45 research outputs found

    The Chern character of {\theta}-summable Fredholm modules over dg algebras and localization on loop space

    Get PDF
    We introduce the notion of a {\vartheta}-summable Fredholm module over a locally convex dg algebra {\Omega} and construct its Chern character as a cocycle on the entire cyclic complex of {\Omega}, extending the construction of Jaffe, Lesniewski and Osterwalder to a differential graded setting. Using this Chern character, we prove an index theorem involving an abstract version of a Bismut-Chern character constructed by Getzler, Jones and Petrack in the context of loop spaces. Our theory leads to a rigorous construction of the path integral for N=1/2 supersymmetry which satisfies a Duistermaat-Heckman type localization formula on loop space

    Post-contrast FLAIR imaging in a patient with posterior reversible encephalopathy syndrome (PRES).

    Get PDF
    We herein present a case of delayed enhancement of CSF on fluidattenuated inversion recovery (FLAIR) imaging in a patient with posterior reversible encephalopathy syndrome (PRES). In our case despite the settled clinical setting of PRES initial MR scan was negative and on repeated FLAIR imaging increased CSF signal intensity was more conspicuous than subtle cortical involvement

    The First Thorough Side-Channel Hardware Trojan

    Get PDF
    Hardware Trojans have gained high attention in academia, industry and by government agencies. The effective detection mechanisms and countermeasures against such malicious designs are only possible when there is a deep understanding of how hardware Trojans can be built in practice. In this work, we present a mechanism which shows how easily a stealthy hardware Trojan can be inserted in a provably-secure side-channel analysis protected implementation. Once the Trojan is triggered, the malicious design exhibits exploitable side-channel leakage leading to successful key recovery attacks. Such a Trojan does not add or remove any logic (even a single gate) to the design which makes it very hard to detect. In ASIC platforms, it is indeed inserted by subtle manipulations at the sub-transistor level to modify the parameters of a few transistors. The same is applicable on FPGA applications by changing the routing of particular signals, leading to null resource utilization overhead. The underlying concept is based on a secure masked hardware implementation which does not exhibit any detectable leakage. However, by running the device at a particular clock frequency one of the requirements of the underlying masking scheme is not fulfilled anymore, i.e., the Trojan is triggered, and the device\u27s side-channel leakage can be exploited. Although as a case study we show an application of our designed Trojan on an FPGA-based threshold implementation of the PRESENT cipher, our methodology is a general approach and can be applied on any similar circuit

    Nonlinear Calderón–Zygmund inequalities for maps

    No full text

    Development of the Unified Security Requirements of PUFs During the Standardization Process

    No full text
    International audienceThis paper accounts for some scientific aspects related to the international standardization process about physically unclonable functions (PUFs), through the drafting of ISO/IEC 20897 project. The primary motivation for this standard project is to structure and expand the market of PUFs, as solutions for non-tamperable electronic chips identifiers. While drafting the documents and discussing with international experts, the topic of PUF also gained much maturity. This article accounts how scientific structuration of the PUF as a field of embedded systems security has been emerging as a byproduct. First, the standardization has allowed to merge two redundant security requirements (namely diffuseness and unpredictability) into one (namely randomness), which in addition better suits all kinds of PUFs. As another contribution, the standardization process made it possible to match unambiguous and consistent tests with the security requirements. Furthermore, the process revealed that tests can be seen as estimators from their theoretic expressions, the so-called stochastic models
    corecore