44,233 research outputs found

    Total Break of the l-IC Signature Scheme

    Get PDF
    The original publication is available at www.springerlink.comInternational audienceIn this paper, we describe efficient forgery and full-key recovery attacks on the l-IC- signature scheme recently proposed at PKC 2007. This cryptosystem is a multivariate scheme based on a new internal quadratic primitive which avoids some drawbacks of previous multivariate schemes: the scheme is extremely fast since it requires one exponentiation in a finite field of medium size and the public key is shorter than in many multivariate signature schemes. Our attacks rely on the recent cryptanalytic tool developed by Dubois et al. against the SFLASH signature scheme. However, the final stage of the attacks require the use of Grobner basis techniques to conclude to actually forge a signature (resp. to recover the secret key). For the forgery attack, this is due to the fact that Patarin's attack is much more difficult to mount against l-IC. The key recovery attack is also very efficient since it is faster to recover equivalent secret keys than to forge

    Annotation Enrichment Analysis: An Alternative Method for Evaluating the Functional Properties of Gene Sets

    Get PDF
    Gene annotation databases (compendiums maintained by the scientific community that describe the biological functions performed by individual genes) are commonly used to evaluate the functional properties of experimentally derived gene sets. Overlap statistics, such as Fisher's Exact Test (FET), are often employed to assess these associations, but don't account for non-uniformity in the number of genes annotated to individual functions or the number of functions associated with individual genes. We find FET is strongly biased toward over-estimating overlap significance if a gene set has an unusually high number of annotations. To correct for these biases, we develop Annotation Enrichment Analysis (AEA), which properly accounts for the non-uniformity of annotations. We show that AEA is able to identify biologically meaningful functional enrichments that are obscured by numerous false-positive enrichment scores in FET, and we therefore suggest it be used to more accurately assess the biological properties of gene sets

    DNA repair deficiency biomarkers and the 70-gene ultra-high risk signature as predictors of veliparib/carboplatin response in the I-SPY 2 breast cancer trial.

    Get PDF
    Veliparib combined with carboplatin (VC) was an experimental regimen evaluated in the biomarker-rich neoadjuvant I-SPY 2 trial for breast cancer. VC showed improved efficacy in the triple negative signature. However, not all triple negative patients achieved pathologic complete response and some HR+HER2- patients responded. Pre-specified analysis of five DNA repair deficiency biomarkers (BRCA1/2 germline mutation; PARPi-7, BRCA1ness, and CIN70 expression signatures; and PARP1 protein) was performed on 116 HER2- patients (VC: 72 and concurrent controls: 44). We also evaluated the 70-gene ultra-high risk signature (MP1/2), one of the biomarkers used to define subtype in the trial. We used logistic modeling to assess biomarker performance. Successful biomarkers were combined using a simple voting scheme to refine the 'predicted sensitive' group and Bayesian modeling used to estimate the pathologic complete response rates. BRCA1/2 germline mutation status associated with VC response, but its low prevalence precluded further evaluation. PARPi-7, BRCA1ness, and MP1/2 specifically associated with response in the VC arm but not the control arm. Neither CIN70 nor PARP1 protein specifically predicted VC response. When we combined the PARPi-7 and MP1/2 classifications, the 42% of triple negative patients who were PARPi7-high and MP2 had an estimated pCR rate of 75% in the VC arm. Only 11% of HR+/HER2- patients were PARPi7-high and MP2; but these patients were also more responsive to VC with estimated pathologic complete response rates of 41%. PARPi-7, BRCA1ness and MP1/2 signatures may help refine predictions of VC response, thereby improving patient care

    Contribution of the Gamma-ray Loud Radio Galaxies Core Emissions to the Cosmic MeV and GeV Gamma-Ray Background Radiation

    Full text link
    The Fermi gamma-ray satellite has recently detected gamma-ray emissions from radio galaxy cores. From these samples, we first examine the correlation between the luminosities at 5 GHz, L_{5GHz}, and at 0.1-10 GeV, L_{gamma}, of these gamma-ray loud radio galaxies. We find that the correlation is significant with L_{gamma} \propto L_{5GHz}^{1.16} based on a partial correlation analysis. Using this correlation and the radio luminosity function (RLF) of radio galaxies, we further explore the contribution of gamma-ray loud radio galaxies to the unresolved extragalactic gamma-ray background (EGRB). The gamma-ray luminosity function is obtained by normalizing the RLF to reproduce the source count distribution of the Fermi gamma-ray loud radio galaxies. We find that gamma-ray loud radio galaxies will explain ~25% of the unresolved Fermi EGRB flux above 100 MeV and will also make a significant contribution to the EGRB in the 1-30 MeV energy band. Since blazars explain 22% of the EGRB above 100 MeV, radio loud active galactic nuclei (AGNs) population explains ~47% of the unresolved EGRB. We further make an interpretation on the origin of the EGRB. The observed EGRB spectrum at 0.2-100 GeV does not show an absorption signature by the extragalactic background light. Thus, the dominant population of the origin of EGRB at very high energy (>30 GeV) might be nearby gamma-ray emitting sources or sources with very hard gamma-ray spectrum.Comment: 9 pages, accepted for publication in Ap

    Coalitions in Cooperative Wireless Networks

    Full text link
    Cooperation between rational users in wireless networks is studied using coalitional game theory. Using the rate achieved by a user as its utility, it is shown that the stable coalition structure, i.e., set of coalitions from which users have no incentives to defect, depends on the manner in which the rate gains are apportioned among the cooperating users. Specifically, the stability of the grand coalition (GC), i.e., the coalition of all users, is studied. Transmitter and receiver cooperation in an interference channel (IC) are studied as illustrative cooperative models to determine the stable coalitions for both flexible (transferable) and fixed (non-transferable) apportioning schemes. It is shown that the stable sum-rate optimal coalition when only receivers cooperate by jointly decoding (transferable) is the GC. The stability of the GC depends on the detector when receivers cooperate using linear multiuser detectors (non-transferable). Transmitter cooperation is studied assuming that all receivers cooperate perfectly and that users outside a coalition act as jammers. The stability of the GC is studied for both the case of perfectly cooperating transmitters (transferrable) and under a partial decode-and-forward strategy (non-transferable). In both cases, the stability is shown to depend on the channel gains and the transmitter jamming strengths.Comment: To appear in the IEEE Journal on Selected Areas in Communication, Special Issue on Game Theory in Communication Systems, 200
    • …
    corecore