1,439 research outputs found

    Layout optimization for multi-bi-modulus materials system under multiple load cases

    Get PDF
    Financial support from the National Natural Science Foundation of China (Grant No. 51179164) and the Australian Research Council (Grant No. DP140103137) is acknowledged

    Synthesis and characterization of 2-(2-benzhydrylnaphthyliminomethyl)pyridylnickel halides: formation of branched polyethylene

    Get PDF
    A series of 2-(2-benzhydrylnaphthyliminomethyl)pyridine derivatives (L1–L3) was prepared and used to synthesize the corresponding bis-ligated nickel(II) halide complexes (Ni1–Ni6) in good yield. The molecular structures of representative complexes, namely the bromide Ni3 and the chloride complex Ni6, were confirmed by single crystal X-ray diffraction, and revealed a distorted octahedral geometry at nickel. Upon activation with either methylaluminoxane (MAO) or modified methylaluminoxane (MMAO), all nickel complex pre-catalysts exhibited high activities (up to 2.02 × 10⁷ g(PE) mol⁻¹(Ni) h⁻¹) towards ethylene polymerization, producing branched polyethylene of low molecular weight and narrow polydispersity. The influence of the reaction parameters and the nature of the ligands on the catalytic behavior of the title nickel complexes were investigated

    Lattice-based weak curve fault attack on ECDSA

    Get PDF
    ECDSA algorithm is usually used in ICT system to achieve communication authenticity. But weakness in various implementations of the algorithm may make its security deviate from theoretical guarantee. This paper proposes a new lattice-based weak curve fault attack on ECDSA. An elliptic curve is weak if the problem of ECDLP in a \emph{subgroup} of the point group G\langle G \rangle is computationally solvable in practice, where GG is the specified basis point of ECDSA algorithm. Since ECDLP is not required to be computationally practical in the whole group of G\langle G \rangle, our approach extends the known existing attacks along this line. In detail, the proposed attack assumes a fault injection process can perturb a segment of consecutive bits of the curve parameter aa in the Weierstrass equation of ECDSA. An analysis on the density of smooth numbers indicates the faulty value a2˘7a\u27 parameterized elliptic curve is weak in high probability. Then we show the faulty value a2˘7a\u27 can be recovered by a dedicated quadratic residue distinguisher, which makes it possible to collect enough side channel information about the nonce used in the ECDSA signature generation process. With the help of these information, we can construct a lattice to recover the private key with lattice basis reduction techniques. Further, we show the same strategy can defeat the nonce masking countermeasure if the random mask is not too long, and makes the commonly employed countermeasures ineffective. To our knowledge, the problem remains untractable to the existing weak curve fault attacks. Thus the proposed approach can find more applications than the existing ones. This is demonstrated by the experimental analysis

    Urinary excretion of L-carnitine, acetyl-L-carnitine, propionyl-L-carnitine and their antioxidant activities after single dose administration of L-carnitine in healthy subjects

    Get PDF
    The urine excretion of L-carnitine (LC), acetyl-L-carnitine (ALC) and propionyl-Lcarnitine (PLC) and their relations with the antioxidant activities are presently unknown. Liquid L-carnitine (2.0 g) was administered orally as a single dose in 12 healthy subjects. Urine concentrations of LC, ALC and PLC were detected by HPLC. Superoxide dismutase (SOD), total antioxidative capacity (T-AOC), malondialdehyde (MDA) and nitrogen monoxidum (NO) activities were measured by spectrophotometric methods. The 0~2 h, 2~4 h, 4~8 h, 8~12 h, 12~24 h excretion of LC was 53.13±31.36 µmol, 166.93±76.87 µmol, 219.92±76.30 µmol, 100.48±23.89 µmol, 72.07±25.77 µmol, respectively. The excretion of ALC was 29.70±14.43 µmol, 80.59±32.70 µmol, 109.85±49.21 µmol, 58.65±18.55 µmol, and 80.43±35.44 µmol, respectively. The urine concentration of PLC was 6.63±4.50 µmol, 15.33±12.59 µmol, 15.46±6.26 µmol, 13.41±11.66 µmol and 9.67±7.92 µmol, respectively. The accumulated excretion rate of LC was 6.1% within 24h after its administration. There was also an increase in urine concentrations of SOD and T-AOC, and a decrease in NO and MDA. A positive correlation was found between urine concentrations of LC and SOD (r = 0.8277) or T-AOC (r = 0.9547), and a negative correlation was found between urine LC excretions and NO (r = -0.8575) or MDA (r = 0.7085). In conclusion, a single oral LC administration let to a gradual increase in urine L-carnitine excretion which was associated with an increase in urine antioxidant enzymes and the total antioxidant capacities. These data may be useful in designing therapeutic regimens of LC or its analogues in the future.A excreção urinária de L-carnitina (LC), acetil-L-carnitina (ALC) e propionil-L-carnitine (PLC) e as suas relações com as atividades antioxidantes são presentemente desconhecidos. Líquido de L-carnitina (2,0 g) foi administrada por via oral como uma dose única em 12 indivíduos saudáveis. As concentrações urinárias de LC, PLC e ALC foram detectados por HPLC. Atividades superóxido dismutase (SOD), a capacidade antioxidante total (T-AOC), malondialdeído (MDA) e óxido nítrico (NO) foram medidas por métodos espectrofotométricos. O 0~2 h, 2~4 h, 4~8 h, 8~12 h, 12~24 h excreção de LC foi 53,13±31.36 µmol, 166,93±76.87 µmol, 219,92±76.30 µmol, 100,48±23.89 µmol, 72,07±25.77 µmol, respectivamente. A excreηão de ALC foi 29,70±14.43 µmol, 80,59±32.70 µmol, 109,85±49.21 µmol, 58,65±18.55 µmol, e 80,43±35.44 µmol, respectivamente. A concentraηão de urina de PLC foi 6,63±4.50 µmol, 15,33±12.59 µmol, 15,46±6.26 µmol, 13,41±11.66 µmol e 9,67±7.92 µmol, respectivamente. A taxa de excreηão acumulada de LC foi de 6,1% 24 horas após sua administração. Houve também um aumento nas concentrações de urina de SOD e T-COA e diminuição de NO e de MDA. Correlação positiva foi encontrada entre as concentrações de urina de LC e SOD (r = 0,8277) ou T-AOC (r = 0,9547) e correlação negativa entre a excreção de LC e NO (r = -0,8575) ou MDA (r = 0,7085). Em conclusão, a administração oral única de LC leva ao aumento gradual na excreção urinária de L-carnitina, que foi associada com o aumento das enzimas antioxidantes na urina e as capacidades antioxidantes totais. Estes dados podem ser úteis no futuro para o planejamento de esquemas terapêuticos de LC ou os seus análogos, no futuro

    Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA

    Get PDF
    The deterministic ECDSA and EdDSA signature schemes have found plenty of applications since their publication and standardization. Their theoretical security can be guaranteed under certain well-designed models, while their practical risks from the flaw of random number generators can be mitigated since no randomness is required by the algorithms anymore. But the situation is not completely optimistic, since it has been gradually found that delicately designed fault attacks can threaten the practical security of the schemes. We present a lattice-based fault analysis method to the deterministic ECDSA and EdDSA algorithms. The underlying fault injection model is a special case of the random fault model in~\cite{MMF2019}. By noticing the algebraic structures of the deterministic algorithms, we show that, when providing with some valid faulty signatures and an associated correct signature of the same input message, some instances of lattice problems can be constructed to recover the signing key. This makes the allowed faulty bits close to the size of the signing key, and obviously bigger than that of the existing differential fault attacks. Moreover, the lattice-based approach supports much more alternative targets of fault injection when comparing with the existing approaches, which further improves its applicability. Experiments are performed to validate the effectiveness of the key recovery method. It is demonstrated that, for 256-bit deterministic ECDSA/EdDSA, the signing key can be recovered efficiently with significant probability even if the targets are affected by 250 (or 247) faulty bits. This is, however, impractical for the existing faulty pattern enumerating approaches
    corecore