skip to main content

Attention:

The NSF Public Access Repository (PAR) system and access will be unavailable from 11:00 PM ET on Friday, December 13 until 2:00 AM ET on Saturday, December 14 due to maintenance. We apologize for the inconvenience.


Search for: All records

Creators/Authors contains: "Kang, S."

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Abstract Proper cell-type identity relies on highly coordinated regulation of gene expression. Regulatory elements such as enhancers can produce cell type-specific expression patterns, but the mechanisms underlying specificity are not well understood. We previously identified an enhancer region capable of driving specific expression in giant cells, which are large, highly endoreduplicated cells in the Arabidopsis thaliana sepal epidermis. In this study, we use the giant cell enhancer as a model to understand the regulatory logic that promotes cell type-specific expression. Our dissection of the enhancer revealed that giant cell specificity is mediated primarily through the combination of two activators and one repressor. HD-ZIP and TCP transcription factors are involved in the activation of expression throughout the epidermis. High expression of HD-ZIP transcription factor genes in giant cells promoted higher expression driven by the enhancer in giant cells. Dof transcription factors repressed the activity of the enhancer such that only giant cells maintained enhancer activity. Thus, our data are consistent with a conceptual model whereby cell type-specific expression emerges from the combined activities of three transcription factor families activating and repressing expression in epidermal cells. 
    more » « less
  2. Memory-hard functions (MHFs) are a key cryptographic primitive underlying the design of moderately expensive password hashing algorithms and egalitarian proofs of work. Over the past few years several increasingly stringent goals for an MHF have been proposed including the requirement that the MHF have high sequential space-time (ST) complexity, parallel space-time complexity, amortized area-time (aAT) complexity and sustained space complexity. Data-Independent Memory Hard Functions (iMHFs) are of special interest in the context of password hashing as they naturally resist side-channel attacks. iMHFs can be specified using a directed acyclic graph (DAG) $G$ with $N=2^n$ nodes and low indegree and the complexity of the iMHF can be analyzed using a pebbling game. Recently, Alwen et al. [CCS'17] constructed an DAG called DRSample which has aAT complexity at least $\Omega\left( N^2/\log N\right)$. Asymptotically DRSample outperformed all prior iMHF constructions including Argon2i, winner of the password hashing competition (aAT cost $\mathcal{O}\left(N^{1.767}\right)$), though the constants in these bounds are poorly understood. We show that the the greedy pebbling strategy of Boneh et al. [ASIACRYPT'16] is particularly effective against DRSample e.g., the aAT cost is $\mathcal{O}\left( N^2/\log N\right)$. In fact, our empirical analysis {\em reverses} the prior conclusion of Alwen et al. that DRSample provides stronger resistance to known pebbling attacks for practical values of $N \leq 2^{24}$. We construct a new iMHF candidate (DRSample+BRG) by using the bit-reversal graph to extend DRSample. We then prove that the construction is asymptotically optimal under every MHF criteria, and we empirically demonstrate that our iMHF provides the best resistance to {\em known} pebbling attacks. For example, we show that any parallel pebbling attack either has aAT cost $\omega(N^2)$ or requires at least $\Omega(N)$ steps with $\Omega(N/\log N)$ pebbles on the DAG. This makes our construction the first practical iMHF with a strong sustained space-complexity guarantee and immediately implies that any parallel pebbling has aAT complexity $\Omega(N^2/\log N)$. We also prove that any sequential pebbling (including the greedy pebbling attack) has aAT cost $\Omega\left( N^2\right)$ and, if a plausible conjecture holds, any parallel pebbling has aAT cost $\Omega(N^2 \log \log N/\log N)$ --- the best possible bound for an iMHF. We implement our new iMHF and demonstrate that it is just as fast as Argon2. Along the way we propose a simple modification to the Argon2 round function which increases an attacker's aAT cost by nearly an order of magnitude without increasing running time on a CPU. Finally, we give a pebbling reduction which proves that in the parallel random oracle model (PROM) the cost of evaluating an iMHF like Argon2i or DRSample+BRG is given by the pebbling cost of the underlying DAG. Prior pebbling reductions assumed that the iMHF round function concatenates input labels before hashing and did not apply to practical iMHFs such as Argon2i, DRSample or DRSample+BRG where input labels are instead XORed together. 
    more » « less
  3. We measure the branching fraction of the decayBD0ρ(770)using data collected with the Belle II detector. The data contain 387 millionBB¯pairs produced ine+ecollisions at theϒ(4S)resonance. We reconstruct8360±180decays from an analysis of the distributions of theBenergy and theρ(770)helicity angle. We determine the branching fraction to be(0.939±0.021(stat)±0.050(syst))%, in agreement with previous results. Our measurement improves the relative precision of the world average by more than a factor of two.

    Published by the American Physical Society2024 
    more » « less
    Free, publicly-accessible full text available June 1, 2025
  4. We report a measurement of decay-time-dependent charge-parity (CP) asymmetries inB0KS0KS0KS0decays. We use387×106BB¯pairs collected at theϒ(4S)resonance with the Belle II detector at the SuperKEKB asymmetric-energy electron-positron collider. We reconstruct 220 signal events and extract theCP-violating parametersSandCfrom a fit to the distribution of the decay-time difference between the twoBmesons. The resulting confidence region is consistent with previous measurements inB0KS0KS0KS0andB0(cc¯)K0decays and with predictions based on the standard model.

    Published by the American Physical Society2024 
    more » « less
    Free, publicly-accessible full text available June 1, 2025
  5. We search for the rare decayB+K+νν¯in a362fb1sample of electron-positron collisions at theϒ(4S)resonance collected with the Belle II detector at the SuperKEKB collider. We use the inclusive properties of the accompanyingBmeson inϒ(4S)BB¯events to suppress background from other decays of the signalBcandidate and light-quark pair production. We validate the measurement with an auxiliary analysis based on a conventional hadronic reconstruction of the accompanyingBmeson. For background suppression, we exploit distinct signal features using machine learning methods tuned with simulated data. The signal-reconstruction efficiency and background suppression are validated through various control channels. The branching fraction is extracted in a maximum likelihood fit. Our inclusive and hadronic analyses yield consistent results for theB+K+νν¯branching fraction of[2.7±0.5(stat)±0.5(syst)]×105and[1.10.8+0.9(stat)0.5+0.8(syst)]×105, respectively. Combining the results, we determine the branching fraction of the decayB+K+νν¯to be[2.3±0.5(stat)0.4+0.5(syst)]×105, providing the first evidence for this decay at 3.5 standard deviations. The combined result is 2.7 standard deviations above the standard model expectation.

    Published by the American Physical Society2024 
    more » « less
    Free, publicly-accessible full text available June 1, 2025
  6. Free, publicly-accessible full text available April 1, 2025
  7. Free, publicly-accessible full text available January 1, 2025