50 research outputs found

    Circuits with arbitrary gates for random operators

    Full text link
    We consider boolean circuits computing n-operators f:{0,1}^n --> {0,1}^n. As gates we allow arbitrary boolean functions; neither fanin nor fanout of gates is restricted. An operator is linear if it computes n linear forms, that is, computes a matrix-vector product y=Ax over GF(2). We prove the existence of n-operators requiring about n^2 wires in any circuit, and linear n-operators requiring about n^2/\log n wires in depth-2 circuits, if either all output gates or all gates on the middle layer are linear.Comment: 7 page

    On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i

    Get PDF
    Argon2i is a data-independent memory hard function that won the password hashing competition. The password hashing algorithm has already been incorporated into several open source crypto libraries such as libsodium. In this paper we analyze the cumulative memory cost of computing Argon2i. On the positive side we provide a lower bound for Argon2i. On the negative side we exhibit an improved attack against Argon2i which demonstrates that our lower bound is nearly tight. In particular, we show that (1) An Argon2i DAG is (e,O(n3/e3)))\left(e,O\left(n^3/e^3\right)\right))-reducible. (2) The cumulative pebbling cost for Argon2i is at most O(n1.768)O\left(n^{1.768}\right). This improves upon the previous best upper bound of O(n1.8)O\left(n^{1.8}\right) [Alwen and Blocki, EURO S&P 2017]. (3) Argon2i DAG is (e,Ω~(n3/e3)))\left(e,\tilde{\Omega}\left(n^3/e^3\right)\right))-depth robust. By contrast, analysis of [Alwen et al., EUROCRYPT 2017] only established that Argon2i was (e,Ω~(n2/e2)))\left(e,\tilde{\Omega}\left(n^2/e^2\right)\right))-depth robust. (4) The cumulative pebbling complexity of Argon2i is at least Ω~(n1.75)\tilde{\Omega}\left( n^{1.75}\right). This improves on the previous best bound of Ω(n1.66)\Omega\left( n^{1.66}\right) [Alwen et al., EUROCRYPT 2017] and demonstrates that Argon2i has higher cumulative memory cost than competing proposals such as Catena or Balloon Hashing. We also show that Argon2i has high {\em fractional} depth-robustness which strongly suggests that data-dependent modes of Argon2 are resistant to space-time tradeoff attacks

    Zesde Nederlandse bosinventarisatie : methoden en basisresultaten

    Get PDF
    Bos beslaat 11% van het grondgebruik in Nederland. Het Nederlandse bos wordt gemiddeld ouder, meer gemengd en iets meer ongelijkjarig. De gemiddelde voorraad levend en dood hout blijft toenemen. De gemiddelde bijgroei is iets gedaald, bij ongeveer gelijkblijvende kap. Er is een duidelijke verschuiving gaande van naaldboomsoorten naar loofboomsoorten. Dat zijn resultaten uit de zesde bosinventarisatie (in opdracht van ministerie EZ)

    On Second-Order Monadic Monoidal and Groupoidal Quantifiers

    Get PDF
    We study logics defined in terms of second-order monadic monoidal and groupoidal quantifiers. These are generalized quantifiers defined by monoid and groupoid word-problems, equivalently, by regular and context-free languages. We give a computational classification of the expressive power of these logics over strings with varying built-in predicates. In particular, we show that ATIME(n) can be logically characterized in terms of second-order monadic monoidal quantifiers

    Anopheles gambiae Antiviral Immune Response to Systemic O'nyong-nyong Infection

    Get PDF
    Mosquito-borne viral diseases are found across the globe and are responsible for numerous severe human infections. In order to develop novel methods for prevention and treatment of these diseases, detailed understanding of the biology of viral infection and transmission is required. Little is known about invertebrate responses to infection in mosquito hosts. In this study we used a model system of Anopheles gambiae mosquitoes and O'nyong-nyong virus to study mosquito immune responses to infection. We examined the global transcriptional responses of A. gambiae to viral infection of the mosquito blood equivalent (the hemolymph) identifying a number of genes with immune functions that are switched on or off in response to infection, including complement-like proteins that circulate in the mosquito hemolymph. The switching on of these genes combined with co-infection experiments with malaria parasites suggests that viral infection inhibits the melanisation pathway. Through silencing the function of a selection of viral responsive genes, we identified four genes that have roles in A. gambiae anti-viral immunity; two putative recognition receptors (a galectin and an MD2-like receptor); two effector lysozymes. These molecules have previously non-described roles in antiviral immunity, and suggest uncharacterised mechanisms for targeting viral infection in A. gambiae mosquitoes

    Triangle-Freeness is Hard to Detect

    No full text

    Das Gleichgewicht 2H2+O2 ? 2H2O in der Glimmentladung

    No full text
    corecore