9 research outputs found

    Nanoscopy in nonlinear scanning fluorescence imaging systems

    Get PDF
    In the last 30 years, superresolution in optical microscopy has been a major field of research. During this time, different techniques have been created to break the diffraction limit in order to make observations at a nanometric scale. Given that optical microscopy is non-invasive, those superresolution methods pave the way for a better understanding of biological mechanism at a molecular level. Most of those methods are based on a nonlinear interaction between the excitation light intensity and the sample response (often fluorescent signal). In the same time, nanodiamonds containing fluorescent defects have been proven to be a choice probe for superresolution nanos-copy since they exhibit a strong and stable fluorescent signal even under high light intensities exposure (often required to obtain nonlinear photoresponse). Nanodiamonds containing Nitrogen Vacancy (NV) defects that exhibit a red fluorescent signal had been previously shown to be a viable biomarker for STED superresolved image. First, we demonstrated that green fluorescent nanodia-monds containing Nitrogen-Vacancy-Nitrogen (NVN) defects can be used with a Stimulated Emission Depletion (STED) superreso-lution microscope. Then, we implemented a STED microscope in our lab and compared the properties of NVN and NV centers for STED imaging. We conclude that even if nanodiamonds with NVN defects are less intense, they can be used as a second color nonbleaching biomarker. To illustrate the potential use of green nanodiamonds as bio-compatible probe, we superresolved them internalized into a cell with STED microscopy. Second, we tried to work on one of the main limitation in STED nanoscopy: the lack of information in the axial direction within a single scan. We combined our home made STED microscope with a Double Helix phase mask that modifies the detection point spread function in order to obtain axial localization of the superresolved emitters. We achieved three dimensional localization of nanometric fluorescent emitters but we note that photobleaching was the main limitation of this approach with organic dyes. We discussed different solutions to limit the photobleaching and their feasibility. We also worked on a different superresolution technique that we named Computational Nonlinear Saturated (CNS) microscopy. We showed that with digital post treatment of the acquired data, a nonlinear photoresponse can be harnessed to any scanning microscope equipped with a camera detector to enhance the resolution. We demonstrated that increasing the excitation power and inducing fluorescence saturation, it is possible to break the diffraction limit in a conventional confocal microscope (after data post-treatment). However, with this method, we did not obtain a gain in resolution as high as with other superresolution tech-niques involving fluorescence saturation, such as saturated structured illumination microscopy. To understand the origin of this limitation, we carried out simulation to investigate the performance of CNS microscopy in noisy environments compared with wide field techniques. We propose alternative implementation and quantify the possible resolution gain with simulations. Finally, we demonstrated how a technique, initially created for optical microscopy, can be adapted to lensless endoscopic imaging..

    Formally verifying Kyber Episode IV: Implementation Correctness

    Get PDF
    In this paper we present the first formally verified implementations of Kyber and, to the best of our knowledge, the first such implementations of any post-quantum cryptosystem. We give a (readable) formal specification of Kyber in the EasyCrypt proof assistant, which is syntactically very close to the pseudocode description of the scheme as given in the most recent version of the NIST submission. We present high-assurance open-source implementations of Kyber written in the Jasmin language, along with machine-checked proofs that they are functionally correct with respect to the EasyCrypt specification. We describe a number of improvements to the EasyCrypt and Jasmin frameworks that were needed for this implementation and verification effort, and we present detailed benchmarks of our implementations, showing that our code achieves performance close to existing hand-optimized implementations in C and assembly

    Formally verifying Kyber: Episode IV: Implementation correctness

    Get PDF
    International audienceIn this paper we present the first formally verified implementations of Kyber and, to the best of our knowledge, the first such implementations of any post-quantum cryptosystem. We give a (readable) formal specification of Kyber in the EasyCrypt proof assistant, which is syntactically very close to the pseudocode description of the scheme as given in the most recent version of the NIST submission. We present high-assurance open-source implementations of Kyber written in the Jasmin language, along with machine-checked proofs that they are functionally correct with respect to the EasyCrypt specification. We describe a number of improvements to the EasyCrypt and Jasmin frameworks that were needed for this implementation and verification effort, and we present detailed benchmarks of our implementations, showing that our code achieves performance close to existing hand-optimized implementations in C and assembly

    Formally verifying Kyber: Episode IV: Implementation correctness

    No full text
    In this paper we present the first formally verified implementations of Kyber and, to the best of our knowledge, the first such implementations of any post-quantum cryptosystem. We give a (readable) formal specification of Kyber in the EasyCrypt proof assistant, which is syntactically very close to the pseudocode description of the scheme as given in the most recent version of the NIST submission. We present high-assurance open-source implementations of Kyber written in the Jasmin language, along with machine-checked proofs that they are functionally correct with respect to the EasyCrypt specification. We describe a number of improvements to the EasyCrypt and Jasmin frameworks that were needed for this implementation and verification effort, and we present detailed benchmarks of our implementations, showing that our code achieves performance close to existing hand-optimized implementations in C and assembly

    Frequency and predictors for chronic thromboembolic pulmonary hypertension after a first unprovoked pulmonary embolism: Results from PADIS studies

    No full text
    International audienc

    CTA contributions to the 33rd International Cosmic Ray Conference (ICRC2013)

    Full text link
    Compilation of CTA contributions to the proceedings of the 33rd International Cosmic Ray Conference (ICRC2013), which took place in 2-9 July, 2013, in Rio de Janeiro, BrazilComment: Index of CTA conference proceedings at the ICRC2013, Rio de Janeiro (Brazil). v1: placeholder with no arXiv links yet, to be replaced once individual contributions have been all submitted. v2: final with arXiv links to all CTA contributions and full author lis
    corecore