134 research outputs found

    An Algebraic Approach to Linear-Optical Schemes for Deterministic Quantum Computing

    Full text link
    Linear-Optical Passive (LOP) devices and photon counters are sufficient to implement universal quantum computation with single photons, and particular schemes have already been proposed. In this paper we discuss the link between the algebraic structure of LOP transformations and quantum computing. We first show how to decompose the Fock space of N optical modes in finite-dimensional subspaces that are suitable for encoding strings of qubits and invariant under LOP transformations (these subspaces are related to the spaces of irreducible unitary representations of U(N)). Next we show how to design in algorithmic fashion LOP circuits which implement any quantum circuit deterministically. We also present some simple examples, such as the circuits implementing a CNOT gate and a Bell-State Generator/Analyzer.Comment: new version with minor modification

    The impact of COVID-19 pandemic on breast surgery in Italy: a multi-centric retrospective observational study

    Get PDF
    COVID-19 pandemic had an impact on surgical activities. The aim of this multi-centric, retrospective study was to evaluate the impact of the COVID-19 pandemic on breast surgery. The patients who operated during the pre-pandemic year 2019 were compared to those operated in 2020. Fourteen Breast Care Units provided data on breast surgical procedures performed in 2020 and 2019: total number of breast-conserving surgery (BCS), number of 1st level oncoplastic breast surgery (OBS), number of 2nd level OBS; total number of mastectomies, mastectomies without reconstruction, mastectomies with a tissue expander, mastectomies with direct to implant (DTI) reconstruction, mastectomies with immediate flap reconstruction; total number of delayed reconstructions, number of expanders to implant reconstructions, number of delayed flap reconstructions. Overall 20.684 patients were included: 10.850 (52.5%) operated during 2019, and 9.834 (47.5%) during 2020. The overall number of breast oncologic surgical procedures in all centers in 2020 was 8.509, compared to 9.383 in 2019 (- 9%). BCS decreased by 744 cases (- 13%), the overall number of mastectomies decreased by 130 cases (- 3.5%); mastectomy-BCS ratio was 39-61% in 2019, and 42-58% in 2020. Regarding immediate reconstructive procedures mastectomies with DTI reconstruction increased by 166 cases (+ 15%) and mastectomies with immediate expander reconstruction decreased by 297 cases (- 20%). Breast-delayed reconstructive procedures in all centers in 2020 were 142 less than in 2019 (- 10%). The outburst of the COVID-19 pandemic in 2020 determined an implemented number of mastectomies compared to BCS, an implemented number of immediate breast reconstructions, mainly DTI, and a reduction of expander reconstruction

    DLDDO: Deep Learning to Detect Dummy Operations

    Get PDF
    Recently, research on deep learning based side-channel analysis (DLSCA) has received a lot of attention. Deep learning-based profiling methods similar to template attacks as well as non-profiling-based methods similar to differential power analysis have been proposed. DLSCA methods have been proposed for targets to which masking schemes or jitter-based hiding schemes are applied. However, most of them are methods for finding the secret key, except for methods for preprocessing, and there are no studies on the target to which the dummy-based hiding schemes or shuffling schemes are applied. In this paper, we propose a DLSCA for detecting dummy operations. In the previous study, dummy operations were detected using the method called BCDC, but there is a disadvantage in that it is impossible to detect dummy operations for commercial devices such as an IC card. We consider the detection of dummy operations as a multi-label classification problem and propose a deep learning method based on CNN to solve it. As a result, it is possible to successfully perform detection of dummy operations on an IC card, which was not possible in the previous study

    Co-movements of REIT indices with structural changes before and during the subprime mortgage crisis: evidence from Euro-Med markets

    Get PDF
    This paper examines the long-run relationships between the REIT indices of the UK, Turkey and Israel in the Euro-Med zone with that of MSCI US REIT Index by using weekly data over the period 2003Q3 through 2009Q3, which includes the latest US subprime mortgage crisis and its effects on global stock markets. Although our EG test results do not indicate a long-run relationship, after taking account of the structural changes by applying the GH test, we find a long-run interaction between the REIT indices of UK and Israel with that of the US. However, our results indicate the lack of co-movement between REIT index of Turkey with the US. In addition, our dynamic OLS test results indicate a perfect relationship between the UK and the US indices. Our findings show that international investors who make long-term investments can only gain from diversifying into the real estate market of Turkey among the involved markets in the Euro-Med zone

    Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery

    Get PDF
    Deep Neural Networks (DNNs) have recently received significant attention in the side-channel community due to their state-of-the-art performance in security testing of embedded systems. However, research on the subject mostly focused on techniques to improve the attack efficiency in terms of the number of traces required to extract secret parameters. What has not been investigated in detail is a constructive approach of DNNs as a tool to evaluate and improve the effectiveness of countermeasures against side-channel attacks. In this work, we try to close this gap by applying attribution methods that aim for interpreting DNN decisions, in order to identify leaking operations in cryptographic implementations. In particular, we investigate three different approaches that have been proposed for feature visualization in image classification tasks and compare them regarding their suitability to reveal Points of Interests (POIs) in side-channel traces. We show by experiments with three separate data sets that Layer-wise Relevance Propagation (LRP) proposed by Bach et al. provides the best result in most cases. Finally, we demonstrate that attribution can also serve as a powerful side-channel distinguisher in DNN-based attack setups

    On the Use of Independent Component Analysis to Denoise Side-Channel Measurements

    Get PDF
    International audienceIndependent Component Analysis (ICA) is a powerful technique for blind source separation. It has been successfully applied to signal processing problems, such as feature extraction and noise reduction , in many different areas including medical signal processing and telecommunication. In this work, we propose a framework to apply ICA to denoise side-channel measurements and hence to reduce the complexity of key recovery attacks. Based on several case studies, we afterwards demonstrate the overwhelming advantages of ICA with respect to the commonly used preprocessing techniques such as the singular spectrum analysis. Mainly, we target a software masked implementation of an AES and a hardware unprotected one. Our results show a significant Signal-to-Noise Ratio (SNR) gain which translates into a gain in the number of traces needed for a successful side-channel attack. This states the ICA as an important new tool for the security assessment of cryptographic implementations

    Correlated topographic analysis: estimating an ordering of correlated components

    Get PDF
    Abstract This paper describes a novel method, which we call correlated topographic analysis (CTA), to estimate non-Gaussian components and their ordering (topography). The method is inspired by a central motivation of recent variants of independent component analysis (ICA), namely, to make use of the residual statistical dependency which ICA cannot remove. We assume that components nearby on the topographic arrangement have both linear and energy correlations, while far-away components are statistically independent. We use these dependencies to fix the ordering of the components. We start by proposing the generative model for the components. Then, we derive an approximation of the likelihood based on the model. Furthermore, since gradient methods tend to get stuck in local optima, we propose a three-step optimization method which dramatically improves topographic estimation. Using simulated data, we show that CTA estimates an ordering of the components and generalizes a previous method in terms of topography estimation. Finally, to demonstrate that CTA is widely applicable, we learn topographic representations for three kinds of real data: natural images, outputs of simulated complex cells and text data

    Conductance Quantization in Resistive Random Access Memory

    Get PDF
    corecore