نتایج جستجو برای: strong s domain

تعداد نتایج: 1413765  

Journal: :Nuclear Physics B - Proceedings Supplements 2005

Journal: :EURO Journal on Computational Optimization 2014

Journal: :Annals of Pure and Applied Logic 2008

A Najafizadeh R Ebrahimi,

Processing map for hot working of Ti-IF steel has been developed in the temperature range of 750 to 1100 °C and strain rate of 0.01 to 100 s-1. This map in the austenite region exhibits a single domain with a peak efficiency of 45% occurring at 1025 °C and strain rate of 0.02 s-1. The domain extends over the temperature range of 1000 to 1100 °C and strain rate range of 0.01 to 1 s-1. The true s...

Journal: :International Journal of Modern Physics A 2001

Journal: :international journal of iron & steel society of iran 2004
r ebrahimi a najafizadeh

processing map for hot working of ti-if steel has been developed in the temperature range of 750 to 1100 °cand strain rate of 0.01 to 100 s-1. this map in the austenite region exhibits a single domain with a peak efficiencyof 45% occurring at 1025 °c and strain rate of 0.02 s-1. the domain extends over the temperature range of 1000to 1100 °c and strain rate range of 0.01 to 1 s-1. the true stre...

Journal: :Journal of Knot Theory and Its Ramifications 2008

Journal: :CoRR 2016
Musheer Ahmad Hamed D. Al-Sharari

Substitution boxes with thorough cryptographic strengths are essential for the development of strong encryption systems. They are the only portions capable of inducing nonlinearity in symmetric encryption systems. Bijective substitution boxes having both high nonlinearities and high algebraic complexities are the most desirable to thwart linear, differential and algebraic attacks. In this paper...

Journal: :Inf. Process. Lett. 1994
Jennifer Seberry Xian-Mo Zhang Yuliang Zheng

This paper presents a simple yet e ective method for transforming Boolean functions that do not satisfy the strict avalanche criterion SAC into ones that satisfy the criterion Such a method has a wide range of applications in designing cryptographically strong functions including substitution boxes S boxes employed by common key block encryption algorithms The rst author was supported in part b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید