990 resultados para Pairing-based cryptography


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Two nonmutually exclusive hypotheses can explain why divorce is an adaptive strategy to improve reproductive success. Under the 'better option hypothesis', only one of the two partners initiates divorce to secure a higher-quality partner and increases reproductive success after divorce. Under the 'incompatibility hypothesis', partners are incompatible and hence they may both increase reproductive success after divorce. In a long-term study of the barn owl (Tyto alba), we address the question of whether one or the two partners derive fitness benefits by divorcing. Our results support the hypothesis that divorce is adaptive: after a poor reproductive season, at least one of the two divorcees increase breeding success up to the level of faithful pairs. By breeding more often together, faithful pairs improve coordination and thereby gain in their efficiency to produce successful fledglings. Males would divorce to obtain a compatible mate rather than a mate of higher quality: a heritable melanin-based signal of female quality did not predict divorce (indicating that female absolute quality may not be the cause of divorce), but the new mate of divorced males was less melanic than their previous mate. This suggests that, at least for males, a cost of divorce may be to secure a lower-quality but compatible mate. The better option hypothesis could not be formally rejected, as only one of the two divorcing partners commonly succeeded in obtaining a higher reproductive success after divorce. In conclusion, incompatible partners divorce to restore reproductive success, and by breeding more often together, faithful partners improve coordination.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this study, we used fluorescence in situ hybridisation to determine the chromosomal location of 45S rDNA clusters in 10 species of the tribe Rhodniini (Hemiptera: Reduviidae: Triatominae). The results showed striking inter and intraspecific variability, with the location of the rDNA clusters restricted to sex chromosomes with two patterns: either on one (X chromosome) or both sex chromosomes (X and Y chromosomes). This variation occurs within a genus that has an unchanging diploid chromosome number (2n = 22, including 20 autosomes and 2 sex chromosomes) and a similar chromosome size and genomic DNA content, reflecting a genome dynamic not revealed by these chromosome traits. The rDNA variation in closely related species and the intraspecific polymorphism in Rhodnius ecuadoriensis suggested that the chromosomal position of rDNA clusters might be a useful marker to identify recently diverged species or populations. We discuss the ancestral position of ribosomal genes in the tribe Rhodniini and the possible mechanisms involved in the variation of the rDNA clusters, including the loss of rDNA loci on the Y chromosome, transposition and ectopic pairing. The last two processes involve chromosomal exchanges between both sex chromosomes, in contrast to the widely accepted idea that the achiasmatic sex chromosomes of Heteroptera do not interchange sequences.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The future of elections seems to be electronic voting systems du to its advantatges over the traditional voting. Nowadays, there are some different paradigms to ensure the security and reliability of e-voting. This document is part of a wider project which presents an e-Voting platform based on elliptic curve cryptography. It uses an hybrid combination of two of the main e-Voting paradigms to guarantee privacy and security in the counting phase, these are precisely, the mixnets and the homomorphic protocols. This document is focused in the description of the system and the maths and programming needed to solve the homomorphic part of it. In later chapters, there is a comparison between a simple mixing system and our system proposal.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Multisensory experiences influence subsequent memory performance and brain responses. Studies have thus far concentrated on semantically congruent pairings, leaving unresolved the influence of stimulus pairing and memory sub-types. Here, we paired images with unique, meaningless sounds during a continuous recognition task to determine if purely episodic, single-trial multisensory experiences can incidentally impact subsequent visual object discrimination. Psychophysics and electrical neuroimaging analyses of visual evoked potentials (VEPs) compared responses to repeated images either paired or not with a meaningless sound during initial encounters. Recognition accuracy was significantly impaired for images initially presented as multisensory pairs and could not be explained in terms of differential attention or transfer of effects from encoding to retrieval. VEP modulations occurred at 100-130ms and 270-310ms and stemmed from topographic differences indicative of network configuration changes within the brain. Distributed source estimations localized the earlier effect to regions of the right posterior temporal gyrus (STG) and the later effect to regions of the middle temporal gyrus (MTG). Responses in these regions were stronger for images previously encountered as multisensory pairs. Only the later effect correlated with performance such that greater MTG activity in response to repeated visual stimuli was linked with greater performance decrements. The present findings suggest that brain networks involved in this discrimination may critically depend on whether multisensory events facilitate or impair later visual memory performance. More generally, the data support models whereby effects of multisensory interactions persist to incidentally affect subsequent behavior as well as visual processing during its initial stages.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A linkage disequilibrium between sexually selected and life history traits can be explained by three mutually non-exclusive mechanisms. Genes coding for two traits may be located close on the same chromosome, genes responsible for variation in one of the trait may pleiotropically alter the other, and non-random pairing with respect to two traits may generate a non-physical linkage disequilibrium between their genes. Knowledge of which of these three mechanisms is responsible for a covariation between two traits is of interest to understand why differently ornamented individuals differ in several phenotypic aspects. In Switzerland, barn owls Tyto alba mate randomly with respect to a colour polymorphism generating a large range of variants between reddish-brown and white, males being lighter coloured than females. Several studies have shown that plumage coloration is not neutral with respect to some life history components. To test whether coloration is genetically associated with body size, partial cross-fostering experiments were performed by exchanging some hatchlings between nests. These experiments showed that darker biological fathers produce longer-tailed offspring. This sex-specific pattern is consistent with the hypothesis of non-physical linkage disequilibrium. In line with this hypothesis, darker coloured males were mated with longer-tailed females, whereas female coloration was not associated with tail length of their mate. The finding that dark nestlings had a longer tail than their pale siblings also supports the physical linkage and pleiotropy hypotheses. Therefore, non-random pairing can generate or strengthen a genetic covariation between a secondary sexual character and a morphological trait.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The basic goal of this study is to extend old and propose new ways to generate knapsack sets suitable for use in public key cryptography. The knapsack problem and its cryptographic use are reviewed in the introductory chapter. Terminology is based on common cryptographic vocabulary. For example, solving the knapsack problem (which is here a subset sum problem) is termed decipherment. Chapter 1 also reviews the most famous knapsack cryptosystem, the Merkle Hellman system. It is based on a superincreasing knapsack and uses modular multiplication as a trapdoor transformation. The insecurity caused by these two properties exemplifies the two general categories of attacks against knapsack systems. These categories provide the motivation for Chapters 2 and 4. Chapter 2 discusses the density of a knapsack and the dangers of having a low density. Chapter 3 interrupts for a while the more abstract treatment by showing examples of small injective knapsacks and extrapolating conjectures on some characteristics of knapsacks of larger size, especially their density and number. The most common trapdoor technique, modular multiplication, is likely to cause insecurity, but as argued in Chapter 4, it is difficult to find any other simple trapdoor techniques. This discussion also provides a basis for the introduction of various categories of non injectivity in Chapter 5. Besides general ideas of non injectivity of knapsack systems, Chapter 5 introduces and evaluates several ways to construct such systems, most notably the "exceptional blocks" in superincreasing knapsacks and the usage of "too small" a modulus in the modular multiplication as a trapdoor technique. The author believes that non injectivity is the most promising direction for development of knapsack cryptosystema. Chapter 6 modifies two well known knapsack schemes, the Merkle Hellman multiplicative trapdoor knapsack and the Graham Shamir knapsack. The main interest is in aspects other than non injectivity, although that is also exploited. In the end of the chapter, constructions proposed by Desmedt et. al. are presented to serve as a comparison for the developments of the subsequent three chapters. Chapter 7 provides a general framework for the iterative construction of injective knapsacks from smaller knapsacks, together with a simple example, the "three elements" system. In Chapters 8 and 9 the general framework is put into practice in two different ways. Modularly injective small knapsacks are used in Chapter 9 to construct a large knapsack, which is called the congruential knapsack. The addends of a subset sum can be found by decrementing the sum iteratively by using each of the small knapsacks and their moduli in turn. The construction is also generalized to the non injective case, which can lead to especially good results in the density, without complicating the deciphering process too much. Chapter 9 presents three related ways to realize the general framework of Chapter 7. The main idea is to join iteratively small knapsacks, each element of which would satisfy the superincreasing condition. As a whole, none of these systems need become superincreasing, though the development of density is not better than that. The new knapsack systems are injective but they can be deciphered with the same searching method as the non injective knapsacks with the "exceptional blocks" in Chapter 5. The final Chapter 10 first reviews the Chor Rivest knapsack system, which has withstood all cryptanalytic attacks. A couple of modifications to the use of this system are presented in order to further increase the security or make the construction easier. The latter goal is attempted by reducing the size of the Chor Rivest knapsack embedded in the modified system. '

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the present work, a simple and rapid ligand-less, in situ, surfactant-based solid phase extraction for the preconcentration of copper in water samples was developed. In this method, a cationic surfactant (n-dodecyltrimethylammonium bromide) was dissolved in an aqueous sample followed by the addition of an appropriate ion-pairing agent (ClO4-). Due to the interaction between the surfactant and ion-pairing agent, solid particles were formed and subsequently used for the adsorption of Cu(OH)2 and CuI. After centrifugation, the sediment was dissolved in 1.0 mL of 1 mol L-1 HNO3 in ethanol and aspirated directly into the flame atomic absorption spectrometer. In order to obtain the optimum conditions, several parameters affecting the performance of the LL-ISS-SPE, including the volumes of DTAB, KClO4, and KI, pH, and potentially interfering ions, were optimized. It was found that KI and phosphate buffer solution (pH = 9) could extract more than 95% of copper ions. The amount of copper ions in the water samples varied from 3.2 to 4.8 ng mL-1, with relative standard deviations of 98.5%-103%. The determination of copper in water samples was linear over a concentration range of 0.5-200.0 ng mL-1. The limit of detection (3Sb/m) was 0.1 ng mL-1 with an enrichment factor of 38.7. The accuracy of the developed method was verified by the determination of copper in two certified reference materials, producing satisfactory results.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The quasiclassical approach was applied to the investigation of the vortex properties in the ironbased superconductors. The special attention was paid to manifestation of the nonlocal effects of the vortex core structure. The main results are as follows: (i) The effects of the pairing symmetries (s+ and s₊₊) on the cutoff parameter of field distribution, ξh, in stoichiometric (like LiFeAs) and nonstoichiometric (like doped BaFe₂As₂) iron pnictides have been investigated using Eilenberger quasiclassical equations. Magnetic field, temperature and impurity scattering dependences of ξh have been calculated. Two opposite behavior have been discovered. The ξh /ξc2 ratio is less in s+ symmetry when intraband impurity scattering (Γ₀) is much larger than one and much larger than interband impurity scattering (Γπ), i.e. in nonstoichiometric iron pnictides. Opposite, the value ξh /ξc2 is higher in s+ case and the field dependent curve is shifted upward from the "clean" case (Γ₀ = Γπ = 0) for stoichiometric iron pnictides (Γ₀ = Γπ ≪ 1). (ii) Eilenberger approach to the cutoff parameter, ξh, of the field distribution in the mixed state of high

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this work, the magnetic field penetration depth for high-Tc cuprate superconductors is calculated using a recent Interlayer Pair Tunneling (ILPT) model proposed by Chakravarty, Sudb0, Anderson, and Strong [1] to explain high temperature superconductivity. This model involves a "hopping" of Cooper pairs between layers of the unit cell which acts to amplify the pairing mechanism within the planes themselves. Recent work has shown that this model can account reasonably well for the isotope effect and the dependence of Tc on nonmagnetic in-plane impurities [2] , as well as the Knight shift curves [3] and the presence of a magnetic peak in the neutron scattering intensity [4]. In the latter case, Yin et al. emphasize that the pair tunneling must be the dominant pairing mechanism in the high-Tc cuprates in order to capture the features found in experiments. The goal of this work is to determine whether or not the ILPT model can account for the experimental observations of the magnetic field penetration depth in YBa2Cu307_a7. Calculations are performed in the weak and strong coupling limits, and the efi"ects of both small and large strengths of interlayer pair tunneling are investigated. Furthermore, as a follow up to the penetration depth calculations, both the neutron scattering intensity and the Knight shift are calculated within the ILPT formalism. The aim is to determine if the ILPT model can yield results consistent with experiments performed for these properties. The results for all three thermodynamic properties considered are not consistent with the notion that the interlayer pair tunneling must be the dominate pairing mechanism in these high-Tc cuprate superconductors. Instead, it is found that reasonable agreement with experiments is obtained for small strengths of pair tunneling, and that large pair tunneling yields results which do not resemble those of the experiments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thèse numérisée par la Division de la gestion de documents et des archives de l'Université de Montréal

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Communication is the process of transmitting data across channel. Whenever data is transmitted across a channel, errors are likely to occur. Coding theory is a stream of science that deals with finding efficient ways to encode and decode data, so that any likely errors can be detected and corrected. There are many methods to achieve coding and decoding. One among them is Algebraic Geometric Codes that can be constructed from curves. Cryptography is the science ol‘ security of transmitting messages from a sender to a receiver. The objective is to encrypt message in such a way that an eavesdropper would not be able to read it. A eryptosystem is a set of algorithms for encrypting and decrypting for the purpose of the process of encryption and decryption. Public key eryptosystem such as RSA and DSS are traditionally being prel‘en‘ec| for the purpose of secure communication through the channel. llowever Elliptic Curve eryptosystem have become a viable altemative since they provide greater security and also because of their usage of key of smaller length compared to other existing crypto systems. Elliptic curve cryptography is based on group of points on an elliptic curve over a finite field. This thesis deals with Algebraic Geometric codes and their relation to Cryptography using elliptic curves. Here Goppa codes are used and the curves used are elliptic curve over a finite field. We are relating Algebraic Geometric code to Cryptography by developing a cryptographic algorithm, which includes the process of encryption and decryption of messages. We are making use of fundamental properties of Elliptic curve cryptography for generating the algorithm and is used here to relate both.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Statistical approaches have been applied to examine amino acid pairing preferences within parallel beta-sheets. The main chain hydrogen bonding pattern in parallel beta-sheets means that, for each residue pair, only one of the residues is involved in main chain hydrogen bonding with the strand containing the partner residue. We call this the hydrogen bonded (HB) residue and the partner residue the non-hydrogen bonded (nHB) residue, and differentiate between the favorability of a pair and that of its reverse pair, e.g. Asn(HB)-Thr(nHB)versus Thr(HB)-Asn(nHB). Significantly (p < or = 0.000001) favoured pairings were rationalised using stereochemical arguments. For instance, Asn(HB)-Thr(nHB) and Arg(HB)-Thr(nHB) were favoured pairs, where the residues adopted favoured chi1 rotamer positions that allowed side-chain interactions to occur. In contrast, Thr(HB)-Asn(nHB) and Thr(HB)-Arg(nHB) were not significantly favoured, and could only form side-chain interactions if the residues involved adopted less favourable chi1 conformations. The favourability of hydrophobic pairs e.g. Ile(HB)-Ile(nHB), Val(HB)-Val(nHB) and Leu(HB)-Ile(nHB) was explained by the residues adopting their most preferred chi1 and chi2 conformations, which enabled them to form nested arrangements. Cysteine-cysteine pairs are significantly favoured, although these do not form intrasheet disulphide bridges. Interactions between positively and negatively charged residues were asymmetrically preferred: those with the negatively charged residue at the HB position were more favoured. This trend was accounted for by the presence of general electrostatic interactions, which, based on analysis of distances between charged atoms, were likely to be stronger when the negatively charged residue is the HB partner. The Arg(HB)-Asp(nHB) interaction was an exception to this trend and its favorability was rationalised by the formation of specific side-chain interactions. This research provides rules that could be applied to protein structure prediction, comparative modelling and protein engineering and design. The methods used to analyse the pairing preferences are automated and detailed results are available (http://www.rubic.rdg.ac.uk/betapairprefsparallel/).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Statistical approaches have been applied to examine amino acid pairing preferences within parallel beta-sheets. The main chain hydrogen bonding pattern in parallel beta-sheets means that, for each residue pair, only one of the residues is involved in main chain hydrogen bonding with the strand containing the partner residue. We call this the hydrogen bonded (HB) residue and the partner residue the non-hydrogen bonded (nHB) residue, and differentiate between the favourability of a pair and that of its reverse pair, e.g. Asn(HB)-Thr(nHB) versus Thr(HB)-Asn(nHB). Significantly (p <= 0.000001) favoured pairings were rationalised using stereochemical arguments. For instance, Asn(HB)-Thr(nHB) and Arg(HB)-Thr(nHB) were favoured pairs, where the residues adopted favoured chi(1) rotamer positions that allowed side-chain interactions to occur. In contrast, Thr(HB)-Asn(nHB) and Thr(HB)-Arg(nHB) were not significantly favoured, and could only form side-chain interactions if the residues involved adopted less favourable chi(1) conformations. The favourability of hydrophobic pairs e.g. Ile(HB)-Ile(nHB), Val(HB)-Val(nHB) and Leu(HB)-Ile(nHB) was explained by the residues adopting their most preferred chi(1) and chi(2) conformations, which enabled them to form nested arrangements. Cysteine-cysteine pairs are significantly favoured, although these do not form intrasheet disulphide bridges. Interactions between positively and negatively charged residues were asymmetrically preferred: those with the negatively charged residue at the HB position were more favoured. This trend was accounted for by the presence of general electrostatic interactions, which, based on analysis of distances between charged atoms, were likely to be stronger when the negatively charged residue is the HB partner. The Arg(HB)-Asp(nHB) interaction was an exception to this trend and its favourability was rationalised by the formation of specific side-chain interactions. This research provides rules that could be applied to protein structure prediction, comparative modelling and protein engineering and design. The methods used to analyse the pairing preferences are automated and detailed results are available (http:// www.rubic.rdg.ac.uk/betapairprefsparallel/). (c) 2005 Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A novel cryptography method based on the Lorenz`s attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.