Last 7 days
Bookmark and Share    
See detailPerspective luxembourgeoise: Conclusions sur le caractère inclusif des supports pédagogiques
Andersen, Katja Natalie UL; Vogt, Michaela; Bagger, Anette et al

in Forum für Politik, Gesellschaft und Kultur in Luxemburg (2022), 423

Cette contribution s’appuie sur les conclusions du projet European Comparison of Inclusive Teaching Materials (ITM) lancé en 2018. Cette collaboration regroupant l’Allemagne (Prof. Dr. M. Vogt, C ... [more ▼]

Cette contribution s’appuie sur les conclusions du projet European Comparison of Inclusive Teaching Materials (ITM) lancé en 2018. Cette collaboration regroupant l’Allemagne (Prof. Dr. M. Vogt, C. Bierschwale), le Luxembourg (Prof. Dr. K. Andersen), la Suède (Prof. Dr. A. Bagger) et l’Italie (Prof. Dr. V. Macchia, Prof. Dr. A. Augschöll, A. Ardemagni) cherche un moyen de définir le caractère inclusif des supports pédagogiques. C’est dans cette perspective qu’a été développé un catalogue de critères permettant d’évaluer la pertinence des supports pédagogiques en vue de leur utilisation dans des contextes d’enseignement inclusif. La présente contribution présente ces critères en les mettant en parallèle avec les conclusions des recherches menées au Luxembourg. [less ▲]

Detailed reference viewed: 43 (2 UL)
See detailHistoire de la Justice au Luxembourg (1795 à nos jours). Institutions - Organisation - Acteurs
Fritz, Vera; Scuto, Denis UL; Wingerter, Elisabeth UL

Book published by De Gruyter (2022)

Detailed reference viewed: 52 (2 UL)
Full Text
Peer Reviewed
See detailIntegral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128
Cui, Jiamin; Hu, Kai; Wang, Qingju UL et al

in Topics in Cryptology - CT-RSA 2022 - The Cryptographers' Track at the RSA Conference 2022, San Francisco, CA, USA, February 7-10, 2022, Proceedings (2022)

Detailed reference viewed: 29 (1 UL)
Full Text
Peer Reviewed
See detailPrivacy-preserving Copy Number Variation Analysis with Homomorphic Encryption
Demirci, Huseyin UL; Lenzini, Gabriele UL

Scientific Conference (2022)

Innovative pharma-genomics and personalized medicine services are now possible thanks to the availability for processing and analysis of a large amount of genomic data. Operating on such databases, is ... [more ▼]

Innovative pharma-genomics and personalized medicine services are now possible thanks to the availability for processing and analysis of a large amount of genomic data. Operating on such databases, is possible to test for predisposition to diseases by searching for genomic variants on whole genomes as well as on exomes, which are collections of protein coding regions called exons. Genomic data are therefore shared amongst research institutes, public/private operators, and third parties, creating issues of privacy, ethics, and data protection because genome data are strictly personal and identifying. To prevent damages that could follow a data breach—a likely threat nowadays—and to be compliant with current data protection regulations, genomic data files should be encrypted, and the data processing algorithms should be privacy-preserving. Such a migration is not always feasible: not all operations can be implemented straightforwardly to be privacypreserving; a privacy-preserving version of an algorithm may not be as accurate for the purpose of biomedical analysis as the original; or the privacy-preserving version may not scale up when applied to genomic data processing because of inefficiency in computation time. In this work, we demonstrate that at least for a wellknown genomic data procedure for the analysis of copy number variants called copy number variations (CNV) a privacy-preserving analysis is possible and feasible. Our algorithm relies on Homomorphic Encryption, a cryptographic technique to perform calculations directly on the encrypted data. We test our implementation for performance and reliability, giving evidence that it is practical to study copy number variations and preserve genomic data privacy. Our proof-of-concept application successfully and efficiently searches for a patient’s somatic copy number variation changes by comparing the patient gene coverage in the whole exome with a healthy control exome coverage. Since all the genomics data are securely encrypted, the data remain protected even if they are transmitted or shared via an insecure environment like a public cloud. Being this the first study for privacy-preserving copy number variation analysis, we demonstrate the potential of recent Homomorphic Encryption tools in genomic applications. [less ▲]

Detailed reference viewed: 58 (3 UL)
Full Text
Peer Reviewed
See detailLa qualité pour agir dans l’intérêt collectif
Menetrey, Séverine UL

in Revue Critique de Jurisprudence Belge (2022)

Detailed reference viewed: 40 (2 UL)
See detailOn the sociopolitical and institutional production of digital cities
Carr, Constance UL

Presentation (2022)

Detailed reference viewed: 31 (5 UL)
See detailConflict of Laws - A Comparative Approach
Cuniberti, Gilles UL

Book published by Edward Elgar - 2nd (2022)

Now in its second edition, and with significant updates and new material, Gilles Cuniberti’s innovative textbook offers a comparative treatment of private international law, a field of great importance in ... [more ▼]

Now in its second edition, and with significant updates and new material, Gilles Cuniberti’s innovative textbook offers a comparative treatment of private international law, a field of great importance in an increasingly globalized world. Written by a leading voice in the field, and using a text and cases approach, this text systematically presents and compares civil law and common law approaches to issues primarily within the United Kingdom, United States, France and the EU, as well as offering additional updated insights into rules applicable in other jurisdictions such as Japan, China and Germany. Key features of the second edition include: • New topics covered in the fields of jurisdiction and foreign judgments • Original discussions surrounding the 2019 Hague Convention on Judgments and the changes contemplated by the new US Restatement on Conflict of Laws • US, EU, French and English perspectives integrated throughout the text to ensure maximum relevance and encourage students to make comparative assessments • Carefully selected extracts from primary and secondary sources that build a clear picture of the field, as well as expert analytical commentaries and questions that set these extracts in context. [less ▲]

Detailed reference viewed: 27 (7 UL)
Full Text
Peer Reviewed
See detailCorporate social responsibility budgeting and spending during COVID–19 in Oman: A humanitarian response to the pandemic
Baatwah, Saeed Rabea; Al-Qadasi, Adel Ali; Al-Shehri, Amer Mohammed et al

in Finance Research Letters (2022)

COVID–19 is causing economic panic among people, governments, and businesses, requiring greater corporate social responsibility (CSR). Using a sample of Omani-listed firms, this study shows that CSR ... [more ▼]

COVID–19 is causing economic panic among people, governments, and businesses, requiring greater corporate social responsibility (CSR). Using a sample of Omani-listed firms, this study shows that CSR budgeting and spending have increased considerably during the pandemic. It also shows that CSR budgeting is positively affected by the increase in COVID–19 deaths. CSR spending increases with the number of COVID–19 confirmed and fatal cases. These findings suggest that firms resort to CSR to reduce the negative consequences of the pandemic. [less ▲]

Detailed reference viewed: 32 (2 UL)
Peer Reviewed
See detailSystemübergänge. Von linker Theorie, rechtem Populismus und leeren Signifikanten
Mein, Georg UL

in Dembeck, Till; Fohrmann, Jürgen (Eds.) Die Rhetorik des Populismus und das Populäre. Körperschaftsbildung in der Gesellschaft (2022)

Detailed reference viewed: 26 (0 UL)
Full Text
See detailOn Leopoldt's and Gross's defects for Artin representations
Maksoud, Alexandre UL

E-print/Working paper (2022)

We generalize Waldschmidt's bound for Leopoldt's defect and prove a similar bound for Gross's defect for an arbitrary extension of number fields. As an application, we prove new cases of the generalized ... [more ▼]

We generalize Waldschmidt's bound for Leopoldt's defect and prove a similar bound for Gross's defect for an arbitrary extension of number fields. As an application, we prove new cases of the generalized Gross conjecture (also known as the Gross-Kuz'min conjecture) beyond the classical abelian case, and we show that Gross's p-adic regulator has at least half of the conjectured rank. We also describe and compute non-cyclotomic analogues of Gross's defect. [less ▲]

Detailed reference viewed: 35 (0 UL)
Full Text
Peer Reviewed
See detailEnhanced Optical Spectroscopy for Multiplexed DNA and Protein-Sequencing with Plasmonic Nanopores: Challenges and Prospects
Li, Wang; Zhou, Juan; Maccaferri, Nicolò UL et al

in Analytical Chemistry (2022), 94(2), 503-514

Detailed reference viewed: 32 (2 UL)
See detailQuelques remarques sur la notion de sécurité juridique dans la tradition de Common Law
Cuniberti, Gilles UL

in Cerqueira, Gustavo; Fulchiron, Hugues; Nord, Nicholas (Eds.) “Insécurité Juridique” – L’émergence d’une notion ? (2022)

Detailed reference viewed: 21 (0 UL)
Full Text
Peer Reviewed
See detailPreschool predictors of learning to read and spell in an additional language: a two-wave longitudinal study in a multilingual context.
Wealer, Cyril UL; Fricke, Silke; Loff, Ariana et al

in Reading and Writing (2022)

The study explores whether foundational skills of reading and spelling in preschool (age 5–6) predict literacy skills cross-linguistically in an additional language in Grade 1 (age 6–7). A sample of ... [more ▼]

The study explores whether foundational skills of reading and spelling in preschool (age 5–6) predict literacy skills cross-linguistically in an additional language in Grade 1 (age 6–7). A sample of linguistically diverse preschool children completed tasks of phonological awareness, letter-sound knowledge, verbal-short term memory, rapid automatized naming, and lexical knowledge in the language of preschool instruction Luxembourgish. The children were followed-up in Grade 1 where literacy skills were assessed in the language of schooling, i.e., German, after fve months of literacy instruction. German was a non-native language for all children. Longitudinal correlations confrm that individual diferences in single word/pseudoword reading and spelling in German in Grade 1 can be predicted by all the foundational literacy skills that were assessed in Luxembourgish. Path analyses showed that phonological awareness in Luxembourgish emerged as the strongest unique predictor of Grade 1 literacy skills in German. The second unique preschool predictor of Grade 1 literacy skills was letter-sound knowledge. Results are consistent with the view that literacy development in an additional language builds upon similar building blocks as literacy acquisition in a frst language, at least for languages that are typologically close. However, current fndings suggest that respective contributions between predictors and literacy skills in children learning to read in an additional language may vary from patterns observed in studies with children acquiring literacy in their frst language. [less ▲]

Detailed reference viewed: 44 (8 UL)
Full Text
Peer Reviewed
See detailDLT-Based Enhancement of Cross-Border Payment Efficiency – a Legal and Regulatory Perspective
Zetzsche, Dirk Andreas UL; Anker-Sorensen, Linn; Passador, Maria et al

E-print/Working paper (2022)

Detailed reference viewed: 37 (2 UL)
Full Text
Peer Reviewed
See detailBuilding Regional Payment Areas: The Single Rule Book Approach
Zetzsche, Dirk Andreas UL; Lammer, Thomas; Gazi, S. et al

E-print/Working paper (2022)

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailIs Eve nearby? Analysing protocols under the distant-attacker assumption
Gil Pons, Reynaldo UL; Horne, Ross James UL; Mauw, Sjouke UL et al

in IEEE Computer Security Foundations Symposium, August 7 - 10, 2022, Haifa, Israel (2022)

Detailed reference viewed: 53 (10 UL)
Full Text
Peer Reviewed
See detailLe Centenaire et les nouveaux médias
Clavert, Frédéric UL

in Weinrich, Arndt; Patin, Nicolas (Eds.) Quel Bilan Scientifique pour le Centenaire de 1914-1918? (2022)

This chapter assesses the general and academic uses of social media (most particularly twitter) during the Centenary of the First World War.

Detailed reference viewed: 43 (3 UL)
Full Text
See detailFrom gravity to string topology
Merkoulov (merkulov), Serguei UL

E-print/Working paper (2022)

The chain gravity properad introduced earlier by the author acts on the cyclic Hochschild of any cyclic A∞ algebra equipped with a scalar product of degree −d. In particular, it acts on the cyclic ... [more ▼]

The chain gravity properad introduced earlier by the author acts on the cyclic Hochschild of any cyclic A∞ algebra equipped with a scalar product of degree −d. In particular, it acts on the cyclic Hochschild complex of any Poincare duality algebra of degree d, and that action factors through a quotient dg properad ST3−d of ribbon graphs which is in focus of this paper. We show that its cohomology properad H∙(ST3−d) is highly non-trivial and that it acts canonically on the reduced equivariant homology H¯S1∙(LM) of the loop space LM of any simply connected d-dimensional closed manifold M. By its very construction, the string topology properad H∙(ST3−d) comes equipped with a morphism from the gravity properad which is fully determined by the compactly supported cohomology of the moduli spaces Mg,n of stable algebraic curves of genus g with marked points. This result gives rise to new universal operations in string topology as well as reproduces in a unified way several known constructions: we show that (i) H∙(ST3−d) is also a properad under the properad of involutive Lie bialgebras in degree 3−d whose induced action on H¯S1∙(LM) agrees precisely with the famous purely geometric construction of M. Chas and D. Sullivan, (ii) H∙(ST3−d) is a properad under the properad of homotopy involutive Lie bialgebras in degree 2−d; (iii) E. Getzler's gravity operad injects into H∙(ST3−d) implying a purely algebraic counterpart of the geometric construction of C. Westerland establishing an action of the gravity operad on H¯S1∙(LM). [less ▲]

Detailed reference viewed: 44 (0 UL)
Full Text
See detailSecurity, Scalability and Privacy in Applied Cryptography
Vitto, Giuseppe UL

Doctoral thesis (2022)

In the modern digital world, cryptography finds its place in countless applications. However, as we increasingly use technology to perform potentially sensitive tasks, our actions and private data attract ... [more ▼]

In the modern digital world, cryptography finds its place in countless applications. However, as we increasingly use technology to perform potentially sensitive tasks, our actions and private data attract, more than ever, the interest of ill-intentioned actors. Due to the possible privacy implications of cryptographic flaws, new primitives’ designs need to undergo rigorous security analysis and extensive cryptanalysis to foster confidence in their adoption. At the same time, implementations of cryptographic protocols should scale on a global level and be efficiently deployable on users’ most common devices to widen the range of their applications. This dissertation will address the security, scalability and privacy of cryptosystems by presenting new designs and cryptanalytic results regarding blockchain cryptographic primitives and public-key schemes based on elliptic curves. In Part I, I will present the works I have done in regards to accumulator schemes. More precisely, in Chapter 2, I cryptanalyze Au et al. Dynamic Universal Accumulator, by showing some attacks which can completely take over the authority who manages the accumulator. In Chapter 3, I propose a design for an efficient and secure accumulator-based authentication mechanism, which is scalable, privacy-friendly, lightweight on the users’ side, and suitable to be implemented on the blockchain. In Part II, I will report some cryptanalytical results on primitives employed or considered for adoption in top blockchain-based cryptocurrencies. In particular, in Chapter 4, I describe how the zero-knowledge proof system and the commitment scheme adopted by the privacy-friendly cryptocurrency Zcash, contain multiple subliminal channels which can be exploited to embed several bytes of tagging information in users’ private transactions. In Chapter 5, instead, I report the cryptanalysis of the Legendre PRF, employed in a new consensus mechanism considered for adoption by the blockchain-based platform Ethereum, and attacks for further generalizations of this pseudo-random function, such as the Higher-Degree Legendre PRF, the Jacobi Symbol PRF, and the Power-Residue PRF. Lastly, in Part III, I present my line of research on public-key primitives based on elliptic curves. In Chapter 6, I will describe a backdooring procedure for primes so that whenever they appear as divisors of a large integer, the latter can be efficiently factored. This technique, based on elliptic curves Complex Multiplication theory, enables to eventually generate non-vulnerable certifiable semiprimes with unknown factorization in a multi-party computation setting, with no need to run a statistical semiprimality test common to other protocols. In Chapter 7, instead, I will report some attack optimizations and specific implementation design choices that allow breaking a reduced-parameters instance, proposed by Microsoft, of SIKE, a post-quantum key-encapsulation mechanism based on isogenies between supersingular elliptic curves. [less ▲]

Detailed reference viewed: 145 (17 UL)
Full Text
See detailDie Grenzen aufgezeigt:Technische Innovation und räumliche Abstraktion am Beispiel früher Landkarten der Grenzregion zwischen dem Herzogtum Luxemburg und dem Kurfürstentum Trier
Solchenbach, Karl UL

in Schröder, Lina; Wegewitz, Markus (Eds.) Europäische Grenzregionen. Neue Wege im Umgang mit historischen Raum- und Grenzkonzeptionen in der Geschichtswissenschaft (2022)

Die Ausbildung und Verfestigung der kurtrierischen und luxemburgischen Landesherrschaften war im 14. Jahrhundert weitgehend zum Abschluss gekommen. Die Transformation vom Personenverbands- zum ... [more ▼]

Die Ausbildung und Verfestigung der kurtrierischen und luxemburgischen Landesherrschaften war im 14. Jahrhundert weitgehend zum Abschluss gekommen. Die Transformation vom Personenverbands- zum Flächenstaat frühneuzeitlicher Prägung hatte die Ausbildung einer zunehmend deutlicheren Grenze zwischen beiden Territorien zur Folge. Ebenso formierte sich auch eine Grenze im Grenzraum mit Frankreich und Lothringen. Die vereinfachende Darstellung komplexer teils überlagerter Grenzzonen in Form von abstrahierenden Linien musste von den zeitgenössischen Kartographen jedoch erst noch entwickelt werden. Die älteste regionale Karte mit einer angedeuteten partiellen Grenzmarkierung stammt aus dem Jahr 1555. Eine zunehmende Professionalisierung der Kartographie gelang ab der zweiten Hälfte des 16. Jahrhunderts durch Landesaufnahmen, initiiert von den jeweiligen Landesherren. Die Intention der Auftraggeber war dabei ähnlich: einerseits sollte das jeweilige Territorium durch die Karte möglichst als geschlossen beherrschter Raum dargestellt werden, andererseits galt es, die bisher nur verbal beschriebenen teils strittigen Grenzen als abstrakte Linien deutlich sichtbar zu machen. Die Karten der Landesaufnahmen waren zunächst geheim, dennoch fanden sie bereits nach wenigen Jahren Eingang in die Atlanten von Ortelius, de Jode und Mercator. Diese beeinflussten wiederum die Karten der Region in den späteren Atlanten der niederländischen, französischen und süddeutschen Kartenverleger. Der Beitrag beschreibt, ab wann und in welcher Form Grenzen in frühen Karten (16.-18. Jahrhundert) dargestellt wurden. Besonders in den Blick genommen wird der Prozess der Ausbildung von Linien zur abstrakten Darstellung unklarer, teils strittiger Grenzräume sowie die zunehmende Professionalisierung und Genauigkeit in der kartographischen Darstellung durch Vermessungen im Feld. [less ▲]

Detailed reference viewed: 30 (0 UL)