6 resultados para Cryptography algorithms


Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been an increasing interest in the development of new methods using Pareto optimality to deal with multi-objective criteria (for example, accuracy and time complexity). Once one has developed an approach to a problem of interest, the problem is then how to compare it with the state of art. In machine learning, algorithms are typically evaluated by comparing their performance on different data sets by means of statistical tests. Standard tests used for this purpose are able to consider jointly neither performance measures nor multiple competitors at once. The aim of this paper is to resolve these issues by developing statistical procedures that are able to account for multiple competing measures at the same time and to compare multiple algorithms altogether. In particular, we develop two tests: a frequentist procedure based on the generalized likelihood-ratio test and a Bayesian procedure based on a multinomial-Dirichlet conjugate model. We further extend them by discovering conditional independences among measures to reduce the number of parameters of such models, as usually the number of studied cases is very reduced in such comparisons. Data from a comparison among general purpose classifiers is used to show a practical application of our tests.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the development of a viable quantum computer nears, existing widely used public-key cryptosystems, such as RSA, will no longer be secure. Thus, significant effort is being invested into post-quantum cryptography (PQC). Lattice-based cryptography (LBC) is one such promising area of PQC, which offers versatile, efficient, and high performance security services. However, the vulnerabilities of these implementations against side-channel attacks (SCA) remain significantly understudied. Most, if not all, lattice-based cryptosystems require noise samples generated from a discrete Gaussian distribution, and a successful timing analysis attack can render the whole cryptosystem broken, making the discrete Gaussian sampler the most vulnerable module to SCA. This research proposes countermeasures against timing information leakage with FPGA-based designs of the CDT-based discrete Gaussian samplers with constant response time, targeting encryption and signature scheme parameters. The proposed designs are compared against the state-of-the-art and are shown to significantly outperform existing implementations. For encryption, the proposed sampler is 9x faster in comparison to the only other existing time-independent CDT sampler design. For signatures, the first time-independent CDT sampler in hardware is proposed. 

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background
It is generally acknowledged that a functional understanding of a biological system can only be obtained by an understanding of the collective of molecular interactions in form of biological networks. Protein networks are one particular network type of special importance, because proteins form the functional base units of every biological cell. On a mesoscopic level of protein networks, modules are of significant importance because these building blocks may be the next elementary functional level above individual proteins allowing to gain insight into fundamental organizational principles of biological cells.
Results
In this paper, we provide a comparative analysis of five popular and four novel module detection algorithms. We study these module prediction methods for simulated benchmark networks as well as 10 biological protein interaction networks (PINs). A particular focus of our analysis is placed on the biological meaning of the predicted modules by utilizing the Gene Ontology (GO) database as gold standard for the definition of biological processes. Furthermore, we investigate the robustness of the results by perturbing the PINs simulating in this way our incomplete knowledge of protein networks.
Conclusions
Overall, our study reveals that there is a large heterogeneity among the different module prediction algorithms if one zooms-in the biological level of biological processes in the form of GO terms and all methods are severely affected by a slight perturbation of the networks. However, we also find pathways that are enriched in multiple modules, which could provide important information about the hierarchical organization of the system

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: To clarify the most appropriate treatment regimen for congenital nasolacrimal duct obstruction (CNLDO). Methods: A retrospective observational analysis was performed of patients undergoing probing with or without intubation to treat CNLDO in a single institution (Royal Victoria Hospital, Belfast) from 2006 to 2011. Results: Based on exclusion criteria, 246 eyes of 177 patients (aged 0 to 9.8 years with a mean age of 2.1 years) were included in this study: 187 (76%) eyes had successful outcome at first intervention with primary probing, whereas 56 (23%) eyes underwent secondary intervention. There were no significant differences by gender, age, or obstruction complexity between the successful and unsuccessful patients with first intervention. For those patients requiring secondary intervention, 16 of 24 (67%) eyes had successful probing, whereas 22 of 24 (92%) had successful intubation. Patients with intubation as a secondary procedure were significantly more likely to have a successful outcome (P = .037). Statistical analysis was performed using the Fisher's exact test and Barnard's exact test. Conclusions: Primary probing for CNLDO has a high success rate that is not adversely affected by increasing age. This study also indicates that if initial probing is unsuccessful, nasolacrimal intubation rather than repeat probing yields a significantly higher success rate.