186 research outputs found

    Osteolytic clear cell meningioma of the petrous bone occurring 36 years after posterior cranial fossa irradiation: Case report

    Get PDF
    Objective and importance While bone invasion and hyperostosis are frequent phenomena in meningiomas, primary intraosseous meningiomas are rare and their occurrence in the skull base is an extraordinary exception. Moreover, radiation-induced meningiomas represent a unique clinical dilemma given the fact that patients with these tumors had often received a prior full course of radiotherapy. Clinical presentation A 42-year-old man presented with a 3-month history of progressively worsening facial asymmetry. His medical history was consistent for a posterior cranial fossa irradiation at the age of 6 years for a non-confirmed brain stem tumor. On admission his Karnofsky performance status was graded as 50% and his neurological examination showed a complete right facial nerve paralysis and hearing impairment. Computed tomography and magnetic resonance imaging demonstrated an osteolytic tumor invading the whole right petrous bone without intracranial involvement. Intervention As the tumor reached the external auditory canal, a tissue sample was obtained locally. Pathological examination of the lesion identified a grade II clear cell meningioma and the patient was consequently addressed for an intensity modulated radiation therapy. His condition remained unchanged till the most recent follow-up examination, 8 months later. Conclusions To the best of our knowledge, a radiation induced osteolytic clear cell meningioma of the petrous bone has not been previously reported. As little literature exists regarding the use of adjuvant therapies for these tumors, intensity modulated radiation therapy remains an attractive treatment option in case of pervious irradiation and general status alteration

    Electroencephalography Predicts Poor and Good Outcomes After Cardiac Arrest: A Two-Center Study.

    Get PDF
    The prognostic role of electroencephalography during and after targeted temperature management in postcardiac arrest patients, relatively to other predictors, is incompletely known. We assessed performances of electroencephalography during and after targeted temperature management toward good and poor outcomes, along with other recognized predictors. Cohort study (April 2009 to March 2016). Two academic hospitals (Centre Hospitalier Universitaire Vaudois, Lausanne, Switzerland; Mayo Clinic, Rochester, MN). Consecutive comatose adults admitted after cardiac arrest, identified through prospective registries. All patients were managed with targeted temperature management, receiving prespecified standardized clinical, neurophysiologic (particularly, electroencephalography during and after targeted temperature management), and biochemical evaluations. We assessed electroencephalography variables (reactivity, continuity, epileptiform features, and prespecified "benign" or "highly malignant" patterns based on the American Clinical Neurophysiology Society nomenclature) and other clinical, neurophysiologic (somatosensory-evoked potential), and biochemical prognosticators. Good outcome (Cerebral Performance Categories 1 and 2) and mortality predictions at 3 months were calculated. Among 357 patients, early electroencephalography reactivity and continuity and flexor or better motor reaction had greater than 70% positive predictive value for good outcome; reactivity (80.4%; 95% CI, 75.9-84.4%) and motor response (80.1%; 95% CI, 75.6-84.1%) had highest accuracy. Early benign electroencephalography heralded good outcome in 86.2% (95% CI, 79.8-91.1%). False positive rates for mortality were less than 5% for epileptiform or nonreactive early electroencephalography, nonreactive late electroencephalography, absent somatosensory-evoked potential, absent pupillary or corneal reflexes, presence of myoclonus, and neuron-specific enolase greater than 75 µg/L; accuracy was highest for early electroencephalography reactivity (86.6%; 95% CI, 82.6-90.0). Early highly malignant electroencephalography had an false positive rate of 1.5% with accuracy of 85.7% (95% CI, 81.7-89.2%). This study provides class III evidence that electroencephalography reactivity predicts both poor and good outcomes, and motor reaction good outcome after cardiac arrest. Electroencephalography reactivity seems to be the best discriminator between good and poor outcomes. Standardized electroencephalography interpretation seems to predict both conditions during and after targeted temperature management

    Structure-Preserving Smooth Projective Hashing

    Get PDF
    International audienceSmooth projective hashing has proven to be an extremely useful primitive, in particular when used in conjunction with commitments to provide implicit decommitment. This has lead to applications proven secure in the UC framework, even in presence of an adversary which can do adaptive corruptions, like for example Password Authenticated Key Exchange (PAKE), and 1-out-of-m Oblivious Transfer (OT). However such solutions still lack in efficiency, since they heavily scale on the underlying message length. Structure-preserving cryptography aims at providing elegant and efficient schemes based on classical assumptions and standard group operations on group elements. Recent trend focuses on constructions of structure- preserving signatures, which require message, signature and verification keys to lie in the base group, while the verification equations only consist of pairing-product equations. Classical constructions of Smooth Projective Hash Function suffer from the same limitation as classical signatures: at least one part of the computation (messages for signature, witnesses for SPHF) is a scalar. In this work, we introduce and instantiate the concept of Structure- Preserving Smooth Projective Hash Function, and give as applications more efficient instantiations for one-round PAKE and three-round OT, and information retrieval thanks to Anonymous Credentials, all UC- secure against adaptive adversaries

    Adaptive Oblivious Transfer and Generalization

    Get PDF
    International audienceOblivious Transfer (OT) protocols were introduced in the seminal paper of Rabin, and allow a user to retrieve a given number of lines (usually one) in a database, without revealing which ones to the server. The server is ensured that only this given number of lines can be accessed per interaction, and so the others are protected; while the user is ensured that the server does not learn the numbers of the lines required. This primitive has a huge interest in practice, for example in secure multi-party computation, and directly echoes to Symmetrically Private Information Retrieval (SPIR). Recent Oblivious Transfer instantiations secure in the UC framework suf- fer from a drastic fallback. After the first query, there is no improvement on the global scheme complexity and so subsequent queries each have a global complexity of O(|DB|) meaning that there is no gain compared to running completely independent queries. In this paper, we propose a new protocol solving this issue, and allowing to have subsequent queries with a complexity of O(log(|DB|)), and prove the protocol security in the UC framework with adaptive corruptions and reliable erasures. As a second contribution, we show that the techniques we use for Obliv- ious Transfer can be generalized to a new framework we call Oblivi- ous Language-Based Envelope (OLBE). It is of practical interest since it seems more and more unrealistic to consider a database with uncontrolled access in access control scenarii. Our approach generalizes Oblivious Signature-Based Envelope, to handle more expressive credentials and requests from the user. Naturally, OLBE encompasses both OT and OSBE, but it also allows to achieve Oblivious Transfer with fine grain access over each line. For example, a user can access a line if and only if he possesses a certificate granting him access to such line. We show how to generically and efficiently instantiate such primitive, and prove them secure in the Universal Composability framework, with adaptive corruptions assuming reliable erasures. We provide the new UC ideal functionalities when needed, or we show that the existing ones fit in our new framework. The security of such designs allows to preserve both the secrecy of the database values and the user credentials. This symmetry allows to view our new approach as a generalization of the notion of Symmetrically PIR

    The Most Common Comorbidities in Dandy-Walker Syndrome Patients: A Systematic Review of Case Reports.

    Get PDF
    OBJECTIVE: Dandy-Walker syndrome (DWS) is a rare neurologic multi-entity malformation. This review aimed at reporting its main nonneurologic comorbidities. METHODS: Following PRISMA guidelines, search in Medline was conducted (2000-2014, keyword: dandy-walker). Age, sex, country, DWS type, consanguinity or siblings with DWS, and recorded coexistent conditions (by ICD10 category) were extracted for 187 patients (46.5% male, 43% from Asia) from 168 case reports. RESULTS: Diagnosis was most often set in 12 years old (27.8%). One-third of cases had a chromosomal abnormality or syndrome (n = 8 PHACE), 27% had a cardiovascular condition (n = 7 Patent Ductus Arteriosus), 24% had a disease of eye and ear (n = 9 cataract); most common malignancy was nephroblastoma (n = 8, all Asian). Almost one-fifth had a mental illness diagnosis; only 6.4% had mild or severe intellectual disability. CONCLUSION: The spread of comorbidities calls for early diagnosis and multidisciplinary research and practice, especially as many cases remain clinically asymptomatic for years
    corecore