64 research outputs found
A Note on the Ramanujan Machine
The Ramanujan Machine project detects new expressions related to constants of
interest, such as function values, and algebraic numbers (to
name a few). In particular the project lists a number of conjectures involving
even and odd function values, logarithms etc. We show that many
relations detected by the Ramanujan Machine Project stem from a specific
algebraic observation and show how to generate infinitely many. This provides
an automated proof and/or an explanation of many of the relations listed as
conjectures by the project (although not all of them)
The Thirteenth Power Residue Symbol
This paper presents an efficient deterministic algorithm for computing \textsuperscript{th}-power residue symbols in the cyclotomic field , where is a primitive \textsuperscript{th} root of unity.
The new algorithm finds applications in the implementation of certain cryptographic schemes and closes a gap in the \textsl{corpus} of algorithms for computing power residue symbols
Chemical Combinatorial Attacks on Keyboards
This paper presents a new attack on keyboards.
\smallskip
The attack consists in depositing on each keyboard key a small
ionic salt quantity ({\sl e.g.} some NaCl on key 0, some KCl on
key 1, LiCl on key 2, SrCl on key 3, BaCl on key 4,
CaCl on key 5...). As the user enters his PIN, salts get mixed
and leave the keyboard in a state that leaks secret information.
Nicely enough, evaluating the entropy loss due to the chemical
trace turns out to be a very interesting combinatorial exercise.
\smallskip
Under the assumption that mass spectroscopic analysis can reveal with accuracy
the mixture of chemical compounds
generated by the user, we show that, for moderate-size
decimal PINs, the attack would generally disclose the PIN.
\smallskip
The attack may apply to door PIN codes, phone numbers dialed from
a hotel rooms, computer keyboards or even ATMs.
\ss
While we did not implement the chemical part of the attack, a number of mass spectrometry
specialists confirmed to the authors its feasibility
Factoring Unbalanced Moduli with Known Bits
Let be an RSA modulus. This note describes a LLL-based method allowing to factor given contiguous bits of , irrespective to their position. A second method is presented, which needs fewer bits but whose length depends on the position of the known bit pattern. Finally, we introduce a somewhat surprising ad hoc method where two different known bit chunks, totalling bits suffice to factor
How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling
This paper explores ways of performing commutative tasks by parties. Tasks are defined as {\sl commutative} if the order at which parties perform tasks can be freely changed without affecting the final result. It is easy to see that arbitrary -party commutative tasks cannot be completed in less than basic time units.
We conjecture that arbitrary -party commutative tasks cannot be performed in time units by exchanging less than messages and provide computational evidence in favor this conjecture. We also explore the most equitable commutative task protocols
New Number-Theoretic Cryptographic Primitives
This paper introduces new -based one-way functions and companion signature schemes.
The new signature schemes are interesting because they do not belong to the two common design
blueprints, which are the inversion of a trapdoor permutation and the Fiat--Shamir transform.
In the basic signature scheme, the signer generates multiple RSA-like moduli and keeps
their factors secret. The signature is a bounded-size prime whose Jacobi symbols with respect to the
\u27s match the message digest. The generalized signature schemes replace the Jacobi symbol with
higher-power residue symbols.
Given of their very unique design the proposed signature schemes seem to be overlooked missing species
in the corpus of known signature algorithms
Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More
Higher-order power residues have enabled the construction of numerous public-key encryption schemes, authentication schemes, and digital signatures. Their explicit characterization is however challenging; an algorithm of Caranay and Scheidler computes -th power residue symbols, with an odd prime, provided that primary elements in the corresponding cyclotomic field can be efficiently found.
In this paper, we describe a new, generic algorithm to compute primary elements in cyclotomic fields; which we apply for
. A key insight is a careful selection of fundamental units as put forward by Dénes.
This solves an essential step in the Caranay--Scheidler algorithm. We give a unified view of the problem. Finally, we provide the first efficient deterministic algorithm for the computation of the 9-th and 16-th power residue symbols
Inside the Hypercube
Bernstein\u27s CubeHash is a hash function family that includes four functions submitted to the NIST Hash Competition. A CubeHash function is parametrized by a number of rounds r, a block byte size b, and a digest bit length h (the compression function makes r rounds, while the finalization function makes 10r rounds). The 1024-bit internal state of CubeHash is represented as a five-dimensional hypercube. The submissions to NIST recommends r=8, b=1, and h in {224,256,384,512}.
This paper presents the first external analysis of CubeHash, with: improved standard generic attacks for collisions and preimages; a multicollision attack that exploits fixed points; a study of the round function symmetries; a preimage attack that exploits these symmetries; a practical collision attack on a weakened version of CubeHash; a study of fixed points and an example of nontrivial fixed point; high-probability truncated differentials over 10 rounds.
Since the first publication of these results, several collision attacks for reduced versions of CubeHash were published by Dai, Peyrin, et al. Our results are more general, since they apply to any choice of the parameters, and show intrinsic properties of the CubeHash design, rather than attacks on specific versions
Automated sleep state classification of wide-field calcium imaging data via multiplex visibility graphs and deep learning
BACKGROUND: Wide-field calcium imaging (WFCI) allows for monitoring of cortex-wide neural dynamics in mice. When applied to the study of sleep, WFCI data are manually scored into the sleep states of wakefulness, non-REM (NREM) and REM by use of adjunct EEG and EMG recordings. However, this process is time-consuming and often suffers from low inter- and intra-rater reliability and invasiveness. Therefore, an automated sleep state classification method that operates on WFCI data alone is needed.
NEW METHOD: A hybrid, two-step method is proposed. In the first step, spatial-temporal WFCI data is mapped to multiplex visibility graphs (MVGs). Subsequently, a two-dimensional convolutional neural network (2D CNN) is employed on the MVGs to be classified as wakefulness, NREM and REM.
RESULTS: Sleep states were classified with an accuracy of 84% and Cohen\u27s κ of 0.67. The method was also effectively applied on a binary classification of wakefulness/sleep (accuracy=0.82, κ = 0.62) and a four-class wakefulness/sleep/anesthesia/movement classification (accuracy=0.74, κ = 0.66). Gradient-weighted class activation maps revealed that the CNN focused on short- and long-term temporal connections of MVGs in a sleep state-specific manner. Sleep state classification performance when using individual brain regions was highest for the posterior area of the cortex and when cortex-wide activity was considered.
COMPARISON WITH EXISTING METHOD: On a 3-hour WFCI recording, the MVG-CNN achieved a κ of 0.65, comparable to a κ of 0.60 corresponding to the human EEG/EMG-based scoring.
CONCLUSIONS: The hybrid MVG-CNN method accurately classifies sleep states from WFCI data and will enable future sleep-focused studies with WFCI
- …