نتایج جستجو برای: prince ehtejab

تعداد نتایج: 4608  

2009
Y. X. Wang J. F. Griffith W. L. Kwok C. S. Leung H. T. Ma D. K. Yeung A. T. Ahuja P. C. Leung Hong Kong

Y. X. Wang , J. F. Griffith, W. L. Kwok, C. S. Leung, H. T. Ma, D. K. Yeung, A. T. Ahuja, and P. C. Leung Department of Diagnostic Radiology and Organ Imaging, The Chinese University of Hong Kong, Prince of Wales Hospital, Shatin, NT, Hong Kong, Jockey Club Centre for Osteoporosis Care and Control, The Chinese University of Hong Kong, Prince of Wales Hospital, Department of Electronic and Infor...

Aliyeh Kord Zafaranlu Kambuziya Eftekhar Sadat Hashemi

In this paper we analyzed some of the phonological rules of Russian loanword adaptation in Persian, on the view of Optimal Theory (OT) (Prince and Smolensky, 1993, 2003). It is the first study of phonological process on Russian loanwords adaptation in Persian. By gathering about 50 current Russian loanwords, we selected some of them to analyze. We found out that vowel insertion, vowel prothesis...

Journal: :Journal of the American Mosquito Control Association 1992
J O Washburn D L Woodward A E Colwell J R Anderson

The efficiency of the duplex cone and Fay-Prince traps for monitoring adult male and female Aedes sierrensis was evaluated at 3 field sites in California. The numbers of females captured by both types of traps were significantly correlated with human sentinel collections. The Fay-Prince trap captured more Ae. sierrensis females than the duplex cone trap and was a better tool for estimating fema...

Journal: :CoRR 2018
Risky Armansyah Dian Pratiwi

Nowadays Games become an entertainment alternative for various circles, industry and game development business is also a profitable industry. In Indonesia the amount of game consumption is very high, especially the console game type RPG (Role Playing Game). The task of this research is developing game software using Unity3d to create an Android-based RPG game app. The story is packed with RPG g...

Journal: :IACR Cryptology ePrint Archive 2014
Ravikumar Selvam Dillibabu Shanmugam Suganya Annadurai

Over a decade, cryptographers are more attentive on designing lightweight ciphers in focus to compact cryptographic devices. More often, the security of these algorithms are defined in terms of its resistance to mathematical cryptanalysis methods. Nevertheless, designers are well aware of implementation attacks and concentrating on new design strategies to improve the defence quality against im...

Journal: :پژوهش ادبیات معاصر جهان 0

one important aspect of the little prince by antoinede saint-exupery 1900 -1944) is a phenomenological approach on the story thatneeds to be analyzed for a clear understanding of the text. according to manysearches in valid english and persian data bases it seems that this aspect of thelittle prince hasn’t been of interest to domestic and foreign researchers.this descriptive- analytical study d...

Journal: :Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery 2011
Richard M Rosenfeld

ENGLISH TOY SPANIELS (BLENHEIM & PRINCE CHARLES) JUDGE: Mr. Thomas O'Neal ENGLISH TOY SPANIELS (BLENHEIM & PRINCE CHARLES). Sweepstakes, 6 to 9 Months Dogs. 1 41 AMERGLO CLARION CALL. TR 24719501. 04-04-04 By Ch Igor Vilflorian Of Yoshimi Ch Amerglo Abelia Of Thornwood. Owner: Mrs John Patterson., Palmdale, CA 935512214. Breeder: Owner. (Sheri Martinez, Agent). ENGLISH TOY SPANIELS (BLENHEIM & ...

Journal: :IACR Cryptology ePrint Archive 2012
Farzaneh Abed Eik List Stefan Lucks

PRINCE is a modern involutive lightweight cipher which was proposed by Rechberger et al. in 2012. PRINCE uses 64-bit core cipher, PRINCEcore, which holds the major encryption logic and is wrapped by two key additions. Thus, the security of the cipher is mainly depending on the security properties of the core. In this paper, we present an independent-biclique attack on the full version and also ...

Journal: :IACR Cryptology ePrint Archive 2013
Philipp Jovanovic Martin Kreuzer Ilia Polian

This paper introduces Multi-Stage Fault Attacks, which allow Differential Fault Analysis of block ciphers having independent subkeys. Besides the specification of an algorithm implementing the technique, we show concrete applications to LED-128 and PRINCE and demonstrate that in both cases approximately 3 to 4 fault-injections are enough to reconstruct the full 128-bit key. Keywords-cryptanalys...

Journal: :IACR Cryptology ePrint Archive 2016
Shahram Rasoolzadeh Håvard Raddum

In this paper we focus on the PRINCE block cipher reduced to 6 rounds, with two known plaintext/ciphertext pairs. We develop two attacks on 6-round PRINCE based on accelerated exhaustive search, one with negligible memory usage and one having moderate memory requirements. The time complexities for the two attacks are 2 and 2, respectively. The memory consumption of the second attack is less tha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید