نتایج جستجو برای: mutamid 256

تعداد نتایج: 12691  

Journal: :Journal of Animal Science 2018

1990
Stephen L. Shapiro John F. Arens Garrett Jernigan Gordon Kramer Tim Collins Stuart Worley Colin D. Wilburn Pat Skubic

We report the successful development of hybrid PIN diode arrays and a series of room-temperature measurements in a high-energy pion beam at FNAL. A PMOS VLSI 256 x 256 readout array having 30 pm square pixels was indiumbump bonded to a mating PIN diode detector array. Preliminary measurements on the resulting hybrid show excellent signal-to-noise at room temperature.

Journal: :I. J. Network Security 2005
Hussein Ahmad Al Hassan Magdy Saeb Hassan Desoky Hamed

The “PYRAMIDS” Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit plaintext block, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of simple round transformations with different operations and different sequences in each round.

Journal: :IET Information Security 2015
Dongxia Bai Hongbo Yu Gaoli Wang Xiaoyun Wang

In this paper we study the security of hash functions SM3 and BLAKE-256 against boomerang attack. SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. BLAKE is one of the five finalists of the NIST SHA-3 competition submitted by J.-P. Aumasson et al. For SM3, we present boomerang...

Journal: :IACR Cryptology ePrint Archive 2009
Alex Biryukov Dmitry Khovratovich Ivica Nikolic

In this paper we construct a chosen-key distinguisher and a related-key attack on the full 256-bit key AES. We define a notion of differential q-multicollision and show that for AES-256 q-multicollisions can be constructed in time q ·2 and with negligible memory, while we prove that the same task for an ideal cipher of the same block size would require at least O(q · 2 q−1 q+1 ) time. Using sim...

Journal: :IACR Cryptology ePrint Archive 2015
Bingke Ma Bao Li Ronglin Hao Xiaoqian Li

In this paper, we present improved preimage attacks on the reduced-round GOST hash function family, which serves as the new Russian hash standard, with the aid of techniques such as the rebound attack, the Meet-in-the-Middle preimage attack and the multicollisions. Firstly, the preimage attack on 5-round GOST-256 is proposed which is the first preimage attack for GOST-256 at the hash function l...

Journal: :IACR Cryptology ePrint Archive 2012
Shay Gueron

j-lanes hashing is a tree mode that splits an input message to j slices, computes j independent digests of each slice, and outputs the hash value of their concatenation. We demonstrate the performance advantage of j-lanes hashing on SIMD architectures, by coding a 4-lanes-SHA-256 implementation and measuring its performance on the latest 3 Generation Intel Core. For message ranging 2KB to 132KB...

Journal: :Research Journal of Applied Sciences, Engineering and Technology 2014

2010
Fernando Guimarães Alessandra Soares Schanoski Priscila Bianchi Juliano Ana Neuza Viera-Matos

The present study aimed at characterizing the subcutaneous development of the Walker 256 (W256) AR tumor, a regressive variant of the rat W256 A tumor. Wistar rats were injected subcutaneously with 4x10 W256 A or W256 AR tumor cells. The development of tumors was evaluated daily by percutaneous measurements. None of the W256 A tumors (n=20) regressed, but 62% of the W256 AR tumor-bearing rats (...

Journal: :Revista dos Trabalhos de Iniciação Científica da UNICAMP 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید