More sober research …

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Get sober; stay sober.

In the decades since alcoholism became widely recognized as a disease (Jellinek, 1960), evidence for alcohol-induced physical damage has accumulated both in quantity and in detail. Prominent amongst the affected organ systems at-risk is the brain, which responds to alcohol in a variety of ways. Free radicals formed during metabolism of alcohol damage the brain. Acetaldehyde, which is generated ...

متن کامل

Sober living houses: research in northern and southern California

Background Sober living houses (SLHs) are peer-managed residences that require sobriety and household participation among residents who rent rooms on a monthly (indefinite) basis and otherwise live normal lives according to personal schedules and needs. The houses do not provide counseling or services, but regular attendance at 12-step or other types of mutual-help groups is generally required....

متن کامل

Cryptanalysis of SOBER-t32

Sober-t32 is a candidate stream cipher in the NESSIE competition. Some new attacks are presented in this paper. A Guess and Determine attack is mounted against Sober-t32 without the decimation of the key stream by the so-called stuttering phase. Also, two distinguishing attacks are mounted against full Sober-t32. These attacks are not practically feasible, but they are theoretically more effici...

متن کامل

Baire Spaces, Sober Spaces

In the article concepts and facts necessary to continue forma-lization of theory of continuous lattices according to [10] are introduced. The notation and terminology used here are introduced in the following papers:

متن کامل

Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering

This paper presents algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two different attacks are implemented. In the first attack, we obtain multivariate equations of degree 10. Then, an algebraic attack is developed using a collection of output bits whose relation to the initial state of the LFSR can be described by low-degree equations. The resulting s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature Medicine

سال: 1995

ISSN: 1078-8956,1546-170X

DOI: 10.1038/nm0895-722a