163 research outputs found

    Sex-differences in the longitudinal recovery of neuromuscular function in COVID-19 associated acute respiratory distress syndrome survivors

    Get PDF
    Introduction: Patients admitted to the intensive care unit (ICU) following severe acute respiratory syndrome 2 (SARS-CoV-2) infection may have muscle weakness up to 1 year or more following ICU discharge. However, females show greater muscle weakness than males, indicating greater neuromuscular impairment. The objective of this work was to assess sex differences in longitudinal physical functioning following ICU discharge for SARS-CoV-2 infection. Methods: We performed longitudinal assessment of physical functioning in two groups: 14 participants (7 males, 7 females) in the 3-to-6 month and 28 participants (14 males, 14 females) in the 6-to-12 month group following ICU discharge and assessed differences between the sexes. We examined self-reported fatigue, physical functioning, compound muscle action potential (CMAP) amplitude, maximal strength, and the neural drive to the tibialis anterior muscle. Results: We found no sex differences in the assessed parameters in the 3-to-6-month follow-up, indicating significant weakness in both sexes. Sex differences emerged in the 6-to-12-month follow-up. Specifically, females exhibited greater impairments in physical functioning, including lower strength, walking lower distances, and high neural input even 1 year following ICU-discharge. Discussion: Females infected by SARS-CoV-2 display significant impairments in functional recovery up to 1 year following ICU discharge. The effects of sex should be considered in post-COVID neurorehabilitation

    The effects of anthocyanin-rich Myrtaceae fruits peel powder on fibrosis-associated hepatocarcinogenesisin mice.

    Get PDF
    Fruits from Myrtaceae family, as jabuticaba (Myrciaria jaboticaba (Vell) O. Berg), jamelão (Syzygium cumini (L.) Skeels) and jambo (Syzygium malaccense), raise interest due to their high levels of anthocyanins, antioxidant compounds, and, thus, potential for chronic disease risk reduction¹. Therefore, the study evaluated whether the ingestion of jabuticaba, jamelão or jambo peel powder attenuates fibrosis-associated hepatocarcinogenesis. Neonatal female C3H/Hej mice were submitted to a diethylnitrosamine (DEN)/carbon tetrachloride (CCl4)-induced fibrosis-associated hepatocarcinogenesis model. Mice also received basal diet or basal diet containing 2% of jabuticaba, jamelão or jambo dehydrated peels for 10 weeks. HPLC analysis of dehydrated fruit peels revealed high levels of anthocyanins in jabuticaba (802.89±22.88 mg/100g), jamelão (575.95±9.42 mg/100g) and jambo (156.05±10.39 mg/100g). These fruits displayed different types of anthocyanins (Figures 1-3). Interestingly, only the ingestion of basal diet containing jamelão peel powder attenuated liver fibrosis compared to DEN/CCl4 (Figure 4). Mechanisms will be evaluated, as well as the effects of these fruits on the development of preneoplasic/neoplastic liver lesions.WTPC. 21 a 26 de abril

    Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC

    Get PDF
    In CRYPTO 2016, Cogliati and Seurin have proposed a highly secure nonce-based MAC called Encrypted Wegman-Carter with Davies-Meyer (EWCDM\textsf{EWCDM}) construction, as EK2(EK1(N)⊕N⊕HKh(M))\textsf{E}_{K_2}\bigl(\textsf{E}_{K_1}(N)\oplus N\oplus \textsf{H}_{K_h}(M)\bigr) for a nonce NN and a message MM. This construction achieves roughly 22n/32^{2n/3} bit MAC security with the assumption that E\textsf{E} is a PRP secure nn-bit block cipher and H\textsf{H} is an almost xor universal nn-bit hash function. In this paper we propose Decrypted Wegman-Carter with Davies-Meyer (DWCDM\textsf{DWCDM}) construction, which is structurally very similar to its predecessor EWCDM\textsf{EWCDM} except that the outer encryption call is replaced by decryption. The biggest advantage of DWCDM\textsf{DWCDM} is that we can make a truly single key MAC: the two block cipher calls can use the same block cipher key K=K1=K2K=K_1=K_2. Moreover, we can derive the hash key as Kh=EK(1)K_h=\textsf{E}_K(1), as long as ∣Kh∣=n|K_h|=n. Whether we use encryption or decryption in the outer layer makes a huge difference; using the decryption instead enables us to apply an extended version of the mirror theory by Patarin to the security analysis of the construction. DWCDM\textsf{DWCDM} is secure beyond the birthday bound, roughly up to 22n/32^{2n/3} MAC queries and 2n2^n verification queries against nonce-respecting adversaries. DWCDM\textsf{DWCDM} remains secure up to 2n/22^{n/2} MAC queries and 2n2^n verification queries against nonce-misusing adversaries

    Gastrointestinal bleeding in patients with sars-cov-2 infection managed by interventional radiology

    Get PDF
    Background: This study was conducted to evaluate the technical and clinical success of trans-arterial embolization (TAE) as a treatment of gastrointestinal bleeding (GIB) in Coronavirus Disease 2019 (COVID-19) patients and to describe its safety; moreover, we describe the characteristics of these patients. Methods: Thirty-four COVID-19 hospitalized patients presented with GIB. Risk factors, drugs administered for COVID-19 infection, and clinical and biological parameters were evaluated. Furthermore, intraprocedural data and outcomes of embolization were analyzed. Results: GIB was more frequent in male. Overweight, hypertension, diabetes, previous cardiac disease, and anticoagulation preadmission (48.5%) were frequently found in our population. Previous or actual COVID Acute respiratory distress syndrome (ARDS) and a high level of D-dimer were encountered in most cases. Upper GIB was more frequent than lower GIB. Technical and clinical success rates of embolization were 88.2% and 94.1%, respectively. The complication rate was 5.9%. Conclusions: Our study highlights the most frequent characteristics of COVID-19 patients with GIB. Embolization is feasible, effective, and safe

    Temperature Dependence of Backbone Dynamics in Human Ileal Bile Acid-Binding Protein: Implications for the Mechanism of Ligand Binding

    Get PDF
    Human ileal bile acid-binding protein (I-BABP), a member of the family of intracellular lipid binding proteins plays a key role in the cellular trafficking and metabolic regulation of bile salts. The protein has two internal and, according to a recent study, an additional superficial binding site and binds di- and trihydroxy bile salts with positive cooperativity and a high degree of site-selectivity. Previously, in the apo form, we have identified an extensive network of conformational fluctuations on the millisecond time scale, which cease upon ligation. Additionally, ligand binding at room temperature was found to be accompanied by a slight rigidification of picosecond-nanosecond (ps-ns) backbone flexibility. In the current study, temperature-dependent N-15 NMR spin relaxation measurements were used to gain more insight into the role of dynamics in human I-BABP-bile salt recognition. According to our analysis, residues sensing a conformational exchange in the apo state can be grouped into two clusters with slightly different exchange rates. The entropy-enthalpy compensation observed for both clusters suggests a disorder-order transition between a ground and a sparsely populated higher energy state in the absence of ligands. Analysis of the faster, ps-ns motion of N-15-H-1 bond vectors indicates an unusual nonlinear temperature-dependence for both ligation states. Intriguingly, while bile salt binding results in a more uniform response to temperature change throughout the protein, the temperature derivative of the generalized order parameter shows different responses to temperature increase for the two forms of the protein in the investigated temperature range. Analysis of both slow and fast motions in human I-BABP indicates largely different energy landscapes for the apo and halo states suggesting that optimization of binding interactions might be achieved by altering the dynamic behavior of specific segments in the protein

    Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption

    Get PDF
    A popular approach to tweakable blockcipher design is via masking, where a certain primitive (a blockcipher or a permutation) is preceded and followed by an easy-to-compute tweak-dependent mask. In this work, we revisit the principle of masking. We do so alongside the introduction of the tweakable Even-Mansour construction MEM. Its masking function combines the advantages of word-oriented LFSR- and powering-up-based methods. We show in particular how recent advancements in computing discrete logarithms over finite fields of characteristic 2 can be exploited in a constructive way to realize highly efficient, constant-time masking functions. If the masking satisfies a set of simple conditions, then MEM is a secure tweakable blockcipher up to the birthday bound. The strengths of MEM are exhibited by the design of fully parallelizable authenticated encryption schemes OPP (nonce-respecting) and MRO (misuse-resistant). If instantiated with a reduced-round BLAKE2b permutation, OPP and MRO achieve speeds up to 0.55 and 1.06 cycles per byte on the Intel Haswell microarchitecture, and are able to significantly outperform their closest competitors

    Diploids in the Cryptococcus neoformans Serotype A Population Homozygous for the α Mating Type Originate via Unisexual Mating

    Get PDF
    The ubiquitous environmental human pathogen Cryptococcus neoformans is traditionally considered a haploid fungus with a bipolar mating system. In nature, the α mating type is overwhelmingly predominant over a. How genetic diversity is generated and maintained by this heterothallic fungus in a largely unisexual α population is unclear. Recently it was discovered that C. neoformans can undergo same-sex mating under laboratory conditions generating both diploid intermediates and haploid recombinant progeny. Same-sex mating (α-α) also occurs in nature as evidenced by the existence of natural diploid αADα hybrids that arose by fusion between two α cells of different serotypes (A and D). How significantly this novel sexual style contributes to genetic diversity of the Cryptococcus population was unknown. In this study, ∼500 natural C. neoformans isolates were tested for ploidy and close to 8% were found to be diploid by fluorescence flow cytometry analysis. The majority of these diploids were serotype A isolates with two copies of the α MAT locus allele. Among those, several are intra-varietal allodiploid hybrids produced by fusion of two genetically distinct α cells through same-sex mating. The majority, however, are autodiploids that harbor two seemingly identical copies of the genome and arose via either endoreplication or clonal mating. The diploids identified were isolated from different geographic locations and varied genotypically and phenotypically, indicating independent non-clonal origins. The present study demonstrates that unisexual mating produces diploid isolates of C. neoformans in nature, giving rise to populations of hybrids and mixed ploidy. Our findings underscore the importance of same-sex mating in shaping the current population structure of this important human pathogenic fungus, with implications for mechanisms of selfing and inbreeding in other microbial pathogens

    Communication and visiting policies in Italian intensive care units during the first COVID-19 pandemic wave and lockdown: a nationwide survey

    Get PDF
    Background: During the first coronavirus disease 2019 (COVID-19) pandemic wave, an unprecedented number of patients with respiratory failure due to a new, highly contagious virus needed hospitalization and intensive care unit (ICU) admission. The aim of the present study was to describe the communication and visiting policies of Italian intensive care units (ICUs) during the first COVID-19 pandemic wave and national lockdown and compare these data with prepandemic conditions. Methods: A national web-based survey was conducted among 290 Italian hospitals. Each ICU (active between February 24 and May 31, 2020) was encouraged to complete an individual questionnaire inquiring the hospital/ICU structure/organization, communication/visiting habits and the role of clinical psychology prior to, and during the first COVID-19 pandemic wave. Results: Two hundred and nine ICUs from 154 hospitals (53% of the contacted hospitals) completed the survey (202 adult and 7 pediatric ICUs). Among adult ICUs, 60% were dedicated to COVID-19 patients, 21% were dedicated to patients without COVID-19 and 19% were dedicated to both categories (Mixed). A total of 11,102 adult patients were admitted to the participating ICUs during the study period and only approximately 6% of patients received at least one visit. Communication with family members was guaranteed daily through an increased use of electronic devices and was preferentially addressed to the same family member. Compared to the prepandemic period, clinical psychologists supported physicians more often regarding communication with family members. Fewer patients received at least one visit from family members in COVID and mixed-ICUs than in non-COVID ICUs, l (0 [0–6]%, 0 [0–4]% and 11 [2–25]%, respectively, p < 0.001). Habits of pediatric ICUs were less affected by the pandemic. Conclusions: Visiting policies of Italian ICUs dedicated to adult patients were markedly altered during the first COVID-19 wave. Remote communication was widely adopted as a surrogate for family meetings. New strategies to favor a family-centered approach during the current and future pandemics are warranted

    On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy

    Get PDF
    Keyed and unkeyed cryptographic permutations often iterate simple round functions. Substitution-permutation networks (SPNs) are an approach that is popular since the mid 1990s. One of the new directions in the design of these round functions is to reduce the substitution (S-Box) layer from a full one to a partial one, uniformly distributed over all the rounds. LowMC and Zorro are examples of this approach. A relevant freedom in the design space is to allow for a highly non-uniform distribution of S-Boxes. However, choosing rounds that are so different from each other is very rarely done, as it makes security analysis and implementation much harder. We develop the design strategy Hades and an analysis framework for it, which despite this increased complexity allows for security arguments against many classes of attacks, similar to earlier simpler SPNs. The framework builds upon the wide trail design strategy, and it additionally allows for security arguments against algebraic attacks, which are much more of a concern when algebraically simple S-Boxes are used. Subsequently, this is put into practice by concrete instances and benchmarks for a use case that generally benefits from a smaller number of S-Boxes and showcases the diversity of design options we support: A candidate cipher natively working with objects in GF(p), for securing data transfers with distributed databases using secure multiparty computation (MPC). Compared to the currently fastest design MiMC, we observe significant improvements in online bandwidth requirements and throughput with a simultaneous reduction of preprocessing effort, while having a comparable online latency

    Naor-Reingold Goes Public: The Complexity of Known-key Security

    Get PDF
    We study the complexity of building secure block ciphers in the setting where the key is known to the attacker. In particular, we consider two security notions with useful implications, namely public-seed pseudorandom permutations (or psPRPs, for short) (Soni and Tessaro, EUROCRYPT \u2717) and correlation-intractable ciphers (Knudsen and Rijmen, ASIACRYPT \u2707; Mandal, Seurin, and Patarin, TCC \u2712). For both these notions, we exhibit constructions which make only two calls to an underlying non-invertible primitive, matching the complexity of building a pseudorandom permutation in the secret-key setting. Our psPRP result instantiates the round functions in the Naor-Reingold (NR) construction with a secure UCE hash function. For correlation intractability, we instead instantiate them from a (public) random function, and replace the pairwise-independent permutations in the NR construction with (almost) O(k2)O(k^2)-wise independent permutations, where kk is the arity of the relations for which we want correlation intractability. Our constructions improve upon the current state of the art, requiring five- and six-round Feistel networks, respectively, to achieve psPRP security and correlation intractability. To do so, we rely on techniques borrowed from Impagliazzo-Rudich-style black-box impossibility proofs for our psPRP result, for which we give what we believe to be the first constructive application, and on techniques for studying randomness with limited independence for correlation intractability
    • …
    corecore