265 research outputs found

    Riding the Saddle Point : asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing

    Get PDF
    We study the asymptotic-capacity-achieving score function that was recently proposed by Oosterwijk et al. for bias-based traitor tracing codes. For the bias function we choose the Dirichlet distribution with a cutoff. Using Bernstein's inequality and Bennett's inequality, we upper bound the false positive and false negative error probabilities. From these bounds we derive sufficient conditions for the scheme parameters. We solve these conditions in the limit of large coalition size c0c_0 and obtain asymptotic solutions for the cutoff, the sufficient code length and the corresponding accusation threshold. The code length converges to its asymptote approximately as c01/2c_0^{-1/2}, which is faster than the c01/3c_0^{-1/3} of Tardos' score function. Keywords: traitor tracin

    Riding the Saddle Point : asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing

    Get PDF
    We study the asymptotic-capacity-achieving score function that was recently proposed by Oosterwijk et al. for bias-based traitor tracing codes. For the bias function we choose the Dirichlet distribution with a cutoff. Using Bernstein's inequality and Bennett's inequality, we upper bound the false positive and false negative error probabilities. From these bounds we derive sufficient conditions for the scheme parameters. We solve these conditions in the limit of large coalition size c0c_0 and obtain asymptotic solutions for the cutoff, the sufficient code length and the corresponding accusation threshold. The code length converges to its asymptote approximately as c01/2c_0^{-1/2}, which is faster than the c01/3c_0^{-1/3} of Tardos' score function. Keywords: traitor tracin

    A meta-analysis of state-of-the-art electoral prediction from Twitter data

    Get PDF
    Electoral prediction from Twitter data is an appealing research topic. It seems relatively straightforward and the prevailing view is overly optimistic. This is problematic because while simple approaches are assumed to be good enough, core problems are not addressed. Thus, this paper aims to (1) provide a balanced and critical review of the state of the art; (2) cast light on the presume predictive power of Twitter data; and (3) depict a roadmap to push forward the field. Hence, a scheme to characterize Twitter prediction methods is proposed. It covers every aspect from data collection to performance evaluation, through data processing and vote inference. Using that scheme, prior research is analyzed and organized to explain the main approaches taken up to date but also their weaknesses. This is the first meta-analysis of the whole body of research regarding electoral prediction from Twitter data. It reveals that its presumed predictive power regarding electoral prediction has been rather exaggerated: although social media may provide a glimpse on electoral outcomes current research does not provide strong evidence to support it can replace traditional polls. Finally, future lines of research along with a set of requirements they must fulfill are provided.Comment: 19 pages, 3 table

    Information-theoretic analysis of coating PUFs

    Get PDF
    Physical Uncloneable Functions (PUFs) can be used as a cost-effective means to store cryptographic key material in an uncloneable way. In coating PUFs, keys are generated from capacitance measurements of a coating containing many randomly distributed particles with different dielectric constants. We introduce a physical model of coating PUFs by simplifying the capacitance sensors to a parallel plate geometry. We estimate the amount of information that can be extracted from the coating. We show that the inherent entropy is proportional to sqrtn(logn)3/2sqrt{n}(log n)^{3/2}, where n is the number of particles that fit between the capacitor plates in a straight line. However, measurement noise may severely reduce the amount of information that can actually be extracted in practice. In the noisy regime the number of extractable bits is in fact a decreasing function of n. We derive an optimal value for n as a function of the noise amplitude, the PUF geometry and the dielectric constants

    ALGSICS - Combining physics and cryptography to enhance security and privacy in RFID systems

    Get PDF
    In this paper, we introduce several new mechanisms that are cheap to implement or integrate into RFID tags and that at the same time enhance their security and privacy properties. Our aim is to provide solutions that make use of existing (or expected) functionality on the tag or that are inherently cheap and thus, enhance the privacy friendliness of the technology "almost" for free. Our proposals, for example, make use of environmental information (presence of light temperature, humidity, etc.) to disable or enable the RFID tag. A second possibility that we explore is the use of delays in revealing a secret key used to later establish a secure communication channel. We also introduce the idea of a "sticky tag," which can be used to re-enable a disabled (or killed) tag whenever the user considers it to be safe. We discuss the security and describe usage scenarios for all solutions. Finally, we review previous works that use physical principles to provide security and privacy in RFID systems

    Preservation of scalar spin chirality across a metallic spacer in synthetic antiferromagnets with chiral interlayer interactions

    Full text link
    Chiral magnetic textures are key for the development of modern spintronic devices. In multilayered thin films, these are typically stabilized via the interfacial intralayer Dzyaloshinskii-Moriya interaction (DMI). Additionally, it has been recently observed that DMI may also promote vector spin chirality along the third dimension, coupling spins in different magnetic layers via non-magnetic spacer layers, an effect referred to as interlayer DMI (IL-DMI). This interaction holds promise for 3D nanomagnetism, from the creation of 3D spin structures such as hopfions to new forms of magnetic functionality in the vertical direction via remote control of chiral spin states. Here, we investigate via magnetic X-ray scattering and imaging techniques the chiral nature of orthogonal magnetic states that form in a synthetic antiferromagnet with IL-DMI. We find that the vector spin chirality of the textures formed in an in-plane layer is determined by the net out-of-plane spin configuration of a neighboring layer, leading as a result to complex spin states across a metallic interface where the overall scalar spin chirality is preserved. This work thus uncovers a new flavor of chiral interlayer interactions, demonstrating new ways to control magnetic chirality in three dimensions

    Observation and formation mechanism of 360° domain wall rings in synthetic anti-ferromagnets with interlayer chiral interactions

    Get PDF
    The interlayer Dzyaloshinskii–Moriya interaction (IL-DMI) chirally couples spins in different ferromagnetic layers of multilayer heterostructures. So far, samples with IL-DMI have been investigated utilizing magnetometry and magnetotransport techniques, where the interaction manifests as a tunable chiral exchange bias field. Here, we investigate the nanoscale configuration of the magnetization vector in a synthetic anti-ferromagnet (SAF) with IL-DMI, after applying demagnetizing field sequences. We add different global magnetic field offsets to the demagnetizing sequence in order to investigate the states that form when the IL-DMI exchange bias field is fully or partially compensated. For magnetic imaging and vector reconstruction of the remanent magnetic states, we utilize x-ray magnetic circular dichroism photoemission electron microscopy, evidencing the formation of 360° domain wall rings of typically 0.5–3.0 μm in diameter. These spin textures are only observed when the exchange bias field due to the IL-DMI is not perfectly compensated by the magnetic field offset. From a combination of micromagnetic simulations, magnetic charge distribution, and topology arguments, we conclude that a non-zero remanent effective field with components both parallel and perpendicular to the anisotropy axis of the SAF is necessary to observe the rings. This work shows how the exchange bias field due to IL-DMI can lead to complex metastable spin states during reversal, important for the development of future spintronic devices

    Management approaches and aquaculture of sturgeons in the Lower Danube region countries

    Get PDF
    Summary This paper presents the status and trends in management of sturgeon species and the development of sturgeon aquaculture in the Lower Danube countries: Romania, Bulgaria, Serbia, Ukraine and Moldova. Sturgeon fishery moratoria and aquaculture development represent first steps in the Lower Danube countries to combat extirpation. Supportive stocking was used as a compensation for the impact of sturgeon fishery and dam construction, but these efforts unfortunately lacked adequate cooperation and coordination between and among region countries. Unsolved problems remain, such as the presence of illegal sturgeon fishery, water pollution, habitat destruction and fragmentation. Construction of fish passes and habitat restoration project developments are two key issues that have yet to be tackled in the Lower Danube region
    corecore