69 research outputs found
Age-related alterations in efferent medial olivocochlear-outer hair cell and primary auditory ribbon synapses in CBA/J mice
Copyright \ua9 2024 D\uf6rje, Shvachiy, K\ufcck, Outeiro, Strenzke, Beutner and Setz.Introduction: Hearing decline stands as the most prevalent single sensory deficit associated with the aging process. Giving compelling evidence suggesting a protective effect associated with the efferent auditory system, the goal of our study was to characterize the age-related changes in the number of efferent medial olivocochlear (MOC) synapses regulating outer hair cell (OHC) activity compared with the number of afferent inner hair cell ribbon synapses in CBA/J mice over their lifespan. Methods: Organs of Corti of 3-month-old CBA/J mice were compared with mice aged between 10 and 20 months, grouped at 2-month intervals. For each animal, one ear was used to characterize the synapses between the efferent MOC fibers and the outer hair cells (OHCs), while the contralateral ear was used to analyze the ribbon synapses between inner hair cells (IHCs) and type I afferent nerve fibers of spiral ganglion neurons (SGNs). Each cochlea was separated in apical, middle, and basal turns, respectively. Results: The first significant age-related decline in afferent IHC-SGN ribbon synapses was observed in the basal cochlear turn at 14 months, the middle turn at 16 months, and the apical turn at 18 months of age. In contrast, efferent MOC-OHC synapses in CBA/J mice exhibited a less pronounced loss due to aging which only became significant in the basal and middle turns of the cochlea by 20 months of age. Discussion: This study illustrates an age-related reduction on efferent MOC innervation of OHCs in CBA/J mice starting at 20 months of age. Our findings indicate that the morphological decline of efferent MOC-OHC synapses due to aging occurs notably later than the decline observed in afferent IHC-SGN ribbon synapses
Ca2+-binding protein 2 inhibits Ca2+-channel inactivation in mouse inner hair cells
Ca2+ channels mediate excitation-secretion coupling and show little inactivation at sensory ribbon synapses, enabling reliable synaptic information transfer during sustained stimulation. Studies of Ca2+-channel complexes in HEK293 cells indicated that Ca2+-binding proteins (CaBPs) antagonize their calmodulin-dependent inactivation. Although human mutations affecting CABP2 were shown to cause hearing impairment, the role of CaBP2 in auditory function and the precise disease mechanism remained enigmatic. Here, we disrupted CaBP2 in mice and showed that CaBP2 is required for sound encoding at inner hair cell synapses, likely by suppressing Ca2+-channel inactivation. We propose that the number of activatable Ca2+ channels at the active zone is reduced when CaBP2 is lacking, as is likely the case with the newly described human CABP2 mutation
QC-MDPC: A Timing Attack and a CCA2 KEM
International audienceIn 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece cryptosystem based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes. This proposal uses an iterative bit-flipping algorithm in its decryption procedure. Such algorithms fail with a small probability. At Asiacrypt 2016, Guo, Johansson and Stankovski (GJS) exploited these failures to perform a key recovery attack. They introduced the notion of the distance spectrum of a sparse vector and showed that the knowledge of the spectrum is enough to find the vector. By observing many failing plaintexts they recovered the distance spectrum of the QC-MDPC secret key. In this work, we explore the underlying causes of this attack, ways in which it can be improved, and how it can be mitigated. We prove that correlations between the spectrum of the key and the spectrum of the error induce a bias on the distribution of the syndrome weight. Hence, the syndrome weight is the fundamental quantity from which secret information leaks. Assuming a side-channel allows the observation of the syndrome weight, we are able to perform a key-recovery attack, which has the advantage of exploiting all known plaintexts, not only those leading to a decryption failure. Based on this study, we derive a timing attack. It performs well on most decoding algorithms, even on the recent variants where the decryption failure rate is low, a case which is more challenging to the GJS attack. To our knowledge, this is the first timing attack on a QC-MDPC scheme. Finally, we show how to construct a new KEM, called ParQ that can reduce the decryption failure rate to a level negligible in the security parameter, without altering the QC-MDPC parameters. This is done through repeated encryption. We formally prove the IND-CCA2 security of ParQ, in a model that considers decoding failures. This KEM offers smaller key sizes and is suitable for purposes where the public key is used statically
On the CCA2 Security of McEliece in the Standard Model
In this paper we study public-key encryption schemes based on error-correcting codes that are IND-CCA2 secure in the standard model. In particular, we analyze a protocol due to Dowsley, Muller-Quade and Nascimento, based on a work of Rosen and Segev. The original formulation of the protocol contained some ambiguities and incongruences, which we point out and correct; moreover, the protocol deviates substantially from the work it is based on. We then present a construction which resembles more closely the original Rosen-Segev framework, and show how this can be instantiated with the McEliece scheme
Age-related alterations in efferent medial olivocochlear-outer hair cell and primary auditory ribbon synapses in CBA/J mice
IntroductionHearing decline stands as the most prevalent single sensory deficit associated with the aging process. Giving compelling evidence suggesting a protective effect associated with the efferent auditory system, the goal of our study was to characterize the age-related changes in the number of efferent medial olivocochlear (MOC) synapses regulating outer hair cell (OHC) activity compared with the number of afferent inner hair cell ribbon synapses in CBA/J mice over their lifespan.MethodsOrgans of Corti of 3-month-old CBA/J mice were compared with mice aged between 10 and 20 months, grouped at 2-month intervals. For each animal, one ear was used to characterize the synapses between the efferent MOC fibers and the outer hair cells (OHCs), while the contralateral ear was used to analyze the ribbon synapses between inner hair cells (IHCs) and type I afferent nerve fibers of spiral ganglion neurons (SGNs). Each cochlea was separated in apical, middle, and basal turns, respectively.ResultsThe first significant age-related decline in afferent IHC-SGN ribbon synapses was observed in the basal cochlear turn at 14 months, the middle turn at 16 months, and the apical turn at 18 months of age. In contrast, efferent MOC-OHC synapses in CBA/J mice exhibited a less pronounced loss due to aging which only became significant in the basal and middle turns of the cochlea by 20 months of age.DiscussionThis study illustrates an age-related reduction on efferent MOC innervation of OHCs in CBA/J mice starting at 20 months of age. Our findings indicate that the morphological decline of efferent MOC-OHC synapses due to aging occurs notably later than the decline observed in afferent IHC-SGN ribbon synapses
Classic McEliece Implementation with Low Memory Footprint
The Classic McEliece cryptosystem is one of the most trusted quantum-resistant cryptographic schemes. Deploying it in practical applications, however, is challenging due to the size of its public key. In this work, we bridge this gap. We present an implementation of Classic McEliece on an ARM Cortex-M4 processor, optimized to overcome memory constraints. To this end, we present an algorithm to retrieve the public key ad-hoc. This reduces memory and storage requirements and enables the generation of larger key pairs on the device. To further improve the implementation, we perform the public key operation by
streaming the key to avoid storing it as a whole. This additionally reduces the risk of denial of service attacks. Finally, we use these results to implement and run TLS on the embedded device
- …