12,032 research outputs found

    Nodes, paranodes and neuropathies

    Get PDF
    This review summarises recent evidence supporting the involvement of the specialised nodal and perinodal domains (the paranode and juxtaparanode) of myelinated axons in the pathology of acquired, inflammatory, peripheral neuropathies.The identification of new target antigens in the inflammatory neuropathies heralds a revolution in diagnosis, and has already begun to inform increasingly targeted and individualised therapies. Rapid progress in our basic understanding of the highly specialised nodal regions of peripheral nerves serves to strengthen the links between their unique microstructural identities, functions and pathologies. In this context, the detection of autoantibodies directed against nodal and perinodal targets is likely to be of increasing clinical importance. Antiganglioside antibodies have long been used in clinical practice as diagnostic serum biomarkers, and associate with specific clinical variants but not to the common forms of either acute or chronic demyelinating autoimmune neuropathy. It is now apparent that antibodies directed against several region-specific cell adhesion molecules, including neurofascin, contactin and contactin-associated protein, can be linked to phenotypically distinct peripheral neuropathies. Importantly, the immunological characteristics of these antibodies facilitate the prediction of treatment responsiveness

    RC4 Encryption-A Literature Survey

    Get PDF
    AbstractA chronological survey demonstrating the cryptanalysis of RC4 stream cipher is presented in this paper. We have summarized the various weaknesses of RC4 algorithm followed by the recently proposed enhancements available in the literature. It is established that innovative research efforts are required to develop secure RC4 algorithm, which can remove the weaknesses of RC4, such as biased bytes, key collisions, and key recovery attacks on WPA. These flaws in RC4 are still offering an open challenge for developers. Hence our chronological survey corroborates the fact that even though researchers are working on RC4 stream cipher since last two decades, it still offers a plethora of research issues. The attraction of community towards RC4 is still alive

    SAFE-NET: Secure and Fast Encryption using Network of Pseudo-Random Number Generators

    Get PDF
    We propose a general framework to design a general class of random number generators suit- able for both computer simulation and computer security applications. It can include newly pro- posed generators SAFE (Secure And Fast Encryption) and ChaCha, a variant of Salsa, one of the four finalists of the eSTREAM ciphers. Two requirements for ciphers to be considered se- cure is that they must be unpredictable with a nice distributional property. Proposed SAFE-NET is a network of n nodes with external pseudo-random number generators as inputs nodes, several inner layers of nodes with a sequence of random variates through ARX (Addition, Rotation, XOR) transformations to diffuse the components of the initial state vector. After several rounds of transformations (with complex inner connections) are done, the output layer with n nodes are outputted via additional transformations. By utilizing random number generators with desirable empirical properties, SAFE-NET injects randomness into the keystream generation process and constantly updates the cipher’s state with external pseudo-random numbers during each iteration. Through the integration of shuffle tables and advanced output functions, extra layers of security are provided, making it harder for attackers to exploit weaknesses in the cipher. Empirical results demonstrate that SAFE-NET requires fewer operations than ChaCha while still producing a sequence of uniformly distributed random numbers

    A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester

    Get PDF
    Rabbit stream cipher is one of the finalists of eSTREAM project which uses 128-bit secret keys. Prior to us, the attacks on Rabbit has been all focused on the bias analysis and the best result showed the distinguishing attack with complexity 2136. Our analysis in this paper, is based on chosen IV analysis on reduced N-S round of Rabbit though using multi cube tester. For this purpose we show for a mature cube we could easily identify weak subcubes which increase the probability of distinguishing for an unknown secret key. We also represent with 225 complexity, using one iteration of next state function the keystream is completely distinguishable from random

    Analysis of the Zodiac 340-cipher

    Get PDF

    Slid Pairs of the Fruit-80 Stream Cipher

    Get PDF
    Fruit is a small-state stream cipher designed for securing communications among resource-constrained devices. The design of Fruit was first known to the public in 2016. It was later improved as Fruit-80 in 2018 and becomes the latest and final version among all versions of the Fruit stream ciphers. In this paper, we analyze the Fruit-80 stream cipher. We found that Fruit-80 generates identical keystreams from certain two distinct pairs of key and IV. Such pair of key and IV pairs is known as a slid pair. Moreover, we discover that when two pairs of key and IV fulfill specific characteristics, they will generate identical keystreams. This shows that slid pairs do not always exist arbitrarily in Fruit-80. We define specific rules which are equivalent to the characteristics. Using the defined rules, we are able to automate the searching process using an MILP solver, which makes searching of the slid pairs trivial

    ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.

    Get PDF
    Ecsc-128 is a new stream cipher based on the intractability of the Elliptic curve discrete logarithm problem. The design of ECSC-l2g is divided into three important stages: Initialization Stage, Keystream Generation stage, and the Encryption Stage. The design goal of ECSC-128 is to come up with a secure stream cipher for data encryption. Ecsc-l2g was designed based on some hard mathematical problems instead of using simple logical operations. In terms of performance and security, Ecsc-l2g was slower, but it provided high level of security against all possible cryptanalysis attacks

    Aerospace medicine and biology: A continuing bibliography with indexes, supplement 190, February 1979

    Get PDF
    This bibliography lists 235 reports, articles, and other documents introduced into the NASA scientific and technical information system in January 1979

    Not Just Mere Things

    Get PDF
    This paper examines Arthur Danto\u27s contention, put forward in The Transfiguration of the Commonplace, that at a certain point in its history art becomes philosophy. The similarities and differences between Danto\u27s view and the Hegelian one from which it is derived are examined. Using Danto\u27s favorite example of a philosophical work of art, Andy Warhol\u27s Brillo Box (1965), it is argued that a more plausible interpretation of the meaning of the work undermines Danto\u27s claims about art\u27s transformation into philosophy
    corecore