368 research outputs found

    Inhibition of Angiogenic Factor Production from Murine Mast Cells by an Antiallergic Agent (Epinastine Hydrochloride) In Vitro

    Get PDF
    Angiogenesis is an important event both in the development of allergic inflammatory responses and in the pathophysiology of tissue remodeling in allergic diseases. In the present study, therefore, we examined the influence of antihistamines on angiogenesis through the choice of epinastine hydrochloride (EP) and murine mast cells in vitro. Mast cells (5 × 105 cells/mL) presensitized with murine IgE specific for ovalbumin (OVA) were stimulated with 10 ng/mL OVA in the presence of various concentrations of EP for 4 hours. The levels of angiogenesis factors, keratinocyte-derived chemokine (KC), tumor necrosis factor-α (TNF), and vascular endothelial growth factor (VEGF) in culture supernatants, were examined by ELISA. We also examined mRNA expression for the angiogenesis factors by RT-PCR. EP significantly inhibited the production of KC, TNF, and VEGF induced by IgE-dependent mechanism at more than 25 ng/mL. Semiquantitative analysis using RT-PCR showed that EP also significantly reduced mRNA expressions for KC, TNF, and VEGF. These results strongly suggest that EP suppresses angiogenesis factor production through the inhibition of mRNA expression in mast cells and results in favorable modification of clinical conditions of allergic diseases

    Extended Generalized Feistel Networks using Matrix Representation

    Get PDF
    International audienceWhile Generalized Feistel Networks have been widely studied in the literature as a building block of a block cipher, we propose in this paper a unified vision to easily represent them through a matrix representation. We then propose a new class of such schemes called Extended Generalized Feistel Networks well suited for cryptographic applications. We instantiate those proposals into two particular constructions and we finally analyze their security

    The influence of aerobic fitness status on ventilatory efficiency in patients with coronary artery disease

    Get PDF
    OBJECTIVE: To test the hypotheses that 1) coronary artery disease patients with lower aerobic fitness exhibit a lower ventilatory efficiency and 2) coronary artery disease patients with lower initial aerobic fitness exhibit greater improvements in ventilatory efficiency with aerobic exercise training. METHOD: A total of 123 patients (61.0±0.7 years) with coronary artery disease were divided according to aerobic fitness status into 3 groups: group 1 (n = 34, peak VO2;17.5 and ;24.5 ml/kg/min). All patients performed a cardiorespiratory exercise test on a treadmill. Ventilatory efficiency was determined by the lowest VE/VCO2 ratio observed. The exercise training program comprised moderate-intensity aerobic exercise performed 3 times per week for 3 months. Clinicaltrials.gov: NCT02106533 RESULTS: Before intervention, group 1 exhibited both lower peak VO2 and lower ventilatory efficiency compared with the other 2 groups (

    Boomerang Connectivity Table:A New Cryptanalysis Tool

    Get PDF
    A boomerang attack is a cryptanalysis framework that regards a block cipher EE as the composition of two sub-ciphers E1E0E_1\circ E_0 and builds a particular characteristic for EE with probability p2q2p^2q^2 by combining differential characteristics for E0E_0 and E1E_1 with probability pp and qq, respectively. Crucially the validity of this figure is under the assumption that the characteristics for E0E_0 and E1E_1 can be chosen independently. Indeed, Murphy has shown that independently chosen characteristics may turn out to be incompatible. On the other hand, several researchers observed that the probability can be improved to pp or qq around the boundary between E0E_0 and E1E_1 by considering a positive dependency of the two characteristics, e.g.~the ladder switch and S-box switch by Biryukov and Khovratovich. This phenomenon was later formalised by Dunkelman et al.~as a sandwich attack that regards EE as E1EmE0E_1\circ E_m \circ E_0, where EmE_m satisfies some differential propagation among four texts with probability rr, and the entire probability is p2q2rp^2q^2r. In this paper, we revisit the issue of dependency of two characteristics in EmE_m, and propose a new tool called Boomerang Connectivity Table (BCT), which evaluates rr in a systematic and easy-to-understand way when EmE_m is composed of a single S-box layer. With the BCT, previous observations on the S-box including the incompatibility, the ladder switch and the S-box switch are represented in a unified manner. Moreover, the BCT can detect a new switching effect, which shows that the probability around the boundary may be even higher than pp or qq. To illustrate the power of the BCT-based analysis, we improve boomerang attacks against Deoxys-BC, and disclose the mechanism behind an unsolved probability amplification for generating a quartet in SKINNY. Lastly, we discuss the issue of searching for S-boxes having good BCT and extending the analysis to modular addition

    Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE

    Get PDF
    Tweakable TWINE (T-TWINE) is a new lightweight tweakable block cipher family proposed by Sakamoto etet alal. at IWSEC 2019. T-TWINE is the first Tweakable Block Cipher (TBC) that is built on Generalized Feistel Structure (GFS). It is based on the TWINE block cipher in addition to a simple tweak scheduling based on SKINNY’s tweakey schedule. Similar to TWINE, it has two versions, namely, T-TWINE-80 and T-TWINE-128, both have a block length of 64 bits and employ keys of length 80 and 128 bits, respectively. In this paper, we present impossible differential attacks against reduced-round versions of T-TWINE-80 and T-TWINE-128. First, we present an 18-round impossible differential distinguisher against T-TWINE. Then, using this distinguisher, we attack 25 and 27 rounds of T-TWINE-80 and T-TWINE-128, respectively

    High-resolution measurement of the time-modulated orbital electron capture and of the β+\beta^+ decay of hydrogen-like 142^{142}Pm60+^{60+} ions

    Full text link
    The periodic time modulations, found recently in the two-body orbital electron-capture (EC) decay of both, hydrogen-like 140^{140}Pr58+^{58+} and 142^{142}Pm60+^{60+} ions, with periods near to 7s and amplitudes of about 20%, were re-investigated for the case of 142^{142}Pm60+^{60+} by using a 245 MHz resonator cavity with a much improved sensitivity and time resolution. We observed that the exponential EC decay is modulated with a period T=7.11(11)T = 7.11(11)s, in accordance with a modulation period T=7.12(11)T = 7.12(11) s as obtained from simultaneous observations with a capacitive pick-up, employed also in the previous experiments. The modulation amplitudes amount to aR=0.107(24)a_R = 0.107(24) and aP=0.134(27)a_P = 0.134(27) for the 245 MHz resonator and the capacitive pick-up, respectively. These new results corroborate for both detectors {\it exactly} our previous findings of modulation periods near to 7s, though with {\it distinctly smaller} amplitudes. Also the three-body β+\beta^+ decays have been analyzed. For a supposed modulation period near to 7s we found an amplitude a=0.027(27)a = 0.027(27), compatible with a=0a = 0 and in agreement with the preliminary result a=0.030(30)a = 0.030(30) of our previous experiment. These observations could point at weak interaction as origin of the observed 7s-modulation of the EC decay. Furthermore, the data suggest that interference terms occur in the two-body EC decay, although the neutrinos are not directly observed.Comment: In memoriam of Prof. Paul Kienle, 9 pages, 1 table, 5 figures Phys. Lett. B (2013) onlin

    Differential Analysis of Block Ciphers SIMON and SPECK

    Get PDF
    In this paper we continue the previous line of research on the analysis of the differential properties of the lightweight block ciphers Simon and Speck. We apply a recently proposed technique for automatic search for differential trails in ARX ciphers and improve the trails in Simon32 and Simon48 previously reported as best. We further extend the search technique for the case of differen- tials and improve the best previously reported differentials on Simon32, Simon48 and Simon64 by exploiting more effectively the strong differential effect of the cipher. We also present improved trails and differentials on Speck32, Speck48 and Speck64. Using these new results we improve the currently best known attacks on several versions of Simon and Speck. A second major contribution of the paper is a graph based algorithm (linear time) for the computation of the exact differential probability of the main building block of Simon: an AND operation preceded by two bitwise shift operations. This gives us a better insight into the differential property of the Simon round function and differential effect in the cipher. Our algorithm is general and works for any rotation constants. The presented techniques are generic and are therefore applicable to a broader class of ARX designs

    Molecular dissection of the pea shoot apical meristem*

    Get PDF
    The shoot apical meristem (SAM) is responsible for the development of all the above-ground parts of a plant. Our understanding of the SAM at the molecular level is incomplete. This study investigates the gene expression repertoire of SAMs in the garden pea (Pisum sativum). To this end, 10 346 EST sequences representing 7610 unique genes were generated from SAM cDNA libraries. These sequences, together with previously reported pea ESTs, were used to construct a 12K oligonucleotide array to identify genes with differential SAM expression, as compared to axillary meristems, root apical meristems, or non-meristematic tissues. A number of genes were identified, predominantly expressed in specific cell layers or domains of the SAM and thus are likely components of the gene networks involved in stem cell maintenance or the initiation of lateral organs. Further in situ hybridization analysis confirmed the spatial localization of some of these genes within the SAM. Our data also indicate the diversification of some gene expression patterns and hence functions in legume crop plants. A number of transcripts highly expressed in all three meristems have also been uncovered and these candidates may provide valuable insight into molecular networks that underpin the maintenance of meristematic functionality

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Get PDF
    Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential characteristics. However, already at EUROCRYPT'91, Lai et al. comprehended that differential cryptanalysis rather uses differentials instead of single characteristics. In this paper, we consider exactly the gap between these two approaches and investigate this gap in the context of recent lightweight cryptographic primitives. This shows that for many recent designs like Midori, Skinny or Sparx one has to be careful as bounds from counting the number of active S-boxes only give an inaccurate evaluation of the best differential distinguishers. For several designs we found new differential distinguishers and show how this gap evolves. We found an 8-round differential distinguisher for Skinny-64 with a probability of 2−56.932−56.93, while the best single characteristic only suggests a probability of 2−722−72. Our approach is integrated into publicly available tools and can easily be used when developing new cryptographic primitives. Moreover, as differential cryptanalysis is critically dependent on the distribution over the keys for the probability of differentials, we provide experiments for some of these new differentials found, in order to confirm that our estimates for the probability are correct. While for Skinny-64 the distribution over the keys follows a Poisson distribution, as one would expect, we noticed that Speck-64 follows a bimodal distribution, and the distribution of Midori-64 suggests a large class of weak keys
    corecore