8 research outputs found

    Natural sd-RCCA secure public-key encryptions from hybrid paradigms

    Get PDF
    The existence of natural public-key encryption (PKE) schemes satisfying secretly detectable replayable CCA (sd-RCCA) security is left as open. By introducing probabilistic message authentication codes (MACs) into popular KEM plus DEM paradigms, several instances of such schemes are presented in this paper. It is known that the encrypt-then-authenticate paradigm gives an RCCA secure DEM when the underlying MAC is regular (but not strong) secure, where forgeries for old messages might be possible. By further requiring that the validity of such forgeries can be verified only secretly, sd-RCCA secure DEMs is obtained. Combining such DEMs with CCA secure KEMs gives sd-RCCA secure hybrid PKEs. We first formalize the related notions and this paradigm, and also other variants of KEM plus DEM hybrid paradigm since MACs are commonly used in them. Then we show natural examples of desired probabilistic MACs under the standard DDH assumption, and find appropriate KEMs to match the message space for those MACs and then obtain natural instances of sd-RCCA secure hybrid PKEs

    Lurasidone hydro­chloride

    Get PDF
    In the crystal structure of the title compound, C28H37N4O2S+·Cl− [systematic name: 4-(1,2-benzothia­zol-3-yl)-1-({2-[(3,5-dioxo-4-aza­tricyclo­[5.2.1.02,6]decan-4-yl)meth­yl]cyclo­hex­yl}meth­yl)piperazin-1-ium chloride], the anions and cations are linked by N—H⋯Cl hydrogen bonds. The crystal structure is further stabilized by C—H⋯π and C—H⋯O inter­actions

    Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms

    Get PDF
    The existence of natural public-key encryption (PKE) schemes satisfying secretly detectable replayable CCA (sd-RCCA) security is left as open. By introducing probabilistic message authentication codes (MACs) into popular KEM plus DEM paradigms, several instances of such schemes are presented in this paper. It is known that the encrypt-then-authenticate paradigm gives an RCCA secure DEM when the underlying MAC is regular (but not strong) secure, where forgeries for old messages might be possible. By further requiring that the validity of such forgeries can be verified only secretly, sd-RCCA secure DEMs is obtained. Combining such DEMs with CCA secure KEMs gives sd-RCCA secure hybrid PKEs. We first formalize the related notions and this paradigm, and also other variants of KEM plus DEM hybrid paradigm since MACs are commonly used in them. Then we show natural examples of desired probabilistic MACs under the standard DDH assumption, and find appropriate KEMs to match the message space for those MACs and then obtain natural instances of sd-RCCA secure hybrid PKEs

    Two-Level Model for Detecting Substation Defects from Infrared Images

    No full text
    Training a deep convolutional neural network (DCNN) to detect defects in substation equipment often requires many defect datasets. However, this dataset is not easily acquired, and the complex background of the infrared images makes defect detection even more difficult. To alleviate this issue, this article presents a two-level defect detection model (TDDM). First, to extract the target equipment in the image, an instance segmentation module is constructed by training from the instance segmentation dataset. Then, the target equipment is segmented by the superpixel segmentation algorithm into superpixels according to obtain more details information. Next, a temperature probability density distribution is constructed with the superpixels, and the defect determination strategy is used to recognize the defect. Finally, experiments verify the effectiveness of the TDDM according to the defect detection dataset

    Advancements in Activating Transcription Factor 5 Function in Regulating Cell Stress and Survival

    No full text
    Activating transcription factor 5 (ATF5) belongs to the activating transcription factor/cyclic adenosine monophosphate (cAMP) response element-binding protein family of basic region leucine zipper transcription factors. ATF5 plays an important role in cell stress regulation and is involved in cell differentiation and survival, as well as centrosome maintenance and development. Accumulating evidence demonstrates that ATF5 plays an oncogenic role in cancer by regulating gene expressions involved in tumorigenesis and tumor survival. Recent studies have indicated that ATF5 may also modify the gene expressions involved in other diseases. This review explores in detail the regulation of ATF5 expression and signaling pathways and elucidates the role of ATF5 in cancer biology. Furthermore, an overview of putative therapeutic strategies that can be used for restoring aberrant ATF5 activity in different cancer types is provided

    DMRNet plus plus : Learning Discriminative Features With Decoupled Networks and Enriched Pairs for One-Step Person Search

    No full text
    10.1109/TPAMI.2022.3221079IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE4567319-733

    Lurasidone hydrochloride

    No full text
    corecore