نتایج جستجو برای: zorro

تعداد نتایج: 116  

Journal: :Journal of economic entomology 2008
Thomas E Eickhoff Tiffany M Heng-Moss Frederick P Baxendale John E Foster

The western chinch bug, Blissus occiduus Barber, has been documented as one of the most serious pests of buffalograss, Buchloë dactyloides (Nuttall) Engelmann, and zoysiagrass, Zoysia japonica Steudel, grown for turf in midwestern states. Resistance to the western chinch bug has been identified in both buffalograsses and zoysiagrasses. Choice and no-choice studies were conducted to determine th...

Journal: :Revista Educación 2021

La investigación tuvo como objetivo describir las interferencias lingüísticas en la obra literaria El Zorro de arriba y el zorro abajo José María Arguedas, una obras más emblemáticas del autor, problema fue: ¿Cuáles son Arguedas Altamirano? es tipo Sustantiva-descriptiva, con diseño descriptivo simple. método que utilizó fue durante proceso se las, fichas hemerográficas análisis lingüístico par...

An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it has a 16-byte state, it uses only 4 S-Boxes per round. This weak nonlinearity was widely criticized, insofar as it has been directly exploited in all the attacks on Zorro reported by now, including the weak key, reduced round, and even full round attacks. In this paper, using some properties discovered by Wa...

Journal: :Caligrama: Revista de Estudos Românicos 2020

2008
Jacob Thamsborg

The concept of a configuration graph associated to a primitive, aperiodic substitution is introduced in [1] as a convenient graphical representation of the infinite indeterminism of the shift space of the substitution. The main result of [1] is an algorithm to calculate this graph from the substitution, in this paper we turn the tables and produce substitutions from graphs. We do this using the...

2014
Hadi Soleimany

This paper aims to enhance the application of slide attack which is one of the most well-known cryptanalysis methods using selfsimilarity of a block cipher. The typical countermeasure against slide cryptanalysis is to use round-dependent constants. We present a new probabilistic technique and show how to overcome round-dependent constants in a slide attack against a block cipher based on the ge...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید