287 research outputs found

    Cryptanalysis of 3-Pass HAVAL

    Full text link

    Segmental relaxation in semicrystalline polymers: a mean field model for the distribution of relaxation times in confined regimes

    Get PDF
    The effect of confinement in the segmental relaxation of polymers is considered. On the basis of a thermodynamic model we discuss the emerging relevance of the fast degrees of freedom in stimulating the much slower segmental relaxation, as an effect of the constraints at the walls of the amorphous regions. In the case that confinement is due to the presence of crystalline domains, a quasi-poissonian distribution of local constraining conditions is derived as a result of thermodynamic equilibrium. This implies that the average free energy barrier ΔF\Delta F for conformational rearrangement is of the same order of the dispersion of the barrier heights, δ(ΔF)\delta (\Delta F), around ΔF\Delta F. As an example, we apply the results to the analysis of the α\alpha-relaxation as observed by dielectric broad band spectroscopy in semicrystalline poly(ethylene terephthalate) cold-crystallized from either an isotropic or an oriented glass. It is found that in the latter case the regions of cooperative rearrangement are significantly larger than in the former.Comment: 10 pages, 4 figures .ep

    Lifting defects for nonstable K_0-theory of exchange rings and C*-algebras

    Full text link
    The assignment (nonstable K_0-theory), that to a ring R associates the monoid V(R) of Murray-von Neumann equivalence classes of idempotent infinite matrices with only finitely nonzero entries over R, extends naturally to a functor. We prove the following lifting properties of that functor: (1) There is no functor F, from simplicial monoids with order-unit with normalized positive homomorphisms to exchange rings, such that VF is equivalent to the identity. (2) There is no functor F, from simplicial monoids with order-unit with normalized positive embeddings to C*-algebras of real rank 0 (resp., von Neumann regular rings), such that VF is equivalent to the identity. (3) There is a {0,1}^3-indexed commutative diagram D of simplicial monoids that can be lifted, with respect to the functor V, by exchange rings and by C*-algebras of real rank 1, but not by semiprimitive exchange rings, thus neither by regular rings nor by C*-algebras of real rank 0. By using categorical tools from an earlier paper (larders, lifters, CLL), we deduce that there exists a unital exchange ring of cardinality aleph three (resp., an aleph three-separable unital C*-algebra of real rank 1) R, with stable rank 1 and index of nilpotence 2, such that V(R) is the positive cone of a dimension group and V(R) is not isomorphic to V(B) for any ring B which is either a C*-algebra of real rank 0 or a regular ring.Comment: 34 pages. Algebras and Representation Theory, to appea

    New (Two-Track-)MAC Based on the Two Trails of RIPEMD

    Full text link

    On the Exploitation of a High-throughput SHA-256 FPGA Design for HMAC

    Get PDF
    High-throughput and area-efficient designs of hash functions and corresponding mechanisms for Message Authentication Codes (MACs) are in high demand due to new security protocols that have arisen and call for security services in every transmitted data packet. For instance, IPv6 incorporates the IPSec protocol for secure data transmission. However, the IPSec's performance bottleneck is the HMAC mechanism which is responsible for authenticating the transmitted data. HMAC's performance bottleneck in its turn is the underlying hash function. In this article a high-throughput and small-size SHA-256 hash function FPGA design and the corresponding HMAC FPGA design is presented. Advanced optimization techniques have been deployed leading to a SHA-256 hashing core which performs more than 30% better, compared to the next better design. This improvement is achieved both in terms of throughput as well as in terms of throughput/area cost factor. It is the first reported SHA-256 hashing core that exceeds 11Gbps (after place and route in Xilinx Virtex 6 board)

    SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities

    Get PDF
    Part 5: CybersecurityInternational audienceThe self-sovereign identity (SSI) model entails the full responsibility and sovereignty of a user regarding his identity data. This identity data can contain private data which is solely known to the user. The user himself is therefore required to manage the whole lifecycle of his private data, including the backup and restore. We show that prior work on how to backup and restore the user’s identity data does not meet the requirements of the SSI setting, and we present the first solution which does meet the requirements. Authenticated backup with auditing by remote entities (AWARE) combines SSI sustaining aspects and extends them to create a truly self-sovereign backup-and-restore protocol. In AWARE, trusted, physically met humans, called custodians, hold a secure device. Custodians with a secure device offer an offline backup possibility and a secure channel. The backup and restore are audited by commits on a publicly accessible distributed ledger. These commits are answered by auditing services which are required during restore. Only some auditing services hold relevant data for a restore. The self sovereignty of the user lies in the exclusive information which auditing services hold relevant data. AWARE  is the first backup-and-restore mechanism that fully complies with the SSI model. We perform an in-depth security-risk analysis of AWARE, showing a risk rating which is comparable to the best risk rating o related non-SSI-compliant backup-and-restore mechanisms. We instantiate the AWARE protocol with cryptographic primitives providing a high security level of 256-bit. We show its implementation feasibility by providing a simulation of AWARE, and conclude with an estimated performance analysis on a microcontoller architecture based on our simulation and implementation results in the literature

    Some Results on the Known Classes of Quadratic APN Functions

    Get PDF
    In this paper, we determine the Walsh spectra of three classes of quadratic APN functions and we prove that the class of quadratic trinomial APN functions constructed by Gölo\u glu is affine equivalent to Gold functions

    On the generalized linear equivalence of functions over finite fields

    Get PDF
    In this paper we introduce the concept of generalized linear equivalence between functions defined over finite fields; this can be seen as an extension of the classical criterion of linear equivalence, and it is obtained by means of a particular geometric representation of the functions. After giving the basic definitions, we prove that the known equivalence relations can be seen as particular cases of the proposed generalized relationship and that there exist functions that are generally linearly equivalent but are not such in the classical theory. We also prove that the distributions of values in the Difference Distribution Table (DDT) and in the Linear Approximation Table (LAT) are invariants of the new transformation; this gives us the possibility to find some Almost Perfect Nonlinear (APN) functions that are not linearly equivalent (in the classical sense) to power functions, and to treat them accordingly to the new formulation of the equivalence criterion
    corecore