12 resultados para Caesar, Julius.

em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Performance by Tyrone Guthrie Society, South Dining Hall, Queen's University, Belfast.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report summarizes our results from security analysis covering all 57 competitions for authenticated encryption: security, applicability, and robustness (CAESAR) first-round candidates and over 210 implementations. We have manually identified security issues with three candidates, two of which are more serious, and these ciphers have been withdrawn from the competition. We have developed a testing framework, BRUTUS, to facilitate automatic detection of simple security lapses and susceptible statistical structures across all ciphers. From this testing, we have security usage notes on four submissions and statistical notes on a further four. We highlight that some of the CAESAR algorithms pose an elevated risk if employed in real-life protocols due to a class of adaptive-chosen-plaintext attacks. Although authenticated encryption with associated data are often defined (and are best used) as discrete primitives that authenticate and transmit only complete messages, in practice, these algorithms are easily implemented in a fashion that outputs observable ciphertext data when the algorithm has not received all of the (attacker-controlled) plaintext. For an implementor, this strategy appears to offer seemingly harmless and compliant storage and latency advantages. If the algorithm uses the same state for secret keying information, encryption, and integrity protection, and the internal mixing permutation is not cryptographically strong, an attacker can exploit the ciphertext–plaintext feedback loop to reveal secret state information or even keying material. We conclude that the main advantages of exhaustive, automated cryptanalysis are that it acts as a very necessary sanity check for implementations and gives the cryptanalyst insights that can be used to focus more specific attack methods on given candidates.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Approaches exploiting trait distribution extremes may be used to identify loci associated with common traits, but it is unknown whether these loci are generalizable to the broader population. In a genome-wide search for loci associated with the upper versus the lower 5th percentiles of body mass index, height and waist-to-hip ratio, as well as clinical classes of obesity, including up to 263,407 individuals of European ancestry, we identified 4 new loci (IGFBP4, H6PD, RSRC1 and PPP2R2A) influencing height detected in the distribution tails and 7 new loci (HNF4G, RPTOR, GNAT2, MRPS33P4, ADCY9, HS6ST3 and ZZZ3) for clinical classes of obesity. Further, we find a large overlap in genetic structure and the distribution of variants between traits based on extremes and the general population and little etiological heterogeneity between obesity subgroups.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A series of palladium, platinum and manganese di(organo) carbene complexes have been prepared from 4-chloro-N-methylquinolinone by processes that involve alkylation before or after attachment to the metal unit; the nucleophilic heteroatoms necessary for eventual carbene formation and stabilisation are separated from the C-donor atom by three bonds.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose
A number of school-based domestic abuse prevention programmes have been developed in the United Kingdom, but evidence as to the effectiveness of such programmes is limited. The aim of the research was to evaluate the effectiveness of one such programme and to see whether the outcomes differ by gender and experiences of domestic abuse.

Method
Pupils aged 13–14 years, across seven schools, receiving a 6-week education programme completed a questionnaire to measure their attitudes towards domestic violence at pre-, post-test, and 3-month follow-up, and also responded to questions about experiences of abuse (as victims, perpetrators, and witnesses) and help seeking. Children in another six schools not yet receiving the intervention responded to the same questions at pre- and post-test. In total, 1,203 children took part in the research.

Results
Boys and girls who had received the intervention became less accepting of domestic violence and more likely to seek help from pre- to post-test compared with those in the control group; outcomes did not vary by experiences of abuse. There was evidence that the change in attitudes for those in the intervention group was maintained at 3-month follow-up.

Conclusions
These findings suggest that such a programme shows great promise, with both boys and girls benefiting from the intervention, and those who have experienced abuse and those who have not (yet) experienced abuse showing a similar degree of attitude change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is widely accepted that silicon-substituted materials enhance bone formation, yet the mechanism by which this occurs is poorly understood. This work investigates the potential of using diatom frustules to answer on fundamental questions surrounding the role of silica in bone healing. Biosilica with frustules 20m were isolated from Cyclotella meneghiniana a unicellular microalgae that was sourced from the Mississippi River, USA. Silanisation chemistry was used to modify the surface of C. meneghiniana with amine (–NH2) and thiol (–SH) terminated silanes. Untreated frustules and both functionalised groups were soaked in culture medium for 24hrs. Following the culture period, frustules were separated from the conditioned medium by centrifugation and both were tested separately in vitro for cytotoxicity using murine-monocyte macrophage (J774) cell line. Cytotoxicity was measured using LDH release to measure damage to cell membrane, MTS to measure cell viability and live-dead staining. The expression and release of pro-inflammatory cytokines (IL-6 and TNF) were measured using ELISA. Our results found that diatom frustules and those functionalised with amino groups showed no cytotoxicity or elevated cytokine release. Diatom frustules functionalised with thiol groups showed higher levels of cytotoxicity. Diatom frustules and those functionalised with amino groups were taken forward to an in vivo mouse toxicity model, whereby the immunological response, organ toxicity and route of metabolism/excretion of silica were investigated. Histological results showed no organ toxicity in any of the groups relative to control. Analysis of blood Si levels suggests that modified frustules are metabolised quicker than functionalised frustules, suggesting that physiochemical attributes influence their biodistribution. Our results show that diatom frustules are non cytotoxic and are promising materials to better understand the role of silica in bone healing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

WHIRLBOB, also known as STRIBOBr2, is an AEAD (Authenticated Encryption with Associated Data) algorithm derived from STRIBOBr1 and the Whirlpool hash algorithm. WHIRLBOB/STRIBOBr2 is a second round candidate in the CAESAR competition. As with STRIBOBr1, the reduced-size Sponge design has a strong provable security link with a standardized hash algorithm. The new design utilizes only the LPS or ρ component of Whirlpool in flexibly domain-separated BLNK Sponge mode. The number of rounds is increased from 10 to 12 as a countermeasure against Rebound Distinguishing attacks. The 8 ×8 - bit S-Box used by Whirlpool and WHIRLBOB is constructed from 4 ×4 - bit “MiniBoxes”. We report on fast constant-time Intel SSSE3 and ARM NEON SIMD WHIRLBOB implementations that keep full miniboxes in registers and access them via SIMD shuffles. This is an efficient countermeasure against AES-style cache timing side-channel attacks. Another main advantage of WHIRLBOB over STRIBOBr1 (and most other AEADs) is its greatly reduced implementation footprint on lightweight platforms. On many lower-end microcontrollers the total software footprint of π+BLNK = WHIRLBOB AEAD is less than half a kilobyte. We also report an FPGA implementation that requires 4,946 logic units for a single round of WHIRLBOB, which compares favorably to 7,972 required for Keccak / Keyak on the same target platform. The relatively small S-Box gate count also enables efficient 64-bit bitsliced straight-line implementations. We finally present some discussion and analysis on the relationships between WHIRLBOB, Whirlpool, the Russian GOST Streebog hash, and the recent draft Russian Encryption Standard Kuznyechik.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authenticated encryption algorithms protect both the confidentiality and integrity of messages in a single processing pass. We show how to utilize the L◦P ◦S transform of the Russian GOST R 34.11-2012 standard hash “Streebog” to build an efficient, lightweight algorithm for Authenticated Encryption with Associated Data (AEAD) via the Sponge construction. The proposed algorithm “StriBob” has attractive security properties, is faster than the Streebog hash alone, twice as fast as the GOST 28147-89 encryption algorithm, and requires only a modest amount of running-time memory. StriBob is a Round 1 candidate in the CAESAR competition.