36 research outputs found
Anonymous IBE From Quadratic Residuosity With Fast Encryption
We develop two variants of Cocks\u27 identity-based encryption. One variant has faster encryption, where the most time-consuming part only requires several modular multiplications. The other variant makes the first variant anonymous under suitable complexity assumptions, while its decryption efficiency is about twice lower than the first one. Both the variants have ciphertext expansion twice more extensive than the original Cocks\u27 identity-based encryption. To alleviate the issue of the second variant\u27s large ciphertext expansion, we consider using it to construct a public-key encryption with keyword search scheme with a fast encryption algorithm
Exponentiating in Pairing Groups
We study exponentiations in pairing groups for the most common security levels and show that, although the Weierstrass model is preferable for pairing computation, it can be worthwhile to map to alternative curve representations for the non-pairing group operations in protocols
1/f2 Characteristics and Isotropy in the Fourier Power Spectra of Visual Art, Cartoons, Comics, Mangas, and Different Categories of Photographs
Art images and natural scenes have in common that their radially averaged (1D) Fourier spectral power falls according to a power-law with increasing spatial frequency (1/f2 characteristics), which implies that the power spectra have scale-invariant properties. In the present study, we show that other categories of man-made images, cartoons and graphic novels (comics and mangas), have similar properties. Further on, we extend our investigations to 2D power spectra. In order to determine whether the Fourier power spectra of man-made images differed from those of other categories of images (photographs of natural scenes, objects, faces and plants and scientific illustrations), we analyzed their 2D power spectra by principal component analysis. Results indicated that the first fifteen principal components allowed a partial separation of the different image categories. The differences between the image categories were studied in more detail by analyzing whether the mean power and the slope of the power gradients from low to high spatial frequencies varied across orientations in the power spectra. Mean power was generally higher in cardinal orientations both in real-world photographs and artworks, with no systematic difference between the two types of images. However, the slope of the power gradients showed a lower degree of mean variability across spectral orientations (i.e., more isotropy) in art images, cartoons and graphic novels than in photographs of comparable subject matters. Taken together, these results indicate that art images, cartoons and graphic novels possess relatively uniform 1/f2 characteristics across all orientations. In conclusion, the man-made stimuli studied, which were presumably produced to evoke pleasant and/or enjoyable visual perception in human observers, form a subset of all images and share statistical properties in their Fourier power spectra. Whether these properties are necessary or sufficient to induce aesthetic perception remains to be investigated
Hypothermia following antipsychotic drug use
Objective: Hypothermia is an adverse drug reaction (ADR) of
antipsychotic drug (APD) use. Risk factors for hypothermia in
ADP users are unknown. We studied which risk factors for
hypothermia can be identified based on case reports.
Method: Case reports of hypothermia in APD-users found in
PUBMED or EMBASE were searched for risk factors. The
WHO international database for Adverse Drug Reactions was
searched for reports of hypothermia and APD use.
Results: The literature search resulted in 32 articles containing
43 case reports. In the WHO database, 480 reports were
registered of patients developing hypothermia during the
use of APDs which almost equals the number of reports for
hyperthermia associated with APD use (n=524). Hypothermia
risk seems to be increased in the first days following start
or dose increase of APs. APs with strong 5-HT2 antagonism
seem to be more involved in hypothermia; 55% of hypothermia
reports are for atypical antipsychotics. Schizophrenia was
the most prevalent diagnosis in the case reports.
Conclusion: Especially in admitted patients who are not able
to control their own environment or physical status, frequent
measurements of body temperature (with a thermometer that
can measure low body temperatures) must be performed in
order to detect developing hypothermia
Biophilic architecture: a review of the rationale and outcomes
Contemporary cities have high stress levels, mental health issues, high crime levels and ill health, while the built environment shows increasing problems with urban heat island effects and air and water pollution. Emerging from these concerns is a new set of design principles and practices where nature needs to play a bigger part called “biophilic architecture”. This design approach asserts that humans have an innate connection with nature that can assist to make buildings and cities more effective human abodes. This paper examines the evidence for this innate human psychological and physiological link to nature and then assesses the emerging research supporting the multiple social, environmental and economic benefits of biophilic architecture
Subsea Blowout Preventer (BOP): Design, Reliability, Testing, Deployment, and Operation and Maintenance Challenges
Subsea blowout preventer (BOP) is a safety-related instrumented system that is used in underwater oil drilling to prevent the well to blowout. As oil and gas exploration moves into deeper waters and harsher environments, the setbacks related to reliable functioning of the BOP system and its subsystems remain a major concern for researchers and practitioners. This study aims to systematically review the current state-of-the-art and present a detailed description about some of the recently developed methodologies for through-life management of the BOP system. Challenges associated with the system design, reliability analysis, testing, deployment as well as operability and maintainability are explored, and then the areas requiring further research and development will be identified. A total of 82 documents published since 1980's are critically reviewed and classified according to two proposed frameworks. The first framework categorises the literature based on the depth of water in which the BOP systems operate, with a sub-categorization based on the Macondo disaster. The second framework categorises the literature based on the techniques applied for the reliability analysis of BOP systems, including Failure Mode and Effects Analysis (FMEA), Fault Tree Analysis (FTA), Reliability Block Diagram (RBD), Petri Net (PN), Markov modelling, Bayesian Network (BN), Monte Carlo Simulation (MCS), etc. Our review analysis reveals that the reliability analysis and testing of BOP has received the most attention in the literature, whereas the design, deployment, and operation and maintenance (O&M) of BOPs received the least
Faster Software for Fast Endomorphisms
Abstract. GLV curves (Gallant et al.) have performance advantages over standard elliptic curves, using half the number of point doublings for scalar multiplication. Despite their introduction in 2001, implemen-tations of the GLV method have yet to permeate widespread software libraries. Furthermore, side-channel vulnerabilities, specifically cache-timing attacks, remain unpatched in the OpenSSL code base since the first attack in 2009 (Brumley and Hakala) even still after the most recent attack in 2014 (Benger et al.). This work reports on the integration of the GLV method in OpenSSL for curves from 160 to 256 bits, as well as deploying and evaluating two side-channel defenses. Performance gains are up to 51%, and with these improvements GLV curves are now the fastest elliptic curves in OpenSSL for these bit sizes
Benthic primary production and nitrogen cycling in Spartina alterniflora marshes: effect of restoration after acute dieback
Single-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations
© Springer International Publishing AG 2017. Single-trace side-channel attacks are a serious threat to elliptic curve cryptography in practice because they can break also cryptosystems where scalars are nonces (e.g., ECDSA). Previously it was believed that single-trace attacks can be avoided by using scalar multiplication algorithms with regular patterns of operations but recently we have learned that they can be broken with correlation tests to decide whether different operations share common operands. In this work, we extend these attacks to scalar multiplication algorithms with precomputations. We show that many algorithms are vulnerable to our attack which correlates measurements with precomputed values. We also show that successful attacks are possible even without knowledge of precomputed values by using clustering instead of correlations. We provide extensive evidence for the feasibility of the attacks with simulations and experiments with an 8-bit AVR. Finally, we discuss the effectiveness of certain countermeasures against our attacks.status: publishe
