40 research outputs found

    A note on SPHINCS+ parameter sets

    Get PDF
    In this note, we discuss using parameter sets for SPHINCS+ which support a smaller number of signatures than the 2642^{64} target. This includes a larger search through the SPHINCS+ parameter space, comparing it with the current parameter sets and providing data on how the security degrades if one exceeds the limits

    Design and analysis of cryptographic algorithms

    Get PDF

    Detection of Circulating Tumour Cells from Blood of Breast Cancer Patients via RT-qPCR

    Get PDF
    Breast cancer is still the most frequent cause of cancer-related death in women worldwide. Often death is not caused only by the primary tumour itself, but also by metastatic lesions. Today it is largely accepted, that these remote metastases arise out of cells, which detach from the primary tumour, enter circulation, settle down at secondary sites in the body and are called Circulating Tumour Cells (CTCs). The occurrence of such minimal residual diseases in the blood of breast cancer patients is mostly linked to a worse prognosis for therapy outcome and overall survival. Due to their very low frequency, the detection of CTCs is, still a technical challenge. RT-qPCR as a highly sensitive method could be an approach for CTC-detection from peripheral blood of breast cancer patients. This assumption is based on the fact that CTCs are of epithelial origin and therefore express a different gene panel than surrounding blood cells. For the technical approach it is necessary to identify appropriate marker genes and to correlate their gene expression levels to the number of tumour cells within a sample in an in vitro approach. After that, samples from adjuvant and metastatic patients can be analysed. This approach may lead to new concepts in diagnosis and treatmen

    Observations on the SIMON block cipher family

    Get PDF
    In this paper we analyse the general class of functions underly- ing the Simon block cipher. In particular, we derive efficiently computable and easily implementable expressions for the exact differential and linear behaviour of Simon-like round functions. Following up on this, we use those expressions for a computer aided approach based on SAT/SMT solvers to find both optimal differential and linear characteristics for Simon. Furthermore, we are able to find all characteristics contributing to the probability of a differential for Simon32 and give better estimates for the probability for other variants. Finally, we investigate a large set of Simon variants using different rotation constants with respect to their resistance against differential and linear cryptanalysis. Interestingly, the default parameters seem to be not always optimal

    Scaling laws in the spatial structure of urban road networks

    Full text link
    The urban road networks of the 20 largest German cities have been analysed, based on a detailed database providing the geographical positions as well as the travel-times for network sizes up to 37,000 nodes and 87,000 links. As the human driver recognises travel-times rather than distances, faster roads appear to be 'shorter' than slower ones. The resulting metric space has an effective dimension d>2, which is a significant measure of the heterogeneity of road speeds. We found that traffic strongly concentrates on only a small fraction of the roads. The distribution of vehicular flows over the roads obeys a power law, indicating a clear hierarchical order of the roads. Studying the cellular structure of the areas enclosed by the roads, the distribution of cell sizes is scale invariant as well

    Glycosyltransferases as Markers for Early Tumorigenesis

    Get PDF
    Background. Glycosylation is the most frequent posttranslational modification of proteins and lipids influencing inter-and intracellular communication and cell adhesion. Altered glycosylation patterns are characteristically observed in tumour cells. Normal and altered carbohydrate chains are transferred to their acceptor structures via glycosyltransferases. Here, we present the correlation between the presence of three different glycosyltransferases and tumour characteristics. Methods. 235 breast cancer tissue samples were stained immunohistochemically for the glycosyltransferases N-acetylgalactosaminyltransferase 6 (GALNT6),beta-1, 6-N-acetylglucosaminyltransferase 2 (GCNT2),and ST6 (alpha-N-acetyl-neuraminyl-2, 3-beta-galactosyl-1, 3)-N-acetylgalactosamine beta-2, 6-sialyltransferase 1 (ST6GALNac1). Staining was evaluated by light microscopy and was correlated to different tumour characteristics by statistical analysis. Results. We found a statistically significant correlation for the presence of glycosyltransferases and tumour size and grading. Specifically smaller tumours with low grading revealed the highest incidences of glycosyltransferases. Additionally, Her4-expression but not pHer4-expression is correlated with the presence of glycosyltransferases. All other investigated parameters could not uncover any statistically significant reciprocity. Conclusion. Here we show, that glycosyltransferases can identify small tumours with well-differentiated cells;hence, glycosylation patterns could be used as a marker for early tumourigenesis. This assumption is supported by the fact that Her4 is also correlated to glycosylation, whereas the activated form of Her4 does not show such a connection with glycosylation

    Glycosyltransferases as Markers for Early Tumorigenesis

    Get PDF
    Background. Glycosylation is the most frequent posttranslational modification of proteins and lipids influencing inter-and intracellular communication and cell adhesion. Altered glycosylation patterns are characteristically observed in tumour cells. Normal and altered carbohydrate chains are transferred to their acceptor structures via glycosyltransferases. Here, we present the correlation between the presence of three different glycosyltransferases and tumour characteristics. Methods. 235 breast cancer tissue samples were stained immunohistochemically for the glycosyltransferases N-acetylgalactosaminyltransferase 6 (GALNT6),beta-1, 6-N-acetylglucosaminyltransferase 2 (GCNT2),and ST6 (alpha-N-acetyl-neuraminyl-2, 3-beta-galactosyl-1, 3)-N-acetylgalactosamine beta-2, 6-sialyltransferase 1 (ST6GALNac1). Staining was evaluated by light microscopy and was correlated to different tumour characteristics by statistical analysis. Results. We found a statistically significant correlation for the presence of glycosyltransferases and tumour size and grading. Specifically smaller tumours with low grading revealed the highest incidences of glycosyltransferases. Additionally, Her4-expression but not pHer4-expression is correlated with the presence of glycosyltransferases. All other investigated parameters could not uncover any statistically significant reciprocity. Conclusion. Here we show, that glycosyltransferases can identify small tumours with well-differentiated cells;hence, glycosylation patterns could be used as a marker for early tumourigenesis. This assumption is supported by the fact that Her4 is also correlated to glycosylation, whereas the activated form of Her4 does not show such a connection with glycosylation

    Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications

    Get PDF
    Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs. However, various applications exist where the performance on short (fixed length) inputs matters more. Such hash functions are the bottleneck in hash-based signature schemes like SPHINCS or XMSS, which is currently under standardization. Secure functions specifically designed for such applications are scarce. We attend to this gap by proposing two short-input hash functions (or rather simply compression functions). By utilizing AES instructions on modern CPUs, our proposals are the fastest on such platforms, reaching throughputs below one cycle per hashed byte even for short inputs, while still having a very low latency of less than 60 cycles. Under the hood, this results comes with several innovations. First, we study whether the number of rounds for our hash functions can be reduced, if only second-preimage resistance (and not collision resistance) is required. The conclusion is: only a little. Second, since their inception, AES-like designs allow for supportive security arguments by means of counting and bounding the number of active S-boxes. However, this ignores powerful attack vectors using truncated differentials, including the powerful rebound attacks. We develop a general tool-based method to include arguments against attack vectors using truncated differentials

    Security of the AES with a Secret S-box

    Get PDF
    How does the security of the AES change when the S-box is replaced by a secret S-box, about which the adversary has no knowledge? Would it be safe to reduce the number of encryption rounds? In this paper, we demonstrate attacks based on integral cryptanalysis which allows to recover both the secret key and the secret S-box for respectively four, five, and six rounds of the AES. Despite the significantly larger amount of secret information which an adversary needs to recover, the attacks are very efficient with time/data complexities of 217/2162^{17}/2^{16}, 238/2402^{38}/2^{40} and 290/2642^{90}/2^{64}, respectively. Another interesting aspect of our attack is that it works both as chosen plaintext and as chosen ciphertext attack. Surprisingly, the chosen ciphertext variant has a significantly lower time complexity in the attacks on four and five round, compared to the respective chosen plaintext attacks

    Real-Time qPCR-Based Detection of Circulating Tumor Cells from Blood Samples of Adjuvant Breast Cancer Patients: A Preliminary Study

    Get PDF
    Background: Circulating tumor cells (CTCs) are cells that detach from a primary tumor, circulate through the blood stream and lymphatic vessels, and are considered to be the main reason for remote metastasis. Due to their origin, tumor cells have different gene expression levels than the surrounding blood cells. Therefore, they might be detectable in blood samples from breast cancer patients by real-time quantitative polymerase chain reaction (RT-qPCR). Materials and Methods: Blood samples of healthy donors and adjuvant breast cancer patients were withdrawn and the cell fraction containing white blood cells and tumor cells was enriched by density gradient centrifugation. RNA was isolated and reverse transcribed to cDNA, which was then used in TaqMan real-time PCR against cytokeratin (CK)8, CK18 and CK19. 18S and GAPDH were used as controls. Results: All 3 CKs were, on average, found to be significantly higher expressed in adjuvant breast cancer samples compared to negative controls, probably due to the presence of CTCs. Unfortunately, gene expression levels could not be correlated to tumor characteristics. Conclusions: RT-qPCR could make up a new approach for the detection of CTCs from blood samples of breast cancer patients, but a correlation of the PCR data to gold standard methods in CTC detection would help to further improve the informative value of the qPCR results. (C) 2016 S. Karger GmbH, Freibur
    corecore