Rainer Plaga

Learn More
232 hours of data were accumulated from 1997 to 1999, using the HEGRA Stereoscopic Cherenkov Telescope System to observe the supernova remnant Cassiopeia A. TeV γ-ray emission was detected at the 5 σ level, and a flux of (5.8 ± 1.2stat ± 1.2syst) × 10 −9 ph m −2 s −1 above 1 TeV was derived. The spectral distribution is consistent with a power law with a(More)
We propose a new hypothesis for the origin of the major part of non-solar hadronic cosmic rays (CRs) at all energies: highly relativistic, narrowly collimated jets from the birth or collapse of neutron stars (NSs) in our Galaxy accelerate ambient disk and halo matter to CR energies and disperse it in hot spots which they form when they stop in the Galactic(More)
The detection of TeV γ-rays from the blazar H 1426+428 at an integral flux level of (4 ± 2stat ± 1syst) × 10 −12 erg cm −2 s −1 above 1 TeV with the HEGRA imaging atmospheric Cherenkov telescope system is reported. H 1426+428 is located at a redshift of z=0.129, which makes it the most distant source detected in TeV γ-rays so far. The TeV radiation is(More)
The Trusted Platform Module TPM is a basic but nevertheless very complex security component that can provide the foundations and the root of security for a variety of applications. In contrast to the TPM, other basic security mechanisms like cryptographic algorithms or security protocols have frequently been subject to thorough security analysis and formal(More)
During the several months of the outburst of Mkn 501 in 1997 the source has been monitored in TeV γ-rays with the HEGRA stereoscopic system of imaging atmospheric Cherenkov telescopes. Quite remarkably it turned out that the shapes of the daily γ-ray energy spectra remained essentially stable throughout the entire state of high activity despite dramatic(More)
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We present a detailed security analysis based on es­ timates of the entropy of the DNA data and formal security results. The scheme is shown to be robust and efficient by analysing the(More)
The characteristic novelty of what is generally meant by a " physical unclonable function " (PUF) is precisely defined, in order to supply a firm basis for security evaluations and the proposal of new security mechanisms. A PUF is defined as a hardware device which implements a physical function with an output value that changes with its argument. A PUF can(More)