30 research outputs found

    Garside and quadratic normalisation: a survey

    Full text link
    Starting from the seminal example of the greedy normal norm in braid monoids, we analyse the mechanism of the normal form in a Garside monoid and explain how it extends to the more general framework of Garside families. Extending the viewpoint even more, we then consider general quadratic normalisation procedures and characterise Garside normalisation among them.Comment: 30 page

    Practical Attacks Against the Walnut Digital Signature Scheme

    Get PDF
    Recently, NIST started the process of standardizing quantum- resistant public-key cryptographic algorithms. WalnutDSA, the subject of this paper, is one of the 20 proposed signature schemes that are being considered for standardization. Walnut relies on a one-way function called E-Multiplication, which has a rich algebraic structure. This paper shows that this structure can be exploited to launch several practical attacks against the Walnut cryptosystem. The attacks work very well in practice; it is possible to forge signatures and compute equivalent secret keys for the 128-bit and 256-bit security parameters submitted to NIST in less than a second and in less than a minute respectively

    The relationship between organisational characteristics and the effects of clinical guidelines on medical performance in hospitals, a meta-analysis

    Get PDF
    We are grateful to our colleagues involved in the systematic review of guideline dissemination and implementation strategies across all settings especially Cynthia Fraser, Graeme MacLennan, Craig Ramsay, Paula Whitty, Martin Eccles, Lloyd Matowe, Liz Shirran. The systematic review of guideline dissemination and implementation strategies across all settings was funded by the UK NHS Health Technology Assessment Program. Dr Ruth Thomas is funded by a Wellcome Training Fellowship in Health Services Research. (Grant number GR063790MA). The Health Services Research Unit is funded by the Chief Scientists Office of the Scottish Executive Department of Health. Dr Jeremy Grimshaw holds a Canada Research Chair in Health Knowledge Transfer and Uptake. However the views expressed are those of the authors and not necessarily the funders.Peer reviewedPublisher PD

    Factoring Products of Braids via Garside Normal Form

    Get PDF
    Braid groups are infinite non-abelian groups naturally arising from geometric braids. For two decades they have been proposed for cryptographic use. In braid group cryptography public braids often contain secret braids as factors and it is hoped that rewriting the product of braid words hides individual factors. We provide experimental evidence that this is in general not the case and argue that under certain conditions parts of the Garside normal form of factors can be found in the Garside normal form of their product. This observation can be exploited to decompose products of braids of the form ABC when only B is known. Our decomposition algorithm yields a universal forgery attack on WalnutDSA™, which is one of the 20 proposed signature schemes that are being considered by NIST for standardization of quantum-resistant public-key cryptography. Our attack on WalnutDSA™ can universally forge signatures within seconds for both the 128-bit and 256-bit security level, given one random message-signature pair. The attack worked on 99.8% and 100% of signatures for the 128-bit and 256-bit security levels in our experiments. Furthermore, we show that the decomposition algorithm can be used to solve instances of the conjugacy search problem and decomposition search problem in braid groups. These problems are at the heart of other cryptographic schemes based on braid groups.SCOPUS: cp.kinfo:eu-repo/semantics/published22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2019; Beijing; China; 14 April 2019 through 17 April 2019ISBN: 978-303017258-9Volume Editors: Sako K.Lin D.Publisher: Springer Verla

    ES-62, an immunomodulator secreted by filarial nematodes, suppresses clonal expansion and modifies effector function of heterologous antigen-specific T cells in vivo

    No full text
    Abstract ES-62 is a phosphorylcholine-containing glycoprotein secreted by filarial nematodes, which has previously been shown to possess a range of immunomodulatory capabilities. We now show, using a CD4+ transgenic TCR T cell adoptive transfer system, that ES-62 can modulate heterologous Ag (OVA)-specific responses in vivo. Thus, in contrast to the mixed IgG1-IgG2a response observed in control animals, ES-62-treated mice exhibited a Th2-biased IgG Ab response as evidenced by stable enhancement of anti-OVA IgG1 production and a profound inhibition of anti-OVA IgG2a. Consistent with this, Ag-specific IFN-γ produced was suppressed by pre-exposure to ES-62 when T cells were rechallenged ex vivo. However, the response observed was not classical Th2, because although Ag-specific IL-5 production was enhanced by pre-exposure to ES-62, IL-13, and IL-4 were inhibited when T cells were rechallenged ex vivo. Moreover, such T cells produced lower levels of IL-2 and proliferated less upon Ag rechallenge ex vivo. Finally, pre-exposure to ES-62 inhibited the clonal expansion of the transferred Ag-specific CD4+ T cells and altered the functional response of such T cells in vivo, by modulating the kinetics and reducing the extent of their migration into B cell follicles.</jats:p

    Braid groups in complex spaces

    No full text
    corecore