Computational Cryptography

2021 ◽  

The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstra–Lenstra–Lovász lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards.

Methodology ◽  
2007 ◽  
Vol 3 (1) ◽  
pp. 14-23 ◽  
Author(s):  
Juan Ramon Barrada ◽  
Julio Olea ◽  
Vicente Ponsoda

Abstract. The Sympson-Hetter (1985) method provides a means of controlling maximum exposure rate of items in Computerized Adaptive Testing. Through a series of simulations, control parameters are set that mark the probability of administration of an item on being selected. This method presents two main problems: it requires a long computation time for calculating the parameters and the maximum exposure rate is slightly above the fixed limit. Van der Linden (2003) presented two alternatives which appear to solve both of the problems. The impact of these methods in the measurement accuracy has not been tested yet. We show how these methods over-restrict the exposure of some highly discriminating items and, thus, the accuracy is decreased. It also shown that, when the desired maximum exposure rate is near the minimum possible value, these methods offer an empirical maximum exposure rate clearly above the goal. A new method, based on the initial estimation of the probability of administration and the probability of selection of the items with the restricted method ( Revuelta & Ponsoda, 1998 ), is presented in this paper. It can be used with the Sympson-Hetter method and with the two van der Linden's methods. This option, when used with Sympson-Hetter, speeds the convergence of the control parameters without decreasing the accuracy.


2014 ◽  
Vol 35 (8) ◽  
pp. 1940-1945 ◽  
Author(s):  
Xiang-hui Liu ◽  
Wen-bao Han ◽  
Jian-xiao Quan

2020 ◽  
Vol 41 (5) ◽  
pp. 604-607 ◽  
Author(s):  
Mark D. Lesher ◽  
Cory M. Hale ◽  
Dona S. S. Wijetunge ◽  
Matt R. England ◽  
Debra S. Myers ◽  
...  

AbstractWe characterized the impact of removal of the ESBL designation from microbiology reports on inpatient antibiotic prescribing. Definitive prescribing of carbapenems decreased from 48.4% to 16.1% (P = .01) and β-lactam–β-lactamase inhibitor combination increased from 19.4% to 61.3% (P = .002). Our findings confirm the importance of collaboration between microbiology and antimicrobial stewardship programs.


Toxins ◽  
2021 ◽  
Vol 13 (2) ◽  
pp. 158
Author(s):  
Colin Eady

For 30 years, forage ryegrass breeding has known that the germplasm may contain a maternally inherited symbiotic Epichloë endophyte. These endophytes produce a suite of secondary alkaloid compounds, dependent upon strain. Many produce ergot and other alkaloids, which are associated with both insect deterrence and livestock health issues. The levels of alkaloids and other endophyte characteristics are influenced by strain, host germplasm, and environmental conditions. Some strains in the right host germplasm can confer an advantage over biotic and abiotic stressors, thus acting as a maternally inherited desirable ‘trait’. Through seed production, these mutualistic endophytes do not transmit into 100% of the crop seed and are less vigorous than the grass seed itself. This causes stability and longevity issues for seed production and storage should the ‘trait’ be desired in the germplasm. This makes understanding the precise nature of the relationship vitally important to the plant breeder. These Epichloë endophytes cannot be ‘bred’ in the conventional sense, as they are asexual. Instead, the breeder may modulate endophyte characteristics through selection of host germplasm, a sort of breeding by proxy. This article explores, from a forage seed company perspective, the issues that endophyte characteristics and breeding them by proxy have on ryegrass breeding, and outlines the methods used to assess the ‘trait’, and the application of these through the breeding, production, and deployment processes. Finally, this article investigates opportunities for enhancing the utilisation of alkaloid-producing endophytes within pastures, with a focus on balancing alkaloid levels to further enhance pest deterrence and improving livestock outcomes.


Smart Cities ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 919-937
Author(s):  
Nikos Papadakis ◽  
Nikos Koukoulas ◽  
Ioannis Christakis ◽  
Ilias Stavrakas ◽  
Dionisis Kandris

The risk of theft of goods is certainly an important source of negative influence in human psychology. This article focuses on the development of a scheme that, despite its low cost, acts as a smart antitheft system that achieves small property detection. Specifically, an Internet of Things (IoT)-based participatory platform was developed in order to allow asset-tracking tasks to be crowd-sourced to a community. Stolen objects are traced by using a prototype Bluetooth Low Energy (BLE)-based system, which sends signals, thus becoming a beacon. Once such an item (e.g., a bicycle) is stolen, the owner informs the authorities, which, in turn, broadcast an alert signal to activate the BLE sensor. To trace the asset with the antitheft tag, participants use their GPS-enabled smart phones to scan BLE tags through a specific smartphone client application and report the location of the asset to an operation center so that owners can locate their assets. A stolen item tracking simulator was created to support and optimize the aforementioned tracking process and to produce the best possible outcome, evaluating the impact of different parameters and strategies regarding the selection of how many and which users to activate when searching for a stolen item within a given area.


2021 ◽  
Vol 11 (2) ◽  
pp. 466
Author(s):  
Włodzimierz Kęska ◽  
Jacek Marcinkiewicz ◽  
Łukasz Gierz ◽  
Żaneta Staszak ◽  
Jarosław Selech ◽  
...  

The continuous development of computer technology has made it applicable in many scientific fields, including research into a wide range of processes in agricultural machines. It allows the simulation of very complex physical phenomena, including grain motion. A recently discovered discrete element method (DEM) is used for this purpose. It involves direct integration of equations of grain system motion under the action of various forces, the most important of which are contact forces. The method’s accuracy depends mainly on precisely developed mathematical models of contacts. The creation of such models requires empirical validation, an experiment that investigates the course of contact forces at the moment of the impact of the grains. To achieve this, specialised test stations equipped with force and speed sensors were developed. The correct selection of testing equipment and interpretation of results play a decisive role in this type of research. This paper focuses on the evaluation of the force sensor dynamic properties’ influence on the measurement accuracy of the course of the plant grain impact forces against a stiff surface. The issue was examined using the computer simulation method. A proprietary computer software with the main calculation module and data input procedures, which presents results in a graphic form, was used for calculations. From the simulation, graphs of the contact force and force signal from the sensor were obtained. This helped to clearly indicate the essence of the correct selection of parameters used in the tests of sensors, which should be characterised by high resonance frequency.


2011 ◽  
Vol 23 (2) ◽  
pp. 207-234 ◽  
Author(s):  
Jesse C. Robertson ◽  
Chad M. Stefaniak ◽  
Mary B. Curtis

ABSTRACT We investigate the effects of auditor-wrongdoer reputations for performance and likeability on fellow auditors' intentions to take action in response to a questionable audit act. We also use this context to explore auditor selection of reporting outlets, when they do choose to take action. In an experiment with 181 auditors, main effects suggest that likeability reputation is a significant determinant of intention to take action, while performance reputation is marginally significant. As expected, interaction results indicate that auditors have the greatest intention to take action against less likeable, poor performers. Contrary to expectations, intention to take action against a more likeable, good performer is no lower than the mixed conditions. Thus, the influence of the two dimensions of reputation is complex. Additionally, we find auditors are more likely to whistle-blow internally than externally, and through non-anonymous outlets than anonymous outlets. Our contributions include exploring the impact of reputation on the actions of third parties, and advancing prior literature by considering the influence of wrongdoer attributes on reporting decisions and auditors' reporting channel preferences. Data Availability: Data are available from the first author upon request.


2021 ◽  
pp. 216769682110251
Author(s):  
Samantha G. Farris ◽  
Mindy M. Kibbey ◽  
Erick J. Fedorenko ◽  
Angelo M. DiBello

The psychological effect of the pandemic and measures taken in response to control viral spread are not yet well understood in university students; in-depth qualitative analysis can provide nuanced information about the young adult distress experience. Undergraduate students ( N = 624) in an early US outbreak “hotspot” completed an online narrative writing about the impact and distress experienced due to the COVID-19 pandemic. Data were collected April-May 2020. A random selection of 50 cases were sampled for thematic analysis. Nine themes were identified: viral outbreak distress, fear of virus contraction/transmission, proximity to virus, dissatisfaction with public response, physical distancing distress, social distancing distress, academic and school-related distress, disruptive changes in health behavior and routines, financial strain and unemployment, worsening of pre-existing mental health problems, and social referencing that minimizes distress. Future work is needed to understand the persistence of the distress, in addition to developing methods for assessment, monitoring, and mitigation of the distress.


Sign in / Sign up

Export Citation Format

Share Document