231 research outputs found

    Measurement of focusing properties for high numerical aperture optics using an automated submicron beamprofiler

    Full text link
    The focusing properties of three aspheric lenses with numerical aperture (NA) between 0.53 and 0.68 were directly measured using an interferometrically referenced scanning knife-edge beam profiler with sub-micron resolution. The results obtained for two of the three lenses tested were in agreement with paraxial gaussian beam theory. It was also found that the highest NA aspheric lens which was designed for 830nm was not diffraction limited at 633nm. This process was automated using motorized translation stages and provides a direct method for testing the design specifications of high numerical aperture optics.Comment: 6 pages 4 figure

    Suppressive effects of co-stimulatory molecule expressions on mouse splenocytes by anti-allergic agents in vitro.

    Get PDF
    The influence of anti-allergic drugs, epinastine hydrochloride (EP) and disodium cromoglycate (DSCG), on the co-stimulatory molecule expression was examined using in vitro cell culture technique. Spleen cells obtained from BALB/c mice 10 days after immunization with haemocyanin absorbed to aluminium hydroxide were cultured in the presence of 100.0 microg/ml haemocyanin and various concentrations of the agents. Low concentrations (<1.5 x 10(-4)M) of EP and DSCG did not influence spleen cell blastic activity induced by antigenic stimulation, whereas these agents caused significant inhibition of spleen cell activation when 2 x 10(-4) M of the agents were added to cell cultures. EP and DSCG also did not affect blastic activity of sensitized splenic T cells by anti-CD3 monoclonal antibody stimulation even when these cells were cultured in the presence of 2 x 10(-4) M of the agents. We next examined the influence of EP and DSCG on the expression of co-stimulatory molecules on spleen cells in response to antigenic stimulation. Sensitized spleen cells were cultured in the presence of 2 x 10(-4)M of the agents and the expression of molecules were examined by flow cytometer 24h later. EP and DSCG suppressed the expression of costimulatory molecules, CD40 and CD80, but not CD86, on splenic B cells which were enhanced by antigenic stimulation in vitro

    Extended Generalized Feistel Networks using Matrix Representation

    Get PDF
    International audienceWhile Generalized Feistel Networks have been widely studied in the literature as a building block of a block cipher, we propose in this paper a unified vision to easily represent them through a matrix representation. We then propose a new class of such schemes called Extended Generalized Feistel Networks well suited for cryptographic applications. We instantiate those proposals into two particular constructions and we finally analyze their security

    Boomerang Connectivity Table:A New Cryptanalysis Tool

    Get PDF
    A boomerang attack is a cryptanalysis framework that regards a block cipher EE as the composition of two sub-ciphers E1E0E_1\circ E_0 and builds a particular characteristic for EE with probability p2q2p^2q^2 by combining differential characteristics for E0E_0 and E1E_1 with probability pp and qq, respectively. Crucially the validity of this figure is under the assumption that the characteristics for E0E_0 and E1E_1 can be chosen independently. Indeed, Murphy has shown that independently chosen characteristics may turn out to be incompatible. On the other hand, several researchers observed that the probability can be improved to pp or qq around the boundary between E0E_0 and E1E_1 by considering a positive dependency of the two characteristics, e.g.~the ladder switch and S-box switch by Biryukov and Khovratovich. This phenomenon was later formalised by Dunkelman et al.~as a sandwich attack that regards EE as E1EmE0E_1\circ E_m \circ E_0, where EmE_m satisfies some differential propagation among four texts with probability rr, and the entire probability is p2q2rp^2q^2r. In this paper, we revisit the issue of dependency of two characteristics in EmE_m, and propose a new tool called Boomerang Connectivity Table (BCT), which evaluates rr in a systematic and easy-to-understand way when EmE_m is composed of a single S-box layer. With the BCT, previous observations on the S-box including the incompatibility, the ladder switch and the S-box switch are represented in a unified manner. Moreover, the BCT can detect a new switching effect, which shows that the probability around the boundary may be even higher than pp or qq. To illustrate the power of the BCT-based analysis, we improve boomerang attacks against Deoxys-BC, and disclose the mechanism behind an unsolved probability amplification for generating a quartet in SKINNY. Lastly, we discuss the issue of searching for S-boxes having good BCT and extending the analysis to modular addition

    Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE

    Get PDF
    Tweakable TWINE (T-TWINE) is a new lightweight tweakable block cipher family proposed by Sakamoto etet alal. at IWSEC 2019. T-TWINE is the first Tweakable Block Cipher (TBC) that is built on Generalized Feistel Structure (GFS). It is based on the TWINE block cipher in addition to a simple tweak scheduling based on SKINNY’s tweakey schedule. Similar to TWINE, it has two versions, namely, T-TWINE-80 and T-TWINE-128, both have a block length of 64 bits and employ keys of length 80 and 128 bits, respectively. In this paper, we present impossible differential attacks against reduced-round versions of T-TWINE-80 and T-TWINE-128. First, we present an 18-round impossible differential distinguisher against T-TWINE. Then, using this distinguisher, we attack 25 and 27 rounds of T-TWINE-80 and T-TWINE-128, respectively

    Molecular dissection of the pea shoot apical meristem*

    Get PDF
    The shoot apical meristem (SAM) is responsible for the development of all the above-ground parts of a plant. Our understanding of the SAM at the molecular level is incomplete. This study investigates the gene expression repertoire of SAMs in the garden pea (Pisum sativum). To this end, 10 346 EST sequences representing 7610 unique genes were generated from SAM cDNA libraries. These sequences, together with previously reported pea ESTs, were used to construct a 12K oligonucleotide array to identify genes with differential SAM expression, as compared to axillary meristems, root apical meristems, or non-meristematic tissues. A number of genes were identified, predominantly expressed in specific cell layers or domains of the SAM and thus are likely components of the gene networks involved in stem cell maintenance or the initiation of lateral organs. Further in situ hybridization analysis confirmed the spatial localization of some of these genes within the SAM. Our data also indicate the diversification of some gene expression patterns and hence functions in legume crop plants. A number of transcripts highly expressed in all three meristems have also been uncovered and these candidates may provide valuable insight into molecular networks that underpin the maintenance of meristematic functionality

    Feistel Structures for MPC, and More

    Get PDF
    We study approaches to generalized Feistel constructions with low-degree round functions with a focus on x -> x^3 . Besides known constructions, we also provide a new balanced Feistel construction with improved diffusion properties. This then allows us to propose more efficient generalizations of the MiMC design (Asiacrypt’16), which we in turn evaluate in three application areas. Whereas MiMC was not competitive at all in a recently proposed new class of PQ-secure signature schemes, our new construction leads to about 30 times smaller signatures than MiMC. In MPC use cases, where MiMC outperforms all other competitors, we observe improvements in throughput by a factor of more than 4 and simultaneously a 5-fold reduction of preprocessing effort, albeit at the cost of a higher latency. Another use case where MiMC already outperforms other designs, in the area of SNARKs, sees modest improvements. Additionally, this use case benefits from the flexibility to use smaller fields

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Get PDF
    Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential characteristics. However, already at EUROCRYPT'91, Lai et al. comprehended that differential cryptanalysis rather uses differentials instead of single characteristics. In this paper, we consider exactly the gap between these two approaches and investigate this gap in the context of recent lightweight cryptographic primitives. This shows that for many recent designs like Midori, Skinny or Sparx one has to be careful as bounds from counting the number of active S-boxes only give an inaccurate evaluation of the best differential distinguishers. For several designs we found new differential distinguishers and show how this gap evolves. We found an 8-round differential distinguisher for Skinny-64 with a probability of 2−56.932−56.93, while the best single characteristic only suggests a probability of 2−722−72. Our approach is integrated into publicly available tools and can easily be used when developing new cryptographic primitives. Moreover, as differential cryptanalysis is critically dependent on the distribution over the keys for the probability of differentials, we provide experiments for some of these new differentials found, in order to confirm that our estimates for the probability are correct. While for Skinny-64 the distribution over the keys follows a Poisson distribution, as one would expect, we noticed that Speck-64 follows a bimodal distribution, and the distribution of Midori-64 suggests a large class of weak keys
    corecore