1,346 research outputs found

    Improved linear programming decoding of LDPC codes and bounds on the minimum and fractional distance

    Full text link
    We examine LDPC codes decoded using linear programming (LP). Four contributions to the LP framework are presented. First, a new method of tightening the LP relaxation, and thus improving the LP decoder, is proposed. Second, we present an algorithm which calculates a lower bound on the minimum distance of a specific code. This algorithm exhibits complexity which scales quadratically with the block length. Third, we propose a method to obtain a tight lower bound on the fractional distance, also with quadratic complexity, and thus less than previously-existing methods. Finally, we show how the fundamental LP polytope for generalized LDPC codes and nonbinary LDPC codes can be obtained.Comment: 17 pages, 8 figures, Submitted to IEEE Transactions on Information Theor

    Adaptive learning and cryptography

    Get PDF
    Significant links exist between cryptography and computational learning theory. Cryptographic functions are the usual method of demonstrating significant intractability results in computational learning theory as they can demonstrate that certain problems are hard in a representation independent sense. On the other hand, hard learning problems have been used to create efficient cryptographic protocols such as authentication schemes, pseudo-random permutations and functions, and even public key encryption schemes.;Learning theory / coding theory also impacts cryptography in that it enables cryptographic primitives to deal with the issues of noise or bias in their inputs. Several different constructions of fuzzy primitives exist, a fuzzy primitive being a primitive which functions correctly even in the presence of noisy , or non-uniform inputs. Some examples of these primitives include error-correcting blockciphers, fuzzy identity based cryptosystems, fuzzy extractors and fuzzy sketches. Error correcting blockciphers combine both encryption and error correction in a single function which results in increased efficiency. Fuzzy identity based encryption allows the decryption of any ciphertext that was encrypted under a close enough identity. Fuzzy extractors and sketches are methods of reliably (re)-producing a uniformly random secret key given an imperfectly reproducible string from a biased source, through a public string that is called the sketch .;While hard learning problems have many qualities which make them useful in constructing cryptographic protocols, such as their inherent error tolerance and simple algebraic structure, it is often difficult to utilize them to construct very secure protocols due to assumptions they make on the learning algorithm. Due to these assumptions, the resulting protocols often do not have security against various types of adaptive adversaries. to help deal with this issue, we further examine the inter-relationships between cryptography and learning theory by introducing the concept of adaptive learning . Adaptive learning is a rather weak form of learning in which the learner is not expected to closely approximate the concept function in its entirety, rather it is only expected to answer a query of the learner\u27s choice about the target. Adaptive learning allows for a much weaker learner than in the standard model, while maintaining the the positive properties of many learning problems in the standard model, a fact which we feel makes problems that are hard to adaptively learn more useful than standard model learning problems in the design of cryptographic protocols. We argue that learning parity with noise is hard to do adaptively and use that assumption to construct a related key secure, efficient MAC as well as an efficient authentication scheme. In addition we examine the security properties of fuzzy sketches and extractors and demonstrate how these properties can be combined by using our related key secure MAC. We go on to demonstrate that our extractor can allow a form of related-key hardening for protocols in that, by affecting how the key for a primitive is stored it renders that protocol immune to related key attacks

    Forward Secure Fuzzy Extractors

    Get PDF

    Sex workers perspectives on strategies to reduce sexual exploitation and HIV risk: a qualitative study in Tijuana, Mexico.

    Get PDF
    Globally, female sex workers are a population at greatly elevated risk of HIV infection, and the reasons for and context of sex industry involvement have key implications for HIV risk and prevention. Evidence suggests that experiences of sexual exploitation (i.e., forced/coerced sex exchange) contribute to health-related harms. However, public health interventions that address HIV vulnerability and sexual exploitation are lacking. Therefore, the objective of this study was to elicit recommendations for interventions to prevent sexual exploitation and reduce HIV risk from current female sex workers with a history of sexual exploitation or youth sex work. From 2010-2011, we conducted in-depth interviews with sex workers (n = 31) in Tijuana, Mexico who reported having previously experienced sexual exploitation or youth sex work. Participants recommended that interventions aim to (1) reduce susceptibility to sexual exploitation by providing social support and peer-based education; (2) mitigate harms by improving access to HIV prevention resources and psychological support, and reducing gender-based violence; and (3) provide opportunities to exit the sex industry via vocational supports and improved access to effective drug treatment. Structural interventions incorporating these strategies are recommended to reduce susceptibility to sexual exploitation and enhance capacities to prevent HIV infection among marginalized women and girls in Mexico and across international settings

    Prospective ultrasonographic study of blood flow and testicular volume in patients submitted to surgical repair of inguinal hernia without using prosthesis

    Get PDF
    Purpose: To evaluate the behavior of arterial circulation and testicular volume in patients submitted to conventional inguinal hernia repair without the use of a synthetic prosthesis to reinforce the posterior wall. Methods: A prospective observational clinical trial was performed on 26 male patients with unilateral inguinal hernia types I and II by the Nyhus classification, who underwent surgical correction using the modified Bassini technique. Bilateral Doppler ultrasonography was performed preoperatively, at the third and at the sixth postoperative month. The studied variables were: systolic peak velocity (SPV), diastolic peak velocity (DPV), resistance index (RI), pulsatility index (PI) and testicular volume. Results: There were no statistically significant changes over time in the variables studied on the operated side: SPV (p = 0.916), DPV (p = 0.304), RI (p = 0.879), PI (p = 0.475), and testicular volume (p = 0.100). The variables on the control side also did not change statistically until the sixth postoperative month: SPV (p = 0.784), DPV (p = 0.446), RI (p = 0.672), PI (p = 0.607), and testicular volume (p = 0.413). Conclusion: Surgical correction of the inguinal hernia without the use of a prosthesis does not cause alterations in vascularization and testicular volume in the first six months postoperatively.Univ Fed Sao Paulo UNIFESP, Postgrad Program Interdisciplinary Surg Sci, Sao Paulo, BrazilUniv Fed Sao Paulo, Surg Dept, Surg Gastroenterol Div, Sao Paulo, BrazilUniv Fed Sao Paulo UNIFESP, Postgrad Program Interdisciplinary Surg Sci, Sao Paulo, BrazilUniv Fed Sao Paulo, Surg Dept, Surg Gastroenterol Div, Sao Paulo, BrazilWeb of Scienc

    International study into the use of intermittent hormone therapy in the treatment of carcinoma of the prostate : A meta-analysis of 1446 patients

    Get PDF
    OBJECTIVE: To review pooled phase II data to identify features of different regimens of intermittent hormone therapy (IHT), developed to reduce the morbidity of treating metastatic prostate cancer, and which carries a theoretical advantage of delaying the onset of androgen-independent prostate cancer, (AIPC) that are associated with success, highlighting features which require exploration with prospective trials to establish the best strategies for using this treatment. METHODS: Individual data were collated on 1446 patients with adequate information, from 10 phase II studies with >50 cases, identified through Pubmed. RESULTS: Univariate and multivariate Cox proportional hazard models were developed to predict treatment success with a high degree of statistical success. The prostate-specific antigen (PSA) nadir, the PSA threshold to restart treatment, and medication type and duration, were important predictors of outcome. CONCLUSIONS: The duration of biochemical remission after a period of HT is a durable early indicator of how rapidly AIPC and death will occur, and will make a useful endpoint in future trials to investigate the best ways to use IHT based on the important treatment cycling variables described above. Patients spent a mean of 39% of the time off treatment. The initial PSA level and PSA nadir allow the identification of patients with prostate cancer in whom it might be possible to avoid radical therapy.Peer reviewe
    • …
    corecore