منابع مشابه
Does Chi give or take?
In lytic cycle crosses with Red-Gam-lambda phage, particles were examined that had undergone an Int-mediated exchange. It was assumed that this exchange dimerized the circular lambda, making it packageable. Among these Int-mediated recombinants, particles were identified that had, in addition, enjoyed a close double exchange mediated by the RecBC pathway. Such close double exchanges indicate lo...
متن کاملWhy Were the Soil Tunnels of Cu Chi and Iron Triangle in Vietnam So Resilient?
At the peak of the Vietnam War, the network of tunnels in the Iron Triangle and Cu Chi linked Viet Cong (VC) support bases over a distance of some 250 km, from the Ho Chi Minh Trail and Cambodian border to the outskirts Saigon. In the early 1960s, the United States escalated its military presence in Vietnam in support of a non-Communist regime in South Vietnam. The North Vietnamese and VC troop...
متن کاملDynamic SHA
In this paper I describe the construction of Dynamic SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but I use the bits in message as parameters of function G, R and ROTR operation in the new hash function. It enabled us to achieve a novel design principle: When message is changed, the calculation will be different. It makes the system ...
متن کاملDynamic Virtual Organizations, or Not So Dynamic?
Expectations created by the early rapid developments in virtual organizations, hoping to resolve the main challenges in the area and continuous emergence of new related facilities are still far from full materialization. Being a multidisciplinary area that requires the participation of experts in ICT, theory of organizations, sociology, economy, law, etc., there is primarily a need for further ...
متن کاملAnalysis of SHA-512/224 and SHA-512/256
In 2012, NIST standardized SHA-512/224 and SHA-512/256, two truncated variants of SHA-512, in FIPS 180-4. These two hash functions are faster than SHA-224 and SHA-256 on 64-bit platforms, while maintaining the same hash size and claimed security level. So far, no third-party analysis of SHA-512/224 or SHA-512/256 has been published. In this work, we examine the collision resistance of step-redu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Royal Asiatic Society
سال: 1905
ISSN: 1356-1863,1474-0591
DOI: 10.1017/s0035869x00033487