88 research outputs found

    Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grøstl, and Skein

    Get PDF
    The weakening of the widely used SHA-1 hash function has also cast doubts on the strength of the related algorithms of the SHA-2 family. The US NIST has therefore initiated the SHA-3 competition in order to select a modern hash function algorithm as a ``backup\u27\u27 for SHA-2. This algorithm should be efficiently implementable both in software and hardware under different constraints. In this paper, we present hardware implementations of the four SHA-3 candidates ARIRANG, BLAKE, Grøstl, and Skein with the primary constraint of minimizing chip area

    Atheisms and the purification of faith

    Get PDF
    Philosophers of religion have distinguished between ‘negative’ and ‘positive’ atheism. This article considers further conceptions of atheism, especially the idea that atheism can facilitate a faith in God purified of idolatrous assumptions. After introducing Bultmann’s contention that a ‘conscious atheist’ can find something transcendent in the world, this contention is interpreted through reflection on Ricoeur’s claim that the atheisms of Nietzsche and Freud serve to mediate a transition to a purified faith – a faith involving heightened receptivity to agapeic love. The troubling question of what differentiates atheism from belief in God is then discussed in the light of Simone Weil’s meditations on God’s secret presence

    A better life through information technology? The techno-theological eschatology of posthuman speculative science

    Get PDF
    This is the pre-peer reviewed version of the article, published in Zygon 41(2) pp.267-288, which has been published in final form at http://www3.interscience.wiley.com/journal/118588124/issueThe depiction of human identity in the pop-science futurology of engineer/inventor Ray Kurzweil, the speculative-robotics of Carnegie Mellon roboticist Hans Moravec and the physics of Tulane University mathematics professor Frank Tipler elevate technology, especially information technology, to a point of ultimate significance. For these three figures, information technology offers the potential means by which the problem of human and cosmic finitude can be rectified. Although Moravec’s vision of intelligent robots, Kurzweil’s hope for immanent human immorality, and Tipler’s description of human-like von Neumann probe colonising the very material fabric of the universe, may all appear to be nothing more than science fictional musings, they raise genuine questions as to the relationship between science, technology, and religion as regards issues of personal and cosmic eschatology. In an attempt to correct what I see as the ‘cybernetic-totalism’ inherent in these ‘techno-theologies’, I will argue for a theology of technology, which seeks to interpret technology hermeneutically and grounds human creativity in the broader context of divine creative activity

    Editing site analysis in a gymnosperm mitochondrial genome reveals similarities with angiosperm mitochondrial genomes

    Get PDF
    Sequence analysis of organelle genomes and comprehensive analysis of C-to-U editing sites from flowering and non-flowering plants have provided extensive sequence information from diverse taxa. This study includes the first comprehensive analysis of RNA editing sites from a gymnosperm mitochondrial genome, and utilizes informatics analyses to determine conserved features in the RNA sequence context around editing sites. We have identified 565 editing sites in 21 full-length and 4 partial cDNAs of the 39 protein-coding genes identified from the mitochondrial genome of Cycas taitungensis. The information profiles and RNA sequence context of C-to-U editing sites in the Cycas genome exhibit similarity in the immediate flanking nucleotides. Relative entropy analyses indicate that similar regions in the 5′ flanking 20 nucleotides have information content compared to angiosperm mitochondrial genomes. These results suggest that evolutionary constraints exist on the nucleotide sequences immediately adjacent to C-to-U editing sites, and similar regions are utilized in editing site recognition

    Complex chloroplast RNA metabolism: just debugging the genetic programme?

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The gene expression system of chloroplasts is far more complex than that of their cyanobacterial progenitor. This gain in complexity affects in particular RNA metabolism, specifically the transcription and maturation of RNA. Mature chloroplast RNA is generated by a plethora of nuclear-encoded proteins acquired or recruited during plant evolution, comprising additional RNA polymerases and sigma factors, and sequence-specific RNA maturation factors promoting RNA splicing, editing, end formation and translatability. Despite years of intensive research, we still lack a comprehensive explanation for this complexity.</p> <p>Results</p> <p>We inspected the available literature and genome databases for information on components of RNA metabolism in land plant chloroplasts. In particular, new inventions of chloroplast-specific mechanisms and the expansion of some gene/protein families detected in land plants lead us to suggest that the primary function of the additional nuclear-encoded components found in chloroplasts is the transgenomic suppression of point mutations, fixation of which occurred due to an enhanced genetic drift exhibited by chloroplast genomes. We further speculate that a fast evolution of transgenomic suppressors occurred after the water-to-land transition of plants.</p> <p>Conclusion</p> <p>Our inspections indicate that several chloroplast-specific mechanisms evolved in land plants to remedy point mutations that occurred after the water-to-land transition. Thus, the complexity of chloroplast gene expression evolved to guarantee the functionality of chloroplast genetic information and may not, with some exceptions, be involved in regulatory functions.</p

    Maintenance of plastid RNA editing activities independently of their target sites

    No full text
    RNA editing in plant organelles is mediated by site-specific, nuclear-encoded factors. Previous data suggested that the maintenance of these factors depends on the presence of their rapidly evolving cognate sites. The surprising ability of allotetraploid Nicotiana tabacum (tobacco) to edit a foreign site in the chloroplast ndhA messenger RNA was thought to be inherited from its diploid male ancestor, Nicotiana tomentosiformis. Here, we show that the same ndhA editing activity is also present in Nicotiana sylvestris, which is the female diploid progenitor of tobacco and which lacks the ndhA site. Hence, heterologous editing is not simply a result of tobacco's allopolyploid genome organization. Analyses of other editing sites after sexual or somatic transfer between land plants showed that heterologous editing occurs at a surprisingly high frequency. This suggests that the corresponding editing activities are conserved despite the absence of their target sites, potentially because they serve other functions in the plant cell

    Energy Evaluation of Software Implementations of Block Ciphers under Memory Constraints

    No full text
    Software implementations of modern block ciphers often require large lookup tables along with code size increasing optimizations like loop unrolling to reach peak performance on general-purpose processors. Therefore, block ciphers are difficult to implement efficiently on embedded devices like smart cards or sensor nodes where run-time memory and program ROM are scarce resources. In this paper we analyze and compare the performance, energy consumption, runtime memory requirements, and code size of the five block ciphers RC6, Rijndael, Serpent, Twofish, and XTEA on the StrongARM SA-1100 processor. Most previous evaluations of block ciphers considered performance as the sole metric of interest and did not care about memory requirements or code size. In contrast to previous work, our study of the performance and energy characteristics of block ciphers has been conducted with “lightweight” implementations which restrict the size of lookup tables to 1 kB and also impose constraints on the code size. We found that Rijndael and RC6 can be well optimized for high performance and energy efficiency, while at the same time meeting the demand for low memory (RAM and ROM) footprint. In addition, we discuss the impact of key expansion and modes of operation on the overall performance and energy consumption of each block cipher. Our simulation results show that RC6 is the most energy-efficient block cipher under memory constraints and thus the best choice for resource-restricted devices
    corecore