scispace - formally typeset
Search or ask a question

Showing papers by "University of Luxembourg published in 2009"


Journal ArticleDOI
TL;DR: It is demonstrated that an unequivocal role for common genetic variants in the etiology of typical PD and population-specific genetic heterogeneity in this disease is suggested, and supporting evidence that common variation around LRRK2 modulates risk for PD is provided.
Abstract: We performed a genome-wide association study (GWAS) in 1,713 individuals of European ancestry with Parkinson's disease (PD) and 3,978 controls. After replication in 3,361 cases and 4,573 controls, we observed two strong association signals, one in the gene encoding a-synuclein (SNCA; rs2736990, OR = 1.23, P = 2.24 x 10(-16)) and another at the MAPT locus (rs393152, OR = 0.77, P = 1.95 x 10(-16)). We exchanged data with colleagues performing a GWAS in Japanese PD cases. Association to PD at SNCA was replicated in the Japanese GWAS1, confirming this as a major risk locus across populations. We replicated the effect of a new locus detected in the Japanese cohort (PARK16, rs823128, OR = 0.66, P = 7.29 x 10(-8)) and provide supporting evidence that common variation around LRRK2 modulates risk for PD (rs1491923, OR = 1.14, P = 1.55 x 10(-5)). These data demonstrate an unequivocal role for common genetic variants in the etiology of typical PD and suggest population-specific genetic heterogeneity in this disease.

1,793 citations


Journal ArticleDOI
TL;DR: The ecological relevance of bacterial weathering, mainly in the soil and especially in acidic forest ecosystems, which strongly depend on mineral weathering for their sustainability are discussed and the potential applications of genomic resources to the study ofacterial weathering are considered.

521 citations


BookDOI
17 Apr 2009
TL;DR: Qvortrup, W.Lange and J.Mierendorff as mentioned in this paper discuss the evolution of childhood in Western Europe c. 1400-1750 and discuss the need for social studies of childhood.
Abstract: List of Figures and Tables Notes on Contributors Introduction: Why Social Studies of Childhood? J.Qvortrup, W.A.Corsaro & M-S.Honig PART I: CONCEPTS OF CHILDHOOD STUDIES Childhood as Structural Form J.Qvortrup Agency A.James Child Development and Development of Childhood M.Woodhead How is the Child Constituted in Childhood Studies? M-S.Honig Method and Methodology in Childhood Research A.Lange & J.Mierendorff PART II: HISTORICAL AND SOCIO-ECONOMIC CONTEXTS OF CHILDHOOD The Evolution of Childhood in Western Europe c. 1400-1750 H.Hendrick Transitions to Modernity J.Gillis Institutionalization as a Secular Trend H.Zeiher Pluralization of Family Forms A-M.Jensen PART III: GENERATIONAL RELATIONS Generational Order L.Alanen Generational Relations at Family Level B.Mayall Children, Generational Relations and Intergenerational Justice T.Olk Collective Identities H.Hengst PART IV: CHILDREN'S EVERYDAY LIVES/THE LOCAL FRAMEWORK Children's Bodies L.Fingerson Policies in Early Childhood Education and Care: Potentialities for Agency, Play and Learning G.Dahlberg Localities: A Holistic Frame of Reference for Appraising Social Justice in Children's Lives J.McKendrick Children as Problems, Problems of Children K.Rosier Childhood: Leisure, Culture, and Peers I.Frones PART V: CHILDREN'S PRACTICE - CHILDREN AS PARTICIPANTS From Child Labour to Working Children's Movement O.Nieuwenhuys Peer Cultures W.A.Corsaro Play and Games A-C.Evaldsson Leisure Time and Cultural Activities I.Frones Children as Consumers D.Cook Children and Television D.Buckingham Children and Digital Media: Online, On Site, On the Go K.Drotner PART VI: CHILDREN'S RIGHTS AND PLACE IN THE WORLD Children's Rights as Human Rights: Reading the UNCRC M.Freeman Interests in and Responsibility for Children and their Life Worlds D.Buhler-Niederberger & H.Sunker Transnational Mobilities and Childhoods A.Bailey Closing the Gap between Rights and the Realities of Children's Lives N.H.Kaufman & I.Rizzini Author Index Subject Index

384 citations


01 Jan 2009
TL;DR: This article presents a revised version of GAT, a transcription system first developed by a group of German conversation analysts and interactional linguists in 1998, which proposes some conventions which are more compatible with linguistic and phonetic analyses of spoken language.
Abstract: This article presents a revised version of GAT, a transcription system first developed by a group of German conversation analysts and interactional linguists in 1998. GAT tries to follow as many principles and conventions of CA's Jeffersonstyle transcription as possible, yet proposes some conventions which are more compatible with linguistic and phonetic analyses of spoken language, especially for the representation of prosody in talk-in-interaction. After ten years of use by many reseachers in conversation and discourse analysis, it was time to revise the first version, against the background of past experience and in light of new necessities for the transcription of corpora arising from technological advances and methodological developments over recent years. This text presents the new GAT 2 transcription system with all its conventions. It gives detailed instructions on how to transcribe spoken talk on three levels of delicacy: minimal, basic and refined transcript versions. In addition, it briefly introduces a few tools that may be helpful for the user: the online tutorial GAT-TO and the transcription editing software FOLKER.

383 citations


Journal ArticleDOI
TL;DR: The intuitive graphical user interface of MetaboliteDetector additionally allows for a detailed examination of a single GC/MS chromatogram including single ion chromatograms, recorded mass spectra, and identified metabolite spectra in combination with the corresponding reference spectra obtained from a reference library.
Abstract: We have developed a new software, MetaboliteDetector, for the efficient and automatic analysis of GC/MS-based metabolomics data. Starting with raw MS data, the program detects and subsequently identifies potential metabolites. Moreover, a comparative analysis of a large number of chromatograms can be performed in either a targeted or nontargeted approach. MetaboliteDetector automatically determines appropriate quantification ions and performs an integration of single ion peaks. The analysis results can directly be visualized with a principal component analysis. Since the manual input is limited to absolutely necessary parameters, the program is also usable for the analysis of high-throughput data. However, the intuitive graphical user interface of MetaboliteDetector additionally allows for a detailed examination of a single GC/MS chromatogram including single ion chromatograms, recorded mass spectra, and identified metabolite spectra in combination with the corresponding reference spectra obtained from a ...

366 citations


Book ChapterDOI
02 Dec 2009
TL;DR: This paper shows the first key recovery attack that works for all the keys and has 299.5 time and data complexity, while the recent attack by Biryukov-Khovratovich-Nikolic works for a weak key class and has much higher complexity.
Abstract: In this paper we present two related-key attacks on the full AES. For AES-256 we show the first key recovery attack that works for all the keys and has 299.5 time and data complexity, while the recent attack by Biryukov-Khovratovich-Nikolic works for a weak key class and has much higher complexity. The second attack is the first cryptanalysis of the full AES-192. Both our attacks are boomerang attacks, which are based on the recent idea of finding local collisions in block ciphers and enhanced with the boomerang switching techniques to gain free rounds in the middle. The extended version of this paper is available at http://eprint.iacr.org/2009/317.pdf .

360 citations


Journal ArticleDOI
TL;DR: In order to study the polarization induced by Abeta, microglia was stimulated with different forms of the peptide and found that the oligomeric Abeta is a stronger M1-inductor than the fibrillar form.

354 citations


Book ChapterDOI
23 Jun 2009
TL;DR: PAT, a toolkit for flexible and efficient system analysis under fairness, is presented and a unified algorithm is proposed to model check systems with a variety of fairness effectively in two different settings.
Abstract: Recent development on distributed systems has shown that a variety of fairness constraints (some of which are only recently defined) play vital roles in designing self-stabilizing population protocols. Current practice of system analysis is, however, deficient under fairness. In this work, we present PAT, a toolkit for flexible and efficient system analysis under fairness. A unified algorithm is proposed to model check systems with a variety of fairness effectively in two different settings. Empirical evaluation shows that PAT complements existing model checkers in terms of fairness. We report that previously unknown bugs have been revealed using PAT against systems functioning under strong global fairness.

340 citations


Journal ArticleDOI
TL;DR: This paper re-examine how abstract argumentation can be formulated in terms of labellings, and how the resulting theory can be applied in the field of modal logic.
Abstract: In the current paper, we re-examine how abstract argumentation can be formulated in terms of labellings, and how the resulting theory can be applied in the field of modal logic. In particular, we are able to express the (complete) extensions of an argumentation framework as models of a set of modal logic formulas that represents the argumentation framework. Using this approach, it becomes possible to define the grounded extension in terms of modal logic entailment.

303 citations


Book ChapterDOI
19 Aug 2009
TL;DR: In this paper, a related-key attack on the full 256-bit key AES was presented, which works for one out of every 235 keys with 2120 data and time complexity and negligible memory.
Abstract: In this paper we construct a chosen-key distinguisher and a related-key attack on the full 256-bit key AES. We define a notion of differential q -multicollision and show that for AES-256 q-multicollisions can be constructed in time q·267 and with negligible memory, while we prove that the same task for an ideal cipher of the same block size would require at least $O(q\cdot 2^{\frac{q-1}{q+1}128})$ time. Using similar approach and with the same complexity we can also construct q-pseudo collisions for AES-256 in Davies-Meyer mode, a scheme which is provably secure in the ideal-cipher model. We have also computed partial q-multicollisions in time q·237 on a PC to verify our results. These results show that AES-256 can not model an ideal cipher in theoretical constructions. Finally we extend our results to find the first publicly known attack on the full 14-round AES-256: a related-key distinguisher which works for one out of every 235 keys with 2120 data and time complexity and negligible memory. This distinguisher is translated into a key-recovery attack with total complexity of 2131 time and 265 memory.

290 citations


Journal ArticleDOI
TL;DR: It is argued that in this model, the product combining is more efficient not only than absolute difference combining, but also than all the other combining techniques proposed in the literature.
Abstract: Second order Differential Power Analysis (2O-DPA) is a powerful side-channel attack that allows an attacker to bypass the widely used masking countermeasure. To thwart 2O-DPA, higher order masking may be employed but it implies a nonnegligible overhead. In this context, there is a need to know how efficient a 2O-DPA can be, in order to evaluate the resistance of an implementation that uses first order masking and, possibly, some hardware countermeasures. Different methods of mounting a practical 2O-DPA attack have been proposed in the literature. However, it is not yet clear which of these methods is the most efficient. In this paper, we give a formal description of the higher order DPA that are mounted against software implementations. We then introduce a framework in which the attack efficiencies may be compared. The attacks we focus on involve the combining of several leakage signals and the computation of correlation coefficients to discriminate the wrong key hypotheses. In the second part of this paper, we pay particular attention to 2O-DPA that involves the product combining or the absolute difference combining. We study them under the assumption that the device leaks the Hamming weight of the processed data together with an independent Gaussian noise. After showing a way to improve the product combining, we argue that in this model, the product combining is more efficient not only than absolute difference combining, but also than all the other combining techniques proposed in the literature.

Journal ArticleDOI
TL;DR: Major constraints associated with a trip to Mars are summarized, immunological hazards associated with this type of mission are presented, and it is shown that current understanding of the immunosuppressive effects of spaceflight is limited.
Abstract: This year, we celebrate the 40th birthday of the first landing of humans on the moon. By 2020, astronauts should return to the lunar surface and establish an outpost there that will provide a technical basis for future manned missions to Mars. This paper summarizes major constraints associated with a trip to Mars, presents immunological hazards associated with this type of mission, and shows that our current understanding of the immunosuppressive effects of spaceflight is limited. Weakening of the immune system associated with spaceflight is therefore an area that should be considered more thoroughly before we undertake prolonged space voyages.

Journal ArticleDOI
15 Feb 2009-Talanta
TL;DR: It was found that steric hindrance and molecular mass play a very important role in the choice of the best suited derivatization reagent: compounds with sterically hindered sites derivatized with MTBSTFA produce very small analytical responses or no signal at all, and compounds with high molecular mass produce no characteristic fragmentation pattern when derivatizing is performed with BSTFA.

Journal ArticleDOI
TL;DR: An electrodeposition-annealing route to films of the promising p-type absorber material Cu2ZnSnS4 (CZTS) using layered metal precursors is studied in this article.

Journal ArticleDOI
TL;DR: A new definition of partial remission in type 1 diabetes that reflects residual β-cell function and has better stability compared with the conventional definitions is proposed, including both glycemic control and insulin dose.
Abstract: OBJECTIVE To find a simple definition of partial remission in type 1 diabetes that reflects both residual beta-cell function and efficacy of insulin treatment. RESEARCH DESIGN AND METHODS A total of 275 patients aged 300 pmol/l was used to define partial remission. The IDAA1C 300 pmol/l) 9 patients entered partial remission and 49 ended. IDAA1C at 6 months has good predictive power for stimulated C-peptide concentrations after both 6 and 12 months. CONCLUSIONS A new definition of partial remission is proposed, including both glycemic control and insulin dose. It reflects residual beta-cell function and has better stability compared with the conventional definitions.

Journal ArticleDOI
TL;DR: The role of contexts, relationships and dispositions in young people's citizenship learning in everyday life is discussed in this paper, where the authors focus on the role of context, relationship, and attitude.
Abstract: Understanding young people’s citizenship learning in everyday life : The role of contexts, relationships and dispositions

Journal ArticleDOI
10 May 2009
TL;DR: This work proposes to replace propositional formulas in the AGM framework of theory change by pairs of propositional formula, representing the rule based character of norms, and to add several principles from the input/output logic framework.
Abstract: Normative systems in a multiagent system must be able to evolve over time, for example due to actions creating or removing norms in the system. The only formal framework to evaluate and classify normative system change methods is the so-called AGM framework of theory change, which has originally been developed as a framework to describe and classify both belief and normative system change. However, it has been used for belief change only, since the beliefs or norms are represented as propositional formulas. We therefore propose, as a normative framework for normative system change, to replace propositional formulas in the AGM framework of theory change by pairs of propositional formulas, representing the rule based character of norms, and to add several principles from the input/output logic framework. In this new framework, we show that some of the AGM properties cannot be expressed, and other properties are consistent only for some logics, but not for others.

Journal ArticleDOI
TL;DR: A large-scale literature-based Boolean model of the central intrinsic and extrinsic apoptosis pathways as well as pathways connected with them is built and gives new insights into the complex interplay of pro- and antiapoptotic factors and can be easily expanded to other signaling pathways.
Abstract: Apoptosis is regulated by several signaling pathways which are extensively linked by crosstalks. Boolean or logical modeling has become a promising approach to capture the qualitative behavior of such complex networks. Here we built a largescale literature-based Boolean model of the central intrinsic and extrinsic apoptosis pathways as well as pathways connected with them. The model responds to several external stimuli such as Fas ligand, TNF-a, UV-B irradiation, interleukin1b and insulin. Timescales and multi-value node logic were used and turned out to be indispensable to reproduce the behavior of the apoptotic network. The coherence of the model was experimentally validated. Thereby an UV-B dose-effect is shown for the first time in mouse hepatocytes. Analysis of the model revealed a tight regulation emerging from high connectivity and spanning crosstalks and a particular importance of feedback loops. An unexpected feedback from Smac release to RIP could further increase complex II formation. The introduced Boolean model provides a comprehensive and coherent description of the apoptosis network behavior. It gives new insights into the complex interplay of pro- and antiapoptotic factors and can be easily expanded to other signaling pathways.

Journal ArticleDOI
TL;DR: The key elements of the approach are presented and the evolution of the design and their suitability in various contexts are described and the voter experience, and the security properties that the schemes provide are described.
Abstract: ??????Pre?t a? Voter provides a practical approach to end-to-end verifiable elections with a simple, familiar voter-experience. It assures a high degree of transparency while preserving secrecy of the ballot. Assurance arises from the auditability of the election itself, rather than the need to place trust in the system components. The original idea has undergone several revisions and enhancements since its inception in 2004, driven by the identification of threats, the availability of improved cryptographic primitives, and the desire to make the scheme as flexible as possible. This paper presents the key elements of the approach and describes the evolution of the design and their suitability in various contexts. We also describe the voter experience, and the security properties that the schemes provide.


Book ChapterDOI
19 Aug 2009
TL;DR: In this paper, the authors describe a new explicit function that given an elliptic curve E defined over E, maps elements of E into E in deterministic polynomial time and in a constant number of operations over E. The function requires to compute a cube root.
Abstract: We describe a new explicit function that given an elliptic curve E defined over $\mathbb F_{p^n}$, maps elements of $\mathbb F_{p^n}$ into E in deterministic polynomial time and in a constant number of operations over $\mathbb F_{p^n}$. The function requires to compute a cube root. As an application we show how to hash deterministically into an elliptic curve.

Journal ArticleDOI
TL;DR: In this paper, the current status of the research on grain boundaries in polycrystalline Cu(In, Ga)(S, Se)2 alloys used as absorber materials for thin-film solar cells is reviewed.
Abstract: The paper reviews the current status of the research on grain boundaries in polycrystalline Cu(In, Ga)(S, Se)2 alloys used as absorber materials for thin-film solar cells. We discuss the different concepts that are available to explain the relatively low electronic activity of grain boundaries in these materials. Numerical simulations that have been undergone so far to model the polycrystalline solar cells are briefly summarized. In addition, we give an overview on the experiments that have been conducted so far to elucidate the structural, defect-chemical, and electronic properties of grain boundaries in Cu(In, Ga)(S, Se)2 thin-films.

Journal ArticleDOI
TL;DR: In this paper, the deformation theory of morphisms of properads and props was extended to a non-linear framework and the associated chain complex is endowed with an L∞-algebra structure.
Abstract: In this paper and its follow-up [Merkulov and Vallette, J. reine angew. Math.], we study the deformation theory of morphisms of properads and props thereby extending Quillen's deformation theory for commutative rings to a non-linear framework. The associated chain complex is endowed with an L∞-algebra structure. Its Maurer-Cartan elements correspond to deformed structures, which allows us to give a geometric interpretation of these results. To do so, we endow the category of prop(erad)s with a model category structure. We provide a complete study of models for prop(erad)s. A new effective method to make minimal models explicit, that extends the Koszul duality theory, is introduced and the associated notion is called homotopy Koszul. As a corollary, we obtain the (co)homology theories of (al)gebras over a prop(erad) and of homotopy (al)gebras as well. Their underlying chain complex is endowed with an L∞-algebra structure in general and a Lie algebra structure only in the Koszul case. In particular, we make the deformation complex of morphisms from the properad of associative bialgebras explicit. For any minimal model of this properad, the boundary map of this chain complex is shown to be the one defined by Gerstenhaber and Schack. As a corollary, this paper provides a complete proof of the existence of an L∞-algebra structure on the Gerstenhaber-Schack bicomplex associated to the deformations of associative bialgebras.

Journal ArticleDOI
TL;DR: In this paper, the authors present results of an experiment that has been designed to evaluate several competing hypotheses to explain the stylized fact of declining contributions in repeated public goods experiments, and the data favor the hypothesis of selfish-biased conditional cooperation as the source for the declining contributions over the competing hypotheses.

BookDOI
16 Oct 2009
TL;DR: The transition through the lifecourse is discussed in this article, where the authors bring together and evaluate insights about educational, life and work transitions from different elds of research and a range of theoretical orientations.
Abstract: This book has its origins in a seminar series on transitions through the lifecourse which was part of the UK Teaching and Learning Research Programme (TLRP; see www.tlrp.org). It aims to bring together and evaluate insights about educational, life and work transitions from different elds of research and a range of theoretical orientations. The book responds to the injunction that researchers need to chart ‘what individuals actually do and how this is changing’ as a ‘rst step to understanding what it means’ (Bynner quoted by Hayward et al. 2005: 115). In different ways, the chapters that follow explore the concept of transitions and its contemporary importance in policy and educational practices. In doing so they enable the book to address the following questions:What are the main characteristics of transitions depicted in policy, practice • and research? How do different ideas and perspectives about transition, people’s agency, • identity and the effects of structural conditions help us to understand transitions better in research, policy and practice? Why are transitions a problem for some individuals and groups and, • conversely, for whom are transitions not a problem? What interventions, activities or practices are seen as useful in dealing with • transitions? What aspects of transitions are contested from different perspectives?•This book arose from a recognition that the research eld around transitions is fragmented both historically and between disciplines and theoretical orientations. The book does not claim to represent a unitary view about transitions in the lifecourse. Rather, it brings together policy, professional and academic concerns about transitions in the lifecourse through the conceptual lenses of identity, agency and structure. The theorising and ndings about transition, and the questions they raise about new forms of support, management and pedagogy, offered in the book, are meant to provide a basis for further thinking and empirical study.

Journal ArticleDOI
TL;DR: In this paper, the authors used a sharp discontinuity in the maximum duration of unemployment benefits in Germany, which increases from 12 months to 18 months at the age of 45, to identify the effect of extended benefit duration on unemployment duration and post-unemployment outcomes.
Abstract: The generosity of the Unemployment Insurance system (UI) plays a central role for the job search behavior of unemployed individuals. Standard search theory predicts that an increase in UI benefit generosity, either in terms of benefit duration or entitlement, has a negative impact on the job search activities of the unemployed increasing their unemployment duration. Despite the disincentive effect of UI on unemployment duration, UI benefit generosity may also increase job match quality by allowing individuals to wait for better job offers. In this paper we use a sharp discontinuity in the maximum duration of unemployment benefits in Germany, which increases from 12 months to 18 months at the age of 45, to identify the effect of extended benefit duration on unemployment duration and post-unemployment outcomes. We find a spike in the re-employment hazard for the unemployed workers with 12 months benefit duration, which occurs around benefit exhaustion. This leads to lower unemployment duration compared to their counterparts with 18 months benefit duration. However, we also show that those unemployed who obtain jobs close to and after the time when benefits are exhausted are significantly more likely to exit subsequent employment and receive lower wages compared to their counterparts with extended benefit duration.

Proceedings ArticleDOI
02 Mar 2009
TL;DR: RAM is presented, an aspect-oriented modeling approach that provides scalable multi-view modeling and supports aspect dependency chains, which allows an aspect providing complex functionality to reuse the functionality provided by other aspects.
Abstract: Multi-view modeling allows a developer to describe a software system from multiple points of view, e.g. structural and behavioral, using different modeling notations. Aspect-oriented modeling techniques have been proposed to address the scalability problem within individual modeling notations. This paper presents RAM, an aspect-oriented modeling approach that provides scalable multi-view modeling. RAM allows the modeler to define stand-alone reusable aspect models using 3 modeling notations. The aspect models support the modeling of structure (using UML class diagrams) and behavior (using UML state and sequence diagrams). RAM supports aspect dependency chains, which allows an aspect providing complex functionality to reuse the functionality provided by other aspects. The RAM weaver can create woven views of the composed model for debugging, simulation or code generation purpose, as well as perform consistency checks during the weaving and on the woven model to detect inconsistencies of the composition.

Journal ArticleDOI
TL;DR: In this article, a simple model shows how merely assuming that firms must have a certain degree of commonality in their knowledge to have a successful alliance is enough to produce the above features, without recourse to social capital at all.
Abstract: Properties of strategic alliance networks, such as small world structures, skewed link distributions, and patterns of repeated tie occurrences, are often explained in terms of social capital theories. A simple model shows how merely assuming that firms must have a certain degree of commonality in their knowledge to have a successful alliance is enough to produce the above features, without recourse to social capital at all.

Book ChapterDOI
30 Aug 2009
TL;DR: In this article, a generic scheme combining higher-order masking and shuffling was proposed to improve the security level of AES implementations against differential power analysis (DPA) attacks.
Abstract: Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually applied to thwart them: masking and operations shuffling. To benefit from the advantages of the two techniques, recent works have proposed to combine them. However, the schemes which have been designed until now only provide limited resistance levels and some advanced DPA attacks have turned out to break them. In this paper, we investigate the combination of masking and shuffling. We moreover extend the approach with the use of higher-order masking and we show that it enables to significantly improve the security level of such a scheme. We first conduct a theoretical analysis in which the efficiency of advanced DPA attacks targeting masking and shuffling is quantified. Based on this analysis, we design a generic scheme combining higher-order masking and shuffling. This scheme is scalable and its security parameters can be chosen according to any desired resistance level. As an illustration, we apply it to protect a software implementation of AES for which we give several security/efficiency trade-offs.

Book ChapterDOI
30 Aug 2009
TL;DR: In this article, the authors propose a new method for generating random delays and a criterion for measuring the efficiency of a random delay countermeasure against side channel and fault attacks in embedded software.
Abstract: Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of random delays and a criterion for measuring the efficiency of a random delay countermeasure. We implement this new method along with the existing ones on an 8-bit platform and mount practical side-channel attacks against the implementations. We show that the new method is significantly more secure in practice than the previously published solutions and also more lightweight.