287 research outputs found
Segmental relaxation in semicrystalline polymers: a mean field model for the distribution of relaxation times in confined regimes
The effect of confinement in the segmental relaxation of polymers is
considered. On the basis of a thermodynamic model we discuss the emerging
relevance of the fast degrees of freedom in stimulating the much slower
segmental relaxation, as an effect of the constraints at the walls of the
amorphous regions. In the case that confinement is due to the presence of
crystalline domains, a quasi-poissonian distribution of local constraining
conditions is derived as a result of thermodynamic equilibrium. This implies
that the average free energy barrier for conformational
rearrangement is of the same order of the dispersion of the barrier heights,
, around . As an example, we apply the results to
the analysis of the -relaxation as observed by dielectric broad band
spectroscopy in semicrystalline poly(ethylene terephthalate) cold-crystallized
from either an isotropic or an oriented glass. It is found that in the latter
case the regions of cooperative rearrangement are significantly larger than in
the former.Comment: 10 pages, 4 figures .ep
Lifting defects for nonstable K_0-theory of exchange rings and C*-algebras
The assignment (nonstable K_0-theory), that to a ring R associates the monoid
V(R) of Murray-von Neumann equivalence classes of idempotent infinite matrices
with only finitely nonzero entries over R, extends naturally to a functor. We
prove the following lifting properties of that functor: (1) There is no functor
F, from simplicial monoids with order-unit with normalized positive
homomorphisms to exchange rings, such that VF is equivalent to the identity.
(2) There is no functor F, from simplicial monoids with order-unit with
normalized positive embeddings to C*-algebras of real rank 0 (resp., von
Neumann regular rings), such that VF is equivalent to the identity. (3) There
is a {0,1}^3-indexed commutative diagram D of simplicial monoids that can be
lifted, with respect to the functor V, by exchange rings and by C*-algebras of
real rank 1, but not by semiprimitive exchange rings, thus neither by regular
rings nor by C*-algebras of real rank 0. By using categorical tools from an
earlier paper (larders, lifters, CLL), we deduce that there exists a unital
exchange ring of cardinality aleph three (resp., an aleph three-separable
unital C*-algebra of real rank 1) R, with stable rank 1 and index of nilpotence
2, such that V(R) is the positive cone of a dimension group and V(R) is not
isomorphic to V(B) for any ring B which is either a C*-algebra of real rank 0
or a regular ring.Comment: 34 pages. Algebras and Representation Theory, to appea
On the Exploitation of a High-throughput SHA-256 FPGA Design for HMAC
High-throughput and area-efficient designs of hash functions and corresponding mechanisms for Message Authentication Codes (MACs) are in high demand due to new security protocols that have arisen and call for security services in every transmitted data packet. For instance, IPv6 incorporates the IPSec protocol for secure data transmission. However, the IPSec's performance bottleneck is the HMAC mechanism which is responsible for authenticating the transmitted data. HMAC's performance bottleneck in its turn is the underlying hash function. In this article a high-throughput and small-size SHA-256 hash function FPGA design and the corresponding HMAC FPGA design is presented. Advanced optimization techniques have been deployed leading to a SHA-256 hashing core which performs more than 30% better, compared to the next better design. This improvement is achieved both in terms of throughput as well as in terms of throughput/area cost factor. It is the first reported SHA-256 hashing core that exceeds 11Gbps (after place and route in Xilinx Virtex 6 board)
SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities
Part 5: CybersecurityInternational audienceThe self-sovereign identity (SSI) model entails the full responsibility and sovereignty of a user regarding his identity data. This identity data can contain private data which is solely known to the user. The user himself is therefore required to manage the whole lifecycle of his private data, including the backup and restore. We show that prior work on how to backup and restore the user’s identity data does not meet the requirements of the SSI setting, and we present the first solution which does meet the requirements. Authenticated backup with auditing by remote entities (AWARE) combines SSI sustaining aspects and extends them to create a truly self-sovereign backup-and-restore protocol. In AWARE, trusted, physically met humans, called custodians, hold a secure device. Custodians with a secure device offer an offline backup possibility and a secure channel. The backup and restore are audited by commits on a publicly accessible distributed ledger. These commits are answered by auditing services which are required during restore. Only some auditing services hold relevant data for a restore. The self sovereignty of the user lies in the exclusive information which auditing services hold relevant data. AWARE is the first backup-and-restore mechanism that fully complies with the SSI model. We perform an in-depth security-risk analysis of AWARE, showing a risk rating which is comparable to the best risk rating o related non-SSI-compliant backup-and-restore mechanisms. We instantiate the AWARE protocol with cryptographic primitives providing a high security level of 256-bit. We show its implementation feasibility by providing a simulation of AWARE, and conclude with an estimated performance analysis on a microcontoller architecture based on our simulation and implementation results in the literature
Some Results on the Known Classes of Quadratic APN Functions
In this paper, we determine the Walsh spectra of three classes of quadratic APN functions and we prove that the class of quadratic trinomial APN functions constructed by Gölo\u glu is affine equivalent to Gold functions
On the generalized linear equivalence of functions over finite fields
In this paper we introduce the concept of generalized linear equivalence between functions defined over finite fields; this can be seen as an extension of the classical criterion of linear equivalence, and it is obtained by means of a particular geometric representation of the functions. After giving the basic definitions, we prove that the known equivalence relations can be seen as particular cases of the proposed generalized relationship and that there exist functions that are generally linearly equivalent but are not such in the classical theory. We also prove that the distributions of values in the Difference Distribution Table (DDT) and in the Linear Approximation Table (LAT) are invariants of the new transformation; this gives us the possibility to find some Almost Perfect Nonlinear (APN) functions that are not linearly equivalent (in the classical sense) to power functions, and to treat them accordingly to the new formulation of the equivalence criterion
- …