15 research outputs found

    Biomechanical simulations of the scoliotic deformation process in the pinealectomized chicken: a preliminary study

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The basic mechanisms whereby mechanical factors modulate the metabolism of the growing spine remain poorly understood, especially the role of growth adaptation in spinal disorders like in adolescent idiopathic scoliosis (AIS). This paper presents a finite element model (FEM) that was developed to simulate early stages of scoliotic deformities progression using a pinealectomized chicken as animal model.</p> <p>Methods</p> <p>The FEM includes basic growth and growth modulation created by the muscle force imbalance. The experimental data were used to adapt a FEM previously developed to simulate the scoliosis deformation process in human. The simulations of the spine deformation process are compared with the results of an experimental study including a group of pinealectomized chickens.</p> <p>Results</p> <p>The comparison of the simulation results of the spine deformation process (Cobb angle of 37°) is in agreement with experimental scoliotic deformities of two representative cases (Cobb angle of 41° and 30°). For the vertebral wedging, a good agreement is also observed between the calculated (28°) and the observed (25° – 30°) values.</p> <p>Conclusion</p> <p>The proposed biomechanical model presents a novel approach to realistically simulate the scoliotic deformation process in pinealectomized chickens and investigate different parameters influencing the progression of scoliosis.</p

    Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations

    Get PDF
    Quantifying the side channel security of implementations has been a significant research question for several years in academia but also among real world side channel practitioners. As part of security evaluations, efficient key rank estimation algorithms were devised, which in contrast to analyses based on subkey recovery, give a holistic picture of the security level after a side channel attack. However, it has been observed that outcomes of rank estimations show a huge spread in precisely the range of key ranks where enumeration could lead to key recovery. These observations raise the question whether this is because of insufficient rank estimation procedures, or, if this is an inherent property of the key rank. Furthermore, if this was inherent, how could key rank outcomes be translated into practically meaningful figures, suitable to analysing the risk that real world side channel attacks pose? This paper is a direct response to these questions. We experimentally identify the key rank distribution and show that it is independent of different distinguishers and signal-to-noise ratios. Then we offer a theoretical explanation for the observed key rank distribution and determine how many samples thereof are required for a robust estimation of some key parameters. We discuss how this can be naturally integrated into real world side channel evaluation practices. We conclude our research by connecting non-parametric order statistics, in particular percentiles, in a practically meaningful way with business goals

    Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience

    No full text
    International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious direction is to use various masking or hiding countermeasures. However, such schemes come with a cost, e.g. an increase in the area and/or reduction of the speed. When considering lightweight cryptography and various constrained environments, the situation becomes even more difficult due to numerous implementation restrictions. However, some options are possible like using S-boxes that are easier to mask or (more on a fundamental level), using S-boxes that possess higher inherent side-channel resilience. In this paper we investigate what properties should an S-box possess in order to be more resilient against side-channel attacks. Moreover, we find certain connections between those properties and cryptographic properties like nonlinearity and differential uniformity. Finally, to strengthen our theoretical findings, we give an extensive experimental validation of our results
    corecore