نتایج جستجو برای: rebound

تعداد نتایج: 5921  

Journal: :Practica Oto-Rhino-Laryngologica 1983

Journal: :The Paleontological Society Special Publications 1996

Journal: :EPJ Web of Conferences 2010

Journal: :Acta Ophthalmologica Scandinavica 2006

2005
JOHN MARSHALL

T HE occurrence of inyocardial inifaretion and embolic incidents in patients with ischemic heart disease after cessation of anticoagulant therapy is well recognized.1-6 Likewise, the recurrence of intermittent ischemic attacks in the carotid and vertebro-basilar territory when anticoagulant treatment has been stopped has been described.7 These experiences have led to the suggestion that followi...

2009
Krystian Matusiewicz María Naya-Plasencia Ivica Nikolic Yu Sasaki Martin Schläffer

In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function Lane uses a permutation based compression function, consisting of a linear message expansion and 6 parallel lanes. In the rebound attack on Lane, we apply several new techniques to construct a collision for the full compression function of Lane-256 and Lane-512. Using a relatively sparse truncated...

2008
Yu-Qing Lou Wei-Gang Wang

We construct magnetohydrodynamic (MHD) similarity rebound shocks joining ‘quasistatic’ asymptotic solutions around the central degenerate core to explore an MHD model for the evolution of random magnetic field in supernova explosions. This provides a theoretical basis for further studying synchrotron diagnostics, MHD shock acceleration of cosmic rays, and the nature of intense magnetic field in...

2007
RHEUMATIC FEVER K. S. HOLT

Children suffering from acute rheumatic fever are usually treated with the hormone preparations, cortisone and A.C.T.H., or with salicylates. Almost always symptoms are rapidly alleviated and clinical signs of activity subside. In a number of cases discontinuance of treatment when the disease process seems to be quiescent is followed by an apparent recrudescence. This feature has become known a...

2011
Samuel J. Kaufman

Copyright is held by the author/owner(s). CHI 2011, May 7–12, 2011, Vancouver, BC, Canada. ACM 978-1-4503-0268-5/11/05. Abstract Much sustainable HCI design research hopes to achieve net reductions in greenhouse gas emissions via persuasive or more efficient technologies. This research has shown promising results. However, the proxies generally used in evaluation (e.g. less energy or water cons...

Journal: :IEICE Transactions 2016
Jiageng Chen Shoichi Hirose Hidenori Kuwakado Atsuko Miyaji

f0(h0∥h1,M) = Eh1∥M(h0) ⊕ h0 , f1(h0∥h1,M) = Eh1∥M(h0 ⊕ c) ⊕ h0 ⊕ c , where ∥ represents concatenation, E is AES-256 and c is a 16-byte nonzero constant. The proposed attack is a free-start collision attack using the rebound attack proposed by Mendel et al. The success of the proposed attack largely depends on the configuration of the constant c: the number of its non-zero bytes and their posit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید