496 research outputs found

    Material Decomposition in Spectral CT using deep learning: A Sim2Real transfer approach

    Get PDF
    The state-of-the art for solving the nonlinear material decomposition problem in spectral computed tomography is based on variational methods, but these are computationally slow and critically depend on the particular choice of the regularization functional. Convolutional neural networks have been proposed for addressing these issues. However, learning algorithms require large amounts of experimental data sets. We propose a deep learning strategy for solving the material decomposition problem based on a U-Net architecture and a Sim2Real transfer learning approach where the knowledge that we learn from synthetic data is transferred to a real-world scenario. In order for this approach to work, synthetic data must be realistic and representative of the experimental data. For this purpose, numerical phantoms are generated from human CT volumes of the KiTS19 Challenge dataset, segmented into specific materials (soft tissue and bone). These volumes are projected into sinogram space in order to simulate photon counting data, taking into account the energy response of the scanner. We compared projection- and image-based decomposition approaches where the network is trained to decompose the materials either in the projection or in the image domain. The proposed Sim2Real transfer strategies are compared to a regularized Gauss-Newton (RGN) method on synthetic data, experimental phantom data and human thorax data

    Rebound Attack on JH42

    Full text link

    Cryptanalysis of MORUS

    Get PDF
    Item does not contain fulltextAdvances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-

    Slide Attacks on a Class of Hash Functions

    Get PDF
    Abstract. This paper studies the application of slide attacks to hash functions. Slide attacks have mostly been used for block cipher cryptanalysis. But, as shown in the current paper, they also form a potential threat for hash functions, namely for sponge-function like structures. As it turns out, certain constructions for hash-function-based MACs can be vulnerable to forgery and even to key recovery attacks. In other cases, we can at least distinguish a given hash function from a random oracle. To illustrate our results, we describe attacks against the Grindahl-256 and Grindahl-512 hash functions. To the best of our knowledge, this is the first cryptanalytic result on Grindahl-512. Furthermore, we point out a slide-based distinguisher attack on a slightly modified version of RadioGatún. We finally discuss simple countermeasures as a defense against slide attacks. Key words: slide attacks, hash function, Grindahl, RadioGatún, MAC, sponge function.

    Cryptanalysis of Reduced NORX

    Get PDF
    NORX is a second round candidate of the ongoing CAESAR competition for authenticated encryption. It is a nonce based authenticated encryption scheme based on the sponge construction. Its two variants denoted by NORX32 and NORX64 provide a security level of 128 and 256 bits, respectively. In this paper, we present a state/key recovery attack for both variants with the number of rounds of the core permutation reduced to 2 (out of 4) rounds. The time complexity of the attack for NORX32 and NORX64 is 21192^{119} and 22342^{234} respectively, while the data complexity is negligible. Furthermore, we show a state recovery attack against NORX in the parallel mode using an internal differential attack for 2 rounds of the permutation. The data, time and memory complexities of the attack for NORX32 are 27.32^{7.3}, 2124.32^{124.3} and 21152^{115} respectively and for NORX64 are 26.22^{6.2}, 2232.82^{232.8} and 22252^{225} respectively. Finally, we present a practical distinguisher for the keystream of NORX64 based on two rounds of the permutation in the parallel mode using an internal differential-linear attack. To the best of our knowledge, our results are the best known results for NORX in nonce respecting manner

    I-CARE, a European Prospective Cohort Study Assessing Safety and Effectiveness of Biologics in Inflammatory Bowel Disease

    Get PDF
    Background and aims: There is a need to evaluate the benefit-risk ratio of current therapies in inflammatory bowel disease (IBD) patients to provide the best quality of care. The primary objective of I-CARE (IBD Cancer and serious infections in Europe) was to assess prospectively safety concerns in IBD, with specific focus on the risk of cancer/lymphoma and serious infections in patients treated with anti-tumor necrosis factor and other biologic monotherapy as well as in combination with immunomodulators.. Methods: I-CARE was designed as a European prospective longitudinal observational multicenter cohort study to include patients with a diagnosis of Crohn's disease, ulcerative colitis, or IBD unclassified established at least 3 months prior to enrollment. Results: A total of 10,206 patients were enrolled between March 2016 and April 2019, including 6169 (60.4%) patients with Crohn's disease, 3853 (37.8%) with ulcerative colitis, and 184 (1.8%) with a diagnosis of IBD unclassified. Thirty-two percent of patients were receiving azathioprine/thiopurines, 4.6% 6-mercaptopurine, and 3.2% methotrexate at study entry. At inclusion, 47.3% of patients were treated with an anti-tumor necrosis factor agent, 8.8% with vedolizumab, and 3.4% with ustekinumab. Roughly one-quarter of patients (26.8%) underwent prior IBD-related surgery. Sixty-six percent of patients had been previously treated with systemic steroids. Three percent of patients had a medical history of cancer prior to inclusion and 1.1% had a history of colonic, esophageal, or uterine cervix high-grade dysplasia.. Conclusions: I-CARE is an ongoing investigator-initiated observational European prospective cohort study that will provide unique information on the long-term benefits and risks of biological therapies in IBD patients

    Attacking the Knudsen-Preneel Compression Functions

    Full text link
    Abstract. Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in which a linear error-correcting code is used to build a wide-pipe compression function from underlying blockciphers operating in Davies-Meyer mode. Their main design goal was to deliver compression functions with collision resistance up to, and even beyond, the block size of the underlying blockciphers. In this paper, we (re)analyse the preimage resistance of the Knudsen-Preneel compression functions in the setting of public random func-tions. We give a new preimage attack that is based on two observations. First, by using the right kind of queries it is possible to mount a non-adaptive preimage attack that is optimal in terms of query complexity. Second, by exploiting the dual code the subsequent problem of reconstructing a preimage from the queries can be rephrased as a problem related to the generalized birthday problem. As a consequence, the time complexity of our attack is intimately tied to the minimum distance of the dual code. Our new attack consistently beats the one given by Knudsen and Preneel (in one case our preimage attack even beats their collision attack) and demonstrates that the gap between their claimed collision resistance and the actual preimage resistance is surprisingly small. Moreover, our new attack falsifies their (conjectured) preimage resistance security bound and shows that intuitive bounds based on the number of ‘active ’ components can be treacherous. Complementing our attack is a formal analysis of the query complexity (both lower and upper bounds) of preimage-finding attacks. This analysis shows that for many concrete codes the time complexity of our attack is optimal.

    cis-Urocanic Acid Attenuates Acute Dextran Sodium Sulphate-Induced Intestinal Inflammation

    Get PDF
    On exposure to sunlight, urocanic acid (UCA) in the skin is converted from trans to the cis form and distributed systemically where it confers systemic immunosuppression. The aim of this study was to determine if administration of cis-UCA would be effective in attenuating colitis and the possible role of IL-10. Colitis was induced in 129/SvEv mice by administering 5% dextran sodium sulfate (DSS) for 7 days in drinking water. During this period mice received daily subcutaneously injections of cis-UCA or vehicle. To examine a role for IL-10, 129/SvEv IL-10−/− mice were injected for 24 days with cis-UCA or vehicle. Clinical disease was assessed by measurement of body weight, stool consistency, and presence of blood. At sacrifice, colonic tissue was collected for histology and measurement of myeloperoxidase and cytokines. Splenocytes were analyzed for CD4+CD25+FoxP3+ T-regulatory cells via flow cytometry. Murine bone-marrow derived antigen-presenting cells were treated with lipopolysaccharide (LPS) ± UCA and cytokine secretion measured. Our results demonstrated that cis-UCA at a dose of 50 µg was effective in ameliorating DSS-induced colitis as evidenced by reduced weight loss and attenuated changes in colon weight/length. This protection was associated with reduced colonic expression of CXCL1, an increased expression of IL-17A and a significant preservation of splenic CD4+CD25+FoxP3+ T-regulatory cells. cis-UCA decreased LPS induced CXCL1, but not TNFα secretion, from antigen-presenting cells in vitro. UCA reduced colonic levels of IFNγ in IL-10−/− mice but did not attenuate colitis. In conclusion, this study demonstrates that cis-urocanic acid is effective in reducing the severity of colitis in a chemically-induced mouse model, indicating that pathways induced by ultraviolet radiation to the skin can influence distal sites of inflammation. This provides further evidence for a possible role for sunlight exposure in modulating inflammatory disorders
    • …
    corecore