensional superconformal field theories upon compactification to three dimensions. We propose a quiver description for the mirror theories of the circle reduction of twisted A2N theories of class S in four dimensions. Although these quivers bear a resemblance to the star-shaped quivers previously studied in the literature, they contain unitary, symplectic and special orthogonal gauge groups, along with hypermultiplets in the fundamental representation. The vacuum moduli spaces of these quiver theories are studied in detail. The Coulomb branch Hilbert series of the mirror theory can be matched with that of the Higgs branch of the corresponding four dimensional theory, providing a non-trivial check of our proposal. Moreover various deformations by mass and Fayet-Iliopoulos terms of such quiver theories are investigated. The fact that several of them flow to expected theories also gives another strong support for the proposal. Utilising the mirror quiver description, we discover a new supersymmetry enhancement renormalisation group flow.


2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Matthew Reeve

Timothy Osborne argues that phrase structure grammars (PSGs) postulate unnecessarily complex structures, and that Dependency Grammar (DG) is to be preferred on grounds of simplicity (1:1 word-to-node ratio) and empirical adequacy (capturing the results of constituency tests). In this reply, I argue that, while some of Osborne’s criticisms of PSGs are justified, there are both empirical and theoretical problems with his major claims. In particular, his version of DG is too restrictive with respect to certain constituency facts (modified nouns, verbal phrases), and what it gains in simplicity qua number of nodes, it loses in requiring a more complex interface between syntax and other linguistic components (phonology, semantics). I argue that Mirror Theory, a framework that is in a sense intermediate between DG and PSGs, answers Osborne’s justified criticisms while not suffering from the problems of his version of DG.


2018 ◽  
Vol 5 (2) ◽  
Author(s):  
Benjamin Assel ◽  
Stefano Cremonesi

We derive the algebraic description of the Coulomb branch of 3d \mathcal{N}=4𝒩=4USp(2N)USp(2N) SQCD theories with N_fNf fundamental hypermultiplets and determine their low energy physics in any vacuum from the local geometry of the moduli space, identifying the interacting SCFTs which arise at singularities and possible extra free sectors. The SCFT with the largest moduli space arises at the most singular locus on the Coulomb branch. For N_f > 2NNf>2N (good theories) it sits at the origin of the conical variety as expected. For N_f =2NNf=2N we find two separate most singular points, from which the two isomorphic components of the Higgs branch of the UV theory emanate. The SCFTs sitting at any of these two vacua have only odd dimensional Coulomb branch generators, which transform under an accidental SU(2)SU(2) global symmetry. We provide a direct derivation of their moduli spaces of vacua, and propose a Lagrangian mirror theory for these fixed points. For 2 \leq N_f < 2N2≤Nf<2N the most singular locus has one or two extended components, for N_fNf odd or even, and the low energy theory involves an interacting SCFT of one of the above types, plus free twisted hypermultiplets. For N_f=0,1Nf=0,1 the Coulomb branch is smooth. We complete our analysis by studying the low energy theory at the symmetric vacuum of theories with N < N_f \le 2NN<Nf≤2N, which exhibits a local Seiberg-like duality.


Author(s):  
Srimanta Bhattacharya ◽  
Mridul Nandi

Let σ be some positive integer and C ⊆ {(i, j) : 1 ≤ i < j ≤ σ}. The theory behind finding a lower bound on the number of distinct blocks P1, . . . , Pσ ∈ {0, 1}n satisfying a set of linear equations {Pi ⊕Pj = ci,j : (i, j) ∈ C} for some ci,j ∈ {0, 1}n, is called mirror theory. Patarin introduced the mirror theory and provided a proof for this. However, the proof, even for a special class of equations, is complex and contains several non-trivial gaps. As an application of mirror theory, XORP[w] (known as XOR construction) returning (w−1) block output, is a pseudorandom function (PRF) for some parameter w, called width. The XOR construction can be seen as a basic structure of some encryption algorithms, e.g., the CENC encryption and the CHM authenticated encryption, proposed by Iwata in 2006. Due to potential application of XORP[w] and the nontrivial gaps in the proof of mirror theory, an alternative simpler analysis of PRF-security of XORP[w] would be much desired. Recently (in Crypto 2017) Dai et al. introduced a tool, called the χ2 method, for analyzing PRF-security. Using this tool, the authors have provided a proof of PRF-security of XORP[2] without relying on the mirror theory. In this paper, we resolve the general case; we apply the χ2 method to obtain a simpler security proof of XORP[w] for any w ≥ 2. For w = 2, we obtain a tighter bound for a wider range of parameters than that of Dai et al.. Moreover, we consider variable width construction XORP[∗] (in which the widths are chosen by adversaries adaptively), and also provide variable output length pseudorandom function (VOLPRF) security analysis for it. As an application of VOLPRF, we propose an authenticated encryption which is a simple variant of CHM or AES-GCM and provides much higher security than those at the cost of one extra blockcipher call for every message.


Sign in / Sign up

Export Citation Format

Share Document