127 research outputs found

    Stochastic fiber dynamics in a spatially semi-discrete setting

    Full text link
    We investigate a spatially discrete surrogate model for the dynamics of a slender, elastic, inextensible fiber in turbulent flows. Deduced from a continuous space-time beam model for which no solution theory is available, it consists of a high-dimensional second order stochastic differential equation in time with a nonlinear algebraic constraint and an associated Lagrange multiplier term. We establish a suitable framework for the rigorous formulation and analysis of the semi-discrete model and prove existence and uniqueness of a global strong solution. The proof is based on an explicit representation of the Lagrange multiplier and on the observation that the obtained explicit drift term in the equation satisfies a one-sided linear growth condition on the constraint manifold. The theoretical analysis is complemented by numerical studies concerning the time discretization of our model. The performance of implicit Euler-type methods can be improved when using the explicit representation of the Lagrange multiplier to compute refined initial estimates for the Newton method applied in each time step.Comment: 20 pages; typos removed, references adde

    Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(282^8) Multiplication

    Get PDF
    It is well known that Canright’s tower field construction leads to a very small, unprotected AES S-box circuit by recursively embedding Galois Field operations into smaller fields. The current size record for the AES S-box by Boyar, Matthews and Peralta improves the original design with optimal subcomponents, while maintaining the overall tower-field structure. Similarly, all small state-of-the-art first-order SCA-secure AES S-box constructions are based on a tower field structure. We demonstrate that a smaller first-order secure AES S-box is achievable by representing the field inversion as a multiplication chain of length 4. Based on this representation, we showcase a very compact S-box circuit with only one GF(282^8)-multiplier instance. Thereby, we introduce a new high-level representation of the AES S-box and set a new record for the smallest first-order secure implementatio

    A Note on Transitional Leakage When Masking AES with Only Two Bits of Randomness

    Get PDF
    Recently, Gross et al. demonstrated a first-order probing-secure implementation of AES using only two bits of randomness for both the initial sharing and the entire computation of AES. In this note, we recall that first-order probing security may not be sufficient for practical first-order security when randomness is re-cycled. We demonstrate that without taking the transitional leakage into account, the expected security level in a serialized design based on their concept might not be achieved in practice

    Co-reference annotation and resources: a multilingual corpus of typologically diverse languages

    Get PDF
    This article introduces a dialogue corpus containing data from two typologically different languages, Japanese and Kilivila. The corpus is annotated in accordance with language specific annotation schemes for co-referential and similar relations. The article describes the corpus data, the properties of language specific co-reference in the two languages and a methodology for its annotation. Examples from the corpus show how this methodology is used in the workflow of the annotation process

    A Note on Masking Generic Boolean Functions

    Get PDF
    Masking is a popular countermeasure to protect cryptographic implementations against side-channel attacks (SCA). In the literature, a myriad of proposals of masking schemes can be found. They are typically defined by a masked multiplication, since this can serve as a basic building block for any nonlinear algorithm. However, when masking generic Boolean functions of algebraic degree t, it is very inefficient to construct the implementation from masked multiplications only. Further, it is not immediately clear from the description of a masked multiplication, how to efficiently implement a masked Boolean function. In this work, we fill this gap in the literature with a detailed description and investigation of a generic masking methodology for Boolean functions of any degree t at any security order d

    Cryptographic Fault Diagnosis using VerFI

    Get PDF
    Historically, fault diagnosis for integrated circuits has singularly dealt with reliability concerns. In contrast, a cryptographic circuit needs to be primarily evaluated concerning information leakage in the presence of maliciously crafted faults. While Differential Fault Attacks (DFAs) on symmetric ciphers have been known for over 20 years, recent developments have tried to structurally classify the attackers’ capabilities as well as the properties of countermeasures. Correct realization of countermeasures should still be manually verified, which is error-prone and infeasible for even moderate-size real-world designs. Here, we introduce the concept of Cryptographic Fault Diagnosis, which revises and shapes the notions of fault diagnosis in reliability testing to the needs of evaluating cryptographic implementations. Additionally, we present VerFI, which materializes the idea of Cryptographic Fault Diagnosis. It is a fully automated, open-source fault detection tool processing the gate-level representation of arbitrary cryptographic implementations. By adjusting the bounds of the underlying adversary model, VerFI allows us to rapidly examine the desired fault detection/correction capabilities of the given implementation. Among several case studies, we demonstrate its application on an implementation of LED cipher with combined countermeasures against side-channel analysis and fault-injection attacks (published at CRYPTO 2016). This experiment revealed general implementation flaws and undetectable faults leading to successful DFA on the protected design with full-key recovery

    Identification and Structural Characterization of Interneurons of the Drosophila Brain by Monoclonal Antibodies of the Würzburg Hybridoma Library

    Get PDF
    Several novel synaptic proteins have been identified by monoclonal antibodies (mAbs) of the Würzburg hybridoma library generated against homogenized Drosophila brains, e.g. cysteine string protein, synapse-associated protein of 47 kDa, and Bruchpilot. However, at present no routine technique exists to identify the antigens of mAbs of our library that label only a small number of cells in the brain. Yet these antibodies can be used to reproducibly label and thereby identify these cells by immunohistochemical staining. Here we describe the staining patterns in the Drosophila brain for ten mAbs of the Würzburg hybridoma library. Besides revealing the neuroanatomical structure and distribution of ten different sets of cells we compare the staining patterns with those of antibodies against known antigens and GFP expression patterns driven by selected Gal4 lines employing regulatory sequences of neuronal genes. We present examples where our antibodies apparently stain the same cells in different Gal4 lines suggesting that the corresponding regulatory sequences can be exploited by the split-Gal4 technique for transgene expression exclusively in these cells. The detection of Gal4 expression in cells labeled by mAbs may also help in the identification of the antigens recognized by the antibodies which then in addition to their value for neuroanatomy will represent important tools for the characterization of the antigens. Implications and future strategies for the identification of the antigens are discussed

    Dual versus single vessel normothermic ex vivo perfusion of rat liver grafts using metamizole for vasodilatation

    Get PDF
    Background: Normothermic ex vivo liver perfusion (NEVLP) is a promising strategy to increase the donor pool in liver transplantation. Small animal models are essential to further investigate questions regarding organ preservation and reconditioning by NEVLP. A dual vessel small animal NEVLP (dNEVLP) model was developed using metamizole as a vasodilator and compared to conventional portovenous single vessel NEVLP (sNEVLP). Methods: Livers of male Wistar rats were perfused with erythrocyte-supplemented culture medium for six hours by either dNEVLP via hepatic artery and portal vein or portovenous sNEVLP. dNEVLP was performed either with or without metamizole treatment. Perfusion pressure and flow rates were constantly monitored. Transaminase levels were determined in the perfusate at the start and after three and six hours of perfusion. Bile secretion was monitored and bile LDH and GGT levels were measured hourly. Histopathological analysis was performed using liver and bile duct tissue samples after perfusion. Results: Hepatic artery pressure was significantly lower in dNEVLP with metamizole administration. Compared to sNEVLP, dNEVLP with metamizole treatment showed higher bile production, lower levels of transaminases during and after perfusion as well as significantly lower necrosis in liver and bile duct tissue. Biochemical markers of bile duct injury showed the same trend. Conclusion: Our miniaturized dNEVLP system enables normothermic dual vessel rat liver perfusion. The administration of metamizole effectively ameliorates arterial vasospasm allowing for six hours of dNEVLP, with superior outcome compared to sNEVLP

    The WCET Tool Challenge 2011

    Get PDF
    Following the successful WCET Tool Challenges in 2006 and 2008, the third event in this series was organized in 2011, again with support from the ARTIST DESIGN Network of Excellence. Following the practice established in the previous Challenges, the WCET Tool Challenge 2011 (WCC'11) defined two kinds of problems to be solved by the Challenge participants with their tools, WCET problems, which ask for bounds on the execution time, and flow-analysis problems, which ask for bounds on the number of times certain parts of the code can be executed. The benchmarks to be used in WCC'11 were debie1, PapaBench, and an industrial-strength application from the automotive domain provided by Daimler AG. Two default execution platforms were suggested to the participants, the ARM7 as "simple target'' and the MPC5553/5554 as a "complex target,'' but participants were free to use other platforms as well. Ten tools participated in WCC'11: aiT, Astr\'ee, Bound-T, FORTAS, METAMOC, OTAWA, SWEET, TimeWeaver, TuBound and WCA

    Short-term physical exercise impacts on the human holobiont obtained by a randomised intervention study

    Get PDF
    Background Human well-being has been linked to the composition and functional capacity of the intestinal microbiota. As regular exercise is known to improve human health, it is not surprising that exercise was previously described to positively modulate the gut microbiota, too. However, most previous studies mainly focused on either elite athletes or animal models. Thus, we conducted a randomised intervention study that focused on the effects of different types of training (endurance and strength) in previously physically inactive, healthy adults in comparison to controls that did not perform regular exercise. Overall study duration was ten weeks including six weeks of intervention period. In addition to 16S rRNA gene amplicon sequencing of longitudinally sampled faecal material of participants (six time points), detailed body composition measurements and analysis of blood samples (at baseline and after the intervention) were performed to obtain overall physiological changes within the intervention period. Activity tracker devices (wrist-band wearables) provided activity status and sleeping patterns of participants as well as exercise intensity and heart measurements. Conclusions We could show that different types of exercise have distinct but moderate effects on the overall physiology of humans and very distinct microbial changes in the gut. The observed overall changes during the intervention highlight the importance of physical activity on well-being. Future studies should investigate the effect of exercise on a longer timescale, investigate different training intensities and consider high-resolution shotgun metagenomics technology. Trial registration DRKS, DRKS00015873 . Registered 12 December 2018; Retrospectively registered
    corecore