111 research outputs found

    On lattice profile of the elliptic curve linear congruential generators

    Get PDF
    Lattice tests are quality measures for assessing the intrinsic structure of pseudorandom number generators. Recently a new lattice test has been introduced by Niederreiter and Winterhof. In this paper, we present a general inequality that is satisfied by any periodic sequence. Then, we analyze the behavior of the linear congruential generators on elliptic curves (EC-LCG) under this new lattice test and prove that the EC-LCG passes it up to very high dimensions. We also use a result of Brandstätter and Winterhof on the linear complexity profile related to the correlation measure of order k to present lower bounds on the linear complexity profile of some binary sequences derived from the EC-LCG

    B-RAF Mutant Alleles Associated with Langerhans Cell Histiocytosis, a Granulomatous Pediatric Disease

    Get PDF
    Langerhans cell histiocytosis (LCH) features inflammatory granuloma characterised by the presence of CD1a+ dendritic cells or 'LCH cells'. Badalian-Very et al. recently reported the presence of a canonical (V600E)B-RAF mutation in 57% of paraffin-embedded biopsies from LCH granuloma. Here we confirm their findings and report the identification of two novel B-RAF mutations detected in LCH patients.Mutations of B-RAF were observed in granuloma samples from 11 out of 16 patients using 'next generation' pyrosequencing. In 9 cases the mutation identified was (V600E)B-RAF. In 2 cases novel polymorphisms were identified. A somatic (600DLAT)B-RAF insertion mimicked the structural and functional consequences of the (V600E)B-RAF mutant. It destabilized the inactive conformation of the B-RAF kinase and resulted in increased ERK activation in 293 T cells. The (600DLAT)B-RAF and (V600E)B-RAF mutations were found enriched in DNA and mRNA from the CD1a+ fraction of granuloma. They were absent from the blood and monocytes of 58 LCH patients, with a lower threshold of sequencing sensitivity of 1%-2% relative mutation abundance. A novel germ line (T599A)B-RAF mutant allele was detected in one patient, at a relative mutation abundance close to 50% in the LCH granuloma, blood monocytes and lymphocytes. However, (T599A)B-RAF did not destabilize the inactive conformation of the B-RAF kinase, and did not induce increased ERK phosphorylation or C-RAF transactivation.Our data confirmed presence of the (V600E)B-RAF mutation in LCH granuloma of some patients, and identify two novel B-RAF mutations. They indicate that (V600E)B-RAF and (600DLAT)B-RAF mutations are somatic mutants enriched in LCH CD1a(+) cells and absent from the patient blood. Further studies are needed to assess the functional consequences of the germ-line (T599A)B-RAF allele

    EAPP: Gatekeeper at the crossroad of apoptosis and p21-mediated cell-cycle arrest

    Get PDF
    We previously identified and characterized E2F-associated phospho-protein (EAPP), a nuclear phosphoprotein that interacts with the activating members of the E2F transcription factor family. EAPP levels are frequently elevated in transformed human cells. To examine the biological relevance of EAPP, we studied its properties in stressed and unstressed cells. Overexpression of EAPP in U2OS cells increased the fraction of G1 cells and lead to heightened resistance against DNA damage- or E2F1-induced apoptosis in a p21-dependent manner. EAPP itself becomes upregulated in confluent cells and after DNA damage and stimulates the expression of p21 independently of p53. It binds to the p21 promoter and seems to be required for the assembly of the transcription initiation complex. RNAi-mediated knockdown of EAPP expression brought about increased sensitivity towards DNA damage and resulted in apoptosis even in the absence of stress. Our results indicate that the level of EAPP is critical for cellular homeostasis. Too much of it results in G1 arrest and resistance to apoptosis, which, paradoxically, might favor cellular transformation. Too little EAPP seems to retard the expression not only of the p21 gene, but also of a number of other genes and ultimately results in apoptosis

    Unifying Leakage Models: From Probing Attacks to Noisy Leakage

    Get PDF
    A recent trend in cryptography is to formally show the leakage resilience of cryptographic implementations in a given leakage model. One of the most prominent leakage models -- the so-called bounded leakage model -- assumes that the amount of leakage is a-priori bounded. Unfortunately, it has been pointed out that the assumption of bounded leakages is hard to verify in practice. A more realistic assumption is to assume that leakages are sufficiently noisy, following the engineering observation that real-world physical leakages are inherently noisy. While the noisy leakage assumption has first been studied in the seminal work of Chari et al. (CRYPTO 99), the recent work of Prouff and Rivain (Eurocrypt 2013) provides the first analysis of a full masking scheme under a physically motivated noise model. In particular, the authors show that a block-cipher implementation that uses an additive masking scheme is secure against noisy leakages. Unfortunately, the security analysis of Prouff and Rivain has three important shortcomings: (1) it requires leak-free gates, (2) it considers a restricted adversarial model (random message attacks), and (3) the security proof has limited application for cryptographic settings. In this work, we provide an alternative security proof in the same noisy model that overcomes these three challenges. We achieve this goal by a new reduction from noisy leakage to the important theoretical model of probing adversaries (Ishai et al~ -- CRYPTO 2003). Our work can be viewed as a next step of closing the gap between theory and practice in leakage resilient cryptography: while our security proofs heavily rely on concepts of theoretical cryptography, we solve problems in practically motivated leakage models

    FourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks

    Get PDF
    This work deals with the energy-efficient, high-speed and high-security implementation of elliptic curve scalar multiplication, elliptic curve Diffie-Hellman (ECDH) key exchange and elliptic curve digital signatures on embedded devices using FourQ and incorporating strong countermeasures to thwart a wide variety of side-channel attacks. First, we set new speed records for constant-time curve-based scalar multiplication, DH key exchange and digital signatures at the 128-bit security level with implementations targeting 8, 16 and 32-bit microcontrollers. For example, our software computes a static ECDH shared secret in 6.9 million cycles (or 0.86 seconds @8MHz) on a low-power 8-bit AVR microcontroller which, compared to the fastest Curve25519 and genus-2 Kummer implementations on the same platform, offers 2x and 1.4x speedups, respectively. Similarly, it computes the same operation in 496 thousand cycles on a 32-bit ARM Cortex-M4 microcontroller, achieving a factor-2.9 speedup when compared to the fastest Curve25519 implementation targeting the same platform. A similar speed performance is observed in the case of digital signatures. Second, we engineer a set of side-channel countermeasures taking advantage of FourQ\u27s rich arithmetic and propose a secure implementation that offers protection against a wide range of sophisticated side-channel attacks, including differential power analysis (DPA). Despite the use of strong countermeasures, the experimental results show that our FourQ software is still efficient enough to outperform implementations of Curve25519 that only protect against timing attacks. Finally, we perform a differential power analysis evaluation of our software running on an ARM Cortex-M4, and report that no leakage was detected with up to 10 million traces. These results demonstrate the potential of deploying FourQ on low-power applications such as protocols for the Internet of Things

    Quelques exemples d'exploitation du fichier de géochimie organique Some Examples of Using the Organic Geochistry File

    No full text
    La division Géologie de l'Institut Français du Pétrole procède systématiquement à la mise en fichier sur ordinateur des données d'analyses d'hydrocarbures effectuées dans ses laboratoires, ainsi que de celles qui sont publiées par divers organismes mondiaux. On présente ici quelques exemples d'utilisation de ce fichier sur le plan statistique. Après avoir exposé la nature de l'information stockée, on sélectionne cinq paramètres jugés intéressants pour leur signification et leur présence fréquente : profondeur, densité de l'huile brute, viscosité, teneur en soufre, point de congélation. Une première étude portant sur les distributions de ces cinq variables avec leur évolution suivant l'âge géologique, la nature lithologique du réservoir ou l'appartenance à quelques bassins pétroliers permet de dégager certains phénomènes (diminution de la densité avec la profondeur ainsi qu'avec l'âge, bimodalité du soufre, valeurs plus élevées de la teneur en soufre dans les huiles issues de réservoirs carbonatés). Une deuxième étude a consisté à calculer le coefficient de corrélation linéaire entre ces paramètres pris deux à deux. Elle a permis de mettre en évidence la liaison entre la densité, la viscosité et la teneur en soufre, et la quasi-indépendance du point de congélation. <br> The Institut Français du Petrole Geology Division systematically compiles computer files of the data from hydrocarbon analyses carried out in its laboratories as well as of those published by various organizations throughout the world. A few examples of how this file is used are described here from the statistical standpoint. After explaining the nature of the data in storage, five parameters judged ta be of interest for their significance and frequent presence are chosen. They are : depth, specific gravity of crude ail, viscosity, sulfur content, and pour point. An initial examination of the distributions of these five variables, along with their variation according to geological age and the lithological nature of the reservoir or what petroleum basins they belong to, is used to detect various phenomena (decrease in specific gravity with depth as well as with age, dual modality of the sulfur, higher sulfur content in oils coming from carbonate reservoirs). A second examination consisted in calculating the linear correlation coefficient between these parameters taken two by two. It revealed the link between specific gravity, viscosity and sulfur content as well as the quasi-independance of the pour point

    Cryptology and Smart Cards: the Way to Go

    No full text
    International audienc
    corecore