Lorenzo Grassi

Learn More
Subject-specific finite element models have been used to predict stress-state and fracture risk in individual patients. While many studies analysed quasi-axial loading configurations, only few works simulated sideways load configurations, such as those arising in a fall. The majority among these latter directly predicted bone strength, without assessing(More)
Various papers described mesh morphing techniques for computational biomechanics, but none of them provided a quantitative assessment of generality, robustness, automation, and accuracy in predicting strains. This study aims to quantitatively evaluate the performance of a novel mesh-morphing algorithm. A mesh-morphing algorithm based on radial-basis(More)
Proximal femur strength estimates from computed tomography (CT)-based finite element (FE) models are finding clinical application. Published models reached a high in-vitro accuracy, yet many of them rely on nonlinear methodologies or internal best-fitting of parameters. The aim of the present study is to verify to what extent a linear FE modelling(More)
This study assessed: (i) how the magnitude and direction of principal strains vary for different sideways fall loading directions; (ii) how the principal strains for a sideways fall differ from physiological loading directions; (iii) the fracture mechanism during a sideways fall. Eleven human femurs were instrumented with 16 triaxial strain gauges each. The(More)
We explore cryptographic primitives with low multiplicative complexity. This is motivated by recent progress in practical applications of secure multi-party computation (MPC), fully homomorphic encryption (FHE), and zero-knowledge proofs (ZK) where primitives from symmetric cryptography are needed and where linear computations are, compared to non-linear(More)
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a potentially more powerful attack vector. Interestingly, subspace trail cryptanalysis in fact includes(More)
We discuss the design of symmetric primitives, in particular Pseudo-Random Functions (PRFs) which are suitable for use in a secret-sharing based MPC system. We consider three different PRFs: the Naor-Reingold PRF, a PRF based on the Legendre symbol, and a specialized block cipher design called MiMC. We present protocols for implementing these PRFs within a(More)
Computed tomography (CT)-based finite element (FE) reconstructions describe shape and density distribution of bones. Both shape and density distribution, however, can vary a lot between individuals. Shape/density indexation (usually achieved by principal component analysis--PCA) can be used to synthesize realistic models, thus overcoming the shortage of(More)
Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases. In this paper, we consider PRINCE, a widely analyzed block cipher proposed in 2012. After the identification of a 2.5 rounds subspace trail of PRINCE, we present several(More)