965 research outputs found

    Assessing and countering reaction attacks against post-quantum public-key cryptosystems based on QC-LDPC codes

    Full text link
    Code-based public-key cryptosystems based on QC-LDPC and QC-MDPC codes are promising post-quantum candidates to replace quantum vulnerable classical alternatives. However, a new type of attacks based on Bob's reactions have recently been introduced and appear to significantly reduce the length of the life of any keypair used in these systems. In this paper we estimate the complexity of all known reaction attacks against QC-LDPC and QC-MDPC code-based variants of the McEliece cryptosystem. We also show how the structure of the secret key and, in particular, the secret code rate affect the complexity of these attacks. It follows from our results that QC-LDPC code-based systems can indeed withstand reaction attacks, on condition that some specific decoding algorithms are used and the secret code has a sufficiently high rate.Comment: 21 pages, 2 figures, to be presented at CANS 201

    On the Dynamics of the Deployment of Renewable Energy Production Capacities

    Full text link
    This chapter falls within the context of modeling the deployment of renewable en-ergy production capacities in the scope of the energy transition. This problem is addressed from an energy point of view, i.e. the deployment of technologies is seen as an energy investment under the constraint that an initial budget of non-renewable energy is provided. Using the Energy Return on Energy Investment (ERoEI) characteristics of technologies, we propose MODERN, a discrete-time formalization of the deployment of renewable energy production capacities. Be-sides showing the influence of the ERoEI parameter, the model also underlines the potential benefits of designing control strategies for optimizing the deployment of production capacities, and the necessity to increase energy efficiency.Peer reviewe

    LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes

    Full text link
    This work presents a new code-based key encapsulation mechanism (KEM) called LEDAkem. It is built on the Niederreiter cryptosystem and relies on quasi-cyclic low-density parity-check codes as secret codes, providing high decoding speeds and compact keypairs. LEDAkem uses ephemeral keys to foil known statistical attacks, and takes advantage of a new decoding algorithm that provides faster decoding than the classical bit-flipping decoder commonly adopted in this kind of systems. The main attacks against LEDAkem are investigated, taking into account quantum speedups. Some instances of LEDAkem are designed to achieve different security levels against classical and quantum computers. Some performance figures obtained through an efficient C99 implementation of LEDAkem are provided.Comment: 21 pages, 3 table

    Multi-step self-guided pathways for shape-changing metamaterials

    Get PDF
    Multi-step pathways, constituted of a sequence of reconfigurations, are central to a wide variety of natural and man-made systems. Such pathways autonomously execute in self-guided processes such as protein folding and self-assembly, but require external control in macroscopic mechanical systems, provided by, e.g., actuators in robotics or manual folding in origami. Here we introduce shape-changing mechanical metamaterials, that exhibit self-guided multi-step pathways in response to global uniform compression. Their design combines strongly nonlinear mechanical elements with a multimodal architecture that allows for a sequence of topological reconfigurations, i.e., modifications of the topology caused by the formation of internal self-contacts. We realized such metamaterials by digital manufacturing, and show that the pathway and final configuration can be controlled by rational design of the nonlinear mechanical elements. We furthermore demonstrate that self-contacts suppress pathway errors. Finally, we demonstrate how hierarchical architectures allow to extend the number of distinct reconfiguration steps. Our work establishes general principles for designing mechanical pathways, opening new avenues for self-folding media, pluripotent materials, and pliable devices in, e.g., stretchable electronics and soft robotics.Comment: 16 pages, 3 main figures, 10 extended data figures. See https://youtu.be/8m1QfkMFL0I for an explanatory vide

    Priority for the Worse Off and the Social Cost of Carbon

    Get PDF
    The social cost of carbon (SCC) is a monetary measure of the harms from carbon emission. Specifically, it is the reduction in current consumption that produces a loss in social welfare equivalent to that caused by the emission of a ton of CO2. The standard approach is to calculate the SCC using a discounted-utilitarian social welfare function (SWF)—one that simply adds up the well-being numbers (utilities) of individuals, as discounted by a weighting factor that decreases with time. The discounted-utilitarian SWF has been criticized both for ignoring the distribution of well-being, and for including an arbitrary preference for earlier generations. Here, we use a prioritarian SWF, with no time-discount factor, to calculate the SCC in the integrated assessment model RICE. Prioritarianism is a well-developed concept in ethics and theoretical welfare economics, but has been, thus far, little used in climate scholarship. The core idea is to give greater weight to well-being changes affecting worse off individuals. We find substantial differences between the discounted-utilitarian and non-discounted prioritarian SCC

    A longitudinal examination of plasma neurofilament light and total tau for the clinical detection and monitoring of Alzheimer's disease

    Get PDF
    We examined baseline and longitudinal associations between plasma neurofilament light (NfL) and total tau (t-tau), and the clinical presentation of Alzheimer's disease (AD). A total of 579 participants (238, normal cognition [NC]; 185, mild cognitive impairment [MCI]; 156, AD dementia) had baseline blood draws; 82% had follow-up evaluations. Plasma samples were analyzed for NfL and t-tau using Simoa technology. Baseline plasma NfL was higher in AD dementia than MCI (standardized mean difference = 0.55, 95% CI: 0.37–0.73) and NC (standardized mean difference = 0.68, 95% CI: 0.49–0.88), corresponded to Clinical Dementia Rating scores (OR = 1.94, 95% CI: 1.35–2.79]), and correlated with all neuropsychological tests (r's = 0.13–0.42). Longitudinally, NfL did not predict diagnostic conversion but predicted decline on 3/10 neuropsychological tests. Baseline plasma t-tau was higher in AD dementia than NC with a small effect (standardized mean difference = 0.33, 95% CI: 0.10–0.57) but not MCI. t-tau did not statistically significant predict any longitudinal outcomes. Plasma NfL may be useful for the detection of AD dementia and monitoring of disease progression. In contrast, there was minimal evidence in support of plasma t-tau

    BASS. XXXV. The MBH-σ* Relation of 105 Month Swift-BAT Type 1 AGNs

    Get PDF
    We present two independent measurements of stellar velocity dispersions (sigma(star)) from the Ca II H+K lambda 3969, 3934 and Mg I b lambda 5183, 5172, 5167 region (3880-5550 angstrom) and the calcium triplet region (8350-8750 angstrom) for 173 hard X-ray-selected Type 1 active galactic nuclei (AGNs; z <= 0.08) from the 105 month Swift-BAT catalog. We construct one of the largest samples of local Type 1 AGNs that have both single-epoch virial black hole mass (M-BH) estimates and sigma(star) measurements obtained from high spectral resolution data, allowing us to test the usage of such methods for supermassive black hole studies. We find that the two independent sigma(star) measurements are highly consistent with each other, with an average offset of only 0.002 +/- 0.001 dex. Comparing M-BH estimates based on broad emission lines and stellar velocity dispersion measurements, we find that the former is systematically lower by approximate to 0.12 dex. Consequently, Eddington ratios estimated through broad-line MBH determinations are similarly biased (but in the opposite way). We argue that the discrepancy is driven by extinction in the broad-line region. We also find an anticorrelation between the offset from the M-BH-sigma(star) relation and the Eddington ratio. Our sample of Type 1 AGNs shows a shallower M-BH-sigma(star) relation (with a power-law exponent of approximate to 3.5) compared with that of inactive galaxies (with a power-law exponent of approximate to 4.5), confirming earlier results obtained from smaller samples

    Dental management considerations for the patient with an acquired coagulopathy. Part 1: Coagulopathies from systemic disease

    Get PDF
    Current teaching suggests that many patients are at risk for prolonged bleeding during and following invasive dental procedures, due to an acquired coagulopathy from systemic disease and/or from medications. However, treatment standards for these patients often are the result of long-standing dogma with little or no scientific basis. The medical history is critical for the identification of patients potentially at risk for prolonged bleeding from dental treatment. Some time-honoured laboratory tests have little or no use in community dental practice. Loss of functioning hepatic, renal, or bone marrow tissue predisposes to acquired coagulopathies through different mechanisms, but the relationship to oral haemostasis is poorly understood. Given the lack of established, science-based standards, proper dental management requires an understanding of certain principles of pathophysiology for these medical conditions and a few standard laboratory tests. Making changes in anticoagulant drug regimens are often unwarranted and/or expensive, and can put patients at far greater risk for morbidity and mortality than the unlikely outcome of postoperative bleeding. It should be recognised that prolonged bleeding is a rare event following invasive dental procedures, and therefore the vast majority of patients with suspected acquired coagulopathies are best managed in the community practice setting
    corecore