930 resultados para Register
Resumo:
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to the eSTREAM project. In this paper, we analyse the initialisation process of Sfinks. We demonstrate a slid property of the loaded state of the Sfinks cipher, where multiple key-IV pairs may produce phase shifted keystream sequences. The state update functions of both the initialisation process and keystream generation and also the pattern of the padding affect generation of the slid pairs.
Resumo:
A5/1 is a shift register based stream cipher which uses a majority clocking rule to update its registers. It is designed to provide privacy for the GSM system. In this paper, we analyse the initialisation process of A5/1. We demonstrate a sliding property of the A5/1 cipher, where every valid internal state is also a legitimate loaded state and multiple key-IV pairs produce phase shifted keystream sequences. We describe a possible ciphertext only attack based on this property.
Resumo:
Background The mechanisms underlying socioeconomic inequalities in mortality from cardiovascular diseases (CVD) are largely unknown. We studied the contribution of childhood socioeconomic conditions and adulthood risk factors to inequalities in CVD mortality in adulthood. Methods The prospective GLOBE study was carried out in the Netherlands, with baseline data from 1991, and linked with the cause of death register in 2007. At baseline, participants reported on adulthood socioeconomic position (SEP) (own educational level), childhood socioeconomic conditions (occupational level of respondent’s father), and a broad range of adulthood risk factors (health behaviours, material circumstances, psychosocial factors). This present study is based on 5,395 men and 6,306 women, and the data were analysed using Cox regression models and hazard ratios (HR). Results A low adulthood SEP was associated with increased CVD mortality for men (HR 1.84; 95% CI: 1.41-2.39) and women (HR 1.80; 95%CI: 1.04-3.10). Those with poorer childhood socioeconomic conditions were more likely to die from CVD in adulthood, but this reached statistical significance only among men with the poorest childhood socioeconomic circumstances. About half of the investigated adulthood risk factors showed significant associations with CVD mortality among both men and women, namely renting a house, experiencing financial problems, smoking, physical activity and marital status. Alcohol consumption and BMI showed a U-shaped relationship with CVD mortality among women, with the risk being significantly greater for both abstainers and heavy drinkers, and among women who were underweight or obese. Among men, being single or divorced and using sleep/anxiety drugs increased the risk of CVD mortality. In explanatory models, the largest contributor to adulthood CVD inequalities were material conditions for men (42%; 95% CI: −73 to −20) and behavioural factors for women (55%; 95% CI: -191 to −28). Simultaneous adjustment for adulthood risk factors and childhood socioeconomic conditions attenuated the HR for the lowest adulthood SEP to 1.34 (95% CI: 0.99-1.82) for men and 1.19 (95% CI: 0.65-2.15) for women. Conclusions Adulthood material, behavioural and psychosocial factors played a major role in the explanation of adulthood SEP inequalities in CVD mortality. Childhood socioeconomic circumstances made a modest contribution, mainly via their association with adulthood risk factors. Policies and interventions to reduce health inequalities are likely to be most effective when considering the influence of socioeconomic circumstances across the entire life course and in particular, poor material conditions and unhealthy behaviours in adulthood.
Resumo:
Purpose: To compare the retinal thickness (RT) and choroidal thickness (ChT) between the fellow eyes of non-amblyopic myopic anisometropes. Methods: The eyes of 22 non-amblyopic myopic anisometropes (1 D spherical equivalent refraction [SER] anisometropia) were examined using spectral domain optical coherence tomography (SD-OCT). Customised software was used to register, align and average multiple foveal OCT B-Scan images from each subject in order to enhance image quality. Two independent masked observers manually determined the RT and ChT from each SD-OCT image up to 2.5 mm nasal and temporal to the fovea. Axial length (AXL) was measured using optical low coherence biometry during relaxed accommodation. Results: The mean SER anisometropia was 1.74 ± 0.95 D and the mean interocular AXL difference was 0.58 ± 0.41 mm. There was no significant difference in foveal RT between the fellow eyes (P > 0.05). Mean subfoveal ChT was significantly thinner in the more myopic eye (252 ± 46 μm compared to the fellow, less myopic eye (286 ± 58 μm) (P < 0.001). There was a moderate correlation between the interocular difference in subfoveal ChT and the interocular difference in AXL (r = -0.50, P < 0.01). Asian anisometropes displayed more regionally symmetrical (nasal-temporal)interocular differences in ChT profile compared to Caucasians. Conclusions: RT was similar between the fellow eyes of myopic anisometropes; however, the subfoveal choroid was significantly thinner in the more myopic (longer) eye of this anisometropic cohort. The interocular asymmetry in ChT correlated with the interocular difference in AXL.
Resumo:
Scarcity of large parcels of land in well-serviced areas has motivated people to re-develop brownfield land. Most of brownfield land has high risk of contamination from wide range of industrial activities such as gas works, factories, railway land and waste tips. In addition, people who live in brownfield re-development areas may be exposed to health hazards. This paper discusses public perceptions on the brownfield sites and also the risk and mitigation strategy to promote brownfield re-development. Data is gathered from face to face survey of fifty respondents who work in Brisbane Central Business District (CBD) and interview with an expert on remediation of contaminated land. From this preliminary study, it is found that majority of the population are not aware of any brownfield sites near their residence and those who are aware showed very little concern on their proximity to the site. Further discussion on the paper based on a simple cross tabulation analysis. The main risk mitigation strategy of re-development of brownfield site is by updating the registration through Environmental Management Register (EMR) and Contaminated Land Register (CLR). In addition, insurance may offer to cover cost overruns on remediation cost.
Resumo:
The CCI Creative City Index (CCI-CCI) is a new approach to the measurement and ranking of creative global cities. It is constructed over eight principal dimensions, each with multiple distinct elements. Some of these dimensions are familiar from other global city indexes, such as the MORI or GaWC indexes, which account for the size of creative industries, the scale of cultural amenities, or the flows of creative people and global connectedness. In addition to these indicators, the CCI-CCI contributes several new dimensions. These measure the demand side of creative participation, the attention economy, user-created content, and the productivity of socially networked consumers. Global creative cities can often seem alike, in respect of per-capita measures of factors such as public spending on cultural amenities, or the number of hotels and restaurants. This is to be expected when people and capital are relatively free to move, and where economic and political institutions are broadly comparable. However, we find that different cities can register far larger differences at the level of consumer-co-creation and especially digital creative ‘microproductivity’. To explain this finding, we review the logic and rationale of creative and global city index construction and present a review of previous and contemporary indexes. We set out the case for our new model of a creative city index by showing why greater attention to consumer co-creation and microproductivity are important, as well as examining how these factors have been previously overlooked. We show how we have CCI-CCI Creative City Index measured these additional factors and indicate the effect they have on creative and global city indexes. We then present the findings from a pilot study of six cities, two Australian, two German and two from the UK, to indicate how the new index is calculated and applied. Our results indicate much greater variance arising from the new arguments between cities.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
Objectives: This study examines the accuracy of Gestational Diabetes Mellitus (GDM) case-ascertainment in routinely collected data. Methods: Retrospective cohort study analysed routinely collected data from all births at Cairns Base Hospital, Australia, from 1 January 2004 to 31 December 2010 in the Cairns Base Hospital Clinical Coding system (CBHCC) and the Queensland Perinatal Data Collection (QPDC). GDM case ascertainment in the National Diabetes Services Scheme (NDSS) and Cairns Diabetes Centre (CDC) data were compared. Results: From 2004 to 2010, the specificity of GDM case-ascertainment in the QPDC was 99%. In 2010, only 2 of 225 additional cases were identified from the CDC and CBHCC, suggesting QPDC sensitivity is also over 99%. In comparison, the sensitivity of the CBHCC data was 80% during 2004–2010. The sensitivity of CDC data was 74% in 2010. During 2010, 223 births were coded as GDM in the QPDC, and the NDSS registered 247 women with GDM from the same postcodes, suggesting reasonable uptake on the NDSS register. However, the proportion of Aboriginal and Torres Strait Islander women was lower than expected. Conclusion: The accuracy of GDM case ascertainment in the QPDC appears high, with lower accuracy in routinely collected hospital and local health service data. This limits capacity of local data for planning and evaluation, and developing structured systems to improve post-pregnancy care, and may underestimate resources required. Implications: Data linkage should be considered to improve accuracy of routinely collected local health service data. The accuracy of the NDSS for Aboriginal and Torres Strait Islander women requires further evaluation.
Resumo:
BACKGROUND: US Centers for Disease Control guidelines recommend replacement of peripheral intravenous (IV) catheters no more frequently than every 72 to 96 hours. Routine replacement is thought to reduce the risk of phlebitis and bloodstream infection. Catheter insertion is an unpleasant experience for patients and replacement may be unnecessary if the catheter remains functional and there are no signs of inflammation. Costs associated with routine replacement may be considerable. This is an update of a review first published in 2010. OBJECTIVES: To assess the effects of removing peripheral IV catheters when clinically indicated compared with removing and re-siting the catheter routinely. SEARCH METHODS: For this update the Cochrane Peripheral Vascular Diseases (PVD) Group Trials Search Co-ordinator searched the PVD Specialised Register (December 2012) and CENTRAL (2012, Issue 11). We also searched MEDLINE (last searched October 2012) and clinical trials registries. SELECTION CRITERIA: Randomised controlled trials that compared routine removal of peripheral IV catheters with removal only when clinically indicated in hospitalised or community dwelling patients receiving continuous or intermittent infusions. DATA COLLECTION AND ANALYSIS: Two review authors independently assessed trial quality and extracted data. MAIN RESULTS: Seven trials with a total of 4895 patients were included in the review. Catheter-related bloodstream infection (CRBSI) was assessed in five trials (4806 patients). There was no significant between group difference in the CRBSI rate (clinically-indicated 1/2365; routine change 2/2441). The risk ratio (RR) was 0.61 but the confidence interval (CI) was wide, creating uncertainty around the estimate (95% CI 0.08 to 4.68; P = 0.64). No difference in phlebitis rates was found whether catheters were changed according to clinical indications or routinely (clinically-indicated 186/2365; 3-day change 166/2441; RR 1.14, 95% CI 0.93 to 1.39). This result was unaffected by whether infusion through the catheter was continuous or intermittent. We also analysed the data by number of device days and again no differences between groups were observed (RR 1.03, 95% CI 0.84 to 1.27; P = 0.75). One trial assessed all-cause bloodstream infection. There was no difference in this outcome between the two groups (clinically-indicated 4/1593 (0.02%); routine change 9/1690 (0.05%); P = 0.21). Cannulation costs were lower by approximately AUD 7.00 in the clinically-indicated group (mean difference (MD) -6.96, 95% CI -9.05 to -4.86; P ≤ 0.00001). AUTHORS' CONCLUSIONS: The review found no evidence to support changing catheters every 72 to 96 hours. Consequently, healthcare organisations may consider changing to a policy whereby catheters are changed only if clinically indicated. This would provide significant cost savings and would spare patients the unnecessary pain of routine re-sites in the absence of clinical indications. To minimise peripheral catheter-related complications, the insertion site should be inspected at each shift change and the catheter removed if signs of inflammation, infiltration, or blockage are present. OBJECTIVES: To assess the effects of removing peripheral IV catheters when clinically indicated compared with removing and re-siting the catheter routinely. SEARCH METHODS: For this update the Cochrane Peripheral Vascular Diseases (PVD) Group Trials Search Co-ordinator searched the PVD Specialised Register (December 2012) and CENTRAL (2012, Issue 11). We also searched MEDLINE (last searched October 2012) and clinical trials registries. SELECTION CRITERIA: Randomised controlled trials that compared routine removal of peripheral IV catheters with removal only when clinically indicated in hospitalised or community dwelling patients receiving continuous or intermittent infusions. DATA COLLECTION AND ANALYSIS: Two review authors independently assessed trial quality and extracted data. MAIN RESULTS: Seven trials with a total of 4895 patients were included in the review. Catheter-related bloodstream infection (CRBSI) was assessed in five trials (4806 patients). There was no significant between group difference in the CRBSI rate (clinically-indicated 1/2365; routine change 2/2441). The risk ratio (RR) was 0.61 but the confidence interval (CI) was wide, creating uncertainty around the estimate (95% CI 0.08 to 4.68; P = 0.64). No difference in phlebitis rates was found whether catheters were changed according to clinical indications or routinely (clinically-indicated 186/2365; 3-day change 166/2441; RR 1.14, 95% CI 0.93 to 1.39). This result was unaffected by whether infusion through the catheter was continuous or intermittent. We also analysed the data by number of device days and again no differences between groups were observed (RR 1.03, 95% CI 0.84 to 1.27; P = 0.75). One trial assessed all-cause bloodstream infection. There was no difference in this outcome between the two groups (clinically-indicated 4/1593 (0.02%); routine change 9/1690 (0.05%); P = 0.21). Cannulation costs were lower by approximately AUD 7.00 in the clinically-indicated group (mean difference (MD) -6.96, 95% CI -9.05 to -4.86; P ≤ 0.00001). AUTHORS' CONCLUSIONS: The review found no evidence to support changing catheters every 72 to 96 hours. Consequently, healthcare organisations may consider changing to a policy whereby catheters are changed only if clinically indicated. This would provide significant cost savings and would spare patients the unnecessary pain of routine re-sites in the absence of clinical indications. To minimise peripheral catheter-related complications, the insertion site should be inspected at each shift change and the catheter removed if signs of inflammation, infiltration, or blockage are present.
Resumo:
Active Appearance Models (AAMs) employ a paradigm of inverting a synthesis model of how an object can vary in terms of shape and appearance. As a result, the ability of AAMs to register an unseen object image is intrinsically linked to two factors. First, how well the synthesis model can reconstruct the object image. Second, the degrees of freedom in the model. Fewer degrees of freedom yield a higher likelihood of good fitting performance. In this paper we look at how these seemingly contrasting factors can complement one another for the problem of AAM fitting of an ensemble of images stemming from a constrained set (e.g. an ensemble of face images of the same person).
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.
Resumo:
Background Exploring self management in End Stage Renal Disease is extremely important for patients as they encounter several challenges including ongoing symptoms, complex treatments and restrictions, uncertainty about life and a dependency on technology, all of which impact upon their autonomy particularly after commencement of haemodialysis. Objective To summarise the effects of nursing interventions which effect selfmanagement of haemodialysis for patients with End Stage Renal Disease. Search strategy Search terms were chosen after reviewing text words and MeSH terms in relevant articles and databases. An extensive search of the literature from 1966 to June 2009 was conducted across a range of health databases including Cochrane Central Register of Controlled Trials, MEDLINE, EMBASE, CINAHL, PsycINFO and Web of Science. Further studies were identified from reference lists of all retrieved studies. Selection criteria We considered randomised controlled trials that compared interventions to improve self management of haemodialysis in patients with ESRD. In the absence of RCTs, comparative studies without randomisation as well as before and after studies were considered for inclusion. Methodological quality Study reports selected for retrieval were assessed by two independent reviewers for methodological quality prior to inclusion in the review using the standardised critical appraisal instruments for the Joanna Briggs Institute System for the Unified Management, Assessment and Review of Information package (SUMARI). Data collection and analysis Data was extracted using the JBI data extraction tool for evidence of effectiveness independently by pairs of review authors. The evidence was reported in narrative summaries due to heterogeneity of the interventions of the studies. Results and conclusions Five randomised controlled trials were included in the review. Overall, the evidence found that psychosocial and educational interventions influenced self management of haemodialysis in this patient population.
Resumo:
An alternative approach to digital PWM generation using an adder rather than a counter is presented. This offers several advantages. The resolution and gain of the pulse width modulator remain constant regardless of the module clock frequency and PWM output frequency. The PWM resolution also becomes fixed at the register width. Even at high PWM frequencies, the resolution remains high when averaged over a number of PWM cycles. An inherent dithering of the PWM waveform introduced over successive cycles blurs the switching spectra without distorting the modulating waveform. The technique also lends itself to easily generating several phase shifted PWM waveforms suitable for multilevel converter modulation.
Resumo:
A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.