62 research outputs found

    On the Compressibility Properties of the Wine-Rack-Like Carbon Allotropes and Related Poly(phenylacetylene) Systems

    Get PDF
    This is the author accepted manuscript. The final version is available from Wiley via the DOI in this record.Poly(phenylacetylene) sheets that mimic the geometry of a wine-rack-like structure have been predicted to exhibit negative Poisson's ratios off-axis. However, their potential to exhibit negative linear compressibility (NLC) has remained largely unexplored. In this work, the compressibility and other mechanical properties of wine-rack-like poly(phenylacetylene) networks with 1,2,4,5 tetra-substituted phenyls as well as their equivalent with allene or cyclobutadiene centres are simulated to assess their ability to exhibit negative linear compressibility on-axis and off-axis. It is shown that some of these systems can indeed exhibit negative linear compressibility whilst others exhibit a near-zero compressibility. The results are compared to the compressibility properties of other poly(phenylacetylene) networks reported in literature as well as with those predicted from the analytical model for an idealised wine-rack structure deforming through hinging. Results suggest that these mechanical properties are arising from a wine-rack-like mechanism, and there is a good agreement with the theoretical model, especially for systems with longer acetylene chains whose geometry is closer to that of the idealised wine-rack.University of MaltaENDEAVOUR Scholarship Scheme (Malta

    On the Mechanical Properties of Graphyne, Graphdiyne, and Other Poly(Phenylacetylene) Networks

    Get PDF
    This is the author accepted manuscript. The final version is available from Wiley via the DOI in this recordWe simulate, analyse and compare the mechanical properties of a number of molecular sheet-like systems based on fully substituted, penta-substituted, tetra-substituted and tri-substituted poly(phenylacetylene) using static force-field based methods. The networks are modeled in a 3D environment with and without inter-layer interactions in analogy to graphite and graphene respectively. It is shown that by varying the type of substitution and the length of the acetylene chain, one may control the mechanical properties of such systems. In particular, it is shown that poly(phenylacetylene) systems can be specifically designed to exhibit negative Poisson's ratio, and that the stiffness can be controlled in an independent manner from the Poisson's ratios. This is significant as it highlights the fact that such systems can be tailored to exhibit a particular set of mechanical properties.The research work disclosed in this publication is funded by the ENDEAVOUR Scholarship Scheme (Malta). The scholarship may be part-financed by the European Union − European Social Fund (ESF) under Operational Programme II − Cohesion Policy 2014–2020, “Investing in human capital to create more opportunities and promote the well being of society.” JNG acknowledges the support of the University of Malta research grant

    On the Gold Standard for Security of Universal Steganography

    Get PDF
    While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them. The computational model for public-key steganography was proposed by von Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first universal public-key stegosystem - i.e. one that works on all channels - achieving security against replayable chosen-covertext attacks (SS-RCCA) and asked whether security against non-replayable chosen-covertext attacks (SS-CCA) is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every efficiently sampleable channel, but did not achieve universality. He posed the question whether universality and SS-CCA-security can be achieved simultaneously. No progress on this question has been achieved since more than a decade. In our work we solve Hopper's problem in a somehow complete manner: As our main positive result we design an SS-CCA-secure stegosystem that works for every memoryless channel. On the other hand, we prove that this result is the best possible in the context of universal steganography. We provide a family of 0-memoryless channels - where the already sent documents have only marginal influence on the current distribution - and prove that no SS-CCA-secure steganography for this family exists in the standard non-look-ahead model.Comment: EUROCRYPT 2018, llncs styl

    Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications

    Get PDF
    Key separation is often difficult to enforce in practice. While key reuse can be catastrophic for security, we know of a number of cryptographic schemes for which it is provably safe. But existing formal models, such as the notions of joint security (Haber-Pinkas, CCS ’01) and agility (Acar et al., EUROCRYPT ’10), do not address the full range of key-reuse attacks—in particular, those that break the abstraction of the scheme, or exploit protocol interactions at a higher level of abstraction. This work attends to these vectors by focusing on two key elements: the game that codifies the scheme under attack, as well as its intended adversarial model; and the underlying interface that exposes secret key operations for use by the game. Our main security experiment considers the implications of using an interface (in practice, the API of a software library or a hardware platform such as TPM) to realize the scheme specified by the game when the interface is shared with other unspecified, insecure, or even malicious applications. After building up a definitional framework, we apply it to the analysis of two real-world schemes: the EdDSA signature algorithm and the Noise protocol framework. Both provide some degree of context separability, a design pattern for interfaces and their applications that aids in the deployment of secure protocols

    Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption

    Get PDF
    Motivated by the currently widespread concern about mass surveillance of encrypted communications, Bellare \emph{et al.} introduced at CRYPTO 2014 the notion of Algorithm-Substitution Attack (ASA) where the legitimate encryption algorithm is replaced by a subverted one that aims to undetectably exfiltrate the secret key via ciphertexts. Practically implementable ASAs on various cryptographic primitives (Bellare \emph{et al.}, CRYPTO\u2714 \& ACM CCS\u2715; Ateniese \emph{et al.}, ACM CCS\u2715; Berndt and Liśkiewicz, ACM CCS\u2717) have been constructed and analyzed, leaking the secret key successfully. Nevertheless, in spite of much progress, the practical impact of ASAs (formulated originally for symmetric key cryptography) on public-key (PKE) encryption operations remains unclear, primarily since the encryption operation of PKE does not involve the secret key, and also previously known ASAs become relatively inefficient for leaking the plaintext due to the logarithmic upper bound of exfiltration rate (Berndt and Liśkiewicz, ACM CCS\u2717). In this work, we formulate a practical ASA on PKE encryption algorithm which, perhaps surprisingly, turns out to be much more efficient and robust than existing ones, showing that ASAs on PKE schemes are far more effective and dangerous than previously believed. We mainly target PKE of hybrid encryption which is the most prevalent way to employ PKE in the literature and in practice. The main strategy of our ASA is to subvert the underlying key encapsulation mechanism (KEM) so that the session key encapsulated could be efficiently extracted, which, in turn, breaks the data encapsulation mechanism (DEM) enabling us to learn the plaintext itself. Concretely, our non-black-box yet quite general attack enables recovering the plaintext from only two successive ciphertexts and minimally depends on a short state of previous internal randomness. A widely used class of KEMs is shown to be subvertible by our powerful attack. Our attack relies on a novel identification and formalization of certain properties that yield practical ASAs on KEMs. More broadly, it points at and may shed some light on exploring structural weaknesses of other ``composed cryptographic primitives,\u27\u27 which may make them susceptible to more dangerous ASAs with effectiveness that surpasses the known logarithmic upper bound (i.e., reviewing composition as an attack enabler)

    Comparative physiology of Australian quolls (Dasyurus; Marsupialia)

    Get PDF
    Quolls (Dasyurus) are medium-sized carnivorous dasyurid marsupials. Tiger (3,840 g) and eastern quolls (780 g) are mesic zone species, northern quolls (516 g) are tropical zone, and chuditch (1,385 g) were once widespread through the Australian arid zone. We found that standard physiological variables of these quolls are consistent with allometric expectations for marsupials. Nevertheless, inter-specific patterns amongst the quolls are consistent with their different environments. The lower T ^sub b^ of northern quolls (34°C) may provide scope for adaptive hyperthermia in the tropics, and they use torpor for energy/water conservation, whereas the larger mesic species (eastern and tiger quolls) do not appear to. Thermolability varied from little in eastern (0.035°C °C^sup -1^) and tiger quolls (0.051°C ºC^sup -1^) to substantial in northern quolls (0.100°C ºC^sup -1^) and chuditch (0.146°C ºC^sup -1^), reflecting body mass and environment. Basal metabolic rate was higher for eastern quolls (0.662 ± 0.033 ml O^sub 2^ g^sup -1^ h^sup -1^), presumably reflecting their naturally cool environment. Respiratory ventilation closely matched metabolic demand, except at high ambient temperatures where quolls hyperventilated to facilitate evaporative heat loss; tiger and eastern quolls also salivated. A higher evaporative water loss for eastern quolls (1.43 ± 0.212 mg H^sub 2^O g^sup -1^ h^sup -1^) presumably reflects their more mesic distribution. The point of relative water economy was low for tiger (-1.3°C), eastern (-12.5°C) and northern (+3.3) quolls, and highest for the chuditch (+22.6°C). We suggest that these differences in water economy reflect lower expired air temperatures and hence lower respiratory evaporative water loss for the arid-zone chuditch relative to tropical and mesic quolls

    Kualitas Hidup Pasien Diabetes Melitus Tipe 2 di Puskesmas Se Kota Kupang

    Full text link
    Diabetes Mellitus is well known as a chronic disease which can lead to a decrease in quality of life in all domains. The study aims to explore the diabetic type 2 patient\u27s quality of life and find out the factors affecting in type 2 diabetic mellitus patients. The cross-sectional study design is used that included 65 patient with type 2 diabetes mellitus, in 11 public health centers of Kupang City. Data were collected by using Short Form Survey (SF-36) that assessed 8-scale health profile. Independent sample t-test is used to analyze the correlation between the factors affecting and the quality of life. the study showed that the QoL of DM patients decreased in all 8- health profile including physical functioning, social functioning, mental health, general health, pain, change in the role due to physical problems and emotional problems. The Study also showed there was a relationship between gender, duration of suffering from Diabetes mellitus, and complications to the quality of life. Male perceived a better quality of life than female

    Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation

    Get PDF
    This paper proposes tweakable block cipher (TBC) based modes PFB_Plus\mathsf{PFB\_Plus} and PFBω\mathsf{PFB}\omega that are efficient in threshold implementations (TI). Let tt be an algebraic degree of a target function, e.g.~t=1t=1 (resp.~t>1t>1) for linear (resp.~non-linear) function. The dd-th order TI encodes the internal state into dt+1d t + 1 shares. Hence, the area size increases proportionally to the number of shares. This implies that TBC based modes can be smaller than block cipher (BC) based modes in TI because TBC requires ss-bit block to ensure ss-bit security, e.g. \textsf{PFB} and \textsf{Romulus}, while BC requires 2s2s-bit block. However, even with those TBC based modes, the minimum we can reach is 3 shares of ss-bit state with t=2t=2 and the first-order TI (d=1d=1). Our first design PFB_Plus\mathsf{PFB\_Plus} aims to break the barrier of the 3s3s-bit state in TI. The block size of an underlying TBC is s/2s/2 bits and the output of TBC is linearly expanded to ss bits. This expanded state requires only 2 shares in the first-order TI, which makes the total state size 2.5s2.5s bits. We also provide rigorous security proof of PFB_Plus\mathsf{PFB\_Plus}. Our second design PFBω\mathsf{PFB}\omega further increases a parameter ω\omega: a ratio of the security level ss to the block size of an underlying TBC. We prove security of PFBω\mathsf{PFB}\omega for any ω\omega under some assumptions for an underlying TBC and for parameters used to update a state. Next, we show a concrete instantiation of PFB_Plus\mathsf{PFB\_Plus} for 128-bit security. It requires a TBC with 64-bit block, 128-bit key and 128-bit tweak, while no existing TBC can support it. We design a new TBC by extending \textsf{SKINNY} and provide basic security evaluation. Finally, we give hardware benchmarks of PFB_Plus\mathsf{PFB\_Plus} in the first-order TI to show that TI of PFB_Plus\mathsf{PFB\_Plus} is smaller than that of \textsf{PFB} by more than one thousand gates and is the smallest within the schemes having 128-bit security

    Shared and Disorder-Specific Event-Related Brain Oscillatory Markers of Attentional Dysfunction in ADHD and Bipolar Disorder.

    Get PDF
    Attention-deficit/hyperactivity disorder (ADHD) and bipolar disorder (BD) often present with overlapping symptoms and cognitive impairments, such as increased fluctuations in attentional performance measured by increased reaction-time variability (RTV). We previously provided initial evidence of shared and distinct event-related potential (ERP) impairments in ADHD and BD in a direct electrophysiological comparison, but no study to date has compared neural mechanisms underlying attentional impairments with finer-grained brain oscillatory markers. Here, we aimed to compare the neural underpinnings of impaired attentional processes in ADHD and BD, by examining event-related brain oscillations during a reaction-time task under slow-unrewarded baseline and fast-incentive conditions. We measured cognitive performance, ERPs and brain-oscillatory modulations of power and phase variability in 20 women with ADHD, 20 women with BD (currently euthymic) and 20 control women. Compared to controls, both ADHD and BD groups showed increased RTV in the baseline condition and increased RTV, theta phase variability and lower contingent negative variation in the fast-incentive condition. Unlike controls, neither clinical group showed an improvement from the slow-unrewarded baseline to the fast-incentive condition in attentional P3 amplitude or alpha power suppression. Most impairments did not differ between the disorders, as only an adjustment in beta suppression between conditions (lower in the ADHD group) distinguished between the clinical groups. These findings suggest shared impairments in women with ADHD and BD in cognitive and neural variability, preparatory activity and inability to adjust attention allocation and activation. These overlapping impairments may represent shared neurobiological mechanisms of attentional dysfunction in ADHD and BD, and potentially underlie common symptoms in both disorders.We thank all who made this research possible: The National Adult ADHD Clinic at the South London and Maudsley Hospital, Dr Helen Costello, Prof Sophia Frangou, Prof Anne Farmer, Jessica Deadman, Hannah Collyer, Sarah-Jane Gregori, and all participants who contributed their time to the study. Dr Giorgia Michelini was supported by a 1+3 PhD studentship awarded by the MRC Social, Genetic and Developmental Psychiatry Centre, Institute of Psychiatry, Psychology and Neuroscience, King’s College London (G9817803). This project was supported by an Economic and Social Research Council studentship to Dr Viryanaga Kitsune (ES/100971X/1). Dr Giorgia Michelini and Prof Philip Asherson are supported by generous grants from the National Institute for Health Research Biomedical Research Centre for Mental Health at King’s College London, Institute of Psychiatry, Psychology and Neuroscience and South London and Maudsley National Health Service (NHS) Foundation Trust. The funders had no role in the design and conduct of the study; collection, management, analysis, and interpretation of the data; preparation, review, or approval of the manuscript; and decision to submit the manuscript for publication

    Practical guidelines for rigor and reproducibility in preclinical and clinical studies on cardioprotection

    Get PDF
    The potential for ischemic preconditioning to reduce infarct size was first recognized more than 30 years ago. Despite extension of the concept to ischemic postconditioning and remote ischemic conditioning and literally thousands of experimental studies in various species and models which identified a multitude of signaling steps, so far there is only a single and very recent study, which has unequivocally translated cardioprotection to improved clinical outcome as the primary endpoint in patients. Many potential reasons for this disappointing lack of clinical translation of cardioprotection have been proposed, including lack of rigor and reproducibility in preclinical studies, and poor design and conduct of clinical trials. There is, however, universal agreement that robust preclinical data are a mandatory prerequisite to initiate a meaningful clinical trial. In this context, it is disconcerting that the CAESAR consortium (Consortium for preclinicAl assESsment of cARdioprotective therapies) in a highly standardized multi-center approach of preclinical studies identified only ischemic preconditioning, but not nitrite or sildenafil, when given as adjunct to reperfusion, to reduce infarct size. However, ischemic preconditioning—due to its very nature—can only be used in elective interventions, and not in acute myocardial infarction. Therefore, better strategies to identify robust and reproducible strategies of cardioprotection, which can subsequently be tested in clinical trials must be developed. We refer to the recent guidelines for experimental models of myocardial ischemia and infarction, and aim to provide now practical guidelines to ensure rigor and reproducibility in preclinical and clinical studies on cardioprotection. In line with the above guideline, we define rigor as standardized state-of-the-art design, conduct and reporting of a study, which is then a prerequisite for reproducibility, i.e. replication of results by another laboratory when performing exactly the same experiment
    corecore