Learn More
Various papers described mesh morphing techniques for computational biomechanics, but none of them provided a quantitative assessment of generality, robustness, automation, and accuracy in predicting strains. This study aims to quantitatively evaluate the performance of a novel mesh-morphing algorithm. A mesh-morphing algorithm based on radial-basis(More)
Subject-specific finite element models have been used to predict stress-state and fracture risk in individual patients. While many studies analysed quasi-axial loading configurations, only few works simulated sideways load configurations, such as those arising in a fall. The majority among these latter directly predicted bone strength, without assessing(More)
Proximal femur strength estimates from computed tomography (CT)-based finite element (FE) models are finding clinical application. Published models reached a high in-vitro accuracy, yet many of them rely on nonlinear methodologies or internal best-fitting of parameters. The aim of the present study is to verify to what extent a linear FE modelling(More)
This study assessed: (i) how the magnitude and direction of principal strains vary for different sideways fall loading directions; (ii) how the principal strains for a sideways fall differ from physiological loading directions; (iii) the fracture mechanism during a sideways fall. Eleven human femurs were instrumented with 16 triaxial strain gauges each. The(More)
Computed tomography (CT)-based finite element (FE) reconstructions describe shape and density distribution of bones. Both shape and density distribution, however, can vary a lot between individuals. Shape/density indexation (usually achieved by principal component analysis--PCA) can be used to synthesize realistic models, thus overcoming the shortage of(More)
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a potentially more powerful attack vector. Interestingly, subspace trail cryptanalysis in fact includes(More)
We explore cryptographic primitives with low multiplicative complexity. This is motivated by recent progress in practical applications of secure multi-party computation (MPC), fully homomorphic en-cryption (FHE), and zero-knowledge proofs (ZK) where primitives from symmetric cryptography are needed and where linear computations are, compared to non-linear(More)
We discuss the design of symmetric primitives, in particular Pseudo-Random Functions (PRFs) which are suitable for use in a secret-sharing based MPC system. We consider three different PRFs: the Naor-Reingold PRF, a PRF based on the Legendre symbol, and a specialized block cipher design called MiMC. We present protocols for implementing these PRFs within a(More)
The theory of the multiple-pass cell based on the use of retroreflectors is presented. As a result of this study, it is shown that it is possible to construct an enhanced White cell with zero geometric loss. Starting from theoretical considerations of the design of a new monolithic multiple-face retroreflector, a multiple-pass cell is proposed. Ray-tracing(More)