73 research outputs found

    Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava code

    Get PDF
    Code-based public key cryptosystems have been found to be an interesting option in the area of Post-Quantum Cryptography. In this work, we present a key encapsulation mechanism (KEM) using a parity check matrix of the Generalized Srivastava code as the public key matrix. Generalized Srivastava codes are privileged with the decoding technique of Alternant codes as they belong to the family of Alternant codes. We exploit the dyadic structure of the parity check matrix to reduce the storage of the public key. Our encapsulation leads to a shorter ciphertext as compared to DAGS proposed by Banegas et al. in Journal of Mathematical Cryptology which also uses Generalized Srivastava code. Our KEM provides IND-CCA security in the random oracle model. Also, our scheme can be shown to achieve post-quantum security in the quantum random oracle model

    Correcting non cephalic presentation with moxibustion: study protocol for a multi-centre randomised controlled trial in general practice

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Non cephalic presentation in childbirth involves various risks to both the mother and the foetus. The incidence in Spain is 3.8% of all full-term pregnancies. The most common technique used to end the gestation in cases of non cephalic presentation is that of caesarian section, and although it provokes a lower rate of morbi-mortality than does vaginal delivery in such situations, there remains the possibility of traumatic injury to the foetal head and neck, while maternal morbidity is also increased. The application of heat (moxibustion) to an acupuncture point, in order to correct non cephalic presentation, has been practised in China since ancient times, but as yet there is insufficient evidence of its real effectiveness.</p> <p>Methods/Design</p> <p>The experimental design consists of a multi-centre randomised controlled trial with three parallel arms, used to compare real moxibustion, sham moxibustion and the natural course of events, among pregnant women with a non cephalic presentation and a gestational duration of 33–35 weeks (estimated by echography). The participants in the trial will be blinded to both interventions. The results obtained will be analyzed by professionals, blinded with respect to the allocation to the different types of intervention. In addition, we intend to carry out a economic analysis.</p> <p>Discussion</p> <p>This trial will contribute to the development of evidence concerning moxibustion in the correction of non cephalic presentations. The primary outcome variable is the proportion of cephalic presentations at term. As secondary outcomes, we will evaluate the proportion of cephalic presentations at week 38 of gestation, determined by echography, together with the safety of the technique, the specificity of moxibustion and the control of the blinding process.</p> <p>This study has been funded by the Health Ministry of the Andalusian Regional Government.</p> <p>Trial registration</p> <p>Current Controlled Trials ISRCTN10634508.</p

    High-resolution genomic and expression analyses of copy number alterations in HER2-amplified breast cancer

    Get PDF
    To access publisher full text version of this article. Please click on the hyperlink in Additional Links fieldINTRODUCTION: HER2 gene amplification and protein overexpression (HER2+) define a clinically challenging subgroup of breast cancer with variable prognosis and response to therapy. Although gene expression profiling has identified an ERBB2 molecular subtype of breast cancer, it is clear that HER2+ tumors reside in all molecular subtypes and represent a genomically and biologically heterogeneous group, needed to be further characterized in large sample sets. METHODS: Genome-wide DNA copy number profiling, using bacterial artificial chromosome (BAC) array comparative genomic hybridization (aCGH), and global gene expression profiling were performed on 200 and 87 HER2+ tumors, respectively. Genomic Identification of Significant Targets in Cancer (GISTIC) was used to identify significant copy number alterations (CNAs) in HER2+ tumors, which were related to a set of 554 non-HER2 amplified (HER2-) breast tumors. High-resolution oligonucleotide aCGH was used to delineate the 17q12-q21 region in high detail. RESULTS: The HER2-amplicon was narrowed to an 85.92 kbp region including the TCAP, PNMT, PERLD1, HER2, C17orf37 and GRB7 genes, and higher HER2 copy numbers indicated worse prognosis. In 31% of HER2+ tumors the amplicon extended to TOP2A, defining a subgroup of HER2+ breast cancer associated with estrogen receptor-positive status and with a trend of better survival than HER2+ breast cancers with deleted (18%) or neutral TOP2A (51%). HER2+ tumors were clearly distinguished from HER2- tumors by the presence of recurrent high-level amplifications and firestorm patterns on chromosome 17q. While there was no significant difference between HER2+ and HER2- tumors regarding the incidence of other recurrent high-level amplifications, differences in the co-amplification pattern were observed, as shown by the almost mutually exclusive occurrence of 8p12, 11q13 and 20q13 amplification in HER2+ tumors. GISTIC analysis identified 117 significant CNAs across all autosomes. Supervised analyses revealed: (1) significant CNAs separating HER2+ tumors stratified by clinical variables, and (2) CNAs separating HER2+ from HER2- tumors. CONCLUSIONS: We have performed a comprehensive survey of CNAs in HER2+ breast tumors, pinpointing significant genomic alterations including both known and potentially novel therapeutic targets. Our analysis sheds further light on the genomically complex and heterogeneous nature of HER2+ tumors in relation to other subgroups of breast cancer

    Search for continuous gravitational waves from 20 accreting millisecond x-ray pulsars in O3 LIGO data

    Get PDF

    The impact of surgical delay on resectability of colorectal cancer: An international prospective cohort study

    Get PDF
    AIM: The SARS-CoV-2 pandemic has provided a unique opportunity to explore the impact of surgical delays on cancer resectability. This study aimed to compare resectability for colorectal cancer patients undergoing delayed versus non-delayed surgery. METHODS: This was an international prospective cohort study of consecutive colorectal cancer patients with a decision for curative surgery (January-April 2020). Surgical delay was defined as an operation taking place more than 4 weeks after treatment decision, in a patient who did not receive neoadjuvant therapy. A subgroup analysis explored the effects of delay in elective patients only. The impact of longer delays was explored in a sensitivity analysis. The primary outcome was complete resection, defined as curative resection with an R0 margin. RESULTS: Overall, 5453 patients from 304 hospitals in 47 countries were included, of whom 6.6% (358/5453) did not receive their planned operation. Of the 4304 operated patients without neoadjuvant therapy, 40.5% (1744/4304) were delayed beyond 4 weeks. Delayed patients were more likely to be older, men, more comorbid, have higher body mass index and have rectal cancer and early stage disease. Delayed patients had higher unadjusted rates of complete resection (93.7% vs. 91.9%, P = 0.032) and lower rates of emergency surgery (4.5% vs. 22.5%, P < 0.001). After adjustment, delay was not associated with a lower rate of complete resection (OR 1.18, 95% CI 0.90-1.55, P = 0.224), which was consistent in elective patients only (OR 0.94, 95% CI 0.69-1.27, P = 0.672). Longer delays were not associated with poorer outcomes. CONCLUSION: One in 15 colorectal cancer patients did not receive their planned operation during the first wave of COVID-19. Surgical delay did not appear to compromise resectability, raising the hypothesis that any reduction in long-term survival attributable to delays is likely to be due to micro-metastatic disease

    Search for gravitational waves associated with gamma-ray bursts detected by Fermi and Swift during the LIGO–Virgo run O3b

    Get PDF
    We search for gravitational-wave signals associated with gamma-ray bursts (GRBs) detected by the Fermi and Swift satellites during the second half of the third observing run of Advanced LIGO and Advanced Virgo (2019 November 1 15:00 UTC–2020 March 27 17:00 UTC). We conduct two independent searches: a generic gravitational-wave transients search to analyze 86 GRBs and an analysis to target binary mergers with at least one neutron star as short GRB progenitors for 17 events. We find no significant evidence for gravitational-wave signals associated with any of these GRBs. A weighted binomial test of the combined results finds no evidence for subthreshold gravitational-wave signals associated with this GRB ensemble either. We use several source types and signal morphologies during the searches, resulting in lower bounds on the estimated distance to each GRB. Finally, we constrain the population of low-luminosity short GRBs using results from the first to the third observing runs of Advanced LIGO and Advanced Virgo. The resulting population is in accordance with the local binary neutron star merger rate

    Analysis of myelodysplastic syndromes with complex karyotypes by high-resolution comparative genomic hybridization and subtelomeric CGH array

    No full text
    Molecular cytogenetic techniques enabled us to clarify numerical and structural alterations previously detected by conventional cytogenetic techniques in 37 patients who had myelodysplastic syndromes with complex karyotypes. Using high-resolution comparative genomic hybridization (HR-CGH), we found the most recurrent alterations to be deletion of 5q (70%), 18q (35%), 7q (32%), 11q (30%), and 20q (24%), gain of 11q (35%) and 8q (24%), and trisomy of chromosome 8 (19%). Furthermore, in 35% of the patients, 20 amplifications were identified. These amplifications were shown by FISH to involve some genes previously described as amplified in hematological malignancies, such as ERBB2, MLL and RUNX1. In addition, two other genes, BCL6 and BCL2, which are classically related to apoptosis and non-Hodgkin lymphoma, were shown for the first time to be involved in amplification. Genomic alterations involving different subtelomeric regions with losses in 4p16, 5p15.3, 6q27, 18p11.3, and 18q23 and gains in 1p36.3 and 19p13.3 were detected by HR-CGH. Array CGH analysis of the subtelomeric regions in some samples was able to confirm a number of these alterations and found some additional alterations not detected by conventional CGH. (C) 2004 Wiley-Liss, Inc

    An analysis of FV parameters impact towards its hardware acceleration

    Get PDF
    Conference of 21st International Workshops on Financial Cryptography and Data Security, FC 2017 held in conjuction with 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, 2nd Workshop on Advances in Secure Electronic Voting Schemes, VOTING 2017, 1st Workshop on Trusted Smart Contracts, WTSC 2017 and 1st Workshop on Targeted Attacks, TA 2017 ; Conference Date: 7 April 2017 Through 7 April 2017; Conference Code:205569International audienceThe development of cloud computing services is restrained by privacy concerns. Centralized medical services for instance, require a guarantee of confidentiality when using outsourced computation platforms. Fully Homomorphic Encryption is an intuitive solution to address such issue, but until 2009, existing schemes were only able to evaluate a reduced number of operations (Partially Homomorphic Encryption). In 2009, C. Gentry proposed a blueprint to construct FHE schemes from SHE schemes. However, it was not practical due to the huge data size overhead and the exponential noise growth of the initial SHE. Since then, major improvements have been made over SHE schemes and their noise management, and resulting schemes, like BGV and FV, allow to foresee small applications. Besides scheme improvements, new practical approaches were proposed to bring homomorphic encryption closer to practice. The IV-based stream cipher trans-ciphering approach brought by Canteaut et al. in 2015 reduces the on-line latency of the trans-ciphering process to a simple homomorphic addition. The homomorphic evaluation of stream ciphers, that produces the trans-ciphering keystream, could be computed in an off-line phase, resulting in an almost transparent trans-ciphering process from the user point of view. This approach combined with hardware accelerations could bring homomorphic encryption closer to practice. This paper deals the choice of FV parameters for efficient implementation of this scheme in the light of related works’ common approaches. At first sight, using large polynomial degree to reduce the coefficients size seemed to be advantageous, but further observations contradict it. Large polynomial degrees imply larger ciphertexts and more complex implementations, but smaller ones imply more primes to find for CRT polynomial representation. The result of this preliminary work for the choice of an adequate hardware target motivates the choice of small degree polynomials rather than small coefficients for the FV scheme
    corecore