74 research outputs found

    The Randomized Slicer for CVPP: Sharper, Faster, Smaller, Batchier

    Get PDF
    Following the recent line of work on solving the closest vector problem with preprocessing (CVPP) using approximate Voronoi cells, we improve upon previous results in the following ways:-We derive sharp asymptotic bounds on the success probability of the randomized slicer, by modelling the behaviour of the algorithm as a random walk on the coset of the lattice of the target vector. We thereby solve the open question left by Doulgerakis–Laarhoven–De Weger [PQCrypto 2019] and Laarhoven [MathCrypt 2019].-We obtain better trade-offs for CVPP and its generalisations (strictly, in certain regimes), both with and without nearest neighbour searching, as a direct result of the above sharp bounds on the success probabilities.-We show how to reduce the memory requirement of the slicer, and in particular the corresponding nearest neighbour data structures, using ideas similar to those proposed by Becker–Gama–Joux [Cryptology ePrint Archive, 2015]. Using 20.185d+o(d)memory, we can solve a single CVPP instance in 20.264d+o(d)time.-We further improve on the per-instance time complexities in certain memory regimes, when we are given a sufficiently large batch of CVPP problem instances for the same lattice. Using memory, we can heuristically solve CVPP instances in amortized time, for batches of size at least.Our random walk model for analysing arbitrary-step transition probabilities in complex step-wise algorithms may be of independent interest, both for deriving analytic bounds through convexity arguments, and for computing optimal paths numerically with a shortest path algorithm. As a side result we apply the same random walk model to graph-based nearest neighbour searching, where we improve upon results of Laarhoven [SOCG 2018] by deriving sharp bounds on the success probability of the corresponding greedy search procedure

    Targeted disruption of Slc2a8 (GLUT8) reduces motility and mitochondrial potential of spermatozoa

    Get PDF
    GLUT8 is a class 3 sugar transport facilitator which is predominantly expressed in testis and also detected in brain, heart, skeletal muscle, adipose tissue, adrenal gland, and liver. Since its physiological function in these tissues is unknown, we generated a Slc2a8 null mouse and characterized its phenotype. Slc2a8 knockout mice appeared healthy and exhibited normal growth, body weight development and glycemic control, indicating that GLUT8 does not play a significant role for maintenance of whole body glucose homeostasis. However, analysis of the offspring distribution of heterozygous mating indicated a lower number of Slc2a8 knockout offspring (30.5:47.3:22.1%, Slc2a8+/+, Slc2a8+/−, and Slc2a8−/− mice, respectively) resulting in a deviation (p = 0.0024) from the expected Mendelian distribution. This difference was associated with lower ATP levels, a reduced mitochondrial membrane potential and a significant reduction of sperm motility of the Slc2a8 knockout in comparison to wild-type spermatozoa. In contrast, number and survival rate of spermatozoa were not altered. These data indicate that GLUT8 plays an important role in the energy metabolism of sperm cells

    Cryptanalysis of GlobalPlatform Secure Channel Protocols

    Get PDF
    GlobalPlatform (GP) card specifications are the de facto standards for the industry of smart cards. Being highly sensitive, GP specifications were defined regarding stringent security requirements. In this paper, we analyze the cryptographic core of these requirements; i.e. the family of Secure Channel Protocols (SCP). Our main results are twofold. First, we demonstrate a theoretical attack against SCP02, which is the most popular protocol in the SCP family. We discuss the scope of our attack by presenting an actual scenario in which a malicious entity can exploit it in order to recover encrypted messages. Second, we investigate the security of SCP03 that was introduced as an amendment in 2009. We find that it provably satisfies strong notions of security. Of particular interest, we prove that SCP03 withstands algorithm substitution attacks (ASAs) defined by Bellare et al. that may lead to secret mass surveillance. Our findings highlight the great value of the paradigm of provable security for standards and certification, since unlike extensive evaluation, it formally guarantees the absence of security flaws

    Reticular synthesis and the design of new materials

    Full text link
    The long-standing challenge of designing and constructing new crystalline solid-state materials from molecular building blocks is just beginning to be addressed with success. A conceptual approach that requires the use of secondary building units to direct the assembly of ordered frameworks epitomizes this process: we call this approach reticular synthesis. This chemistry has yielded materials designed to have predetermined structures, compositions and properties. In particular, highly porous frameworks held together by strong metal-oxygen-carbon bonds and with exceptionally large surface area and capacity for gas storage have been prepared and their pore metrics systematically varied and functionalized.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/62718/1/nature01650.pd

    The LifeCycle Project-EU Child Cohort Network : a federated analysis infrastructure and harmonized data of more than 250,000 children and parents

    Get PDF
    Early life is an important window of opportunity to improve health across the full lifecycle. An accumulating body of evidence suggests that exposure to adverse stressors during early life leads to developmental adaptations, which subsequently affect disease risk in later life. Also, geographical, socio-economic, and ethnic differences are related to health inequalities from early life onwards. To address these important public health challenges, many European pregnancy and childhood cohorts have been established over the last 30 years. The enormous wealth of data of these cohorts has led to important new biological insights and important impact for health from early life onwards. The impact of these cohorts and their data could be further increased by combining data from different cohorts. Combining data will lead to the possibility of identifying smaller effect estimates, and the opportunity to better identify risk groups and risk factors leading to disease across the lifecycle across countries. Also, it enables research on better causal understanding and modelling of life course health trajectories. The EU Child Cohort Network, established by the Horizon2020-funded LifeCycle Project, brings together nineteen pregnancy and childhood cohorts, together including more than 250,000 children and their parents. A large set of variables has been harmonised and standardized across these cohorts. The harmonized data are kept within each institution and can be accessed by external researchers through a shared federated data analysis platform using the R-based platform DataSHIELD, which takes relevant national and international data regulations into account. The EU Child Cohort Network has an open character. All protocols for data harmonization and setting up the data analysis platform are available online. The EU Child Cohort Network creates great opportunities for researchers to use data from different cohorts, during and beyond the LifeCycle Project duration. It also provides a novel model for collaborative research in large research infrastructures with individual-level data. The LifeCycle Project will translate results from research using the EU Child Cohort Network into recommendations for targeted prevention strategies to improve health trajectories for current and future generations by optimizing their earliest phases of life.Peer reviewe

    cohesion and conflict in transnational merchant families

    Get PDF
    How do people negotiate the diversity of positionalities within kin groups? Through a diachronic approach, I investigate how Ali and Jalal, two merchants with Azeri and Gilaki ethnic identifications who came to Hamburg in the 1930s, mobilized kin to generate capital along the lines of generation, gender, and age. The reader simultaneously learns about the local history of Iranian immigration. Building on literature about historical merchant networks, the social organization of the Iranian marketplace (bazaar), the anthropology of kinship and transnational families, I question the social cohesion on which Aihwa Ong's study of flexible capital creation relies. The material suggests that the experience of family relations influences agents' positioning in the local Iranian social field

    Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures

    Get PDF
    This article describes concrete results and practically approved countermeasures concerning differential fault attacks on RSA using the CRT. It especially investigates smartcards with a RSA coprocessor where any hardware countermeasure to defeat such fault attacks have been switched off. This scenario has been chosen in order to completely analyze the resulting effects and errors occurring inside the hardware. Using the results of this kind of physical stress attack enables the development of completely reliable software countermeasures. Althoug
    corecore