81 resultados para factoring
Resumo:
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.
Resumo:
A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudonym can interact with an unknown entity and be confident that his/her identity is secret even if the other entity is dishonest. In this work, we present a system that allows users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Our proposal is different from previously published pseudonym systems, as in addition to standard notion of protecting privacy of an user, our system offers colligation between seemingly independent pseudonyms. This new property when combined with a trusted platform that stores a master secret key is extremely beneficial to an user as it offers a convenient way to generate a large number of pseudonyms using relatively small storage.
Resumo:
Introduction and Aim: Sexual assaults commonly involve alcohol use by the perpetrator, victim, or both. Beliefs about alcohol’s effects may impact on people’s perceptions of and responses to men and women who have had such experiences while intoxicated from alcohol. This study aimed to develop an alcohol expectancy scale that captures young adults’ beliefs about alcohol’s role in sexual aggression and victimisation. Design and Methods: Based on pilot focus groups, an initial pool of 135 alcohol expectancy items was developed, checked for readability and face validity, and administered via a cross-sectional survey to 201 male and female university students (18-25 years). Items were specified in terms of three target drinkers: self, men, and women. In addition, a social desirability measure was included. Results: Principal Axis Factoring revealed a 4-factor solution for the targets men and women and a 5-factor solution for the target self with 72 items retained. Factors related to sexual coercion, sexual vulnerability, confidence, self-centredness, and negative cognitive and behavioural effects. Social desirability issues were evident for the target self, but not for the targets men and women. Discussion and Conclusions: Young adults link alcohol’s effects with sexual vulnerabilities via perceived risky cognitions and behaviours. Due to social desirability, these expectancies may be difficult to explicate for the self but may be accessible instead via other-oriented assessment. The Sexual Coercion and Vulnerability Alcohol Expectancy Scale has potential as a tool to elucidate the established tendency for observers to excuse intoxicated sexual perpetrators while blaming intoxicated victims.
Resumo:
Number theory has in recent decades assumed a great practical importance, due primarily to its application to cryptography. This chapter discusses how elementary concepts of number theory may be illuminated and made accessible to upper secondary school students via appropriate spreadsheet models. In such environments, students can observe patterns, gain structural insight, form and test conjectures, and solve problems. The chapter begins by reviewing literature on the use of spreadsheets in general and the use of spreadsheets in number theory in particular. Two sample applications are then discussed. The first, factoring factorials, is presented and instructions are given to construct a model in Excel 2007. The second application, the RSA cryptosystem, is included because of its importance to Science, Technology, Engineering, and Mathematics (STEM) students. Number theoretic concepts relevant to RSA are discussed, and an outline of RSA. is given, with example. The chapter ends with instructions on how to construct a simple spreadsheet illustrating RSA.
Resumo:
Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.
Resumo:
Background: The critical care context presents important opportunities for nurses to deliver skilled, comprehensive care to patients at the end of life and their families. Limited research has identified the actual end-of-life care practices of critical care nurses. Objective: To identify the end-of-life care practices of critical care nurses. Design: A national cross-sectional online survey. Methods: The survey was distributed to members of an Australian critical care nursing association and 392 critical care nurses (response rate 25%) completed the survey. Exploratory factor analysis using principal axis factoring with oblique rotation was undertaken on survey responses to identify the domains of end-of-life care practice. Descriptive statistics were calculated for individual survey items. Results: Exploratory factor analysis identified six domains of end-of-life care practice: information sharing, environmental modification, emotional support, patient and family centred decision-making, symptom management and spiritual support. Descriptive statistics identified a high level of engagement in information sharing and environmental modification practices and less frequent engagement in items from the emotional support and symptom management practice areas. Conclusions: The findings of this study identified domains of end-of-life care practice, and critical care nurse engagement in these practices. The findings highlight future training and practice development opportunities, including the need for experiential learning targeting the emotional support practice domain. Further research is needed to enhance knowledge of symptom management practices during the provision of end-of-life care to inform and improve practice in this area.
Resumo:
The Eating Disorder Risk Composite (EDRC) comprises the Drive for Thinness, Bulimia, and Body Dissatisfaction subscales of the Eating Disorder Inventory, Third Edition (EDI-3, Garner, 2004). Past research conducted with Latina college women (LCW) has found older versions of the EDRC subscales to be reliable, but the EDI-3's EDRC factor structure has yet to be studied among LCW. The present study investigated the pattern of responses to and the factor structure of the EDRC in LCW. It was hypothesized that eating pathology would be present and that a factor analysiswould find some discrepancies between the original factor structure of the EDRC and the factor structure from LCW. Analyses of data on a 6-point Likert scale indicate that drive for thinness and body dissatisfaction are far more prevalent than is bulimic symptomology in LCW. Principal Axis Factoring with promax rotation was used to extract three factors very similar to the original EDRC. Some discrepancies in the item loadings were observed, most notably that half of the items from the original Body Dissatisfaction subscale did not load together on one factor. Overall, the EDRC appears to be a goodmeasurement of eating- and body-related phenomena among LCW. Implications, limitations, and future directions are discussed.
Resumo:
The continually expanding macadamia industry needs an accurate crop forecasting system to allow it to develop effective crop handling and marketing strategies, particularly when the industry faces recurring cycles of unsustainably high and low commodity prices. This project aims to provide the AMS with a robust, reliable predictive model of national crop volume within 10% of the actual crop by 1 April each year by factoring known seasonal, environmental, cultural, climatic, management and biological constraints, together with the existing AMS database which includes data on tree numbers, tree age, variety, location and previous season's production.
Resumo:
Background Alcohol expectancies likely play a role in people’s perceptions of alcohol-involved sexual violence. However, no appropriate measure exists to examine this link comprehensively. Objective The aim of this research was to develop an alcohol expectancy measure which captures young adults’ beliefs about alcohol’s role in sexual aggression and victimization. Method Two cross-sectional samples of young Australian adults (18–25 years) were recruited for scale development (Phase 1) and scale validation (Phase 2). In Phase 1, participants (N = 201; 38.3% males) completed an online survey with an initial pool of alcohol expectancy items stated in terms of three targets (self, men, women) to identify the scale’s factor structure and most effective items. A revised alcohol expectancy scale was then administered online to 322 young adults (39.6% males) in Phase 2. To assess the predictive, convergent, and discriminant validity of the scale, participants also completed established measures of personality, social desirability, alcohol use, general and context-specific alcohol expectancies, and impulsiveness. Results Principal axis factoring (Phase 1) and confirmatory factor analysis (Phase 2) resulted in a target-equivalent five-factor structure for the final 66-item Drinking Expectancy Sexual Vulnerabilities Questionnaire (DESV-Q). The factors were labeled: - (1) Sexual Coercion - (2) Sexual Vulnerability - (3) Confidence - (4) Self-Centeredness - (5) Negative Cognitive and Behavioral Changes The measure demonstrated effective items, high internal consistency, and satisfactory predictive, convergent, and discriminant validity. Conclusions The DESV-Q is a purpose-specific instrument that could be used in future research to elucidate people’s attributions for alcohol-involved sexual aggression and victimization.
Resumo:
Background Methamphetamine use can produce symptoms almost indistinguishable from schizophrenia. Distinguishing between the two conditions has been hampered by the lack of a validated symptom profile for methamphetamine-induced psychiatric symptoms. We use data from a longitudinal cohort study to examine the profile of psychiatric symptoms that are acutely exacerbated by methamphetamine use. Methods 164 methamphetamine users, who did not meet DSM-IV criteria for a lifetime primary psychotic disorder, were followed monthly for one year to assess the relationship between days of methamphetamine use and symptom severity on the 24-item Brief Psychiatric Rating Scale. Exacerbation of psychiatric symptoms with methamphetamine use was quantified using random coefficient models. The dimensions of symptom exacerbation were examined using principal axis factoring and a latent profile analysis. Results Symptoms exacerbated by methamphetamine loaded on three factors: positive psychotic symptoms (suspiciousness, unusual thought content, hallucinations, bizarre behavior); affective symptoms (depression, suicidality, guilt, hostility, somatic concern, self-neglect); and psychomotor symptoms (tension, excitement, distractibility, motor hyperactivity). Methamphetamine use did not significantly increase negative symptoms. Vulnerability to positive psychotic and affective symptom exacerbation was shared by 28% of participants, and this vulnerability aligned with a past year DSM-IV diagnosis of substance-induced psychosis (38% vs. 22%, _2 (df1) = 3.66, p = 0.056). Conclusion Methamphetamine use produced a symptom profile comprised of positive psychotic and affective symptoms, which aligned with a diagnosis of substance-induced psychosis, with no evidence of a negative syndrome.
Resumo:
How powerful are Quantum Computers? Despite the prevailing belief that Quantum Computers are more powerful than their classical counterparts, this remains a conjecture backed by little formal evidence. Shor's famous factoring algorithm [Shor97] gives an example of a problem that can be solved efficiently on a quantum computer with no known efficient classical algorithm. Factoring, however, is unlikely to be NP-Hard, meaning that few unexpected formal consequences would arise, should such a classical algorithm be discovered. Could it then be the case that any quantum algorithm can be simulated efficiently classically? Likewise, could it be the case that Quantum Computers can quickly solve problems much harder than factoring? If so, where does this power come from, and what classical computational resources do we need to solve the hardest problems for which there exist efficient quantum algorithms?
We make progress toward understanding these questions through studying the relationship between classical nondeterminism and quantum computing. In particular, is there a problem that can be solved efficiently on a Quantum Computer that cannot be efficiently solved using nondeterminism? In this thesis we address this problem from the perspective of sampling problems. Namely, we give evidence that approximately sampling the Quantum Fourier Transform of an efficiently computable function, while easy quantumly, is hard for any classical machine in the Polynomial Time Hierarchy. In particular, we prove the existence of a class of distributions that can be sampled efficiently by a Quantum Computer, that likely cannot be approximately sampled in randomized polynomial time with an oracle for the Polynomial Time Hierarchy.
Our work complements and generalizes the evidence given in Aaronson and Arkhipov's work [AA2013] where a different distribution with the same computational properties was given. Our result is more general than theirs, but requires a more powerful quantum sampler.
Resumo:
We examine monthly and seasonal patterns of precipitation across various elevations of the eastern Central Valley of California and the Sierra Nevada. A measure of the strength of the orographic effect called the “precipitation ratio” is calculated, and we separate months into four groups based on being wet or dry and having low or high precipitation ratios. Using monthly maps of mean 700-mb height anomalies, we describe the northern hemisphere mid-tropospheric circulation patterns associated with each of the four groups. Wet months are associated with negative height anomalies over the eastern Pacific, as expected. However, the orientation of the trough is different for years with high and low precipitation ratios. Wet months with high ratios typically have circulation patterns factoring a west-southwest to east-northeast storm track from around the Hawaiian Islands to the Pacific Northwest of the United States. Wet months with low precipitation ratios are associated with a trough centered near the Aleutians and a northwest to southeast storm track. Dry months are marked by anticyclones in the Pacific, but this feature is more localized to the eastern Pacific for months with low precipitation ratios than for those with high ratios. Using precipitation gauge and snow course data from the American River and Truckee-Tahoe basins, we determined that the strength of the orographic effect on a seasonal basis is spatially coherent at low and high elevations and on opposite sides of the Sierra Nevada crestline.
Resumo:
对一个基于因数分解和离散对数两个困难问题的签名方案的安全漏洞进行了分析,提出了一种改进的基于两个数学难题的签名方案,并对它的安全性给出了证明。
Resumo:
The patterns of copepod species richness (S) and their relationship with phytoplankton productivity, temperature and environmental stability were investigated at climatological, seasonal and year-to-year time scales as well as scales along latitudinal and oceanic–neritic gradients using monthly time series of the Continuous Plankton Recorder (CPR) Survey collected in the North East Atlantic between 1958 and 2006. Time series analyses confirmed previously described geographic patterns. Equatorward and towards neritic environments, the climatological average of S increases and the variance explained by the seasonal cycle decreases. The bi-modal character of seasonality increases equatorward and the timing of the seasonal cycle takes place progressive earlier equatorward and towards neritic environments. In the long-term, the climatological average of S decreased significantly (p < 0.001) between 1958 and 2006 in the Bay of Biscay and North Iberian shelf at a rate of ca. 0.04 year−1, and increased at the same rate between 1991 and 2006 in the northernmost oceanic location. The climatological averages of S correlate positively with those of the index of seasonality of phytoplankton productivity (ratio between the minimum and maximum monthly values of surface chlorophyll) and sea surface temperature, and negatively with those of the proxy for environmental stability (monthly frequency of occurrence of daily averaged wind speed exceeding 10 m s−1). The seasonal cycles of S and phytoplankton productivity (surface chlorophyll as proxy) exhibit similar features in terms of shape, timing and explained variance, but the relationship between the climatological averages of both variables is non-significant. From year-to-year, the annual averages of S correlate negatively with those of phytoplankton productivity and positively with those of sea surface temperature along the latitudinal gradient, and negatively with those of environmental stability along the oceanic–neritic gradient. The annual anomalies of S (i.e. factoring out geographic variation) show a unimodal relationship with those of sea surface temperature and environmental stability, with S peaking at intermediate values of the anomalies of these variables. The results evidence the role of seasonality of phytoplankton productivity on the control of copepod species richness at seasonal and climatological scales, giving support to the species richness–productivity hypothesis. Although sea surface temperature (SST) is indeed a good predictor of richness along the latitudinal gradient, it is unable to predict the increase of richness form oceanic to neritic environments, thus lessening the generality of the species richness–energy hypothesis. Meteo-hydrographic disturbances (i.e. SST and wind speed anomalies as proxies), presumably through its role on mixed layer depth dynamics and turbulence and hence productivity, maximise local diversity when occurring at intermediate frequency and or intensity, thus providing support to the intermediate disturbance hypothesis on the control of copepod diversity.
Resumo:
Digital signatures are an important primitive for building secure systems and are used in most real-world security protocols. However, almost all popular signature schemes are either based on the factoring assumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case of classical cryptanalytic advances or progress on the development of quantum computers, the hardness of these closely related problems might be seriously weakened. A potential alternative approach is the construction of signature schemes based on the hardness of certain lattice problems that are assumed to be intractable by quantum computers. Due to significant research advancements in recent years, lattice-based schemes have now become practical and appear to be a very viable alternative to number-theoretic cryptography. In this article, we focus on recent developments and the current state of the art in lattice-based digital signatures and provide a comprehensive survey discussing signature schemes with respect to practicality. Additionally, we discuss future research areas that are essential for the continued development of lattice-based cryptography.