Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailÀ propos de l'évêque Marus de Trèves
Dubuisson, Bastien UL

in Analecta Bollandiana: Revue Critique d'Hagiographie (in press)

The life of Bishop Marus of Trier (5th century) is little known, apart from a few snippets of information transmitted in the Gesta Treverorum (ca. 1100). Only a brief miraculous account from the beginning ... [more ▼]

The life of Bishop Marus of Trier (5th century) is little known, apart from a few snippets of information transmitted in the Gesta Treverorum (ca. 1100). Only a brief miraculous account from the beginning of the 16th century provides some additional details on the character, limited however to his qualities as an intercessor. The discovery of an older witness to this work in the Sanctilogium of Jean Gielemans of the Abbey of Rouge-Cloître makes it possible to re-evaluate its dating. The investigation into the genesis and transmission of this text (the edition of which is given in the appendix) is an opportunity to deal with a lesser-known period of the hagiography of Trier and to address the question of the existence of a Vita of the bishop. [less ▲]

Detailed reference viewed: 20 (1 UL)
Full Text
Peer Reviewed
See detailMarital Patterns and Income Inequality
Dupuy, Arnaud UL; Weber, Simon

in Economica (in press)

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailNIKE from Affine Determinant Programs
Barthel, Jim Jean-Pierre UL; Rosie, Razvan UL

in Qiong, Huang; Yu, Yu (Eds.) Provable and Practical Security, 15th International Conference, ProvSec 2021, Guangzhou, November 5 – November 8, 2021, Proceedings (in press)

A multi-party non-interactive key-exchange (NIKE) scheme enables N users to securely exchange a secret key K in a non-interactive manner. It is well-known that NIKE schemes can be obtained assuming the ... [more ▼]

A multi-party non-interactive key-exchange (NIKE) scheme enables N users to securely exchange a secret key K in a non-interactive manner. It is well-known that NIKE schemes can be obtained assuming the existence of indistinguishability obfuscation (iO). In this work, we revisit the original, iO-based, provably-secure NIKE construction by Boneh and Zhandry, aiming to simplify it. The core idea behind our protocol is to replace the functionality of the obfuscator with the one of an affine determinant program (ADP). Although ADPs have been designed with the purpose of attaining indistinguishability obfuscation, such implication is left open for general circuits. The ingredients enabling to prove the security of our scheme stem into a more careful analysis of the branching programs needed to build ADPs. In particular, we show: 1) An intuitive indistinguishability notion defined for ADPs of puncturable pseudorandom functions (PRFs) is sufficient to prove security for NIKE. 2) A set of simple conditions based on ADP's branching program topology that are sufficient for proving indistinguishability of ADPs. We leave open the question of finding ADPs satisfying them. [less ▲]

Detailed reference viewed: 24 (2 UL)
Full Text
Peer Reviewed
See detailPartitioned Searchable Encryption
Barthel, Jim Jean-Pierre UL; Beunardeau, Marc; Rosie, Razvan et al

in Qiong, Huang; Yu, Yu (Eds.) Provable and Practical Security, 15th International Conference, ProvSec 2021, Guangzhou, November 5 – November 8, 2021, Proceedings (in press)

Symmetric searchable encryption (SSE) allows to outsource encrypted data to an untrusted server and retain searching capabilities. This is done without impacting the privacy of both the data and the ... [more ▼]

Symmetric searchable encryption (SSE) allows to outsource encrypted data to an untrusted server and retain searching capabilities. This is done without impacting the privacy of both the data and the search/update queries. In this work we put forth a new flavour of symmetric searchable encryption (SSE): Partitioned SSE is meant to capture the cases where the search rights must be partitioned among multiple individuals. We motivate through compelling examples the practical need for such a notion and discuss instantiations based on functional encryption and trapdoor permutations. First we leverage the power of functional encryption (FE). Our construction follows the general technique of encrypting the set of keywords and the presumably larger datafiles separately, a keyword acting as a ``pointer'' to datafiles it belongs to. To improve on the constraint factors (large ciphertext, slow encryption/decryption procedures) that are inherent in FE schemes, the keyword check is done with the help of a Bloom filter -- one per datafile: the crux idea is to split the filter into buckets, and encrypt each bucket separately under an FE scheme. Functional keys are given for binary \masks checking if relevant positions are set to 1 inside the underlying bit-vector of the Bloom filter. The second construction we present achieves forward security and stems from the scheme by Bost in CCS'16. We show that a simple tweak of the original construction gives rise to a scheme supporting updates in the partitioned setting. Moreover, the constructions take into account the possibility that some specific users are malicious while declaring their search results. [less ▲]

Detailed reference viewed: 53 (1 UL)
Full Text
Peer Reviewed
See detailLehren und Lernen auf Distanz – Impulse für digitale Unterrichtsentwicklung in Luxemburg
Baumann, Isabell Eva UL; Harion, Dominic UL

in Bildungsbericht für Luxemburg 2021 (in press)

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailOn the (M)iNTRU assumption in the integer case
Barthel, Jim Jean-Pierre UL; Müller, Volker UL; Rosie, Razvan UL

in Provable and Practical Security, 15th International Conference, ProvSec 2021, Guangzhou, November 5 – November 8, 2021, Proceedings (in press)

In AsiaCrypt 2019, Genise, Gentry, Halevi, Li and Micciancio put forth two novel and intriguing computational hardness hypotheses: The inhomogeneous NTRU (iNTRU) assumption and its matrix version MiNTRU ... [more ▼]

In AsiaCrypt 2019, Genise, Gentry, Halevi, Li and Micciancio put forth two novel and intriguing computational hardness hypotheses: The inhomogeneous NTRU (iNTRU) assumption and its matrix version MiNTRU. In this work, we break the integer case of the iNTRU assumption through elementary lattice reduction, and we describe how the attack might be generalized to polynomial rings and to the low dimensional MiNTRU assumption with small noise. [less ▲]

Detailed reference viewed: 36 (5 UL)
Full Text
Peer Reviewed
See detailA Note on the Estimation of Job Amenities and Labor Productivity
Dupuy, Arnaud UL; Galichon, Alfred

in Quantitative Economics (in press)

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailLife Satisfaction and the Human Development Index Across the World
Yin, Remi UL; Lepinteur, Anthony UL; Clark, Andrew et al

in Journal of Cross-Cultural Psychology (in press)

We use annual data on over 150 countries between 2005 and 2018 to look at the relationship between subjective well-being (both cognitive and affective) and the Human Development Index (HDI). The HDI ... [more ▼]

We use annual data on over 150 countries between 2005 and 2018 to look at the relationship between subjective well-being (both cognitive and affective) and the Human Development Index (HDI). The HDI appears to be more closely related to cognitive than affective well-being. We also consider the relationships between the three HDI components (the Income, Health and Education Indices) and well-being, and find that, on average, the Income Index has the strongest predictive power. Importantly, we find that the three HDI components only matter equally in Western and rich countries. Our analysis contributes to the discussion about cultural sensitivity in paradigms of societal development in two ways. We first show that differences in preferences towards development aims exist. Second, we propose a weighting procedure for a culturally-sensitive version of the HDI. [less ▲]

Detailed reference viewed: 54 (4 UL)
Full Text
Peer Reviewed
See detailNonlinear three-dimensional anisotropic material model for failure analysis of timber
Eslami, Hooman; Jayasinghe, Laddu Bhagya; Waldmann, Daniele UL

in Engineering Failure Analysis (in press)

Detailed reference viewed: 79 (2 UL)
Full Text
Peer Reviewed
See detailPrenatal exposure to endocrine disrupting chemicals is associated with altered DNA methylation in cord blood
Mattonet, Katharina; Nowack-Weyers, Nikola; Vogel, Vanessa et al

in Epigenetics (in press)

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailHeartbeat evoked potentials in patients with posttraumatic stress disorder: an unaltered neurobiological regulation system?
Schmitz, Marius; Müller, Laura E.; Seitz, Katja I. et al

in European Journal of Psychotraumatology (in press)

Background: Early life maltreatment is a risk factor for psychiatric disorders, including posttraumatic stress disorder (PTSD). Posttraumatic stress disorder is a severe and heterogeneous disorder with ... [more ▼]

Background: Early life maltreatment is a risk factor for psychiatric disorders, including posttraumatic stress disorder (PTSD). Posttraumatic stress disorder is a severe and heterogeneous disorder with fluctuating states of emotional over- and undermodulation including hypervigilance, dissociation, and emotion regulation deficits. The perception and regulation of emotions have been linked to interoception, the cortical representation and sensing of inner bodily processes. Although first therapeutic approaches targeting bodily sensations have been found effective in patients with PTSD, and deficits in interoceptive signal representation have been reported in other trauma-related disorders such as borderline personality disorder (BPD), the role of interoception remains largely unexplored for PTSD. Objective: The objective was to investigate the cortical representation of cardiac interoceptive signals in patients with PTSD and its associations with early life maltreatment, trait dissociation, and emotion dysregulation. Methods: Twenty-four medication-free patients with PTSD and 31 healthy controls (HC) completed a 5-min resting electrocardiogram (ECG) with parallel electroencephalogram (EEG). Heartbeat evoked potential (HEP) amplitudes as a measure for cortical representation of cardiac interoceptive signals were compared between groups and correlated with self-report questionnaires. Results: We did not find significantly different mean HEP amplitudes in patients with PTSD compared to HC, although HEPs of patients with PTSD were descriptively higher. No significant associations between mean HEP amplitudes and early life maltreatment, trait dissociation or emotion dysregulation were obtained within the groups. Conclusion: The current finding does not indicate deficits in interoceptive signal representation at rest in individuals with PTSD. Whether patients with PTSD show altered HEP modulations during emotion regulation tasks and might benefit from therapeutic approaches aiming at changing the perception of bodily signals, needs to be investigated in future studies. [less ▲]

Detailed reference viewed: 45 (1 UL)
See detailExploring the History of Digital History
Zaagsma, Gerben UL

Scientific Conference (2021, September 20)

As long as new preservation technologies and computing machines have been developed, the question of their utility and uptake in historical research practices has been debated. Yet, the very fact that ... [more ▼]

As long as new preservation technologies and computing machines have been developed, the question of their utility and uptake in historical research practices has been debated. Yet, the very fact that historical knowledge production has always been affected by new and emerging technologies is often forgotten. Similarly, the fact that key epistemological and methodological questions in what we now call ‘digital history’ were already debated decades ago by earlier generations of computing historians (analog and digital) is often overlooked. There is a lack of transmission of accumulated knowledge from the past and it sometimes seems as if every new generation of historians rediscovers the promise of ‘digital history’, with all of its attending hopes, visions and ambitions for reinventing and reshaping historical research. To fill this gap, this paper will explore what a history of digital history might look like. It will do so by focusing on hybridity as a key characteristic of historical research. Hybridity, seen as some form of integrating newly emerging tools, technologies, materials, and/or practices in historical research, has a long history that predates the advent of computers. In my paper I will map and qualify that history according to the main phases of historical research. The paper will conclude by outlining what groundwork is necessary to explore digital history’s forgotten roots: a basic overview of the field’s different spatio-temporal and ideological trajectories and recreation of the networks of computing historians in the pre-PC and early PC period. [less ▲]

Detailed reference viewed: 44 (0 UL)
Full Text
Peer Reviewed
See detailMachine learning in mix design of Miscanthus lightweight concrete
Pereira Dias, Patrick; Jayasinghe, Laddu Bhagya; Waldmann, Daniele UL

in Construction and Building Materials (2021)

Detailed reference viewed: 14 (3 UL)
Full Text
Peer Reviewed
See detailBinary blended cement pastes and concrete using gravel wash mud (GWM) powders
Thapa, Vishojit; Waldmann, Daniele UL

in Construction and Building Materials (2021)

Detailed reference viewed: 55 (1 UL)
Full Text
See detailReview of Adam Crymble: Technology and the Historian. Transformations in the Digital Age
Zaagsma, Gerben UL

in H-Soz-Kult: Kommunikation und Fachinformation für die Geschichtswissenschaften (2021)

Detailed reference viewed: 32 (2 UL)