منابع مشابه
study of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
On Cyclically Symmetrical Spacetimes
In a recent paper Carot et al. considered the definition of cylindrical symmetry as a specialisation of the case of axial symmetry. One of their propositions states that if there is a second Killing vector, which together with the one generating the axial symmetry, forms the basis of a two-dimensional Lie algebra, then the two Killing vectors must commute, thus generating an Abelian group. In t...
متن کاملPartial deletion in the JK locus causing a Jk(null) phenotype.
A new alteration of the blood group JK*A allele was identified in a Jk(null) patient from Tunisia with an allo-anti-Jk3 in her serum. Southern blot and exon mapping analyses revealed an internal deletion within the Kidd (JK) locus encompassing exons 4 and 5. Sequence analysis of the Jk transcript showed that exons 4 and 5 were missing but were replaced by a 136-base-pair (bp) intron 3 sequence ...
متن کاملHamiltonian Cycles on Symmetrical Graphs
The edges of highly-connected symmetrical graphs are colored so that they form Hamiltonian cycles. As an introduction we discuss the coloring of the complete graphs K2m+1 for m>1, but the focus is on the graphs resulting from symmetrical perspective projections of the edges of the regular 4-dimensional polytopes into 3-space. The goal is to color all edges in these graphs with multiple congruen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematica Bohemica
سال: 1995
ISSN: 0862-7959,2464-7136
DOI: 10.21136/mb.1995.125897