نتایج جستجو برای: فرمولاسیون ec 128 چریش

تعداد نتایج: 60454  

2015
Lorenzo Rovelli Karl M. Attard Lee D. Bryant Sascha Flögel Henrik Stahl J. Murray Roberts Peter Linke Ronnie N. Glud

The community respiration of 2 tidally dominated cold-water coral (CWC) sites was estimated using the non-invasive eddy correlation (EC) technique. The first site, Mingulay Reef Complex, was a rock ridge located in the Sea of Hebrides off Scotland at a depth of 128 m and the second site, Stjernsund, was a channel-like sound in Northern Norway at a depth of 220 m. Both sites were characterized b...

حسن پاک نیت رحیمه همتی

در سال 1381 طی یک آزمایش گلخانه‌ای واکنش 11 ژنوتیپ گندم نان (Triticum aestivum L.) و 9 ژنوتیپ گندم دوروم (Triticum turgidum L.) به تنش شوری به صورت آزمایش فاکتوریل در قالب طرح پایه کاملاً تصادفی بررسی شد. شوری شامل سه سطح 72/0 ( کنترل)، 1/8 و 5/11 (دسی زیمنس بر متر) بود. در مرحله دو برگی تنش اعمال شد و20 روز پس از اعمال تنش، نمونه‌برداری برای اندازه‌گیری میزان Na+ و K+ و پرولین برگ صورت گرفت. تن...

2008
Hongjun Wu

Statement 1. HC-128 supports 128-bit key and 128-bit initialization vector. Statement 2. 2 keystream bits can be generated from each key/IV pair. Statement 3. There is no hidden flaw in HC-128. Statement 4. The smallest period is expected to be much larger than 2. Statement 5. Recovering the secret key is as difficult as exhaustive key search. Statement 6. Distinguishing attack requires more th...

2016
Klas Sandell

Th e conceptual framework of ecostrategies (views and use of landscape) presented here have been used to analyse various cases of nature-based tourism and related activities such as outdoor recreation, outdoor education, nature reserves and conservation. Th e role of the ecostrategies is to illustrate the intersections, confl icts and alliances between diff erent types of nature based tourism a...

Journal: :CoRR 2006
María Naya-Plasencia

This paper presents two attacks against Achterbahn-128/80, the last version of one of the stream cipher proposals in the eSTREAM project. The attack against the 80-bit variant, Achterbahn-80, has complexity 2^{56.32}. The attack against Achterbahn-128 requires 2^{75.4} operations and 2^{61} keystream bits. These attacks are based on an improvement of the attack due to Hell and Johansson against...

Journal: :Des. Codes Cryptography 2012
Paul Stankovski Sushmita Ruj Martin Hell Thomas Johansson

HC-128 is an eSTREAM final portfolio stream cipher. Several authors have investigated its security and, in particular, distinguishing attacks have been considered. Still, no one has been able to provide a distinguisher stronger than the one presented by Wu in the original HC128 paper. In this paper we first argue that the keystream requirement in Wu’s original attack is underestimated by a fact...

2007
María Naya-Plasencia

This paper presents two key-recovery attacks against Achterbahn-128/80, the last version of one of the stream cipher proposals in the eSTREAM project. The attack against the 80-bit variant, Achterbahn80, has complexity 2. The attack against Achterbahn-128 requires 2 operations and 2 keystream bits. These attacks are based on an improvement of the attack due to Hell and Johansson against Achterb...

ژورنال: :مجله علوم کشاورزی ایران 2006
رحیمه همتی حسن پاک نیت

در سال 1381 طی یک آزمایش گلخانه ای واکنش 11 ژنوتیپ گندم نان (triticum aestivum l.) و 9 ژنوتیپ گندم دوروم (triticum turgidum l.) به تنش شوری به صورت آزمایش فاکتوریل در قالب طرح پایه کاملاً تصادفی بررسی شد. شوری شامل سه سطح 72/0 ( کنترل)، 1/8 و 5/11 (دسی زیمنس بر متر) بود. در مرحله دو برگی تنش اعمال شد و20 روز پس از اعمال تنش، نمونه برداری برای اندازه گیری میزان na+ و k+ و پرولین برگ صورت گرفت. تن...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید