262 research outputs found

    Studies of the use of high-temperature nuclear heat from an HTGR for hydrogen production

    Get PDF
    The results of a study which surveyed various methods of hydrogen production using nuclear and fossil energy are presented. A description of these methods is provided, and efficiencies are calculated for each case. The process designs of systems that utilize the heat from a general atomic high temperature gas cooled reactor with a steam methane reformer and feed the reformer with substitute natural gas manufactured from coal, using reforming temperatures, are presented. The capital costs for these systems and the resultant hydrogen production price for these cases are discussed along with a research and development program

    Composability in quantum cryptography

    Full text link
    In this article, we review several aspects of composability in the context of quantum cryptography. The first part is devoted to key distribution. We discuss the security criteria that a quantum key distribution protocol must fulfill to allow its safe use within a larger security application (e.g., for secure message transmission). To illustrate the practical use of composability, we show how to generate a continuous key stream by sequentially composing rounds of a quantum key distribution protocol. In a second part, we take a more general point of view, which is necessary for the study of cryptographic situations involving, for example, mutually distrustful parties. We explain the universal composability framework and state the composition theorem which guarantees that secure protocols can securely be composed to larger applicationsComment: 18 pages, 2 figure

    Attacks on quantum key distribution protocols that employ non-ITS authentication

    Full text link
    We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced it was shown to prevent straightforward Man-In-The-Middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols we describe every single action taken by the adversary. For all protocols the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD-postprocessing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.Comment: 34 page

    Tight Finite-Key Analysis for Quantum Cryptography

    Get PDF
    Despite enormous progress both in theoretical and experimental quantum cryptography, the security of most current implementations of quantum key distribution is still not established rigorously. One of the main problems is that the security of the final key is highly dependent on the number, M, of signals exchanged between the legitimate parties. While, in any practical implementation, M is limited by the available resources, existing security proofs are often only valid asymptotically for unrealistically large values of M. Here, we demonstrate that this gap between theory and practice can be overcome using a recently developed proof technique based on the uncertainty relation for smooth entropies. Specifically, we consider a family of Bennett-Brassard 1984 quantum key distribution protocols and show that security against general attacks can be guaranteed already for moderate values of M.Comment: 11 pages, 2 figure

    Soft systems methodology: a context within a 50-year retrospective of OR/MS

    Get PDF
    Soft systems methodology (SSM) has been used in the practice of operations research and management science OR/MS) since the early 1970s. In the 1990s, it emerged as a viable academic discipline. Unfortunately, its proponents consider SSM and traditional systems thinking to be mutually exclusive. Despite the differences claimed by SSM proponents between the two, they have been complementary. An extensive sampling of the OR/MS literature over its entire lifetime demonstrates the richness with which the non-SSM literature has been addressing the very same issues as does SSM

    Tropical limestone forest resilience during MIS-2: implications for Pleistocene foraging & modern conservation

    Get PDF
    In this paper we present a multi-proxy study of tropical limestone forest and its utilization by human groups during the major climatic and environmental upheavals of MIS-2 (29-11.7 ka BP). Our data are drawn from new field research within the Tràng An World Heritage property, on the edge of the Red River Delta, northern Vietnam. Key findings from this study include 1) that limestone forest formations were resilient to the large-scale landscape transformation and inundation of the Sunda continent at the end of the last glaciation; 2) that prehistoric human groups were probably present in this habitat through-out MIS-2; and 3) that the forested, almost insular, karst of Tràng An provided foragers with a stable resource-base in a wider changing landscape. These results have implications for our understanding of the prehistoric utilization of karst environments and resonance for conservation efforts in the face of climate and environmental change today

    Immunoglobulin, glucocorticoid, or combination therapy for multisystem inflammatory syndrome in children: a propensity-weighted cohort study

    Get PDF
    Background: Multisystem inflammatory syndrome in children (MIS-C), a hyperinflammatory condition associated with SARS-CoV-2 infection, has emerged as a serious illness in children worldwide. Immunoglobulin or glucocorticoids, or both, are currently recommended treatments. Methods: The Best Available Treatment Study evaluated immunomodulatory treatments for MIS-C in an international observational cohort. Analysis of the first 614 patients was previously reported. In this propensity-weighted cohort study, clinical and outcome data from children with suspected or proven MIS-C were collected onto a web-based Research Electronic Data Capture database. After excluding neonates and incomplete or duplicate records, inverse probability weighting was used to compare primary treatments with intravenous immunoglobulin, intravenous immunoglobulin plus glucocorticoids, or glucocorticoids alone, using intravenous immunoglobulin as the reference treatment. Primary outcomes were a composite of inotropic or ventilator support from the second day after treatment initiation, or death, and time to improvement on an ordinal clinical severity scale. Secondary outcomes included treatment escalation, clinical deterioration, fever, and coronary artery aneurysm occurrence and resolution. This study is registered with the ISRCTN registry, ISRCTN69546370. Findings: We enrolled 2101 children (aged 0 months to 19 years) with clinically diagnosed MIS-C from 39 countries between June 14, 2020, and April 25, 2022, and, following exclusions, 2009 patients were included for analysis (median age 8·0 years [IQR 4·2–11·4], 1191 [59·3%] male and 818 [40·7%] female, and 825 [41·1%] White). 680 (33·8%) patients received primary treatment with intravenous immunoglobulin, 698 (34·7%) with intravenous immunoglobulin plus glucocorticoids, 487 (24·2%) with glucocorticoids alone; 59 (2·9%) patients received other combinations, including biologicals, and 85 (4·2%) patients received no immunomodulators. There were no significant differences between treatments for primary outcomes for the 1586 patients with complete baseline and outcome data that were considered for primary analysis. Adjusted odds ratios for ventilation, inotropic support, or death were 1·09 (95% CI 0·75–1·58; corrected p value=1·00) for intravenous immunoglobulin plus glucocorticoids and 0·93 (0·58–1·47; corrected p value=1·00) for glucocorticoids alone, versus intravenous immunoglobulin alone. Adjusted average hazard ratios for time to improvement were 1·04 (95% CI 0·91–1·20; corrected p value=1·00) for intravenous immunoglobulin plus glucocorticoids, and 0·84 (0·70–1·00; corrected p value=0·22) for glucocorticoids alone, versus intravenous immunoglobulin alone. Treatment escalation was less frequent for intravenous immunoglobulin plus glucocorticoids (OR 0·15 [95% CI 0·11–0·20]; p<0·0001) and glucocorticoids alone (0·68 [0·50–0·93]; p=0·014) versus intravenous immunoglobulin alone. Persistent fever (from day 2 onward) was less common with intravenous immunoglobulin plus glucocorticoids compared with either intravenous immunoglobulin alone (OR 0·50 [95% CI 0·38–0·67]; p<0·0001) or glucocorticoids alone (0·63 [0·45–0·88]; p=0·0058). Coronary artery aneurysm occurrence and resolution did not differ significantly between treatment groups. Interpretation: Recovery rates, including occurrence and resolution of coronary artery aneurysms, were similar for primary treatment with intravenous immunoglobulin when compared to glucocorticoids or intravenous immunoglobulin plus glucocorticoids. Initial treatment with glucocorticoids appears to be a safe alternative to immunoglobulin or combined therapy, and might be advantageous in view of the cost and limited availability of intravenous immunoglobulin in many countries. Funding: Imperial College London, the European Union's Horizon 2020, Wellcome Trust, the Medical Research Foundation, UK National Institute for Health and Care Research, and National Institutes of Health
    corecore