38 research outputs found

    A note on SPHINCS+ parameter sets

    Get PDF
    In this note, we discuss using parameter sets for SPHINCS+ which support a smaller number of signatures than the 2642^{64} target. This includes a larger search through the SPHINCS+ parameter space, comparing it with the current parameter sets and providing data on how the security degrades if one exceeds the limits

    Design and analysis of cryptographic algorithms

    Get PDF

    Detection of Circulating Tumour Cells from Blood of Breast Cancer Patients via RT-qPCR

    Get PDF
    Breast cancer is still the most frequent cause of cancer-related death in women worldwide. Often death is not caused only by the primary tumour itself, but also by metastatic lesions. Today it is largely accepted, that these remote metastases arise out of cells, which detach from the primary tumour, enter circulation, settle down at secondary sites in the body and are called Circulating Tumour Cells (CTCs). The occurrence of such minimal residual diseases in the blood of breast cancer patients is mostly linked to a worse prognosis for therapy outcome and overall survival. Due to their very low frequency, the detection of CTCs is, still a technical challenge. RT-qPCR as a highly sensitive method could be an approach for CTC-detection from peripheral blood of breast cancer patients. This assumption is based on the fact that CTCs are of epithelial origin and therefore express a different gene panel than surrounding blood cells. For the technical approach it is necessary to identify appropriate marker genes and to correlate their gene expression levels to the number of tumour cells within a sample in an in vitro approach. After that, samples from adjuvant and metastatic patients can be analysed. This approach may lead to new concepts in diagnosis and treatmen

    Scaling laws in the spatial structure of urban road networks

    Full text link
    The urban road networks of the 20 largest German cities have been analysed, based on a detailed database providing the geographical positions as well as the travel-times for network sizes up to 37,000 nodes and 87,000 links. As the human driver recognises travel-times rather than distances, faster roads appear to be 'shorter' than slower ones. The resulting metric space has an effective dimension d>2, which is a significant measure of the heterogeneity of road speeds. We found that traffic strongly concentrates on only a small fraction of the roads. The distribution of vehicular flows over the roads obeys a power law, indicating a clear hierarchical order of the roads. Studying the cellular structure of the areas enclosed by the roads, the distribution of cell sizes is scale invariant as well

    Glycosyltransferases as Markers for Early Tumorigenesis

    Get PDF
    Background. Glycosylation is the most frequent posttranslational modification of proteins and lipids influencing inter-and intracellular communication and cell adhesion. Altered glycosylation patterns are characteristically observed in tumour cells. Normal and altered carbohydrate chains are transferred to their acceptor structures via glycosyltransferases. Here, we present the correlation between the presence of three different glycosyltransferases and tumour characteristics. Methods. 235 breast cancer tissue samples were stained immunohistochemically for the glycosyltransferases N-acetylgalactosaminyltransferase 6 (GALNT6),beta-1, 6-N-acetylglucosaminyltransferase 2 (GCNT2),and ST6 (alpha-N-acetyl-neuraminyl-2, 3-beta-galactosyl-1, 3)-N-acetylgalactosamine beta-2, 6-sialyltransferase 1 (ST6GALNac1). Staining was evaluated by light microscopy and was correlated to different tumour characteristics by statistical analysis. Results. We found a statistically significant correlation for the presence of glycosyltransferases and tumour size and grading. Specifically smaller tumours with low grading revealed the highest incidences of glycosyltransferases. Additionally, Her4-expression but not pHer4-expression is correlated with the presence of glycosyltransferases. All other investigated parameters could not uncover any statistically significant reciprocity. Conclusion. Here we show, that glycosyltransferases can identify small tumours with well-differentiated cells;hence, glycosylation patterns could be used as a marker for early tumourigenesis. This assumption is supported by the fact that Her4 is also correlated to glycosylation, whereas the activated form of Her4 does not show such a connection with glycosylation

    Glycosyltransferases as Markers for Early Tumorigenesis

    Get PDF
    Background. Glycosylation is the most frequent posttranslational modification of proteins and lipids influencing inter-and intracellular communication and cell adhesion. Altered glycosylation patterns are characteristically observed in tumour cells. Normal and altered carbohydrate chains are transferred to their acceptor structures via glycosyltransferases. Here, we present the correlation between the presence of three different glycosyltransferases and tumour characteristics. Methods. 235 breast cancer tissue samples were stained immunohistochemically for the glycosyltransferases N-acetylgalactosaminyltransferase 6 (GALNT6),beta-1, 6-N-acetylglucosaminyltransferase 2 (GCNT2),and ST6 (alpha-N-acetyl-neuraminyl-2, 3-beta-galactosyl-1, 3)-N-acetylgalactosamine beta-2, 6-sialyltransferase 1 (ST6GALNac1). Staining was evaluated by light microscopy and was correlated to different tumour characteristics by statistical analysis. Results. We found a statistically significant correlation for the presence of glycosyltransferases and tumour size and grading. Specifically smaller tumours with low grading revealed the highest incidences of glycosyltransferases. Additionally, Her4-expression but not pHer4-expression is correlated with the presence of glycosyltransferases. All other investigated parameters could not uncover any statistically significant reciprocity. Conclusion. Here we show, that glycosyltransferases can identify small tumours with well-differentiated cells;hence, glycosylation patterns could be used as a marker for early tumourigenesis. This assumption is supported by the fact that Her4 is also correlated to glycosylation, whereas the activated form of Her4 does not show such a connection with glycosylation

    Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications

    Get PDF
    Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs. However, various applications exist where the performance on short (fixed length) inputs matters more. Such hash functions are the bottleneck in hash-based signature schemes like SPHINCS or XMSS, which is currently under standardization. Secure functions specifically designed for such applications are scarce. We attend to this gap by proposing two short-input hash functions (or rather simply compression functions). By utilizing AES instructions on modern CPUs, our proposals are the fastest on such platforms, reaching throughputs below one cycle per hashed byte even for short inputs, while still having a very low latency of less than 60 cycles. Under the hood, this results comes with several innovations. First, we study whether the number of rounds for our hash functions can be reduced, if only second-preimage resistance (and not collision resistance) is required. The conclusion is: only a little. Second, since their inception, AES-like designs allow for supportive security arguments by means of counting and bounding the number of active S-boxes. However, this ignores powerful attack vectors using truncated differentials, including the powerful rebound attacks. We develop a general tool-based method to include arguments against attack vectors using truncated differentials

    Real-Time qPCR-Based Detection of Circulating Tumor Cells from Blood Samples of Adjuvant Breast Cancer Patients: A Preliminary Study

    Get PDF
    Background: Circulating tumor cells (CTCs) are cells that detach from a primary tumor, circulate through the blood stream and lymphatic vessels, and are considered to be the main reason for remote metastasis. Due to their origin, tumor cells have different gene expression levels than the surrounding blood cells. Therefore, they might be detectable in blood samples from breast cancer patients by real-time quantitative polymerase chain reaction (RT-qPCR). Materials and Methods: Blood samples of healthy donors and adjuvant breast cancer patients were withdrawn and the cell fraction containing white blood cells and tumor cells was enriched by density gradient centrifugation. RNA was isolated and reverse transcribed to cDNA, which was then used in TaqMan real-time PCR against cytokeratin (CK)8, CK18 and CK19. 18S and GAPDH were used as controls. Results: All 3 CKs were, on average, found to be significantly higher expressed in adjuvant breast cancer samples compared to negative controls, probably due to the presence of CTCs. Unfortunately, gene expression levels could not be correlated to tumor characteristics. Conclusions: RT-qPCR could make up a new approach for the detection of CTCs from blood samples of breast cancer patients, but a correlation of the PCR data to gold standard methods in CTC detection would help to further improve the informative value of the qPCR results. (C) 2016 S. Karger GmbH, Freibur

    ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny

    Get PDF
    We study possible alternatives for ShiftRows to be used as cell permutations in AES-like ciphers. As observed during the design process of the block cipher Midori, when using a matrix with a non-optimal branch number for the MixColumns operation, the choice of the cell permutation, i.e., an alternative for ShiftRows, can actually improve the security of the primitive. In contrast, when using an MDS matrix it is known that one cannot increase the minimum number of active S-boxes by deviating from the ShiftRows-type permutation. However, finding the optimal choice for the cell permutation for a given, non-optimal, MixColumns operation is a highly non-trivial problem. In this work, we propose techniques to speed up the search for the optimal cell permutations significantly. As case studies, we apply those techniques to Midori and Skinny and provide possible alternatives for their cell permutations. We finally state an easy-to-verify sufficient condition on a cell permutation, to be used as an alternative in Midori, that attains a high number of active S-boxes and thus provides good resistance against differential and linear attacks

    How to Abuse and Fix Authenticated Encryption Without Key Commitment

    Get PDF
    Authenticated encryption (AE) is used in a wide variety of applications, potentially in settings for which it was not originally designed. Recent research tries to understand what happens when AE is not used as prescribed by its designers. A question given relatively little attention is whether an AE scheme guarantees ``key commitment\u27\u27: ciphertext should only decrypt to a valid plaintext under the key used to generate the ciphertext. Generally, AE schemes do not guarantee key commitment as it is not part of AE\u27s design goal. Nevertheless, one would not expect this seemingly obscure property to have much impact on the security of actual products. In reality, however, products do rely on key commitment. We discuss three recent applications where missing key commitment is exploitable in practice. We provide proof-of-concept attacks via a tool that constructs AES-GCM ciphertext which can be decrypted to two plaintexts valid under a wide variety of file formats, such as PDF, Windows executables, and DICOM. Finally we discuss two solutions to add key commitment to AE schemes which have not been analyzed in the literature: a generic approach that adds an explicit key commitment scheme to the AE scheme, and a simple fix which works for AE schemes like AES-GCM and ChaCha20Poly1305, but requires separate analysis for each scheme
    corecore