154 research outputs found
Constructive Relationships Between Algebraic Thickness and Normality
We study the relationship between two measures of Boolean functions;
\emph{algebraic thickness} and \emph{normality}. For a function , the
algebraic thickness is a variant of the \emph{sparsity}, the number of nonzero
coefficients in the unique GF(2) polynomial representing , and the normality
is the largest dimension of an affine subspace on which is constant. We
show that for , any function with algebraic thickness
is constant on some affine subspace of dimension
. Furthermore, we give an algorithm
for finding such a subspace. We show that this is at most a factor of
from the best guaranteed, and when restricted to the
technique used, is at most a factor of from the best
guaranteed. We also show that a concrete function, majority, has algebraic
thickness .Comment: Final version published in FCT'201
Efficient noninteractive certification of RSA moduli and beyond
In many applications, it is important to verify that an RSA public key (N; e) speci es a
permutation over the entire space ZN, in order to prevent attacks due to adversarially-generated
public keys. We design and implement a simple and e cient noninteractive zero-knowledge
protocol (in the random oracle model) for this task. Applications concerned about adversarial
key generation can just append our proof to the RSA public key without any other modi cations
to existing code or cryptographic libraries. Users need only perform a one-time veri cation of
the proof to ensure that raising to the power e is a permutation of the integers modulo N. For
typical parameter settings, the proof consists of nine integers modulo N; generating the proof
and verifying it both require about nine modular exponentiations.
We extend our results beyond RSA keys and also provide e cient noninteractive zero-
knowledge proofs for other properties of N, which can be used to certify that N is suitable
for the Paillier cryptosystem, is a product of two primes, or is a Blum integer. As compared to
the recent work of Auerbach and Poettering (PKC 2018), who provide two-message protocols for
similar languages, our protocols are more e cient and do not require interaction, which enables
a broader class of applications.https://eprint.iacr.org/2018/057First author draf
A multi-start heuristic for multiplicative depth minimization of boolean circuits
In this work we propose a multi-start heuristic which aims at minimizing the multiplicative depth of boolean circuits. The multiplicative depth objective is encountered in the field of homomorphic encryption where ciphertext size depends on the number of consecutive multiplications. The heuristic is based on rewrite operators for multiplicative depth-2 paths. Even if the proposed rewrite operators are simple and easy to understand the experimental results show that they are rather powerful. The multiplicative depth of the benchmarked circuits was hugely improved. In average the obtained multiplicative depths were lower by more than 3 times than the initial ones. The proposed rewrite operators are not limited to boolean circuits and can also be used for arithmetic circuits
EFFECT OF CORTISOL TREATMENT ON HORMONAL RELATIONSHIPS IN CONGENITAL ADRENAL HYPERPLASIA
The temporal relationship between administration of cortisol and serum 17Α-hydroxyprogesterone was investigated in five patients aged 9-19 years with congenital adrenal hyperplasia due to 21-hydroxylase deficiency. There was marked variability in the 17Α-hydroxyprogesterone response (determined hourly for 24 h) of individual patients to administration of cortisol. Mean concentration was less than 0.030 Μmol/l in one patient but 0.519Μ mol/l in another. Levels were higher in all patients while off treatment, and were greatest in those with salt-losing adrenal hyperplasia. Growth hormone secretion was not suppressed by treatment with cortisol. Withdrawal of cortisol for 3 days resulted in a significant decrease in the mean serum FSH/LH ratio and a rise in serum testosterone in all subjects. Episodic release of gonadotrophins persisted in the adolescent patients.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/75713/1/j.1365-2265.1977.tb02002.x.pd
Efficient FPGA Implementations of LowMC and Picnic
Post-quantum cryptography has received increased attention in recent years, in particular, due to the standardization effort by NIST. One of the second-round candidates in the NIST post-quantum standardization project is Picnic, a post-quantum secure signature scheme based on efficient zero-knowledge proofs of knowledge. In this work, we present the first FPGA implementation of Picnic. We show how to efficiently calculate LowMC, the block cipher used as a one-way function in Picnic, in hardware despite the large number of constants needed during computation. We then combine our LowMC implementation and efficient instantiations of Keccak to build the full Picnic algorithm. Additionally, we conform to recently proposed hardware interfaces for post-quantum schemes to enable easier comparisons with other designs. We provide evaluations of our Picnic implementation for both, the standalone design and a version wrapped with a PCIe interface, and compare them to the state-of-the-art software implementations of Picnic and similar hardware designs. Concretely, signing messages on our FPGA takes 0.25 ms for the L1 security level and 1.24 ms for the L5 security level, beating existing optimized software implementations by a factor of 4
Prospects for the development of probiotics and prebiotics for oral applications
There has been a paradigm shift towards an ecological and microbial community-based approach to understanding oral diseases. This has significant implications for approaches to therapy and has raised the possibility of developing novel strategies through manipulation of the resident oral microbiota and modulation of host immune responses. The increased popularity of using probiotic bacteria and/or prebiotic supplements to improve gastrointestinal health has prompted interest in the utility of this approach for oral applications. Evidence now suggests that probiotics may function not only by direct inhibition of, or enhanced competition with, pathogenic micro-organisms, but also by more subtle mechanisms including modulation of the mucosal immune system. Similarly, prebiotics could promote the growth of beneficial micro-organisms that comprise part of the resident microbiota. The evidence for the use of pro or prebiotics for the prevention of caries or periodontal diseases is reviewed, and issues that could arise from their use, as well as questions that still need to be answered, are raised. A complete understanding of the broad ecological changes induced in the mouth by probiotics or prebiotics will be essential to assess their long-term consequences for oral health and disease
Socioeconomic mobility and talent utilization of workers from poorer backgrounds: The overlooked importance of within-organization dynamics
Socioeconomic mobility, or the ability of individuals to improve their socioeconomic standing through merit-based contributions, is a fundamental ideal of modern societies. The key focus of societal efforts to ensure socioeconomic mobility has been on the provision of educational opportunities. We review evidence that even with the same education and job opportunities, being born into a poorer family undermines socioeconomic mobility due to processes occurring within organizations. The burden of poorer background might, ceteris paribus, be economically comparable to the gender gap. We argue that in the societal and scientific effort to promote socioeconomic mobility, the key context in which mobility is supposed to happen—organizations—as well as the key part of the life of people striving toward socioeconomic advancement—that as working adults—have been overlooked. We integrate the organizational literature pointing to key within-organizational processes impacting objective (socioeconomic) success with research, some emergent in organizational sciences and some disciplinary, on when, why, and how people from poorer backgrounds behave or are treated by others in the relevant situations. Integrating these literatures generates a novel and useful framework for identifying issues people born into poorer families face as employees, systematizes extant evidence and makes it more accessible to organizational scientists, and allows us to lay the agenda for future organizational scholarshi
- …