37 research outputs found

    Mass scales and stability of the proton in [SU(6)]3 X Z3

    Get PDF
    ABSTRACT: We prove that the proton is stable in the gauge model [SU(6)] x Zs which uni6es nongravitational forces with Savors, broken spontaneously by a minimal set of Higgs fields and vacuum expectation values down to SU(3)cU(1)aM. We also compute the evolution of the gauge coupling constants and show how agreement with precision data can be obtained

    Differences by country in academic production indexed in Scopus on intellectual property and innovation systems (2001-2021)

    Get PDF
    This paper aims to establish what are the differences by country in scientific production on intellectual property and innovation systems between 2001 and 2021? We use text mining, non-parametric statistics, and two specialized software (Bibliometrix and VosViewer) to indicate the differences in scientific production by country on innovation systems and intellectual property. We found that scientific production in the Asia Pacific and North American countries is, on average, higher than in Eastern Europe, the Middle East and North Africa, and Sub-Saharan Africa. These last three regions do not exhibit statistically significant differences among themselves. On the other hand, the countries of Western Europe exceed the production levels of the countries of Eastern Europe and Sub-Saharan Africa. We identified that the topics in the scientific production of the most productive countries were related to case studies, technology transfer, triple helix, regional innovation systems, governance, open innovation, competitiveness, and innovation policies

    New Attacks from Old Distinguishers Improved Attacks on Serpent

    Get PDF
    International audienceSerpent was originally proposed in 1998 and is one of the most studied block ciphers. In this paper we improve knowledge of its security by providing the current best attack on this cipher, which is a 12-round differential-linear attack with lower data, time and memory complexities than the best previous attacks. Our improvements are based on an improved conditional key guessing technique that exploits the properties of the Sboxes

    Improved Differential-Linear Attacks with Applications to ARX Ciphers

    Get PDF
    International audienceWe present several improvements to the framework of differential-linear attacks with a special focus on ARX ciphers. As a demonstration of their impact, we apply them to Chaskey and ChaCha and we are able to significantly improve upon the best attacks published so far

    Seropositividad de VIH y factores asociados en donantes de un banco de sangre de la ciudad de Medellín - Colombia, 2005 – 2018

    Get PDF
    El objetivo de esta investigación fue estimar la seropositividad de VIH y factores asociados en donantes de un banco de sangre de la ciudad de Medellín - Colombia, 2005 - 2018. Se realizó un estudio transversal en 166 603 donantes del banco de Sangre de la Escuela de Microbiología de la Universidad de Antioquia. Las estimaciones se basaron en proporciones y razones de odds con sus intervalos de confianza del 95 %. La mayoría de donantes fueron del Valle de Aburrá, 50,2 % hombres, 65,4 % altruistas, 59,3 % de primera vez y 81,2 % captados fuera de las instalaciones del Banco. La seropositividad general de VIH fue 0,275 % (IC 95 %=0,25-0,30), en las frecuencias específicas fue del 0,324 % en hombres y 0,224 % en mujeres; 0,299 % en donantes con edad entre 18 - 40 años, 0,212% en los de 41 - 65 años, 0,333 % en los de primera vez; 0,213 % en los no repetitivos y 0,149 % en los donantes repetitivos. Se concluye que la seropositividad de la infección fue similar en comparación con investigaciones previas, con un descenso importante desde el 2013. El riesgo de infección fue estadísticamente mayor en los hombres, los menores de 40 años y donantes de primera vez. Esto es importante para conocer la línea base y evaluar acciones de prevención en la población de estudio, orientar estudios etiológicos y mejorar políticas de hemovigilanciaThe objective of this study was to estimate the seropositivity of HIV and associated factors in donors of a blood bank in the city of Medellín- Colombia, 2005 - 2018. A cross-sectional study in 166 603 donors of the Blood Bank of the School of Microbiology. Estimates were based proportions and odds ratios with 95 % confidence intervals. The majority of donors were from the Aburrá Valley, 50.2 % men, 65.4 % altruistic, 59.3 % first time and 81.2 % received outside the blood bank. The general seropositivity of HIV was 0.275 % (95 % CI = 0.25-0.30), the specific proportions were 0.324 % in men and 0.224 % in women; 0.299 % in donors with 18-40 years old and 0.212 % in the group of 41-6540 years old, and 0.333 % in donors of first-time, 0.213 % in non-repetitive and 0.149 % in repetitive donors. The conclusion was that the seropositivity of the infection was similar in comparison with previous investigations, with a significant decrease since 2013. The risk of infection was statistically higher in men, under 40 years and first-time donors. All this takes is important to know the baseline and evaluate prevention actions in the study population, guide etiological studies, and improve hemovigilance policies.https://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0001501791https://scienti.minciencias.gov.co/gruplac/jsp/visualiza/visualizagr.jsp?nro=00000000011355https://orcid.org/0000-0003-1361-312

    Internal symmetries and linear properties: Full-permutation distinguishers and improved collisions on Gimli

    Get PDF
    Gimli is a family of cryptographic primitives (both a hash function and an AEAD scheme) that has been selected for the second round of the NIST competition for standardizing new lightweight designs. The candidate Gimli is based on the permutation Gimli, which was presented at CHES 2017. In this paper, we study the security of both the permutation and the constructions that are based on it. We exploit the slow diffusion in Gimli and its internal symmetries to build, for the first time, a distinguisher on the full permutation of complexity 2^64. We also provide a practical distinguisher on 23 out of the full 24 rounds of Gimli that has been implemented. Next, we give (full state) collision and semi-free start collision attacks on Gimli-Hash, reaching, respectively, up to 12 and 18 rounds. On the practical side, we compute a collision on 8-round Gimli-Hash. In the quantum setting, these attacks reach 2 more rounds. Finally, we perform the first study of linear trails in Gimli, and we find a linear distinguisher on the full permutation

    Key Committing Security of AEZ and More

    Get PDF
    For an Authenticated Encryption with Associated Data (AEAD) scheme, the key committing security refers to the security notion of whether the adversary can produce a pair of distinct input tuples, including the key, that result in the same output. While the key committing security of various nonce-based AEAD schemes is known, the security analysis of Robust AE (RAE) is largely unexplored. In particular, we are interested in the key committing security of AEAD schemes built on the Encode-then-Encipher (EtE) approach from a wide block cipher. We first consider AEZ v5, the classical and the first dedicated RAE that employs the EtE approach. We focus our analysis on the core part of AEZ to show our best attacks depending on the length of the ciphertext expansion. In the general case where the Tweakable Block Cipher (TBC) is assumed to be ideal, we show a birthday attack and a matching provable security result. AEZ adopts a simpler key schedule and the prove-then-prune approach in the full specification, and we show a practical attack against it by exploiting the simplicity of the key schedule. The complexity is 227, and we experimentally verify the correctness with a concrete example. We also cover two AEAD schemes based on EtE. One is built on Adiantum, and the other one is built on HCTR2, which are two wide block ciphers that are used in real applications. We present key committing attacks against these schemes when used in EtE and matching proofs for particular cases

    Reflections Magazine of the Faculty of Education. Volume 3 No. 4 July 1991

    Get PDF
    La formación en el afecto, en los valores, en la moral... ¿Qué mejor ámbito para su análisis e incorporación a una práctica social y pedagógica coherente con ello que la vida cotidiana?...la vida cotidiana escolar o familiar, personal o colectiva. Los afectos, y éstos como fundamento de una educación orientada hacia la formación de sujetos históricos, hombres y mujeres con responsabilidad, compromiso y conciencia sociales, corresponden a una de las formas de contacto cotidiano más importantes, especialmente por la intensidad de los sentimientos que en ellas se establecen: nos referimos a las relaciones entre sujetos. Constituyen expresiones suyas, las relaciones de amistad, el amor, pero también el adío. Aunque una valoración de tales sentimientos solo se logra mediante el análisis del contenido y la motivación — sobre todo de orden moral— de tales sentimientos, podemos afirmar, en general, siguiendo a Agnes Heller que el desarrollo de la moral, de la política, del arte y de la ciencia, es inconcebible sin grandes amores y grandes odios’’.Training in affection, in values, in morality... What better environment for its analysis and incorporation into a coherent social and pedagogical practice than daily life?... daily school or family, personal life or collective. Affections, and these as the foundation of an education oriented towards the formation of historical subjects, men and women with social responsibility, commitment and conscience, correspond to one of the most important forms of daily contact, especially due to the intensity of the feelings that in they are established: we refer to the relations between subjects. Their expressions are friendships, love, but also goodbye. Although an assessment of such feelings can only be achieved through analysis of content and motivation — especially of moral order— of such feelings, we can affirm, in general, following Agnes Heller that the development of morality, politics, art and science is inconceivable without great loves and great hates.Modalidad Presencia

    Una mirada prospectiva de la industria Risaraldense camino a la industria 4.0 : plan tecnológico 2020–2030 Centro de Diseño e Innovación Tecnológico Industrial

    Get PDF
    Se presenta el plan tecnológico del Centro de Diseño e Innovación Tecnológico Industrial del SENA para la vigencia 2002 - 2030. Comprende el análisis y diagnóstico de la industria risaraldense, sus necesidades y tendencias, con enfoque a la industria 4.0. Se provee información para: identificar tecnologías y ocupaciones emergentes que permitan anticipar la definición de perfiles de instructores, determinar requerimientos de modernización de infraestructura física y tecnológica del Centro de formación, actualizar, crear o eliminar programas de formación, establecer el tipo de formación, servicios tecnológicos e innovación que el centro de formación ofrecerá en un horizonte de 10 años e identificar los proyectos y actores estratégicos para el centro de formación.The technological plan of the SENA Industrial Technological Design and Innovation Center for the period 2002-2030 is presented. It includes the analysis and diagnosis of the Risaralda industry, its needs and trends, with a focus on industry 4.0. Information is provided to: identify emerging technologies and occupations that allow anticipating the definition of instructor profiles, determine modernization requirements of the physical and technological infrastructure of the Training Center, update, create or eliminate training programs, establish the type of training, services technology and innovation that the training center will offer over a 10-year horizon and identify projects and strategic actors for the training center.Fase I: análisis y diagnóstico estratégico -- Análisis externo del centro de formación -- Análisis interno del centro de formación -- Seguimiento al plan tecnológico inmediatamente anterior -- Cruce DOFA -- Vigilancia científico -tecnológica y competitiva especialidad energía eléctrica -- Vigilancia científico -tecnológica y competitiva especialidad electrónica y automatización -- Vigilancia científico -tecnológica y competitiva especialidad Mecánica Industrial -- Vigilancia científico -tecnológica y competitiva especialidad Informática, diseño y desarrollo de software -- Vigilancia científico -tecnológica y competitiva especialidad materiales para la industria -- Vigilancia científico -tecnológica y competitiva especialidad Automotor -- Vigilancia científico -tecnológica y competitiva especialidad Textil, confección y diseño -- Vigilancia científico -tecnológica y competitiva especialidad construcción e infraestructura -- Vigilancia científico -tecnológica y competitiva servicios tecnológicos -- Fase II: formulación estratégica -- Mapa de trayectoria tecnológica -- Validación con expertos -- Construcción de escenarios -- Formulación estratégica -- Métodos prospectivos utilizados -- Formulación estratégica -- Fase III: recomendaciones estratégicas -- Recomendaciones estratégicas especialidad energía eléctrica -- Recomendaciones estratégicas especialidad electrónica y automatización -- Recomendaciones estratégicas especialidad mecánica industrial -- Recomendaciones estratégicas especialidad Informática, diseño y desarrollo de software -- Recomendaciones estratégicas especialidad materiales para la industria -- Recomendaciones estratégicas especialidad Automotor -- Recomendaciones estratégicas especialidad Textil, confección y diseño -- Recomendaciones estratégicas especialidad construcción e infraestructura -- Recomendaciones estratégicas Sennova -- Servicios tecnológicos -- Introducción e información general -- Planteamiento de la necesidad u oportunidad -- Objetivos -- Desarrollo de la vigilancia científico-tecnológica -- Resultados de vigilancia tecnológica con base en análisis de patentes -- Identificación de tecnologías y sublíneas tecnológicas -- Comportamiento de los aceros -- Vigilancia normativa y regulatoria -- Vigilancia tecnológica -- Vigilancia competitiva -- Vigilancia comercial -- Resultados -- Conclusiones y recomendacionesna556 página
    corecore