60 resultados para Harry Truman


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study aimed to assess the feasibility of a home-based exercise program and examine the effects on the healing rates of venous leg ulcers. A 12 –week randomised controlled trial was conducted investigating the effects of an exercise intervention compared to a usual care group. Participants in both groups (n = 13) had active venous ulceration and were treated in a metropolitan hospital outpatients clinic in Australia. Data were collected on recruitment from medical records, clinical assessment and questionnaires. Follow-up data on progress in healing and treatments were collected fortnightly for 12 weeks. Calf muscle pump function data were collected at baseline and 12 weeks from recruitment. Range of ankle motion data were collected at baseline, 6 and 12 weeks from recruitment. This pilot study indicated that the intervention was feasible. Clinical significance was observed in the intervention group with a 32% greater decrease in ulcer size (p=0.34) than the control group, and a 10% (p=0.74) improvement in the number of participants healed in the intervention group compared to the control group. Significant differences between groups over time were observed in calf muscle pump function parameters; (ejection fraction [p = 0.05]; residual volume fraction [p = 0.04]) and range of ankle motion (p = 0.01). This pilot study is one of the first studies to examine and measure clinical healing rates for participants involved in a home-based progressive resistance exercise program. Further research is warranted with a larger multi-site study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to the eSTREAM project. In this paper, we analyse the initialisation process of Sfinks. We demonstrate a slid property of the loaded state of the Sfinks cipher, where multiple key-IV pairs may produce phase shifted keystream sequences. The state update functions of both the initialisation process and keystream generation and also the pattern of the padding affect generation of the slid pairs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Well-designed initialisation and keystream generation processes for stream ciphers should ensure that each key-IV pair generates a distinct keystream. In this paper, we analyse some ciphers where this does not happen due to state convergence occurring either during initialisation, keystream generation or both. We show how state convergence occurs in each case and identify two mechanisms which can cause state convergence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which uses a majority clocking rule to update its registers. It is designed to provide privacy for the GSM system. In this paper, we analyse the initialisation process of A5/1. We demonstrate a sliding property of the A5/1 cipher, where every valid internal state is also a legitimate loaded state and multiple key-IV pairs produce phase shifted keystream sequences. We describe a possible ciphertext only attack based on this property.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Proteinuria was observed in 27% of 153 patients taking tenofovir for more than 1 year. Concomitant protease inhibitor therapy and cumulative tenofovir exposure were independently associated with proteinuria in this cohort. Proteinuria was reversible in 11 of 12 patients who ceased tenofovir because of proteinuria without altering other medications. Clinicians should be aware that tenofovir can cause reversible proteinuria in patients with HIV.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions: Trivium-N, Bivium-A and Bivium-B. In doing so, we answer an open question in the literature. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques which use the F4 algorithm to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analysis. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book examines different aspects of Asian popular culture, including films, TV, music, comedy, folklore, cultural icons, the Internet and theme parks. It raises important questions such as – What are the implications of popularity of Asian popular culture for globalization? Do regional forces impede the globalizing of cultures? Or does the Asian popular culture flow act as a catalyst or conveying channel for cultural globalization? Does the globalization of culture pose a threat to local culture? It addresses two seemingly contradictory and yet parallel processes in the circulation of Asian popular culture: the interconnectedness between Asian popular culture and western culture in an era of cultural globalization that turns subjects such as Pokémon, Hip Hop or Cosmopolitan into truly global phenomena, and the local derivatives and versions of global culture that are necessarily disconnected from their origins in order to cater for the local market. It thereby presents a collective argument that, whilst local social formations, and patterns of consumption and participation in Asia are still very much dependent on global cultural developments and the phenomena of modernity, yet such dependence is often concretized, reshaped and distorted by the local media to cater for the local market. Contents: Introduction: Asian Popular Culture: The Global (Dis)continuity Anthony Y.H. Fung Part 1: The Dominance of Global Continuity: Cultural Localization and Adaptation 1. One Region, Two Modernities: Disneyland in Tokyo and Hong Kong Micky Lee and Anthony Y.H. Fung 2. Comic Travels: Disney Publishing in the People’s Republic of China Jennifer Altehenger 3. When Chinese Youth Meet Harry Potter: Translating Consumption and Middle Class Identification John Nguyet Erni 4.New Forms of Transborder Visuality in Urban China: Saving Face for Magazine Covers Eric Kit-Wai Ma 5. Cultural Consumption and Masculinity: A Case Study of GQ Magazine Covers in Taiwan Hong-Chi Shiau Part 2: Global Discontinuity: The Local Absorption of Global Culture 6. An Unlocalized and Unglobalized Subculture: English Language Independent Music in Singapore Kai Khiun Liew and Shzr Ee Tan 7. The Localized Production of Jamaican Music in Thailand Viriya Sawangchot 8. Consuming Online Games in Taiwan: Global Games and Local Market Lai-Chi Chen 9. The Rise of the Korean Cinema in Inbound and Outbound Globalization Shin Dong Kim Part 3: Cultural Domestication: A New Form of Global Continuity 10. Pocket Capitalism and Virtual Intimacy: Pokémon as a Symptom of Post-Industrial Youth Culture Anne Allison 11. Playing the Global Game: Japan Brand and Globalization Kukhee Choo Part 4: China as a Rising Market: Cultural Antagonism and Globalization 12. China’s New Creative Strategy: The Utilization of Cultural Soft Power and New Markets Michael Keane and Bonnie Liu 13. Renationalizing Hong Kong Cinema: The Gathering Force of the Mainland Market Michael Curtin

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe a new species of dasyurid marsupial within the genus Antechinus that was previously known as a northern outlier of Dusky Antechinus (A. swainsonii). The Black-tailed Antechinus, Antechinus arktos sp. nov., is known only from areas of high altitude and high rainfall on the Tweed Volcano caldera of far south-east Queensland and north-east New South Wales, Australia. Antechinus arktos formerly sheltered under the taxonomic umbrella of A. swainsonii mimetes, the widespread mainland form of Dusky Antechinus. With the benefit of genetic hindsight, some striking morphological differences are herein resolved: A. s. mimetes is more uniformly deep brown-black to grizzled grey-brown from head to rump, with brownish (clove brown—raw umber) hair on the upper surface of the hindfoot and tail, whereas A. arktos is more vibrantly coloured, with a marked change from greyish-brown head to orange-brown rump, fuscous black on the upper surface of the hindfoot and dense, short fur on the evenly black tail. Further, A. arktos has marked orange-brown fur on the upper and lower eyelid, cheek and in front of the ear and very long guard hairs all over the body; these characters are more subtle in A. s. mimetes. There are striking genetic differences between the two species: at mtDNA, A. s. mimetes from north-east New South Wales is 10% divergent to A. arktos from its type locality at Springbrook NP, Queensland. In contrast, the Ebor A. s. mimetes clades closely with conspecifics from ACT and Victoria. A. arktos skulls are strikingly different to all subspecies of A. swainsonii. A. arktos are markedly larger than A. s. mimetes and A. s. swainsonii (Tasmania) for a range of craniodental measures. Antechinus arktos were historically found at a few proximate mountainous sites in south-east Queensland, and have only recently been recorded from or near the type locality. Even there, the species is likely in low abundance. The Black-tailed Antechinus has plausibly been detrimentally affected by climate change in recent decades, and will be at further risk with increasing warming trends.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Antechinus argentus sp. nov. is currently only known from the plateau at the eastern escarpment of Kroombit Tops National Park, about 400km NNW of Brisbane and 60km SSW of Gladstone, south-east Queensland, Australia. Antechinus flavipes (Waterhouse) is also known from Kroombit Tops NP, 4.5km W of the nearest known population of A. argentus; A. mysticus Baker, Mutton and Van Dyck has yet to be found within Kroombit Tops, but is known from museum specimens taken at Bulburin NP, just 40km ESE, as well as extant populations about 400km to both the south-east and north-west of Kroombit NP. A. argentus can be easily distinguished in the field, having an overall silvery/grey appearance with much paler silver feet and drabber deep greyish-olive rump than A. flavipes, which has distinctive yellow-orange toned feet, rump and tail-base; A. argentus fur is also less coarse than that of A. flavipes. A. argentus has a striking silver-grey head, neck and shoulders, with pale, slightly broken eye-rings, which distinguish it from A. mysticus which has a more subtle greyish-brown head, pale buff dabs of eyeliner and more colourful brownish-yellow rump. Features of the dentary can also be used for identification: A. argentus differs from A. flavipes in having smaller molar teeth, as well as a narrower and smaller skull and from A. mysticus in having on average a narrower snout, smaller skull and dentary lengths and smaller posterior palatal vacuities in the skull. A. argentus is strongly divergent genetically (at mtDNA) from both A. flavipes (9.0–11.2%) and A. mysticus (7.2–7.5%), and forms a very strongly supported clade to the exclusion of all other antechinus species, in both mtDNA and combined (mtDNA and nDNA) phylogenies inferred here. We are yet to make detailed surveys in search of A. argentus from forested areas to the immediate east and north of Kroombit Tops. However, A. mysticus has only been found at these sites in low densities in decades past and not at all in several recent trapping expeditions conducted by the authors. With similar habitat types in close geographic proximity, it is plausible that A. argentus may be found outside Kroombit. Nevertheless, it is striking that from a range of surveys conducted at Kroombit Tops in the last 15 years and intensive surveys by the authors in the last 3 years, totalling more than 5 080 trap nights, just 13 A. argentus have been captured from two sites less than 6 km apart. If this is even close to the true geographic extent of the species, it would possess one of the smallest distributions of an Australian mammal species. With several threats identified, we tentatively recommend that A. argentus be listed as Endangered, pending an exhaustive trapping survey of Kroombit and surrounds.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Western economies are highly dependent on service innovation for their growth and employment. An important driver for economic growth is, therefore, the development of new, innovative services like electronic services, mobile end-user services, new financial or personalized services. Service innovation joins four trends that currently shape the western economies: the growing importance of services, the need for innovation, changes in consumer and business markets, and the advancements in information and communication technology (ICT).