1,658 results on '"Couvreur, P"'
Search Results
2. Freiman's $3k-4$ Theorem for Function Fields
- Author
-
Couvreur, Alain and Zémor, Gilles
- Subjects
Mathematics - Number Theory ,Mathematics - Combinatorics - Abstract
Freiman's $3k-4$ Theorem states that if a subset $A$ of $k$ integers has a Minkowski sum $A+A$ of size at most $3k-4$, then it must be contained in a short arithmetic progression. We prove a function field analogue that is also a generalisation: it states that if $K$ is a perfect field and if $S\supset K$ is a vector space of dimension $k$ inside an extension $F/K$ in which~$K$ is algebraically closed, and if the $K$-vector space generated by all products of pairs of elements of $S$ has dimension at most $3k-4$, then $K(S)$ is a function field of small genus, and $S$ is of small codimension inside a Riemann-Roch space of $K(S)$.
- Published
- 2024
3. Addition in Dumont-Thomas Numeration Systems in Theory and Practice
- Author
-
Carton, Olivier, Couvreur, Jean-Michel, Delacourt, Martin, and Ollinger, Nicolas
- Subjects
Computer Science - Formal Languages and Automata Theory ,Computer Science - Discrete Mathematics ,Mathematics - Combinatorics - Abstract
Given a fixpoint of a substitution, the associated Dumont-Thomas numeration system provides a convenient immediate way to describe the fixpoint as an automatic sequence. In order to study first-order properties of these fixpoints using B\"uchi-Bruy\`ere characterization, it is necessary for the numeration system to be addable. This means that its addition relation must be computable by a finite automaton. Dumont-Thomas numeration systems can be regarded as an extension of positional numeration systems with states where the greediness is state-dependent. We introduce sequence automata as a tool to extend the results of Bruy\`ere-Hansel and Frougny-Solomyak on the regularity of the addition of Bertrand numeration systems to the case of Dumont-Thomas numeration systems related to some Pisot number. We present a practical implementation of the addition compatible with the Walnut computation tool, along with some experimental results.
- Published
- 2024
4. MinRank Gabidulin encryption scheme on matrix codes
- Author
-
Aragon, Nicolas, Couvreur, Alain, Dyseryn, Victor, Gaborit, Philippe, and Vinçotte, Adrien
- Subjects
Computer Science - Cryptography and Security - Abstract
The McEliece scheme is a generic frame which allows to use any error correcting code of which there exists an efficient decoding algorithm to design an encryption scheme by hiding the generator matrix code. Similarly, the Niederreiter frame is the dual version of the McEliece scheme, and achieves smaller ciphertexts. We propose a generalization of the McEliece frame and the Niederreiter frame to matrix codes and the MinRank problem, that we apply to Gabidulin matrix codes (Gabidulin rank codes considered as matrix codes). The masking we consider consists in starting from a rank code C, to consider a matrix version of C and to concatenate a certain number of rows and columns to the matrix codes version of the rank code C and then apply to an isometry for matric codes. The security of the schemes relies on the MinRank problem to decrypt a ciphertext, and the structural security of the scheme relies on a new problem EGMC-Indistinguishability problem that we introduce and that we study in detail. The main structural attack that we propose consists in trying to recover the masked linearity over the extension field which is lost during the masking process. Overall, starting from Gabidulin codes we obtain a very appealing tradeoff between the size of ciphertext and the size of the public key. For 128b of security we propose parameters ranging from ciphertext of size 65 B (and public keys of size 98 kB) to ciphertext of size 138B (and public key of size 41 kB). Our new approach permits to achieve better trade-off between ciphertexts and public key than the classical McEliece scheme. Our new approach permits to obtain an alternative scheme to the classic McEliece scheme, to obtain very small ciphertexts, with moreover smaller public keys than in the classic McEliece scheme. For 256 bits of security, we can obtain ciphertext as low as 119B, or public key as low as 87kB.
- Published
- 2024
5. Efficient computation of Riemann–Roch spaces for plane curves with ordinary singularities
- Author
-
Abelard, Simon, Couvreur, Alain, and Lecerf, Grégoire
- Published
- 2024
- Full Text
- View/download PDF
6. A new approach based on quadratic forms to attack the McEliece cryptosystem
- Author
-
Couvreur, Alain, Mora, Rocco, and Tillich, Jean-Pierre
- Subjects
Computer Science - Cryptography and Security ,68 ,E.3 ,E.4 - Abstract
We bring in here a novel algebraic approach for attacking the McEliece cryptosystem. It consists in introducing a subspace of matrices representing quadratic forms. Those are associated with quadratic relationships for the component-wise product in the dual of the code used in the cryptosystem. Depending on the characteristic of the code field, this space of matrices consists only of symmetric matrices or skew-symmetric matrices. This matrix space is shown to contain unusually low-rank matrices (rank $2$ or $3$ depending on the characteristic) which reveal the secret polynomial structure of the code. Finding such matrices can then be used to recover the secret key of the scheme. We devise a dedicated approach in characteristic $2$ consisting in using a Gr\"obner basis modeling that a skew-symmetric matrix is of rank $2$. This allows to analyze the complexity of solving the corresponding algebraic system with Gr\"obner bases techniques. This computation behaves differently when applied to the skew-symmetric matrix space associated with a random code rather than with a Goppa or an alternant code. This gives a distinguisher of the latter code family. We give a bound on its complexity which turns out to interpolate nicely between polynomial and exponential depending on the code parameters. A distinguisher for alternant/Goppa codes was already known [FGO+11]. It is of polynomial complexity but works only in a narrow parameter regime. This new distinguisher is also polynomial for the parameter regime necessary for [FGO+11] but contrarily to the previous one is able to operate for virtually all code parameters relevant to cryptography. Moreover, we use this matrix space to find a polynomial time attack of the McEliece cryptosystem provided that the Goppa code is distinguishable by the method of [FGO+11] and its degree is less than $q-1$, where $q$ is the alphabet size of the code., Comment: 68 pages
- Published
- 2023
7. Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding
- Author
-
Bombar, Maxime, Couteau, Geoffroy, Couvreur, Alain, and Ducros, Clément
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Information Theory - Abstract
Secure computation often benefits from the use of correlated randomness to achieve fast, non-cryptographic online protocols. A recent paradigm put forth by Boyle $\textit{et al.}$ (CCS 2018, Crypto 2019) showed how pseudorandom correlation generators (PCG) can be used to generate large amounts of useful forms of correlated (pseudo)randomness, using minimal interactions followed solely by local computations, yielding silent secure two-party computation protocols (protocols where the preprocessing phase requires almost no communication). An additional property called programmability allows to extend this to build N-party protocols. However, known constructions for programmable PCG's can only produce OLE's over large fields, and use rather new splittable Ring-LPN assumption. In this work, we overcome both limitations. To this end, we introduce the quasi-abelian syndrome decoding problem (QA-SD), a family of assumptions which generalises the well-established quasi-cyclic syndrome decoding assumption. Building upon QA-SD, we construct new programmable PCG's for OLE's over any field $\mathbb{F}_q$ with $q>2$. Our analysis also sheds light on the security of the ring-LPN assumption used in Boyle $\textit{et al.}$ (Crypto 2020). Using our new PCG's, we obtain the first efficient N-party silent secure computation protocols for computing general arithmetic circuit over $\mathbb{F}_q$ for any $q>2$., Comment: This is a long version of a paper accepted at CRYPTO'23
- Published
- 2023
8. The impact of quality-adjusted life years on evaluating COVID-19 mitigation strategies: lessons from age-specific vaccination roll-out and variants of concern in Belgium (2020-2022)
- Author
-
Willem, Lander, Abrams, Steven, Franco, Nicolas, Coletti, Pietro, Libin, Pieter J. K., Wambua, James, Couvreur, Simon, André, Emmanuel, Wenseleers, Tom, Mao, Zhuxin, Torneri, Andrea, Faes, Christel, Beutels, Philippe, and Hens, Niel
- Published
- 2024
- Full Text
- View/download PDF
9. Phylogenomics and the rise of the angiosperms
- Author
-
Zuntini, Alexandre R., Carruthers, Tom, Maurin, Olivier, Bailey, Paul C., Leempoel, Kevin, Brewer, Grace E., Epitawalage, Niroshini, Françoso, Elaine, Gallego-Paramo, Berta, McGinnie, Catherine, Negrão, Raquel, Roy, Shyamali R., Simpson, Lalita, Toledo Romero, Eduardo, Barber, Vanessa M. A., Botigué, Laura, Clarkson, James J., Cowan, Robyn S., Dodsworth, Steven, Johnson, Matthew G., Kim, Jan T., Pokorny, Lisa, Wickett, Norman J., Antar, Guilherme M., DeBolt, Lucinda, Gutierrez, Karime, Hendriks, Kasper P., Hoewener, Alina, Hu, Ai-Qun, Joyce, Elizabeth M., Kikuchi, Izai A. B. S., Larridon, Isabel, Larson, Drew A., de Lírio, Elton John, Liu, Jing-Xia, Malakasi, Panagiota, Przelomska, Natalia A. S., Shah, Toral, Viruel, Juan, Allnutt, Theodore R., Ameka, Gabriel K., Andrew, Rose L., Appelhans, Marc S., Arista, Montserrat, Ariza, María Jesús, Arroyo, Juan, Arthan, Watchara, Bachelier, Julien B., Bailey, C. Donovan, Barnes, Helen F., Barrett, Matthew D., Barrett, Russell L., Bayer, Randall J., Bayly, Michael J., Biffin, Ed, Biggs, Nicky, Birch, Joanne L., Bogarín, Diego, Borosova, Renata, Bowles, Alexander M. C., Boyce, Peter C., Bramley, Gemma L. C., Briggs, Marie, Broadhurst, Linda, Brown, Gillian K., Bruhl, Jeremy J., Bruneau, Anne, Buerki, Sven, Burns, Edie, Byrne, Margaret, Cable, Stuart, Calladine, Ainsley, Callmander, Martin W., Cano, Ángela, Cantrill, David J., Cardinal-McTeague, Warren M., Carlsen, Mónica M., Carruthers, Abigail J. A., de Castro Mateo, Alejandra, Chase, Mark W., Chatrou, Lars W., Cheek, Martin, Chen, Shilin, Christenhusz, Maarten J. M., Christin, Pascal-Antoine, Clements, Mark A., Coffey, Skye C., Conran, John G., Cornejo, Xavier, Couvreur, Thomas L. P., Cowie, Ian D., Csiba, Laszlo, Darbyshire, Iain, Davidse, Gerrit, Davies, Nina M. J., Davis, Aaron P., van Dijk, Kor-jent, Downie, Stephen R., Duretto, Marco F., Duvall, Melvin R., Edwards, Sara L., Eggli, Urs, Erkens, Roy H. J., Escudero, Marcial, de la Estrella, Manuel, Fabriani, Federico, Fay, Michael F., Ferreira, Paola de L., Ficinski, Sarah Z., Fowler, Rachael M., Frisby, Sue, Fu, Lin, Fulcher, Tim, Galbany-Casals, Mercè, Gardner, Elliot M., German, Dmitry A., Giaretta, Augusto, Gibernau, Marc, Gillespie, Lynn J., González, Cynthia C., Goyder, David J., Graham, Sean W., Grall, Aurélie, Green, Laura, Gunn, Bee F., Gutiérrez, Diego G., Hackel, Jan, Haevermans, Thomas, Haigh, Anna, Hall, Jocelyn C., Hall, Tony, Harrison, Melissa J., Hatt, Sebastian A., Hidalgo, Oriane, Hodkinson, Trevor R., Holmes, Gareth D., Hopkins, Helen C. F., Jackson, Christopher J., James, Shelley A., Jobson, Richard W., Kadereit, Gudrun, Kahandawala, Imalka M., Kainulainen, Kent, Kato, Masahiro, Kellogg, Elizabeth A., King, Graham J., Klejevskaja, Beata, Klitgaard, Bente B., Klopper, Ronell R., Knapp, Sandra, Koch, Marcus A., Leebens-Mack, James H., Lens, Frederic, Leon, Christine J., Léveillé-Bourret, Étienne, Lewis, Gwilym P., Li, De-Zhu, Li, Lan, Liede-Schumann, Sigrid, Livshultz, Tatyana, Lorence, David, Lu, Meng, Lu-Irving, Patricia, Luber, Jaquelini, Lucas, Eve J., Luján, Manuel, Lum, Mabel, Macfarlane, Terry D., Magdalena, Carlos, Mansano, Vidal F., Masters, Lizo E., Mayo, Simon J., McColl, Kristina, McDonnell, Angela J., McDougall, Andrew E., McLay, Todd G. B., McPherson, Hannah, Meneses, Rosa I., Merckx, Vincent S. F. T., Michelangeli, Fabián A., Mitchell, John D., Monro, Alexandre K., Moore, Michael J., Mueller, Taryn L., Mummenhoff, Klaus, Munzinger, Jérôme, Muriel, Priscilla, Murphy, Daniel J., Nargar, Katharina, Nauheimer, Lars, Nge, Francis J., Nyffeler, Reto, Orejuela, Andrés, Ortiz, Edgardo M., Palazzesi, Luis, Peixoto, Ariane Luna, Pell, Susan K., Pellicer, Jaume, Penneys, Darin S., Perez-Escobar, Oscar A., Persson, Claes, Pignal, Marc, Pillon, Yohan, Pirani, José R., Plunkett, Gregory M., Powell, Robyn F., Prance, Ghillean T., Puglisi, Carmen, Qin, Ming, Rabeler, Richard K., Rees, Paul E. J., Renner, Matthew, Roalson, Eric H., Rodda, Michele, Rogers, Zachary S., Rokni, Saba, Rutishauser, Rolf, de Salas, Miguel F., Schaefer, Hanno, Schley, Rowan J., Schmidt-Lebuhn, Alexander, Shapcott, Alison, Al-Shehbaz, Ihsan, Shepherd, Kelly A., Simmons, Mark P., Simões, André O., Simões, Ana Rita G., Siros, Michelle, Smidt, Eric C., Smith, James F., Snow, Neil, Soltis, Douglas E., Soltis, Pamela S., Soreng, Robert J., Sothers, Cynthia A., Starr, Julian R., Stevens, Peter F., Straub, Shannon C. K., Struwe, Lena, Taylor, Jennifer M., Telford, Ian R. H., Thornhill, Andrew H., Tooth, Ifeanna, Trias-Blasi, Anna, Udovicic, Frank, Utteridge, Timothy M. A., Del Valle, Jose C., Verboom, G. Anthony, Vonow, Helen P., Vorontsova, Maria S., de Vos, Jurriaan M., Al-Wattar, Noor, Waycott, Michelle, Welker, Cassiano A. D., White, Adam J., Wieringa, Jan J., Williamson, Luis T., Wilson, Trevor C., Wong, Sin Yeng, Woods, Lisa A., Woods, Roseina, Worboys, Stuart, Xanthos, Martin, Yang, Ya, Zhang, Yu-Xiao, Zhou, Meng-Yuan, Zmarzty, Sue, Zuloaga, Fernando O., Antonelli, Alexandre, Bellot, Sidonie, Crayn, Darren M., Grace, Olwen M., Kersey, Paul J., Leitch, Ilia J., Sauquet, Hervé, Smith, Stephen A., Eiserhardt, Wolf L., Forest, Félix, and Baker, William J.
- Published
- 2024
- Full Text
- View/download PDF
10. Evaluation of point-of-care ultrasound use in the diagnostic approach for right upper quadrant abdominal pain management in the emergency department: a prospective study
- Author
-
Dupriez, Florence, Niset, Alexandre, Couvreur, Claire, Marissiaux, Laurent, Gendebien, Félix, Peyskens, Laurent, Germeau, Boris, Fasseaux, Antoine, Rodrigues de Castro, Bastian, Penaloza, Andrea, Vanpee, Dominique, and Bobbia, Xavier
- Published
- 2024
- Full Text
- View/download PDF
11. An extension of Overbeck's attack with an application to cryptanalysis of Twisted Gabidulin-based schemes
- Author
-
Couvreur, Alain and Zappatore, Ilaria
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Information Theory ,Mathematics - Rings and Algebras - Abstract
In this article, we discuss the decoding of Gabidulin and related codes from a cryptographic point of view, and we observe that these codes can be decoded solely from the knowledge of a generator matrix. We then extend and revisit Gibson and Overbeck attacks on the generalized GPT encryption scheme (instantiated with the Gabidulin code) for different ranks of the distortion matrix. We apply our attack to the case of an instantiation with twisted Gabidulin codes.
- Published
- 2023
12. Diversity and conservation status of palms (Arecaceae) in two hotspots of biodiversity in Colombia and Ecuador
- Author
-
Thomas L. P. Couvreur, Nayeli Jijon, Rommel Montúfar, Paula A. Morales‐Morales, Maria José Sanín, Juan Carlos Copete, Alix Lozinguez, Álvaro J. Pérez, and Emily Beech
- Subjects
Aiphanes ,Andes ,anthromes ,Chocó ,ConR ,dead palm standing syndrome ,Environmental sciences ,GE1-350 ,Botany ,QK1-989 - Abstract
Societal Impact Statement Palms provide vital plant resources and ecosystem services to people across the tropics. To improve conservation guidance, a “health check” of palms in two highly threatened biodiversity hotspots in Colombia and Ecuador was undertaken. Palms are very diverse in these regions, but over one third are threatened with extinction now, especially among endemic species. Widespread and useful palms are also under intense human pressure and need to be prioritized in terms of sustainable management practices. Given the importance of palms for humans, inclusive conservation actions should be continued in both countries in order to safeguard this resource. Summary Palms provide central plant resources to societies in the tropics, especially in the Global South. The western Pacific and Andean regions of Colombia and Ecuador host two hotspots of biodiversity. To prioritize conservation policies towards palms, we undertook a conservation assessment of species in the region. We compiled a taxonomically verified database of specimens collected in both hotspots. We inferred preliminary conservation assessments using International Union for Conservation of Nature (IUCN) Criteria B. In addition, we evaluated the level of exposure of palms to human use and population density using the anthrome concept. We documented 144 native palm species in 33 genera occurring in both hotspots of Colombia and Ecuador. Of these, 55 are endemic to this region. We recorded 133 species for Colombia, 43 endemic, and 71 species for Ecuador, 9 endemic. A third of all palm species in the region are potentially threatened with extinction (50/144) and 12 as preliminary Critically Endangered. Aiphanes and Geonoma have the highest number of threatened species. In total, 60% of palm specimens were collected in the “low human impact” anthrome type. In contrast, 41% of specimens occur in high human density areas. The two hotspots of biodiversity in Colombia and Ecuador are very diverse in palms. However, we show that this diversity is under threat and is predominantly found in areas impacted by human activities. Extinction risk is highest in endemic species in both countries. Widespread and useful palm species also face threats linked to overexploitation or habitat loss. Inclusive conservation measures should be designed to conserve, together with communities, this plant resource.
- Published
- 2024
- Full Text
- View/download PDF
13. Codes and modular curves
- Author
-
Couvreur, Alain
- Subjects
Mathematics - Number Theory ,Computer Science - Information Theory ,Mathematics - Algebraic Geometry - Abstract
These lecture notes have been written for a course at the Algebraic Coding Theory (ACT) summer school 2022 that took place in the university of Zurich. The objective of the course propose an in-depth presentation of the proof of one of the most striking results of coding theory: Tsfasman Vl\u{a}du\c{t} Zink Theorem, which asserts that for some prime power $q$, there exist sequences of codes over $\mathbb{F}_q$ whose asymptotic parameters beat random codes., Comment: Lecture notes for a course given at the Algebraic Coding Theory (ACT) summer school 2022
- Published
- 2023
14. Improved decoding of symmetric rank metric errors
- Author
-
Couvreur, Alain
- Subjects
Computer Science - Information Theory - Abstract
We consider the decoding of rank metric codes assuming the error matrix is symmetric. We prove two results. First, for rates $<1/2$ there exists a broad family of rank metric codes for which any symmetric error pattern, even of maximal rank can be corrected. Moreover, the corresponding family of decodable codes includes Gabidulin codes of rate $<1/2$. Second, for rates $>1/2$, we propose a decoder for Gabidulin codes correcting symmetric errors of rank up to $n-k$. The two mentioned decoders are deterministic and worst case.
- Published
- 2022
15. Potential determinants of the decline in mpox cases in Belgium: A behavioral, epidemiological and seroprevalence study
- Author
-
Elise De Vos, Liesbeth Van Gestel, Isabel Brosius, Chris Kenyon, Bea Vuylsteke, Irith De Baetselier, Joachim Mariën, Eugene Bangwen, Simon Couvreur, Amaryl Lecompte, Dominique Van Beckhoven, Bart Hoorelbeke, Babs E. Verstrepen, Luca M. Zaeck, Rory D. de Vries, Corine H. Geurts van Kessel, Niel Hens, Kevin K. Ariën, Koen Vercauteren, Marjan Van Esbroek, Christophe Van Dijck, and Laurens Liesenborghs
- Subjects
Mpox ,Sexual and gender minorities ,Sexual behavior ,Multiple sexual partners ,Herd immunity- ,Smallpox vaccination ,Infectious and parasitic diseases ,RC109-216 - Abstract
Objectives: The 2022 mpox epidemic reached a peak in Belgium and the rest of Europe in July 2022, after which it unexpectedly subsided. This study investigates epidemiological, behavioral, and immunological factors behind the waning of the epidemic in Belgium. Methods: We investigated temporal evolutions in the characteristics and behavior of mpox patients using national surveillance data and data from a prospective registry of mpox patients in the Institute of Tropical Medicine (Antwerp). We studied behavioral changes in the population at risk using a survey among HIV-preexposure prophylaxis (PrEP) users. We determined the seroprevalence of anti-orthopoxvirus antibodies among HIV-PrEP users across four-time points in 2022. Results: Mpox patients diagnosed at the end of the epidemic had less sexual risk behavior compared to those diagnosed earlier: they engaged less in sex at mass events, had fewer sexual partners, and were less likely to belong to the sexual network's central group. Among HIV-PrEP users there were no notable changes in sexual behavior. Anti-orthopoxvirus seroprevalence did not notably increase before the start of national vaccination campaigns. Conclusion: The observed changes in group immunity and behavior in the population at greater risk of exposure to mpox seem unable to explain the waning of the mpox epidemic. A change in the profile of mpox patients might have contributed to the decline in cases.
- Published
- 2024
- Full Text
- View/download PDF
16. Efficacy of Otoendoscopy for Residual Cholesteatoma Detection During Microscopic Chronic Ear Surgery
- Author
-
Floor Couvreur, Elke Loos, Christian Desloovere, and Nicolas Verhaert
- Subjects
Otorhinolaryngology ,RF1-547 - Abstract
BACKGROUND: The aim of this article is to determine the efficacy of otoendoscopy during microscopic cholesteatoma surgery on residual cholesteatoma rates postoperatively. METHODS: The medical records of patients (aged 4-90) with primary acquired cholesteatoma who underwent microscopic cholesteatoma surgery (exclusively transcanal approach or canal wall-up tympano-mastoidectomy) with subsequent otoendoscopic examination (80 ears) for intraoperative cholesteatoma residues were retrospectively reviewed. All cases with mixed microscopic/endoscopic, fully endoscopic, or fully microscopic dissection were excluded, as well as cases where a canal wall-down technique was used. After microscopic cholesteatoma removal, the otoendoscope was used to inspect the middle ear recesses for intraoperative cholesteatoma residues. The intra- and postoperative cholesteatoma residue rate were evaluated. RESULTS: On endoscopic examination, intraoperative cholesteatoma residues were encountered in 24 patients (30%). A total of 30 foci were detected. Most of them were found in the superior retrotympanum (15 foci). In 9 cases an antral remnant guided the surgeon to convert to a canal wall up tympanomastoidectomy. During the postoperative follow-up period, residual cholesteatoma was detected on postoperative magnetic resonance imaging in 6 patients (7.5%). Adding an otoendoscopic examination to microscopic cholesteatoma surgery reduced the postoperative cholesteatoma residues rate (odds ratio=0.16). A negative otoendoscopic examination led to a cholesteatoma residue-free follow-up period in 95% of cases(NPV=0.95). CONCLUSION: Otoendoscopy is effective in identifying intraoperative cholesteatoma residues after microscopic cholesteatoma surgery. It reduces the postoperative cholesteatoma residue rate, and a negative otoendoscopic examination increases the likelihood of a cholesteatoma residue-free follow-up.
- Published
- 2024
- Full Text
- View/download PDF
17. The impact of quality-adjusted life years on evaluating COVID-19 mitigation strategies: lessons from age-specific vaccination roll-out and variants of concern in Belgium (2020-2022)
- Author
-
Lander Willem, Steven Abrams, Nicolas Franco, Pietro Coletti, Pieter J. K. Libin, James Wambua, Simon Couvreur, Emmanuel André, Tom Wenseleers, Zhuxin Mao, Andrea Torneri, Christel Faes, Philippe Beutels, and Niel Hens
- Subjects
COVID-19 ,Model ,QALY ,Vaccine ,Non-pharmaceutical intervention ,SARS-CoV-2 ,Public aspects of medicine ,RA1-1270 - Abstract
Abstract Background When formulating and evaluating COVID-19 vaccination strategies, an emphasis has been placed on preventing severe disease that overburdens healthcare systems and leads to mortality. However, more conventional outcomes such as quality-adjusted life years (QALYs) and inequality indicators are warranted as additional information for policymakers. Methods We adopted a mathematical transmission model to describe the infectious disease dynamics of SARS-COV-2, including disease mortality and morbidity, and to evaluate (non)pharmaceutical interventions. Therefore, we considered temporal immunity levels, together with the distinct transmissibility of variants of concern (VOCs) and their corresponding vaccine effectiveness. We included both general and age-specific characteristics related to SARS-CoV-2 vaccination. Our scenario study is informed by data from Belgium, focusing on the period from August 2021 until February 2022, when vaccination for children aged 5-11 years was initially not yet licensed and first booster doses were administered to adults. More specifically, we investigated the potential impact of an earlier vaccination programme for children and increased or reduced historical adult booster dose uptake. Results Through simulations, we demonstrate that increasing vaccine uptake in children aged 5-11 years in August–September 2021 could have led to reduced disease incidence and ICU occupancy, which was an essential indicator for implementing non-pharmaceutical interventions and maintaining healthcare system functionality. However, an enhanced booster dose regimen for adults from November 2021 onward could have resulted in more substantial cumulative QALY gains, particularly through the prevention of elevated levels of infection and disease incidence associated with the emergence of Omicron VOC. In both scenarios, the need for non-pharmaceutical interventions could have decreased, potentially boosting economic activity and mental well-being. Conclusions When calculating the impact of measures to mitigate disease spread in terms of life years lost due to COVID-19 mortality, we highlight the impact of COVID-19 on the health-related quality of life of survivors. Our study underscores that disease-related morbidity could constitute a significant part of the overall health burden. Our quantitative findings depend on the specific setup of the interventions under review, which is open to debate or should be contextualised within future situations.
- Published
- 2024
- Full Text
- View/download PDF
18. A proof of the Brill-Noether method from scratch
- Author
-
Berardini, Elena, Couvreur, Alain, and Lecerf, Grégoire
- Subjects
Mathematics - Algebraic Geometry ,Computer Science - Symbolic Computation - Abstract
In 1874 Brill and Noether designed a seminal geometric method for computing bases of Riemann-Roch spaces. From then, their method has led to several algorithms, some of them being implemented in computer algebra systems. The usual proofs often rely on abstract concepts of algebraic geometry and commutative algebra. In this paper we present a short self-contained and elementary proof that mostly needs Newton polygons, Hensel lifting, bivariate resultants, and Chinese remaindering., Comment: Final version
- Published
- 2022
- Full Text
- View/download PDF
19. Protect peripheral intravenous catheters: a study protocol for a randomised controlled trial of a novel antimicrobial dressing for peripheral intravenous catheters (ProP trial)
- Author
-
Claire M Rickard, Jérémy Guenezan, Bertrand Drugeon, Sabrina Seguin, Olivier Mimoz, Amanda Corley, Joshua Byrnes, Jessica Schults, Nicole M Marsh, Catherine O'Brien, Syeda Farah Zahir, Tricia M Kleidon, Amanda Ullman, Daner Ball, Raphael Couvreur, Kate L McCarthy, and Guillaume Batiot
- Subjects
Medicine - Abstract
Introduction Peripheral intravenous catheters (PIVCs) are the most commonly used vascular access device in hospitalised patients. Yet PIVCs may be complicated by local or systemic infections leading to increased healthcare costs. Chlorhexidine gluconate (CHG)-impregnated dressings may help reduce PIVC-related infectious complications but have not yet been evaluated. We hypothesise an impregnated CHG transparent dressing, in comparison to standard polyurethane dressing, will be safe, effective and cost-effective in protecting against PIVC-related infectious complications and phlebitis.Methods and analysis The ProP trial is a multicentre, superiority, randomised clinical and cost-effectiveness trial with internal pilot, conducted across three centres in Australia and France. Patients (adults and children aged ≥6 years) requiring one PIVC for ≥48 hours are eligible. We will exclude patients with emergent PIVCs, known CHG allergy, skin injury at site of insertion or previous trial enrolment. Patients will be randomised to 3M Tegaderm Antimicrobial IV Advanced Securement dressing or standard care group. For the internal pilot, 300 patients will be enrolled to test protocol feasibility (eligibility, recruitment, retention, protocol fidelity, missing data and satisfaction of participants and staff), primary endpoint for internal pilot, assessed by independent data safety monitoring committee. Clinical outcomes will not be reviewed. Following feasibility assessment, the remaining 2624 (1312 per trial arm) patients will be enrolled following the same methods. The primary endpoint is a composite of catheter-related infectious complications and phlebitis. Recruitment began on 3 May 2023.Ethics and dissemination The protocol was approved by Ouest I ethic committee in France and by The Queensland Children’s Hospital Human Research Ethics Committee in Australia. The findings will be disseminated through presentation at scientific conferences and publication in peer-reviewed journals.Trial registration number NCT05741866.
- Published
- 2024
- Full Text
- View/download PDF
20. Mechanistically derived macroscopic root water uptake functions: The α and ω of root water uptake functions
- Author
-
Jan Vanderborght, Valentin Couvreur, Mathieu Javaux, Daniel Leitner, Andrea Schnepf, and Harry Vereecken
- Subjects
Environmental sciences ,GE1-350 ,Geology ,QE1-996.5 - Abstract
Abstract Water uptake by plant roots is an important component of the soil water balance. Predicting to what extent potential transpiration from the canopy, that is, transpiration demand, can be met by supply of water from the soil through the root system is crucial to simulate the actual transpiration and assess vegetation water stress. In models that simulate the dynamics of vertical soil water content profiles as a function of water fluxes and soil water potential gradients, the root water uptake (RWU) distribution is represented by macroscopic sink terms. We present RWU functions that calculate sink terms based on a mechanistic model of water flow in the soil–root system. Based on soil–root hydraulics, we define α‐supply functions representing the maximal uptake by the root system from a certain soil depth when the root collar water potential equals the wilting point, ω‐supply factors representing the maximal supply from the entire root system, and a critical ωc factor representing the potential transpiration demand. These functions and factors are subsequently used to calculate RWU distributions directly from potential transpiration or demand and the soil water potentials. Unlike currently used approaches, which define α‐stress functions and ω factors representing ratios of actual uptake to uptake demand, the supply‐based formulations can be derived directly from soil and root hydraulic properties and can represent processes like root hydraulic redistribution and hydraulic lift.
- Published
- 2024
- Full Text
- View/download PDF
21. On Codes and Learning With Errors over Function Fields
- Author
-
Bombar, Maxime, Couvreur, Alain, and Debris-Alazard, Thomas
- Subjects
Computer Science - Cryptography and Security ,Mathematics - Number Theory - Abstract
It is a long standing open problem to find search to decision reductions for structured versions of the decoding problem of linear codes. Such results in the lattice-based setting have been carried out using number fields: Polynomial-LWE, Ring-LWE, Module-LWE and so on. We propose a function field version of the LWE problem. This new framework leads to another point of view on structured codes, e.g. quasi-cyclic codes, strengthening the connection between lattice-based and code-based cryptography. In particular, we obtain the first search to decision reduction for structured codes. Following the historical constructions in lattice-based cryptography, we instantiate our construction with function fields analogues of cyclotomic fields, namely Carlitz extensions, leading to search to decision reductions on various versions of Ring-LPN, which have applications to secure multi party computation and to an authentication protocol.
- Published
- 2022
22. Matrix quantum groups as matrix product operator representations of Lie groups
- Author
-
Couvreur, Romain, Lootens, Laurens, and Verstraete, Frank
- Subjects
Condensed Matter - Statistical Mechanics ,Mathematical Physics ,Quantum Physics - Abstract
We demonstrate that the matrix quantum group $SL_q(2)$ gives rise to nontrivial matrix product operator representations of the Lie group $SL(2)$, providing an explicit characterization of the nontrivial global $SU(2)$ symmetry of the XXZ model with periodic boundary conditions. The matrix product operators are non-injective and their set is closed under multiplication. This allows to calculate the fusion tensors acting on the virtual or quantum degrees of freedom and to obtain the recoupling coefficients, which satisfy a type of pentagon relation. We argue that the combination of this data with the well known $q$-deformed Clebsch-Gordan coefficients and 6j-symbols is consistent with a description of this quantum group in terms of bimodule categories., Comment: 5+3 pages, comments invited
- Published
- 2022
23. Self-assembled lipid–prodrug nanoparticles
- Author
-
Couvreur, Patrick, Lepetre-Mouelhi, Sinda, Garbayo, Elisa, and Blanco-Prieto, Maria J.
- Published
- 2023
- Full Text
- View/download PDF
24. Right-hand side decoding of Gabidulin code and applications
- Author
-
Bombar, Maxime and Couvreur, Alain
- Subjects
Computer Science - Information Theory ,Computer Science - Cryptography and Security - Abstract
We discuss the decoding of Gabidulin and interleaved Gabidulin codes. We give the full presentation of a decoding algorithm for Gabidulin codes, which as Loidreau's seminal algorithm consists in localizing errors in the spirit of Berlekamp-Welch algorithm for Reed-Solomon codes. On the other hand, this algorithm consists in acting on codewords on the right while Loidreau's algorithm considers an action on the left. This right-hand side decoder was already introduced by the authors in a previous work for cryptanalytic applications. We give here a generalised version which applies to the case of non-full length Gabidulin codes. Finally, we show that this algorithm turns out to provide a very clear and natural approach for the decoding of interleaved Gabidulin codes., Comment: 10 pages, Accepted at the conference WCC 2022
- Published
- 2021
25. How arithmetic and geometry make error correcting codes better
- Author
-
Couvreur, Alain
- Subjects
Mathematics - Algebraic Geometry ,Computer Science - Information Theory ,Mathematics - Number Theory - Abstract
This note completes a talk given at the conference Curves over Finite Fields: past, present and future celebrating the publication the book {\em Rational Points on Curves over Finite Fields by J.-P. Serre and organised at Centro de ciencias de Benasque in june 2021. It discusses a part of the history of algebraic geometry codes together with some of their recent applications. A particular focus is done on the "multiplicative" structure of these codes, i.e. their behaviour with respect to the component wise product. Some open questions are raised and discussed.
- Published
- 2021
26. Were SARS-CoV-2 self-tests used for their intended purpose? The experience in Belgium
- Author
-
Lafort, Yves, Cornelissen, Laura, Van Cauteren, Dieter, Verboven, Barbara, Drieskens, Sabine, Couvreur, Simon, Hermans, Lize, Straetmans, Koen, and Lernout, Tinne
- Published
- 2023
- Full Text
- View/download PDF
27. A Taxonomically-verified and Vouchered Checklist of the Vascular Plants of the Republic of Guinea
- Author
-
Gosline, George, Bidault, Ehoarn, van der Burgt, Xander, Cahen, Daniel, Challen, Gill, Condé, Nagnouma, Couch, Charlotte, Couvreur, Thomas L. P., Dagallier, Léo-Paul M. J., Darbyshire, Iain, Dawson, Sally, Doré, Tokpa Seny, Goyder, David, Grall, Aurélie, Haba, Pépé, Haba, Pierre, Harris, David, Hind, D. J. Nicholas, Jongkind, Carel, Konomou, Gbamon, Larridon, Isabel, Lewis, Gwilym, Ley, Alexandra, Lock, Michael, Lucas, Eve, Magassouba, Sékou, Mayo, Simon, Molmou, Denise, Monro, Alexandre, Onana, Jean Michel, Paiva, Jorge, Paton, Alan, Phillips, Sylvia, Prance, Ghillean, Quintanar, Alejandro, Rokni, Saba, Shah, Toral, Schrire, Brian, Schuiteman, André, Simões, Ana Rita Giraldes, Sosef, Marc, Stévart, Tariq, Stone, R. Doug, Utteridge, Tim, Wilkin, Paul, Xanthos, Martin, Nic Lughadha, Eimear, and Cheek, Martin
- Published
- 2023
- Full Text
- View/download PDF
28. Combining root and soil hydraulics in macroscopic representations of root water uptake
- Author
-
Jan Vanderborght, Daniel Leitner, Andrea Schnepf, Valentin Couvreur, Harry Vereecken, and Mathieu Javaux
- Subjects
Environmental sciences ,GE1-350 ,Geology ,QE1-996.5 - Abstract
Abstract Plant water uptake and plant and soil water status are important for the soil water balance and plant growth. They depend on atmospheric water demand and the accessibility of soil water to plant roots, which is in turn related to the hydraulic properties of the root system and the soil around root segments. We present a simulation model that describes water flow in the soil–plant system mechanistically considering both root and soil hydraulic properties. We developed an approach to upscale three‐dimensional (3D) flow in the soil toward root segments of a 3D root architecture to a model that considers one‐dimensional flow between horizontal soil layers and radial flow to root segments in that layer. The upscaled model couples upscaled linear flow equations in the root system with an analytical solution of the nonlinear radial flow equation between the soil and roots. The upscaled model avoids simplifying assumptions about root hydraulic properties and water potential drops near roots made in, respectively, soil‐ and root‐centered models. Xylem water potentials and soil–root interface potentials are explicitly simulated and show, respectively, large variations with depth and large deviations from bulk soil water potentials under dry soil conditions. Accounting for hydraulic gradients in the soil around root segments led to an earlier but slower reduction of transpiration during a drought period and a better plant water status with higher nighttime plant water potentials.
- Published
- 2024
- Full Text
- View/download PDF
29. Root hydraulic properties: An exploration of their variability across scales
- Author
-
Juan C. Baca Cabrera, Jan Vanderborght, Valentin Couvreur, Dominik Behrend, Thomas Gaiser, Thuy Huu Nguyen, and Guillaume Lobet
- Subjects
open access database ,plant functional types ,plant modeling ,review ,root hydraulic properties variability ,whole root system conductance ,Botany ,QK1-989 - Abstract
Abstract Root hydraulic properties are key physiological traits that determine the capacity of root systems to take up water, at a specific evaporative demand. They can strongly vary among species, cultivars or even within the same genotype, but a systematic analysis of their variation across plant functional types (PFTs) is still missing. Here, we reviewed published empirical studies on root hydraulic properties at the segment‐, individual root‐, or root system scale and determined its variability and the main factors contributing to it. This corresponded to a total of 241 published studies, comprising 213 species, including woody and herbaceous vegetation. We observed an extremely large range of variation (of orders of magnitude) in root hydraulic properties, but this was not caused by systematic differences among PFTs. Rather, the (combined) effect of factors such as root system age, driving force used for measurement, or stress treatments shaped the results. We found a significant decrease in root hydraulic properties under stress conditions (drought and aquaporin inhibition, p 2 orders of magnitude). Interestingly, this relationship showed an asymptotic shape, with a steep increase during the first days of growth and a flattening out at later stages of development. We confirmed this dynamic through simulations using a state‐of‐the‐art computational model of water flow in the root system for a variety of crop species, suggesting common patterns across studies and species. These findings provide better understanding of the main causes of root hydraulic properties variations observed across empirical studies. They also open the door to better representation of hydraulic processes across multiple plant functional types and at large scales. All data collected in our analysis has been aggregated into an open access database (https://roothydraulic-properties.shinyapps.io/database/), fostering scientific exchange.
- Published
- 2024
- Full Text
- View/download PDF
30. Impact of phosphorus limitation on medium-chain-length polyhydroxyalkanoate production by activated sludge
- Author
-
Alaux, Emilie, Marie, Bastien, Couvreur, Marion, Bounouba, Mansour, and Hernandez-Raquet, Guillermina
- Published
- 2023
- Full Text
- View/download PDF
31. Decoding supercodes of Gabidulin codes and applications to cryptanalysis
- Author
-
Bombar, Maxime and Couvreur, Alain
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Information Theory - Abstract
This article discusses the decoding of Gabidulin codes and shows how to extend the usual decoder to any supercode of a Gabidulin code at the cost of a significant decrease of the decoding radius. Using this decoder, we provide polynomial time attacks on the rank-metric encryption schemes RAMESSES and LIGA., Comment: PQCrypto 2021. The Sage code is available on Github: https://github.com/mbombar/Attack_on_LIGA
- Published
- 2021
32. Recovering or Testing Extended-Affine Equivalence
- Author
-
Canteaut, Anne, Couvreur, Alain, and Perrin, Léo
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Discrete Mathematics ,Computer Science - Information Theory - Abstract
Extended Affine (EA) equivalence is the equivalence relation between two vectorial Boolean functions $F$ and $G$ such that there exist two affine permutations $A$, $B$, and an affine function $C$ satisfying $G = A \circ F \circ B + C$. While the problem has a simple formulation, it is very difficult in practice to test whether two functions are EA-equivalent. This problem has two variants: {\em EA-partitioning} deals with partitioning a set of functions into disjoint EA-equivalence classes, and \emph{EA-recovery} is about recovering the tuple $(A,B,C)$ if it exists. In this paper, we present a new algorithm that efficiently solves the EA-recovery problem for quadratic functions. Although its worst-case complexity occurs when dealing with APN functions, it supersedes, in terms of performance, all previously known algorithms for solving this problem for all quadratic functions and in any dimension, even in the case of APN functions. This approach is based on the Jacobian matrix of the functions, a tool whose study in this context can be of independent interest. The best approach for EA-partitioning in practice mainly relies on class invariants. We provide an overview of the known invariants along with a new one based on the \emph{ortho-derivative}. This new invariant is applicable to quadratic APN functions, a specific type of functions that is of great interest, and of which tens of thousands need to be sorted into distinct EA-classes. Our ortho-derivative-based invariant is very fast to compute, and it practically always distinguishes between EA-inequivalent quadratic APN functions.
- Published
- 2021
33. Cocktails of endocrine disruptors in the different diets of French consumers
- Author
-
Gaud Dervilly, Manon Bourdeau, Manon Pruvost-Couvreur, Isabelle Severin, Anne Platel, M.C. Chagnon, Fabrice Nesslany, Bruno Le Bizec, and Hélène Moche
- Subjects
Dietary patterns ,Endocrine disruptors ,Mixtures ,Co-exposure assessment ,Sparse and Unique Non-negative Matrix Factorization ,Environmental sciences ,GE1-350 - Abstract
With a view to identifying main endocrine disruptors (ED) mixtures to which French consumers are exposed through food, their main diets were modelled using an adapted dimension reduction method. Seven specific diets could be modelled for adults while only one overall diet was considered for children aged 3–17 years. The knowledge of the contamination levels of 78 known or suspected endocrine disrupting compounds in the foods constituting these diets, collected in the frame of the second French Total Diet Study, made it possible to explore the mixtures of EDs to which consumers are exposed. We have thus shown that the ED substances most present in mass concentration are comparable for the whole population, whatever the diet considered. However, a second approach made it possible to highlight, for a given diet, the substances whose exposure is statistically higher than in the diet of the general population. Thus, significantly different ED mixtures could be established for each diet. For example, diets with a high proportion of animal-based foods induce significantly higher exposures to some persistent organic pollutants (e.g., PCDD/F, brominated flame retardants), whereas these exposures are lower for Mediterranean-type diet. On the other hand, the latter, richer in fruits and vegetables, is the one for which pesticides represent a specific signature.These results now pave the way for studying the specific effects of these cocktails of endocrine disruptors, each of which is representative of a type of chronic exposure linked to specific diets.
- Published
- 2024
- Full Text
- View/download PDF
34. On the hardness of code equivalence problems in rank metric
- Author
-
Couvreur, Alain, Debris-Alazard, Thomas, and Gaborit, Philippe
- Subjects
Computer Science - Information Theory ,Computer Science - Computational Geometry ,Mathematics - Rings and Algebras - Abstract
In the recent years, the notion of rank metric in the context of coding theory has known many interesting developments in terms of applications such as space time coding, network coding or public key cryptography. These applications raised the interest of the community for theoretical properties of this type of codes, such as the hardness of decoding in rank metric. Among classical problems associated to codes for a given metric, the notion of code equivalence (to decide if two codes are isometric) has always been of the greatest interest, for its cryptographic applications or its deep connexions to the graph isomorphism problem. In this article, we discuss the hardness of the code equivalence problem in rank metric for $\mathbb{F}_{q^m}$-linear and general rank metric codes. In the $\mathbb{F}_{q^m}$-linear case, we reduce the underlying problem to another one called {\em Matrix Codes Right Equivalence Problem}. We prove the latter problem to be either in $\mathcal{P}$ or in $\mathcal{ZPP}$ depending of the ground field size. This is obtained by designing an algorithm whose principal routines are linear algebra and factoring polynomials over finite fields. It turns out that the most difficult instances involve codes with non trivial {\em stabilizer algebras}. The resolution of the latter case will involve tools related to finite dimensional algebras and Wedderburn--Artin theory. It is interesting to note that 30 years ago, an important trend in theoretical computer science consisted to design algorithms making effective major results of this theory. These algorithmic results turn out to be particularly useful in the present article. Finally, for general matrix codes, we prove that the equivalence problem (both left and right) is at least as hard as the well--studied {\em Monomial Equivalence Problem} for codes endowed with the Hamming metric.
- Published
- 2020
35. On the security of subspace subcodes of Reed-Solomon codes for public key encryption
- Author
-
Couvreur, Alain and Lequesne, Matthieu
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Information Theory - Abstract
This article discusses the security of McEliece-like encryption schemes using subspace subcodes of Reed-Solomon codes, i.e. subcodes of Reed-Solomon codes over $\mathbb{F}_{q^m}$ whose entries lie in a fixed collection of $\mathbb{F}_q$-subspaces of $\mathbb{F}_{q^m}$. These codes appear to be a natural generalisation of Goppa and alternant codes and provide a broader flexibility in designing code based encryption schemes. For the security analysis, we introduce a new operation on codes called the twisted product which yields a polynomial time distinguisher on such subspace subcodes as soon as the chosen $\mathbb{F}_q$-subspaces have dimension larger than $m/2$. From this distinguisher, we build an efficient attack which in particular breaks some parameters of a recent proposal due to Khathuria, Rosenthal and Weger.
- Published
- 2020
36. Algebraic geometry codes and some applications
- Author
-
Couvreur, Alain and Randriambololona, Hugues
- Subjects
Computer Science - Information Theory ,Computer Science - Cryptography and Security ,Mathematics - Algebraic Geometry ,Mathematics - Number Theory - Abstract
This article surveys the development of the theory of algebraic geometry codes since their discovery in the late 70's. We summarize the major results on various problems such as: asymptotic parameters, improved estimates on the minimum distance, and decoding algorithms. In addition, we present various modern applications of these codes such as public-key cryptography, algebraic complexity theory, multiparty computation or distributed storage., Comment: Survey chapter to appear in "A Concise Encyclopedia of Coding Theory", W.C. Huffman, J.-L. Kim, and P. Sole' Eds., CRC Press
- Published
- 2020
37. Rank-metric codes over arbitrary Galois extensions and rank analogues of Reed-Muller codes
- Author
-
Augot, Daniel, Couvreur, Alain, Lavauzelle, Julien, and Neri, Alessandro
- Subjects
Computer Science - Information Theory ,Mathematics - Number Theory ,Mathematics - Rings and Algebras - Abstract
This paper extends the study of rank-metric codes in extension fields $\mathbb{L}$ equipped with an arbitrary Galois group $G = \mathrm{Gal}(\mathbb{L}/\mathbb{K})$. We propose a framework for studying these codes as subspaces of the group algebra $\mathbb{L}[G]$, and we relate this point of view with usual notions of rank-metric codes in $\mathbb{L}^N$ or in $\mathbb{K}^{N\times N}$, where $N = [\mathbb{L} : \mathbb{K}]$. We then adapt the notion of error-correcting pairs to this context, in order to provide a non-trivial decoding algorithm for these codes. We then focus on the case where $G$ is abelian, which leads us to see codewords as elements of a multivariate skew polynomial ring. We prove that we can bound the dimension of the vector space of zeroes of these polynomials, depending of their degree. This result can be seen as an analogue of Alon-F\"uredi theorem -- and by means, of Schwartz-Zippel lemma -- in the rank metric. Finally, we construct the counterparts of Reed-Muller codes in the rank metric, and we give their parameters. We also show the connection between these codes and classical Reed-Muller codes in the case where $\mathbb{L}$ is a Kummer extension., Comment: 26 pages, 1 figure
- Published
- 2020
38. Toward good families of codes from towers of surfaces
- Author
-
Couvreur, Alain, Lebacque, Philippe, and Perret, Marc
- Subjects
Mathematics - Algebraic Geometry ,Computer Science - Information Theory ,Mathematics - Number Theory - Abstract
We introduce in this article a new method to estimate the minimum distance of codes from algebraic surfaces. This lower bound is generic, i.e. can be applied to any surface, and turns out to be ``liftable'' under finite morphisms, paving the way toward the construction of good codes from towers of surfaces. In the same direction, we establish a criterion for a surface with a fixed finite set of closed points $\mathcal P$ to have an infinite tower of $\ell$--\'etale covers in which $\mathcal P$ splits totally. We conclude by stating several open problems. In particular, we relate the existence of asymptotically good codes from general type surfaces with a very ample canonical class to the behaviour of their number of rational points with respect to their $K^2$ and coherent Euler characteristic., Comment: In memory of Gilles Lachaud. This article has been submitted with an appendix by Alexander Schmidt previously posted on ArXiv with reference arXiv:1702.03701
- Published
- 2020
39. Power Error Locating Pairs
- Author
-
Couvreur, Alain and Panaccione, Isabella
- Subjects
Computer Science - Information Theory ,Mathematics - Algebraic Geometry ,Mathematics - Number Theory ,94B35, 94B27, 11T71, 14G50 - Abstract
We present a new decoding algorithm based on error locating pairs and correcting an amount of errors exceeding half the minimum distance. When applied to Reed--Solomon or algebraic geometry codes, the algorithm is a reformulation of the so--called {\em power decoding} algorithm. Asymptotically, it corrects errors up to Sudan's radius. In addition, this new framework applies to any code benefiting from an error locating pair. Similarly to Pellikaan's and K\"otter's approach for unique algebraic decoding, our algorithm provides a unified point of view for decoding codes with an algebraic structure beyond the half minimum distance. It permits to get an abstract description of decoding using only codes and linear algebra and without involving the arithmetic of polynomial and rational function algebras used for the definition of the codes themselves. Such algorithms can be valuable for instance for cryptanalysis to construct a decoding algorithm of a code without having access to the hidden algebraic structure of the code.
- Published
- 2019
40. Practical Algebraic Attack on DAGS
- Author
-
Bardet, Magali, Bertin, Manon, Couvreur, Alain, and Otmani, Ayoub
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Information Theory - Abstract
DAGS scheme is a key encapsulation mechanism (KEM) based on quasi-dyadic alternant codes that was submitted to NIST standardization process for a quantum resistant public key algorithm. Recently an algebraic attack was devised by Barelli and Couvreur (Asiacrypt 2018) that efficiently recovers the private key. It shows that DAGS can be totally cryptanalysed by solving a system of bilinear polynomial equations. However, some sets of DAGS parameters were not broken in practice. In this paper we improve the algebraic attack by showing that the original approach was not optimal in terms of the ratio of the number of equations to the number of variables. Contrary to the common belief that reducing at any cost the number of variables in a polynomial system is always beneficial, we actually observed that, provided that the ratio is increased and up to a threshold, the solving can be heavily improved by adding variables to the polynomial system. This enables us to recover the private keys in a few seconds. Furthermore, our experimentations also show that the maximum degree reached during the computation of the Gr\"obner basis is an important parameter that explains the efficiency of the attack. Finally, the authors of DAGS updated the parameters to take into account the algebraic cryptanalysis of Barelli and Couvreur. In the present article, we propose a hybrid approach that performs an exhaustive search on some variables and computes a Gr\"obner basis on the polynomial system involving the remaining variables. We then show that the updated set of parameters corresponding to 128-bit security can be broken with 2^83 operations., Comment: 16 pages, accepted for publication in the 7th Code-Based Cryptography Workshop 2019
- Published
- 2019
- Full Text
- View/download PDF
41. Anticanonical codes from del Pezzo surfaces with Picard rank one
- Author
-
Blache, Régis, Couvreur, Alain, Hallouin, Emmanuel, Madore, David, Nardi, Jade, Rambaud, Matthieu, and Randriam, Hugues
- Subjects
Mathematics - Algebraic Geometry ,Computer Science - Information Theory - Abstract
We construct algebraic geometric codes from del Pezzo surfaces and focus on the ones having Picard rank one and the codes associated to the anticanonical class. We give explicit constructions of del Pezzo surfaces of degree 4, 5 and 6, compute the parameters of the associated anticanonical codes and study their isomorphisms arising from the automorphisms of the surface. We obtain codes with excellent parameters and some of them turn out to beat the best known codes listed on the database codetable.
- Published
- 2019
42. On the security of a Loidreau's rank metric code based encryption scheme
- Author
-
Coggia, Daniel and Couvreur, Alain
- Subjects
Computer Science - Information Theory ,Computer Science - Cryptography and Security - Abstract
We present a polynomial time attack of a rank metric code based encryption scheme due to Loidreau for some parameters., Comment: Long version of an article accepted at the conference WCC 2019
- Published
- 2019
43. The global abundance of tree palms
- Author
-
Muscarella, R, Emilio, T, Phillips, OL, Lewis, SL, Slik, F, Baker, WJ, Couvreur, TLP, Eiserhardt, WL, Svenning, JC, Affum-Baffoe, K, Aiba, SI, de Almeida, EC, de Almeida, SS, de Oliveira, EA, Álvarez-Dávila, E, Alves, LF, Alvez-Valles, CM, Carvalho, FA, Guarin, FA, Andrade, A, Aragão, LEOC, Murakami, AA, Arroyo, L, Ashton, PS, Corredor, GAA, Baker, TR, de Camargo, PB, Barlow, J, Bastin, JF, Bengone, NN, Berenguer, E, Berry, N, Blanc, L, Böhning-Gaese, K, Bonal, D, Bongers, F, Bradford, M, Brambach, F, Brearley, FQ, Brewer, SW, Camargo, JLC, Campbell, DG, Castilho, CV, Castro, W, Catchpole, D, Cerón Martínez, CE, Chen, S, Chhang, P, Cho, P, Chutipong, W, Clark, C, Collins, M, Comiskey, JA, Medina, MNC, Costa, FRC, Culmsee, H, David-Higuita, H, Davidar, P, del Aguila-Pasquel, J, Derroire, G, Di Fiore, A, Van Do, T, Doucet, JL, Dourdain, A, Drake, DR, Ensslin, A, Erwin, T, Ewango, CEN, Ewers, RM, Fauset, S, Feldpausch, TR, Ferreira, J, Ferreira, LV, Fischer, M, Franklin, J, Fredriksson, GM, Gillespie, TW, Gilpin, M, Gonmadje, C, Gunatilleke, AUN, Hakeem, KR, Hall, JS, Hamer, KC, Harris, DJ, Harrison, RD, Hector, A, Hemp, A, Herault, B, Pizango, CGH, Coronado, ENH, Hubau, W, Hussain, MS, Ibrahim, FH, Imai, N, Joly, CA, Joseph, S, Anitha, K, Kartawinata, K, Kassi, J, and Killeen, TJ
- Subjects
above-ground biomass ,abundance patterns ,Arecaceae ,local abiotic conditions ,Neotropics ,pantropical biogeography ,tropical rainforest ,wood density ,Ecology ,Physical Geography and Environmental Geoscience ,Ecological Applications - Abstract
Aim: Palms are an iconic, diverse and often abundant component of tropical ecosystems that provide many ecosystem services. Being monocots, tree palms are evolutionarily, morphologically and physiologically distinct from other trees, and these differences have important consequences for ecosystem services (e.g., carbon sequestration and storage) and in terms of responses to climate change. We quantified global patterns of tree palm relative abundance to help improve understanding of tropical forests and reduce uncertainty about these ecosystems under climate change. Location: Tropical and subtropical moist forests. Time period: Current. Major taxa studied: Palms (Arecaceae). Methods: We assembled a pantropical dataset of 2,548 forest plots (covering 1,191 ha) and quantified tree palm (i.e., ≥10 cm diameter at breast height) abundance relative to co-occurring non-palm trees. We compared the relative abundance of tree palms across biogeographical realms and tested for associations with palaeoclimate stability, current climate, edaphic conditions and metrics of forest structure. Results: On average, the relative abundance of tree palms was more than five times larger between Neotropical locations and other biogeographical realms. Tree palms were absent in most locations outside the Neotropics but present in >80% of Neotropical locations. The relative abundance of tree palms was more strongly associated with local conditions (e.g., higher mean annual precipitation, lower soil fertility, shallower water table and lower plot mean wood density) than metrics of long-term climate stability. Life-form diversity also influenced the patterns; palm assemblages outside the Neotropics comprise many non-tree (e.g., climbing) palms. Finally, we show that tree palms can influence estimates of above-ground biomass, but the magnitude and direction of the effect require additional work. Conclusions: Tree palms are not only quintessentially tropical, but they are also overwhelmingly Neotropical. Future work to understand the contributions of tree palms to biomass estimates and carbon cycling will be particularly crucial in Neotropical forests.
- Published
- 2020
44. On truncations of the Chalker-Coddington model
- Author
-
Couvreur, Romain, Vernier, Eric, Jacobsen, Jesper Lykke, and Saleur, Hubert
- Subjects
Condensed Matter - Statistical Mechanics ,Mathematical Physics - Abstract
The supersymmetric reformulation of physical observables in the Chalker-Coddington model (CC) for the plateau transition in the integer quantum Hall effect leads to a reformulation of its critical properties in terms of a 2D non-compact loop model or a 1D non-compact $gl(2|2)$ spin chain. Following a proposal by Ikhlef, Fendley and Cardy, we define and study a series of truncations of these loop models and spin chains, involving a finite and growing number of degrees of freedom per site. The case of the first truncation is solved analytically using the Bethe-ansatz. It is shown to exhibit many of the qualitative features expected for the untruncated theory, including a quadratic spectrum of exponents with a continuous component, and a normalizable ground state below that continuum. Quantitative properties are however at odds with the results of simulations on the CC model. Higher truncations are studied only numerically. While their properties are found to get closer to those of the CC model, it is not clear whether this is a genuine effect, or the result of strong finite-size corrections., Comment: 47 pages, 12 figures, v2: corrected affiliation
- Published
- 2018
- Full Text
- View/download PDF
45. Observation of non-scalar and logarithmic correlations in 2D and 3D percolation
- Author
-
Tan, Xiaojun, Couvreur, Romain, Deng, Youjin, and Jacobsen, Jesper Lykke
- Subjects
Condensed Matter - Statistical Mechanics - Abstract
Percolation, a paradigmatic geometric system in various branches of physical sciences, is known to possess logarithmic factors in its correlators. Starting from its definition, as the $Q\rightarrow1$ limit of the $Q$-state Potts model with $S_Q$ symmetry, in terms of geometrical clusters, its operator content as $N$-cluster observables has been classified. We extensively simulate critical bond percolation in two and three dimensions and determine with high precision the $N$-cluster exponents and non-scalar features up to $N \! =\! 4$ (2D) and $N \! =\! 3$ (3D). The results are in excellent agreement with the predicted exact values in 2D, while such families of critical exponents have not been reported in 3D, to our knowledge. Finally, we demonstrate the validity of predictions about the logarithmic structure between the energy and two-cluster operators in 3D., Comment: 10 pages, 7 figures
- Published
- 2018
- Full Text
- View/download PDF
46. Recovering short secret keys of RLCE in polynomial time
- Author
-
Couvreur, Alain, Lequesne, Matthieu, and Tillich, Jean-Pierre
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Information Theory - Abstract
We present a key recovery attack against Y. Wang's Random Linear Code Encryption (RLCE) scheme recently submitted to the NIST call for post-quantum cryptography. This attack recovers the secret key for all the short key parameters proposed by the author.
- Published
- 2018
47. An efficient structural attack on NIST submission DAGS
- Author
-
Barelli, Elise and Couvreur, Alain
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Information Theory - Abstract
We present an efficient key recovery attack on code based encryption schemes using some quasi-dyadic alternant codes with extension degree 2. This attack permits to break the proposal DAGS recently submitted to NIST.
- Published
- 2018
48. Délivrance de l’ARN à l’aide de nanoparticules lipidiques
- Author
-
Couvreur, P.
- Published
- 2022
- Full Text
- View/download PDF
49. The commonness of rarity: Global and future distribution of rarity across land plants.
- Author
-
Enquist, Brian J, Feng, Xiao, Boyle, Brad, Maitner, Brian, Newman, Erica A, Jørgensen, Peter Møller, Roehrdanz, Patrick R, Thiers, Barbara M, Burger, Joseph R, Corlett, Richard T, Couvreur, Thomas LP, Dauby, Gilles, Donoghue, John C, Foden, Wendy, Lovett, Jon C, Marquet, Pablo A, Merow, Cory, Midgley, Guy, Morueta-Holme, Naia, Neves, Danilo M, Oliveira-Filho, Ary T, Kraft, Nathan JB, Park, Daniel S, Peet, Robert K, Pillet, Michiel, Serra-Diaz, Josep M, Sandel, Brody, Schildhauer, Mark, Šímová, Irena, Violle, Cyrille, Wieringa, Jan J, Wiser, Susan K, Hannah, Lee, Svenning, Jens-Christian, and McGill, Brian J
- Abstract
A key feature of life's diversity is that some species are common but many more are rare. Nonetheless, at global scales, we do not know what fraction of biodiversity consists of rare species. Here, we present the largest compilation of global plant diversity to quantify the fraction of Earth's plant biodiversity that are rare. A large fraction, ~36.5% of Earth's ~435,000 plant species, are exceedingly rare. Sampling biases and prominent models, such as neutral theory and the k-niche model, cannot account for the observed prevalence of rarity. Our results indicate that (i) climatically more stable regions have harbored rare species and hence a large fraction of Earth's plant species via reduced extinction risk but that (ii) climate change and human land use are now disproportionately impacting rare species. Estimates of global species abundance distributions have important implications for risk assessments and conservation planning in this era of rapid global change.
- Published
- 2019
50. Bactris gasipaes Kunth var. gasipaes complete plastome and phylogenetic analysis
- Author
-
Maria Camila Buitrago Acosta, Rommel Montúfar, Romain Guyot, Cedric Mariac, Timothy J. Tranbarger, Silvia Restrepo, and Thomas L. P. Couvreur
- Subjects
chloroplast ,plastome ,novoplasty ,peach palm ,phylogeny ,Genetics ,QH426-470 - Abstract
Bactris gasipaes var. gasipaes (Arecaceae, Palmae) is an economically and socially important plant species for populations across tropical South and Central America. It has been domesticated from its wild variety, B. gasipaes var. chichagui, since pre-Columbian times. In this study, we sequenced the plastome of the cultivated variety, B. gasipaes Kunth var. gasipaes and compared it with the published plastome of the wild variety. The chloroplast sequence obtained was 156,580 bp. The cultivated chloroplast sequence was conserved compared to the wild type sequence with 99.8% of nucleotide identity. We did, however, identify multiple Single Nucleotide Variants (SNVs), insertions, microsatellites and a resolved region of missing nucleotides. A SNV in one of the core barcode markers (matK) was detected between the wild and cultivated accessions. Phylogenetic analysis was carried out across the Arecaceae family and compared to previous reports, resulting in an identical topology. This study is a step forward in understanding the genome evolution of this species.
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.