171 research outputs found

    Efficient Unified Arithmetic for Hardware Cryptography

    Get PDF
    The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1], the US federal Digital Signature Standard [2], elliptic curve cryptography [3, 4], and also recently identity based cryptography [5, 6]. Most popular finite fields that are heavily used in cryptographic applications due to elliptic curve based schemes are prime fields GF(p) and binary extension fields GF(2n). Recently, identity based cryptography based on pairing operations defined over elliptic curve points has stimulated a significant level of interest in the arithmetic of ternary extension fields, GF(3^n)

    Lattice Energies from Hydration Enthalpies: Some acid-base and Structural Considerations

    Full text link
    In the present work, using reference values for the hydration enthalpies for a series of mono, di, tri and tetra cations, as well as reference values for the lattice energies of a series of nono, di, tri and tetrahalides, it is shown that reliable lattice energies for such halides can be calculated by UPOT = (ΔHhyd+ + ΔHhyd-), by UPOT = (ΔHhyd+ + 2ΔHhyd-), by UPOT = (ΔHhyd+ + 3ΔHhyd-) or by UPOT = (ΔHhyd+ + 4ΔHhyd-) for mono, di, tri and tetrahalides, respectively. Linearized improved versions of such simply equations, parametrized in order to take into account factors such as dilution and entropic contributions, were also obtained. Lattice energies for a series of halides and other salts are calculated by using the obtained empirical equations, providing results in very good agreement with literature reference values. Furthermore, a series of empirical equations were derived, relating several acid-base parameters with lattice energy. It is shown that the cation and anion volumes (obtained by X-ray data), are very closely related with the cation and anion absolute hardness, that is, are very closely relates with the frontier (HOMO and LUMO) orbitals energies

    Multi-exponentiations on multi-cores

    Get PDF
    Modular exponentiation lies at the core of many cryptographic schemes and its efficient implementation is a must for a reasonable practical performance. For various applications, multiple exponentiations with different bases and exponents need to be performed and multiplied. Although this multiexponentiation operation can be implemented by individually exponentiating the bases to their corresponding exponents, as discussed in the literature, a significant performance boost can be obtained when the operation is considered as a whole. However, performing separate exponentiations is pleasingly parallelizable but the latter approach requires a careful implementation on a multi-core processor. In this work, we propose a parallel algorithm and implementation based on an existing multi-exponentiation algorithm with precomputation. The experimental results show that the proposed implementation is significantly faster than the existing parallel multi-exponentiation schemes in the literature

    Investigation of survivin gene polymorphism in patients with gastric carcinoma

    Get PDF
    Objectives: Despite decreasing incidence of gastric cancerin worldwide, it is still a major health problem. Everyyear, 30.000 new gastric cancer cases emerging, and itis the second most common cancer in Turkey. Gastriccancer is a complex multifactorial disease, emerging byinteraction between genetic and environmental factors.Survivin, apoptosis inhibitory protein is over-expressed incancer tissue. In this study, association between Survivin-31G/C polymorphism and gastric carcinoma was investigated.Materials and Methods: 46 gastric carcinoma patientswho had been admitted at Düzce University Researchand Practice Hospital, Laboratory of Pathology and 42healthy individuals have been included in the study. Sampleshave been subjected to genetic analysis by PCRRFLPmethod in Medical Genetics Department laboratoryat Düzce University.Results: GG genotype was found in 16 (34.8%), GCgenotype in 21 (45.7%), CC genotype in 9 (19.6%) in patientgroup. In control group, genotype distribution werefound 13 (31%), 26 (61.9%) and 3 (7.1%) respectively.The statistically significant difference was not found whencompared between patient and control groups. However,we observed the increased occurrence of gastric cancerassociated with CC genotype (OR=1.52).Conclusions: In our knowledge, this study is the first toevaluate the relationship between gastric carcinoma andSurvivin -31G/C polymorphism in Turkish population. Ourresults show that there is no any association betweengastric carcinoma and Survivin -31G/C polymorphismin the community which is represented by our study andcontrol groups. However, it was concluded that CC genotypemay create the susceptibility to gastric cancer.Key words: Polymorphism, gastric carcinoma, survivinggene, apoptosi

    Increased Caspase-3 Immunoreactivity of Erythrocytes in STZ Diabetic Rats

    Get PDF
    Eryptosis is a term to define apoptosis of erythrocytes. Oxidative stress and hyperglycemia, both of which exist in the diabetic intravascular environment, can trigger eryptosis of erythrocytes. In this experimental study, it is presented that the majority of erythrocytes shows caspase-3 immunoreactivity in streptozocin- (STZ)-induced diabetic rats. Besides that, caspase-3 positive erythrocytes are aggregated and attached to vascular endothelium. In conclusion, these results may start a debate that eryptosis could have a role in the diabetic complications

    Farklı Oksinlerin Turp Raphanus sativus L. Yumrusunun Anatomik Yapısı ve Gelişimi Üzerine Etkileri

    Get PDF
    Kırmızı fındık turpunun yaprak sapına uygulanan oksin ve sentetik oksinlerin bitkinin morfolojisi ve yumru anatomisi üzerine etkileri incelenmiştir. Yumru çapı, yumru uzunluğu, ve ağırlığı, kazık kök uzunluğu ve ağırlığı, yaprak uzunluğu ve ağırlığı IAA,IBA, NAA ve 2,4 – D uygulamaları ile artmıştır. En fazla artış IAA uygulamasında görülmüştür. Oksin ve sentetik oksinler; kambiyum hücre sayılarını artırmıştır ve en fazla artış NAA uygulamasında olmuştur. Merkezi silindir bölge kalınlığını artırmıştır ve en fazla artma IAA uygulamasında görülmüştür. Odunlaşmış ksilem hücre sayılarını artırmıştır . En fazla artma IBA ve 2,4 - D uygulamalarında görülmüştür. Odunlaşmış ksilem hücre çapları IBA ve NAA hormon uygulamalarında kontrollere göre artmıştır. Odunlaşmış ksilem hücre çapları IAA ve 2,4 – D hormon uygulamalarında kontrollere göre azalmıştır. Odunlaşmamış ksilem parankima hücre çaplarını artırmıştır. En fazla artış IAA uygulamasında görülmüştür. Korteks bölge kalınlığını artırmıştır ve en fazla artma NAA uygulamasında görülmüştü

    Public key cryptography based privacy preserving multi-context RFID infrastructure

    Get PDF
    In this paper, We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy as one of the most important design issues and show that an infrastructure for multi-purpose RFID tags to be used in different contexts can be implemented in a privacy preserving manner. We address security attacks such as cryptanalytic, impersonation, tracking, replay, and relay and show that the protocols used in the proposed infrastructure are secure against them. We also introduce a new angle to privacy in RFID systems by presenting spatio-temporal attacks as an important threat against privacy. We propose a methodology to thwart or alleviate these kinds of attacks. We develop our multi-context RFID infrastructure relying on usage of public key cryptography (PKC), which presents more scalable solutions in the sense that the backend servers can identify the tags approximately 57 times (est.) faster than the best symmetric cipher based systems when there are a million tags in the system. We demonstrate that our infrastructure is feasible even with passive class 2 RFID tags and that the requirements for PKC are comparable to those other cryptographic implementations based on symmetric ciphers proposed for RFID use
    corecore