92 research outputs found

    Towed sensors and hydrodynamic model evidence the need to include submarine in coastal lagoons water balance, the Mar Menor example (SE Spain).

    Get PDF
    The use of radionuclide tracers to determine the submarine groundwater discharges has been used widely but in areas highly anthropized as the Mar Menor surface water tributaries can carry high concentration of Radon, making very difficult to distinguish the radionuclide origin. In this paper a combined approach was applied in the Mar Menor, a towed system was designed to enable the continuous measurement of Radon and Nitrate and a hydrodynamic model was used to establish the influence areas of the surface discharge to the lagoon. The areas were Radon was detected and was out from the area located with the model could be establish as a submarine groundwater discharge point.Peer Reviewe

    Multi-Device for Signal

    Get PDF
    Nowadays, we spend our life juggling with many devices such as smartphones, tablets or laptops, and we expect to easily and efficiently switch between them without losing time or security. However, most applications have been designed for single device usage. This is the case for secure instant messaging (SIM) services based on the Signal protocol, that implements the Double Ratchet key exchange algorithm. While some adaptations, like the Sesame protocol released by the developers of Signal, have been proposed to fix this usability issue, they have not been designed as specific multi-device solutions and no security model has been formally defined either. In addition, even though the group key exchange problematic appears related to the multi-device case, group solutions are too generic and do not take into account some properties of the multi-device setting.Indeed, the fact that all devices belong to a single user can be exploited to build more efficient solutions. In this paper, we propose a Multi-Device Instant Messaging protocol based on Signal, ensuring all the security properties of the original Signal

    On The Broadcast and Validity-Checking Security of PKCS #1 v1.5 Encryption

    Get PDF
    (article recompensé par le "Best Student Paper Award")International audienceThis paper describes new attacks on PKCS #1 v1.5, a deprecated but still widely used RSA encryption standard. The first cryptanalysis is a broadcast attack, allowing the opponent to reveal an identical plaintext sent to different recipients. This is nontrivial because different randomizers are used for different encryptions (in other words, plaintexts coincide only partially). The second attack predicts, using a single query to a validity checking oracle, which of two chosen plaintexts corresponds to a challenge ciphertext. The attack's success odds are very high. The two new attacks rely on different mathematical tools and underline the need to accelerate the phase out of PKCS #1 v1.5

    On the Adaptive Security of MACs and PRFs

    Get PDF
    We consider the security of two of the most commonly used cryptographic primitives—message authentication codes (MACs) and pseudorandom functions (PRFs)—in a multi-user setting with adaptive corruption. Whereas is it well known that any secure MAC or PRF is also multi-user secure under adaptive corruption, the trivial reduction induces a security loss that is linear in the number of users. Our main result shows that black-box reductions from “standard” assumptions cannot be used to provide a tight, or even a linear-preserving, security reduction for adaptive multi-user secure deterministic stateless MACs and thus also PRFs. In other words, a security loss that grows with the number of users is necessary for any such black-box reduction

    Atherosclerosis and Alzheimer - diseases with a common cause? Inflammation, oxysterols, vasculature

    Full text link

    Neutronic calculation of deformed cores development of a time-dependent diffusion solver in CAST3M

    No full text
    International audienc

    Protocols with Security Proofs for Mobile Applications

    Get PDF
    The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the security community. We wor

    MINARET: Towards a time-dependent neutron transport parallel solver

    No full text
    We present the newly developed time-dependent 3D multigroup discrete ordinates neutron transport solver that has recently been implemented in the MINARET code. The solver is the support for a study about computing acceleration techniques that involve parallel architectures. In this work, we will focus on the parallelization of two of the variables involved in our equation: the angular directions and the time. This last variable has been parallelized by a (time) domain decomposition method called the parareal in time algorithm
    corecore