نتایج جستجو برای: caesar
تعداد نتایج: 799 فیلتر نتایج به سال:
Cryptographic contests have emerged as a commonly accepted way of developing cryptographic standards. A few representative examples include the AES (Advanced Encryption Standard) competition, conducted in the period 1998-2000, the SHA-3 (Secure Hash Algorithm 3) contest, organized in the period 2008-2012, and the CAESAR Competition for Authenticated Encryption: Security, Applicability, and Robu...
Cryptoprimitives rely on thorough theoretical background, but often lack basic usability features making them prone to unintentional misuse by developers. We argue that this is true even for the state-of-the-art designs. Analyzing 52 candidates of the current CAESAR competition has shown none of them have an avalanche effect in authentication tag strong enough to work properly when partially mi...
Comprehending meaning from natural language is a primary objective of Natural Language Processing (NLP), and text comprehension is the cornerstone for achieving this objective upon which all other problems like chat bots, language translation and others can be achieved. We report a Summary-Attentive Reader we designed to better emulate the human reading process, along with a dictiontarybased so...
Six groups of neurosecretory cells were identified in the brain of the mature larva of Lucilia caesar. Five of these groups belonged to the category of medial neurosecretory cells and one to that of lateral neurosecretory cells. The groups differ in position, cell size, staining characteristics, and sequence of activity. It is apparent that only some of the groups are concerned with the process...
The study of law and religion has tended to focus on debates over “church and state.” The central question has been how the law ought to structure the relationship between religion and the government. Many of the legal conflicts over religion, however, take place in a commercial context. They are thus not simply puzzles of how God and Caesar should interact. They also present the question of ho...
Cryptography is, in the true sense of the word, a classic discipline: we find it in Mesopotamia and Caesar used it. Typically, the historical examples involve secret services and military. Information is exchanged amongst a limited community in which each member is to be trusted. Like Caesar’s chiffre these systems were entirely symmetric. Thus, the communicating parties needed to have a common...
Pigging is a significant part of a pipeline system that is required for production and operational maintenance. However, if the bend is not set properly, it is likely to cause congestion, which could cause the pipeline system to deviate from its normal operation or even lead to cracks or explosions due to overloaded stress. Due to the potential risk mentioned above, this report aims to build an...
The aim of this study was to investigate the synanthropy of Diptera: Calliphoridae, insects of forensic importance, in Calabria (southern Italy). The study lasted 2 years, from February 2010 to January 2012, and was carried out in three areas of Cosenza province representing "urban", "rural", and "wild" environments. Bottle traps baited with pork were used to catch Calliphoridae. Six species we...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید