نتایج جستجو برای: rebound
تعداد نتایج: 5921 فیلتر نتایج به سال:
T HE occurrence of inyocardial inifaretion and embolic incidents in patients with ischemic heart disease after cessation of anticoagulant therapy is well recognized.1-6 Likewise, the recurrence of intermittent ischemic attacks in the carotid and vertebro-basilar territory when anticoagulant treatment has been stopped has been described.7 These experiences have led to the suggestion that followi...
In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function Lane uses a permutation based compression function, consisting of a linear message expansion and 6 parallel lanes. In the rebound attack on Lane, we apply several new techniques to construct a collision for the full compression function of Lane-256 and Lane-512. Using a relatively sparse truncated...
We construct magnetohydrodynamic (MHD) similarity rebound shocks joining ‘quasistatic’ asymptotic solutions around the central degenerate core to explore an MHD model for the evolution of random magnetic field in supernova explosions. This provides a theoretical basis for further studying synchrotron diagnostics, MHD shock acceleration of cosmic rays, and the nature of intense magnetic field in...
Children suffering from acute rheumatic fever are usually treated with the hormone preparations, cortisone and A.C.T.H., or with salicylates. Almost always symptoms are rapidly alleviated and clinical signs of activity subside. In a number of cases discontinuance of treatment when the disease process seems to be quiescent is followed by an apparent recrudescence. This feature has become known a...
Copyright is held by the author/owner(s). CHI 2011, May 7–12, 2011, Vancouver, BC, Canada. ACM 978-1-4503-0268-5/11/05. Abstract Much sustainable HCI design research hopes to achieve net reductions in greenhouse gas emissions via persuasive or more efficient technologies. This research has shown promising results. However, the proxies generally used in evaluation (e.g. less energy or water cons...
f0(h0∥h1,M) = Eh1∥M(h0) ⊕ h0 , f1(h0∥h1,M) = Eh1∥M(h0 ⊕ c) ⊕ h0 ⊕ c , where ∥ represents concatenation, E is AES-256 and c is a 16-byte nonzero constant. The proposed attack is a free-start collision attack using the rebound attack proposed by Mendel et al. The success of the proposed attack largely depends on the configuration of the constant c: the number of its non-zero bytes and their posit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید