99 research outputs found

    White matter T2 hyperintensities and blood‐brain barrier disruption in the hyperacute stage of subarachnoid hemorrhage in male mice: The role of lipocalin‐2

    Full text link
    AimsThe current study examined whether white matter injury occurs in the hyperacute (4 hours) phase after subarachnoid hemorrhage (SAH) and the potential role of blood‐brain barrier (BBB) disruption and an acute phase protein, lipocalin 2 (LCN2), in that injury.MethodsSubarachnoid hemorrhage was induced by endovascular perforation in adult mice. First, wild‐type (WT) mice underwent MRI 4 hours after SAH to detect white matter T2 hyperintensities. Second, changes in LCN2 expression and BBB disruption associated with the MRI findings were examined. Third, SAH‐induced white matter injury at 4 hours was compared in WT and LCN2 knockout (LCN2 KO) mice.ResultsAt 4 hours, most animals had uni‐ or bilateral white matter T2 hyperintensities after SAH in WT mice that were associated with BBB disruption and LCN2 upregulation. However, some disruption and LCN2 upregulation was also found in mice with no T2‐hyperintensity lesion. In contrast, there were no white matter T2 hyperintensities in LCN2 KO mice after SAH. LCN2 deficiency also attenuated BBB disruption, myelin damage, and oligodendrocyte loss.ConclusionsSubarachnoid hemorrhage causes very early BBB disruption and LCN2 expression in white matter that is associated with and may precede T2 hyperintensities. LCN2 deletion attenuates MRI changes and pathological changes in white matter after SAH.Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/151855/1/cns13221.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/151855/2/cns13221_am.pd

    Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing

    Get PDF
    The Meet-in-the-Middle (MitM) attack has been widely applied to preimage attacks on Merkle-Damg{\aa}rd (MD) hashing. In this paper, we introduce a generic framework of the MitM attack on sponge-based hashing. We find certain bit conditions can significantly reduce the diffusion of the unknown bits and lead to longer MitM characteristics. To find good or optimal configurations of MitM attacks, e.g., the bit conditions, the neutral sets, and the matching points, we introduce the bit-level MILP-based automatic tools on Keccak, Ascon and Xoodyak. To reduce the scale of bit-level models and make them solvable in reasonable time, a series of properties of the targeted hashing are considered in the modelling, such as the linear structure and CP-kernel for Keccak, the Boolean expression of Sbox for Ascon. Finally, we give an improved 4-round preimage attack on Keccak-512/SHA3, and break a nearly 10 years’ cryptanalysis record. We also give the first preimage attacks on 3-/4-round Ascon-XOF and 3-round Xoodyak-XOF

    Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256

    Get PDF
    Designing symmetric ciphers for particular applications becomes a hot topic. At EUROCRYPT 2020, Naito, Sasaki and Sugawara invented the threshold implementation friendly cipher SKINNYe-64-256 to meet the requirement of the authenticated encryption PFB_Plus. Soon, Thomas Peyrin pointed out that SKINNYe-64-256 may lose the security expectation due the new tweakey schedule. Although the security issue of SKINNYe-64-256 is still unclear, Naito et al. decided to introduce SKINNYe-64-256 v2 as a response. In this paper, we give a formal cryptanalysis on the new tweakey schedule of SKINNYe-64-256 and discover unexpected differential cancellations in the tweakey schedule. For example, we find the number of cancellations can be up to 8 within 30 consecutive rounds, which is significantly larger than the expected 3 cancellations. Moreover, we take our new discoveries into rectangle, MITM and impossible differential attacks, and adapt the corresponding automatic tools with new constraints from our discoveries. Finally, we find a 41-round related-tweakey rectangle attack on SKINNYe-64-256 and leave a security margin of 3 rounds only. As STK accepts arbitrary tweakey size, but SKINNY and SKINNYe-64-256 v2 only support up to 4n tweakey size. We introduce a new design of tweakey schedule for SKINNY-64 to further extend the supported tweakey size. We give a formal proof that our new tweakey schedule inherits the security requirement of STK and SKINNY. We also discuss possible ways to extend the tweakey size for SKINNY-128

    Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks

    Get PDF
    At EUROCRYPT 2021, Bao et al. proposed an automatic method for systematically exploring the configuration space of meet-in-the-middle (MITM) preimage attacks. We further extend it into a constraint-based framework for finding exploitable MITM characteristics in the context of key-recovery and collision attacks by taking the subtle peculiarities of both scenarios into account. Moreover, to perform attacks based on MITM characteristics with nonlinear constrained neutral words, which have not been seen before, we present a procedure for deriving the solution spaces of neutral words without solving the corresponding nonlinear equations or increasing the overall time complexities of the attack. We apply our method to concrete symmetric-key primitives, including SKINNY, ForkSkinny, Romulus, Saturnin, Grostl, Whirlpool, and hashing modes with AES-256. As a result, we identify the first 23-round key-recovery attack on SKINNY-nn-3n3n and the first 24-round key-recovery attack on ForkSkinny-nn-3n3n in the single-key model. Moreover, improved (pseudo) preimage or collision attacks on round-reduced Whirlpool, Grostl, and hashing modes with AES-256 are obtained. In particular, employing the new representation of the AES key schedule due to Leurent and Pernot (EUROCRYPT 2021), we identify the first preimage attack on 10-round AES-256 hashing

    Artificial intelligence : A powerful paradigm for scientific research

    Get PDF
    Y Artificial intelligence (AI) coupled with promising machine learning (ML) techniques well known from computer science is broadly affecting many aspects of various fields including science and technology, industry, and even our day-to-day life. The ML techniques have been developed to analyze high-throughput data with a view to obtaining useful insights, categorizing, predicting, and making evidence-based decisions in novel ways, which will promote the growth of novel applications and fuel the sustainable booming of AI. This paper undertakes a comprehensive survey on the development and application of AI in different aspects of fundamental sciences, including information science, mathematics, medical science, materials science, geoscience, life science, physics, and chemistry. The challenges that each discipline of science meets, and the potentials of AI techniques to handle these challenges, are discussed in detail. Moreover, we shed light on new research trends entailing the integration of AI into each scientific discipline. The aim of this paper is to provide a broad research guideline on fundamental sciences with potential infusion of AI, to help motivate researchers to deeply understand the state-of-the-art applications of AI-based fundamental sciences, and thereby to help promote the continuous development of these fundamental sciences.Peer reviewe

    Transcriptome and Network Changes in Climbers at Extreme Altitudes

    Get PDF
    Extreme altitude can induce a range of cellular and systemic responses. Although it is known that hypoxia underlies the major changes and that the physiological responses include hemodynamic changes and erythropoiesis, the molecular mechanisms and signaling pathways mediating such changes are largely unknown. To obtain a more complete picture of the transcriptional regulatory landscape and networks involved in extreme altitude response, we followed four climbers on an expedition up Mount Xixiabangma (8,012 m), and collected blood samples at four stages during the climb for mRNA and miRNA expression assays. By analyzing dynamic changes of gene networks in response to extreme altitudes, we uncovered a highly modular network with 7 modules of various functions that changed in response to extreme altitudes. The erythrocyte differentiation module is the most prominently up-regulated, reflecting increased erythrocyte differentiation from hematopoietic stem cells, probably at the expense of differentiation into other cell lineages. These changes are accompanied by coordinated down-regulation of general translation. Network topology and flow analyses also uncovered regulators known to modulate hypoxia responses and erythrocyte development, as well as unknown regulators, such as the OCT4 gene, an important regulator in stem cells and assumed to only function in stem cells. We predicted computationally and validated experimentally that increased OCT4 expression at extreme altitude can directly elevate the expression of hemoglobin genes. Our approach established a new framework for analyzing the transcriptional regulatory network from a very limited number of samples

    Real-time Monitoring for the Next Core-Collapse Supernova in JUNO

    Full text link
    Core-collapse supernova (CCSN) is one of the most energetic astrophysical events in the Universe. The early and prompt detection of neutrinos before (pre-SN) and during the SN burst is a unique opportunity to realize the multi-messenger observation of the CCSN events. In this work, we describe the monitoring concept and present the sensitivity of the system to the pre-SN and SN neutrinos at the Jiangmen Underground Neutrino Observatory (JUNO), which is a 20 kton liquid scintillator detector under construction in South China. The real-time monitoring system is designed with both the prompt monitors on the electronic board and online monitors at the data acquisition stage, in order to ensure both the alert speed and alert coverage of progenitor stars. By assuming a false alert rate of 1 per year, this monitoring system can be sensitive to the pre-SN neutrinos up to the distance of about 1.6 (0.9) kpc and SN neutrinos up to about 370 (360) kpc for a progenitor mass of 30M⊙M_{\odot} for the case of normal (inverted) mass ordering. The pointing ability of the CCSN is evaluated by using the accumulated event anisotropy of the inverse beta decay interactions from pre-SN or SN neutrinos, which, along with the early alert, can play important roles for the followup multi-messenger observations of the next Galactic or nearby extragalactic CCSN.Comment: 24 pages, 9 figure

    Association between magnesium intake and cognition in US older adults: National Health and Nutrition Examination Survey (NHANES) 2011 to 2014

    No full text
    Abstract Introduction Identifying nutrition‐ and modifiable lifestyle‐based risk factors for cognitive decline and dementia may contribute future primary prevention strategies. This study aimed to evaluate the associations between magnesium intake and cognition in older adults in the United States. Methods Based on the National Health and Nutrition Survey (NHANES) between 2011 and 2014, the study included 2508 participants aged 60 years and older. Linear regression models were used to examine the association of total magnesium intake with cognition. Results After adjusted demographic and other confounding factors, intakes of energy and total calcium, and serum vitamin D level, higher intake of total magnesium was independently associated with 0.15 higher global cognitive z‐score (95% confidence interval, 0.02 to 0.28 for highest vs. lowest quartile, P trend = .037). The positive association of total magnesium intake with global cognition was primarily presented among women, non‐Hispanic Whites, and those with sufficient serum vitamin D levels (≄50 nmol/L), although interactions were not significant. There were no clear linear associations for global cognition with serum vitamin D level. Discussions Our findings suggest that high magnesium intake alone may improve cognition in older adults, particularly among non‐Hispanic Whites and subjects with sufficient levels of serum vitamin D. Further studies are needed to confirm the findings
    • 

    corecore