612 research outputs found

    Exponentiating in Pairing Groups

    Get PDF
    We study exponentiations in pairing groups for the most common security levels and show that, although the Weierstrass model is preferable for pairing computation, it can be worthwhile to map to alternative curve representations for the non-pairing group operations in protocols

    Trends in design of ransomware viruses

    Get PDF
    The ransomware nightmare is taking over the internet impacting common users,small businesses and large ones. The interest and investment which are pushed into this market each month, tells us a few things about the evolution of both technical and social engineering and what to expect in the short-coming future from them. In this paper we analyze how ransomware programs developed in the last few years and how they were released in certain market segments throughout the deep web via RaaS, exploits or SPAM, while learning from their own mistakes to bring profit to the next level. We will also try to highlight some mistakes that were made, which allowed recovering the encrypted data, along with the ransomware authors preference for specific encryption types, how they got to distribute, the silent agreement between ransomwares, coin-miners and bot-nets and some edge cases of encryption, which may prove to be exploitable in the short-coming future

    Re-assessing the validity of the Moral Sensitivity Questionnaire (MSQ):Two new scales for moral deliberation and paternalism

    Get PDF
    RATIONALE, AIMS, AND OBJECTIVES: The current study and previous research have called the six-component model of Lützen's 30-item Moral Sensitivity Questionnaire (MSQ) into question. For this reason, we re-examined the construct validity of this instrument. METHODS: In this cross-sectional study, which was based on a convenience sample of Dutch nurse practitioners (NPs) and physician assistants (PAs), we tested the validity of MSQ items using exploratory and confirmatory factor analyses (EFA and CFA, respectively). RESULTS: The EFA revealed a two-component model, which was then tested as a target model with CFA and was found to have good model fit. Some items were correlated with two uncorrelated latent constructs, which we labelled as "paternalistic" and "deliberate" attitudes towards patients. CONCLUSIONS: As in previous studies, the analyses in the current study, which was conducted among PAs and NPs, did not reveal six dimensions for the 30 items. Two new latent dimensions of moral sensitivity were psychometrically tested and confirmed. These two components relate to studies investigating ethical behaviour, and they can be used to describe the moral climate in healthcare organizations. The scales are indicators of the extent to which health professionals behave in a deliberate (sensitive) or paternalistic (insensitive) manner towards the opinions of patients within the context of medical decision-making

    Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors

    Get PDF
    Small 8-bit RISC processors and micro-controllers based on the AVR instruction set architecture are widely used in the embedded domain with applications ranging from smartcards over control systems to wireless sensor nodes. Many of these applications require asymmetric encryption or authentication, which has spurred a body of research into implementation aspects of Elliptic Curve Cryptography (ECC) on the AVR platform. In this paper, we study the suitability of a special class of finite fields, the so-called Optimal Prime Fields (OPFs), for a "lightweight" implementation of ECC with a view towards high performance and security. An OPF is a finite field Fp defined by a prime of the form p = u*2^k + v, whereby both u and v are "small" (in relation to 2^k) so that they fit into one or two registers of an AVR processor. OPFs have a low Hamming weight, which allows for a very efficient implementation of the modular reduction since only the non-zero words of p need to be processed. We describe a special variant of Montgomery multiplication for OPFs that does not execute any input-dependent conditional statements (e.g. branch instructions) and is, hence, resistant against certain side-channel attacks. When executed on an Atmel ATmega processor, a multiplication in a 160-bit OPF takes just 3237 cycles, which compares favorably with other implementations of 160-bit modular multiplication on an 8-bit processor. We also describe a performance-optimized and a security-optimized implementation of elliptic curve scalar multiplication over OPFs. The former uses a GLV curve and executes in 4.19M cycles (over a 160-bit OPF), while the latter is based on a Montgomery curve and has an execution time of approximately 5.93M cycles. Both results improve the state-of-the-art in lightweight ECC on 8-bit processors

    Neurobehavioral consequences of chronic intrauterine opioid exposure in infants and preschool children: a systematic review and meta-analysis

    Get PDF
    <b>Background</b><p></p> It is assumed within the accumulated literature that children born of pregnant opioid dependent mothers have impaired neurobehavioral function as a consequence of chronic intrauterine opioid use.<p></p> <b>Methods</b><p></p> Quantitative and systematic review of the literature on the consequences of chronic maternal opioid use during pregnancy on neurobehavioral function of children was conducted using the Meta-analysis of Observational Studies in Epidemiology (MOOSE) and the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) guidelines. We searched Cinahl, EMBASE, PsychINFO and MEDLINE between the periods of January 1995 to January 2012.<p></p> <b>Results</b><p></p> There were only 5 studies out of the 200 identified that quantitatively reported on neurobehavioral function of children after maternal opioid use during pregnancy. All 5 were case control studies with the number of exposed subjects within the studies ranging from 33–143 and 45–85 for the controls. This meta-analysis showed no significant impairments, at a non-conservative significance level of p < 0.05, for cognitive, psychomotor or observed behavioural outcomes for chronic intra-uterine exposed infants and pre-school children compared to non-exposed infants and children. However, all domains suggested a trend to poor outcomes in infants/children of opioid using mothers. The magnitude of all possible effects was small according to Cohen’s benchmark criteria.<p></p> <b>Conclusions</b><p></p> Chronic intra-uterine opioid exposed infants and pre-school children experienced no significant impairment in neurobehavioral outcomes when compared to non-exposed peers, although in all domains there was a trend to poorer outcomes. The findings of this review are limited by the small number of studies analysed, the heterogenous populations and small numbers within the individual studies. Longitudinal studies are needed to determine if any neuropsychological impairments appear after the age of 5 years and to help investigate further the role of environmental risk factors on the effect of ‘core’ phenotypes

    Taming the many EdDSAs

    Get PDF
    This paper analyses security of concrete instantiations of EdDSA by identifying exploitable inconsistencies between standardization recommendations and Ed25519 implementations. We mainly focus on current ambiguity regarding signature verification equations, binding and malleability guarantees, and incompatibilities between randomized batch and single verification. We give a formulation of Ed25519 signature scheme that achieves the highest level of security, explaining how each step of the algorithm links with the formal security properties. We develop optimizations to allow for more efficient secure implementations. Finally, we designed a set of edge-case test-vectors and run them by some of the most popular Ed25519 libraries. The results allowed to understand the security level of those implementations and showed that most libraries do not comply with the latest standardization recommendations. The methodology allows to test compatibility of different Ed25519 implementations which is of practical importance for consensus-driven applications

    Study protocol to investigate the effect of a lifestyle intervention on body weight, psychological health status and risk factors associated with disease recurrence in women recovering from breast cancer treatment

    Get PDF
    Background Breast cancer survivors often encounter physiological and psychological problems related to their diagnosis and treatment that can influence long-term prognosis. The aim of this research is to investigate the effects of a lifestyle intervention on body weight and psychological well-being in women recovering from breast cancer treatment, and to determine the relationship between changes in these variables and biomarkers associated with disease recurrence and survival. Methods/design Following ethical approval, a total of 100 patients will be randomly assigned to a lifestyle intervention (incorporating dietary energy restriction in conjunction with aerobic exercise training) or normal care control group. Patients randomised to the dietary and exercise intervention will be given individualised healthy eating dietary advice and written information and attend moderate intensity aerobic exercise sessions on three to five days per week for a period of 24 weeks. The aim of this strategy is to induce a steady weight loss of up to 0.5 Kg each week. In addition, the overall quality of the diet will be examined with a view to (i) reducing the dietary intake of fat to ~25% of the total calories, (ii) eating at least 5 portions of fruit and vegetables a day, (iii) increasing the intake of fibre and reducing refined carbohydrates, and (iv) taking moderate amounts of alcohol. Outcome measures will include body weight and body composition, psychological health status (stress and depression), cardiorespiratory fitness and quality of life. In addition, biomarkers associated with disease recurrence, including stress hormones, estrogen status, inflammatory markers and indices of innate and adaptive immune function will be monitored. Discussion This research will provide valuable information on the effectiveness of a practical, easily implemented lifestyle intervention for evoking positive effects on body weight and psychological well-being, two important factors that can influence long-term prognosis in breast cancer survivors. However, the added value of the study is that it will also evaluate the effects of the lifestyle intervention on a range of biomarkers associated with disease recurrence and survival. Considered together, the results should improve our understanding of the potential role that lifestyle-modifiable factors could play in saving or prolonging lives

    Batch Binary Weierstrass

    Get PDF
    Bitslicing is a programming technique that offers several attractive features, such as timing attack resistance, high amortized performance in batch computation, and architecture independence. On the symmetric crypto side, this technique sees wide real-world deployment, in particular for block ciphers with naturally parallel modes. However, the asymmetric side lags in application, seemingly due to the rigidity of the batch computation requirement. In this paper, we build on existing bitsliced binary field arithmetic results to develop a tool that optimizes performance of binary fields at any size on a given architecture. We then provide an ECC layer, with support for arbitrary binary curves. Finally, we integrate into our novel dynamic OpenSSL engine, transparently exposing the batch results to the OpenSSL library and linking applications to achieve significant performance and security gains for key pair generation, ECDSA signing, and (half of) ECDH across a wide range of curves, both standardized and non-standard
    corecore