169 resultados para two-to-one trapdoor functions


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A key perspective on reputation is that of assessment. Much of the communication literature focuses on the influence organizations have on impression formation. This chapter however suggests that in order to understand reputation assessment, it is also important to understand the related concept of legitimacy. It addresses two approaches to understanding reputation namely accreditation and ranking. Accreditation alludes to concepts of legitimacy in which firms may acquire credibility by meeting formalized standards of certification. Ranking deals with categorizing and rating organizational reputations so that they may be assessed relative to one another. The chapter explores the various ways in which the mechanisms of accreditation and ranking operate and the role of social actors in developing and applying them. Ranking systems that provide the mechanism for comparing organizations and assessing their relative value are also explored.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose: Data from two randomized phase III trials were analyzed to evaluate prognostic factors and treatment selection in the first-line management of advanced non-small cell lung cancer patients with performance status (PS) 2. Patients and Methods: Patients randomized to combination chemotherapy (carboplatin and paclitaxel) in one trial and single-agent therapy (gemcitabine or vinorelbine) in the second were included in these analyses. Both studies had identical eligibility criteria and were conducted simultaneously. Comparison of efficacy and safety was performed between the two cohorts. A regression analysis identified prognostic factors and subgroups of patients that may benefit from combination or single-agent therapy. Results: Two hundred one patients were treated with combination and 190 with single-agent therapy. Objective responses were 37 and 15%, respectively. Median time to progression was 4.6 months in the combination arm and 3.5 months in the single-agent arm (p < 0.001). Median survival imes were 8.0 and 6.6 months, and 1-year survival rates were 31 and 26%, respectively. Albumin <3.5 g, extrathoracic metastases, lactate dehydrogenase ≥200 IU, and 2 comorbid conditions predicted outcome. Patients with 0-2 risk factors had similar outcomes independent of treatment, whereas patients with 3-4 factors had a nonsignificant improvement in median survival with combination chemotherapy. Conclusion: Our results show that PS2 non-small cell lung cancer patients are a heterogeneous group who have significantly different outcomes. Patients treated with first-line combination chemotherapy had a higher response and longer time to progression, whereas overall survival did not appear significantly different. A prognostic model may be helpful in selecting PS 2 patients for either treatment strategy. © 2009 by the International Association for the Study of Lung Cancer.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction Falls are the most frequent adverse event reported in hospitals. Approximately 30% of in-hospital falls lead to an injury and up to 2% result in a fracture. A large randomised trial found that a trained health professional providing individualised falls prevention education to older inpatients reduced falls in a cognitively intact subgroup. This study aims to investigate whether this efficacious intervention can reduce falls and be clinically useful and cost-effective when delivered in the real-life clinical environment. Methods A stepped-wedge cluster randomised trial will be used across eight subacute units (clusters) which will be randomised to one of four dates to start the intervention. Usual care on these units includes patient's screening, assessment and implementation of individualised falls prevention strategies, ongoing staff training and environmental strategies. Patients with better levels of cognition (Mini-Mental State Examination >23/30) will receive the individualised education from a trained health professional in addition to usual care while patient's feedback received during education sessions will be provided to unit staff. Unit staff will receive training to assist in intervention delivery and to enhance uptake of strategies by patients. Falls data will be collected by two methods: case note audit by research assistants and the hospital falls reporting system. Cluster-level data including patient's admissions, length of stay and diagnosis will be collected from hospital systems. Data will be analysed allowing for correlation of outcomes (clustering) within units. An economic analysis will be undertaken which includes an incremental cost-effectiveness analysis. Ethics and dissemination The study was approved by The University of Notre Dame Australia Human Research Ethics Committee and local hospital ethics committees. Results The results will be disseminated through local site networks, and future funding and delivery of falls prevention programmes within WA Health will be informed. Results will also be disseminated through peer-reviewed publications and medical conferences.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Agent-based modelling (ABM), like other modelling techniques, is used to answer specific questions from real world systems that could otherwise be expensive or impractical. Its recent gain in popularity can be attributed to some degree to its capacity to use information at a fine level of detail of the system, both geographically and temporally, and generate information at a higher level, where emerging patterns can be observed. This technique is data-intensive, as explicit data at a fine level of detail is used and it is computer-intensive as many interactions between agents, which can learn and have a goal, are required. With the growing availability of data and the increase in computer power, these concerns are however fading. Nonetheless, being able to update or extend the model as more information becomes available can become problematic, because of the tight coupling of the agents and their dependence on the data, especially when modelling very large systems. One large system to which ABM is currently applied is the electricity distribution where thousands of agents representing the network and the consumers’ behaviours are interacting with one another. A framework that aims at answering a range of questions regarding the potential evolution of the grid has been developed and is presented here. It uses agent-based modelling to represent the engineering infrastructure of the distribution network and has been built with flexibility and extensibility in mind. What distinguishes the method presented here from the usual ABMs is that this ABM has been developed in a compositional manner. This encompasses not only the software tool, which core is named MODAM (MODular Agent-based Model) but the model itself. Using such approach enables the model to be extended as more information becomes available or modified as the electricity system evolves, leading to an adaptable model. Two well-known modularity principles in the software engineering domain are information hiding and separation of concerns. These principles were used to develop the agent-based model on top of OSGi and Eclipse plugins which have good support for modularity. Information regarding the model entities was separated into a) assets which describe the entities’ physical characteristics, and b) agents which describe their behaviour according to their goal and previous learning experiences. This approach diverges from the traditional approach where both aspects are often conflated. It has many advantages in terms of reusability of one or the other aspect for different purposes as well as composability when building simulations. For example, the way an asset is used on a network can greatly vary while its physical characteristics are the same – this is the case for two identical battery systems which usage will vary depending on the purpose of their installation. While any battery can be described by its physical properties (e.g. capacity, lifetime, and depth of discharge), its behaviour will vary depending on who is using it and what their aim is. The model is populated using data describing both aspects (physical characteristics and behaviour) and can be updated as required depending on what simulation is to be run. For example, data can be used to describe the environment to which the agents respond to – e.g. weather for solar panels, or to describe the assets and their relation to one another – e.g. the network assets. Finally, when running a simulation, MODAM calls on its module manager that coordinates the different plugins, automates the creation of the assets and agents using factories, and schedules their execution which can be done sequentially or in parallel for faster execution. Building agent-based models in this way has proven fast when adding new complex behaviours, as well as new types of assets. Simulations have been run to understand the potential impact of changes on the network in terms of assets (e.g. installation of decentralised generators) or behaviours (e.g. response to different management aims). While this platform has been developed within the context of a project focussing on the electricity domain, the core of the software, MODAM, can be extended to other domains such as transport which is part of future work with the addition of electric vehicles.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Parental reading to children from an early age has been shown to enhance children’s emergent literacy skills. A pragmatic randomized controlled trial (RCT) was used to investigate the effects of two forms of shared reading interventions on children’s language and literacy skills. Parents of 80 preparatory year children from outer suburban schools of an Australian metropolitan city were trained to use shared reading strategies in an eight-week home intervention. Families were assigned to one of three groups: Dialogic Reading (DR), Dialogic Reading with the addition of Print Referencing (DR + PR), or an attention-matched control group. The sample comprised 42 boys and 38 girls ranging in age from 4.9 years to 6.3 years (M = 5.5, SD = 0.3). Data were collected at pre, post, and at three months follow-up. Measures assessed children’s oral language (receptive and expressive vocabulary), phonological awareness (rhyme, word completion), alphabet knowledge, and concepts about print. Analyses of change from pre to post showed significant effects for the DR and DR + PR groups compared to the control group on three of the six measures: expressive language, rhyme, and concepts about print. At 3-month follow-up assessment, the two intervention groups maintained significantly better performance on the measure of concepts of print only. At both time points, there were no group differences between the DR and DR+PR conditions. These findings illustrate the potential of a brief home focused intervention on promoting children’s emergent literacy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dengue is the most prevalent arthropod-borne virus, with at least 40% of the world’s population at risk of infection each year. In Australia, dengue is not endemic, but viremic travelers trigger outbreaks involving hundreds of cases. We compared the susceptibility of Aedes aegypti mosquitoes from two geographically isolated populations with two strains of dengue virus serotype 2. We found, interestingly, that mosquitoes from a city with no history of dengue were more susceptible to virus than mosquitoes from an outbreak-prone region, particularly with respect to one dengue strain. These findings suggest recent evolution of population-based differences in vector competence or different historical origins. Future genomic comparisons of these populations could reveal the genetic basis of vector competence and the relative role of selection and stochastic processes in shaping their differences. Lastly, we show the novel finding of a correlation between midgut dengue titer and titer in tissues colonized after dissemination.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We construct an efficient identity based encryption system based on the standard learning with errors (LWE) problem. Our security proof holds in the standard model. The key step in the construction is a family of lattices for which there are two distinct trapdoors for finding short vectors. One trapdoor enables the real system to generate short vectors in all lattices in the family. The other trapdoor enables the simulator to generate short vectors for all lattices in the family except for one. We extend this basic technique to an adaptively-secure IBE and a Hierarchical IBE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where each participant’s share can be used several times which reduces the number of interactions between the dealer and the group members. In addition some secrets may require a higher security level than others involving the need for different threshold values. Recently Chan and Chang designed such a scheme but their construction only allows a single secret to be shared per threshold value. In this article we combine the previous two approaches to design a multiple time verifiable multi-secret sharing scheme where several secrets can be shared for each threshold value. Since the running time is an important factor for practical applications, we will provide a complexity comparison of our combined approach with respect to the previous schemes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An experiment tested the hypothesis that individuals high in negative affectivity (NA) show increased stress reactivity to stressors. There were three predictor variables: NA (measured 1 week prior to experimental participation), and two manipulated variables—demand (high/low) and behavioral control (high/low). First-year psychology students (n=256) were randomly allocated to one of the four experimental conditions. Measures obtained were initial and post-task negative mood, coping strategies, task satisfaction, and performance (subjective and objective). Participants with high levels of NA reported more post-task negative mood in response to high demand conditions, compared to participants with low NA. A similar pattern of results emerged for task satisfaction, particularly in response to high demand-low behavioral control situations. Mediation analyses suggested this was because participants with high NA used more emotion-focused coping strategies. The study provides support for the stress reactivity role of NA in the stressor-strain process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper discusses how fundamentals of number theory, such as unique prime factorization and greatest common divisor can be made accessible to secondary school students through spreadsheets. In addition, the three basic multiplicative functions of number theory are defined and illustrated through a spreadsheet environment. Primes are defined simply as those natural numbers with just two divisors. One focus of the paper is to show the ease with which spreadsheets can be used to introduce students to some basics of elementary number theory. Complete instructions are given to build a spreadsheet to enable the user to input a positive integer, either with a slider or manually, and see the prime decomposition. The spreadsheet environment allows students to observe patterns, gain structural insight, form and test conjectures, and solve problems in elementary number theory.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The World Health Organization identifies road trauma as a major public health issue in every country; most notably among low-to-middle income countries. More than 90% of all road fatalities occur in these countries, although they have only 48% of all registered vehicles [1]. Unprecedented focus has been placed on reducing the global road trauma burden through the United Nations Decade of Action for Road Safety (2011-2020). China is rapidly transitioning from a nation of bicycle riders and pedestrians to one where car ownership and use is increasing. This transition presents important public health, mobility, and safety challenges. Rapid motorisation has resulted in an increased road trauma burden, shouldered disproportionately among the population. Vulnerable road users (bicyclists, pedestrians, and motorcyclists) are of particular concern, representing 70% of all road-related fatalities [1]. Furthermore, those at greatest risk of sustaining a crash-related disability are: male, older, less educated, and earning a lower income [2] and residing in urban areas [3], with higher fatality rates in north-western poorer provinces [3]. Speeding is a key factor in road crashes in China [1, 4] and is one of two risk factors targeted in the Bloomberg Philanthropies-funded Global Road Safety Program operating in two Chinese cities over five year [5] to which the first author has provided expert advice. However, little evidence exists to help understand the factors underpinning speeding behaviour. Previous research conducted by the authors in Beijing and Hangzhou explored personal, social, and legal factors relating to speeding to assist in better understanding the motivations for non-compliance with speed limits. Qualitative and quantitative research findings indicated that speeding is relatively common, including self-reported travel speeds of greater than 30 km/hour above posted speed limits [6], and that the road safety laws and enforcement practices may, in some circumstances, contribute to this [7]. Normative factors were also evident; the role of friends, family members and driving instructors were influential. Additionally, using social networks to attempt to avoid detection and penalty was reported, thereby potentially reinforcing community perceptions that speeding is acceptable [8, 9]. The authors established strong collaborative links with the Chinese Academy of Sciences and Zhejiang Police College to conduct this research. The first author has worked in both institutions for extended time periods and recognises that research must include an understanding of culturally-relevant issues if road safety is to improve in China. Future collaborations to assist in enhancing our understanding of such issues are welcomed. References [1] World Health Organization. (2009). Global status report on road safety: Time for action; Geneva. [2] Chen, H., Du, W., & Li, N. (2013). The socioeconomic inequality in traffic-related disability among Chinese adults: the application of concentration index. Accident Analysis & Prevention, 55(101-106). [3] Wang, S. Y., Li, Y. H., Chi, G. B., Xiao, S. Y., Ozanne-Smith, J., Stevenson, M., & Phillips, M. (2008). Injury-related fatalities in China: an under-recognised public-health problem. The Lancet (British edition), 372(9651), 1765-1773. [4] He, J., King, M. J., Watson, B., Rakotonirainy, A., & Fleiter, J. J. (2013). Speed enforcement in China: National, provincial and city initiatives and their success. Accident Analysis & Prevention, 50, 282-288. [5] Bhalla, K., Li, Q., Duan, L., Wang, Y., Bishai, D., & Hyder, A. A. (2013). The prevalence of speeding and drink driving in two cities in China: a mid project evaluation of ongoing road safety interventions. Injury, 44, 49-56. doi:10.1016/S0020-1383(13)70213-4. [6] Fleiter, J. J., Watson, B., & Lennon, A. (2013). Awareness of risky behaviour among Chinese drivers. Peer-reviewed paper presented at 23rd Canadian Multidisciplinary Road Safety Conference, Montréal, Québec. [7] Fleiter, J. J., Watson, B., Lennon, A., King, M. J., & Shi, K. (2009). Speeding in Australia and China: A comparison of the influence of legal sanctions and enforcement practices on car drivers. Peer-reviewd paper presented at Australasian Road Safety Research Policing Education Conference, Sydney. [8] Fleiter, J. J., Watson, B., Lennon, A., King, M. J., & Shi, K. (2011). Social influences on drivers in China. Journal of the Australasian College of Road Safety, 22(2), 29-36. [9] Fleiter, J. J., Watson, B., Guan, M. Q., Ding, J. Y., & Xu, C. (2013). Characteristics of Chinese Drivers Attending a Mandatory Training Course Following Licence Suspension. Peer-reviewed paper presented at Road Safety on Four Continents, Beijing, China.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background Ugni molinae Turcz. is one of the most studied species of South American Myrtaceae due to its edible fruits and foliar medicinal compounds. However, there is no anatomical study of the leaves or secretory cavities. This paper seeks to describe the leaf micromorphology and anatomy of the species using standard protocols for light and scanning electron microscopy. Secretory cavities were anatomically characterized in young and mature leaves. Histochemical staining of the cavities was performed. Results The leaves of U. molinae are hypostomatic, have a wavy surface and possess scattered hairs. Leaf anatomical features include dorsiventral mesophyll, two to three layers of palisade parenchyma with abundant chloroplasts, calcium oxalate crystals and internal phloem in vascular bundles. Schizogenous secretory cavities are present on the abaxial surface and are mainly located on the margins of the leaves. Histochemical tests of these cavities suggest the presence of lipophilic substances. Conclusions This is the first study of secretory cavities in Chilean Myrtaceae. In general, micromorphological and anatomical characters are similar to other species of the family. The present findings could provide valuable anatomical information for future research in South American Myrtaceae.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Quality in education at the tertiary level is constantly questioned, and increasingly “professional standards” are offered as the solution to the perceived decline in quality. Foucauldian archaeological analysis of teacher graduate and geography graduate standards in Australia is conducted, revealing tensions between the different document sets. Teacher graduate standards reflect two discourses (one of knowledge and understanding, and one of skills) that are anti-intellectual and based on jargon and formulaic prescriptions. In contrast, disciplinary standards give primacy to geography as an intellectual inquiry such that its knowledge and understanding, skills, and concepts lead to progressively higher order thinking in graduates.