658 research outputs found

    The influences and outcomes of phonological awareness: a study of MA, PA and auditory processing in pre-readers with a family risk of dyslexia

    Get PDF
    The direct influence of phonological awareness (PA) on reading outcomes has been widely demonstrated, yet PA may also exert indirect influence on reading outcomes through other cognitive variables such as morphological awareness (MA). However, PA's own development is dependent and influenced by many extraneous variables such as auditory processing, which could ultimately impact reading outcomes. In a group of pre-reading children with a family risk of dyslexia and low-risk controls, this study sets out to answer questions surrounding PA's relationship at various grain sizes (syllable, onset/rime and phoneme) with measures of auditory processing (frequency modulation (FM) and an amplitude rise-time task (RT)) and MA, independent of reading experience. Group analysis revealed significant differences between high- and low-risk children on measures of MA, and PA at all grain sizes, while a trend for lower RT thresholds of high-risk children was found compared with controls. Correlational analysis demonstrated that MA is related to the composite PA score and syllable awareness. Group differences on MA and PA were re-examined including PA and MA, respectively, as control variables. Results exposed PA as a relevant component of MA, independent of reading experience

    An Algebraic Attack Against McEliece-like Cryptosystems Based on BCH Codes

    Get PDF
    We present an algebraic attack on a McEliece-like scheme based on BCH codes (BCH-McEliece), where the Goppa code is replaced by a suitably permuted BCH code. Our attack continues the line of work devising attacks against McEliece-like schemes with Goppa-like codes, with the goal of getting a better understanding of why Goppa codes are so intractable. Our starting point is the work of Faugère, Perret and Portzamparc (Asiacrypt 2014). We take their algebraic model and adapt and improve their attack algorithm so that it can handle BCH-McEliece. We implement the attack and exhibit a parameter range where our attack is practical while generic attacks suggest cryptographic security
    • …
    corecore