نتایج جستجو برای: caesar

تعداد نتایج: 799  

2005
William Butler Yeats

Our first tendency is to look outside Europe when searching for ancient rhetorics that do not follow the Greco-Roman tradition. After all, much of European culture was strongly influenced by Roman culture, especially following the conquests of Julius Caesar in 58-51 BCE and subsequent conquests that brought most of Europe under Roman control. Rome’s civic practices, including variations of Grec...

Journal: :IACR Cryptology ePrint Archive 2016
Ekawat Homsirikamol William Diehl Ahmed Ferozpuri Farnoud Farahmand Panasayya Yalla Jens-Peter Kaps Kris Gaj

In this paper, we define the CAESAR hardware Application Programming Interface (API) for authenticated ciphers. In particular, our API is intended to meet the requirements of all algorithms submitted to the CAESAR competition. The major parts of our specification include: minimum compliance criteria, interface, communication protocol, and timing characteristics supported by the core. All of the...

Journal: :Chemistry Central Journal 2010

2013
Alexander Ferrein Tim Niemüller Stefan Schiffer Gerhard Lakemeyer

In this paper we outline the development of CAESAR, a domestic service robot with which we participated in the robot competition RoboCup@Home for many years. We sketch the system components, in particular the parts relevant to the high-level reasoning system, that make CAESAR an intelligent robot. We report on the development and discuss the lessons we learnt over the years designing, developin...

2014
Paul M. Pietroski

ing away from the specific content of CAESAR yields the monadic concept ARRIVED(X).Starting with SAW(CAESAR, BRUTUS) and abstracting away from the contents of both saturatingconcepts yields the dyadic concept SAW(X, Y). I assume that concepts have contents, which neednot be linguistic meanings. I follow the usual conventions of using small capitals to indicateconcepts, with vari...

Journal: :IACR Cryptology ePrint Archive 2015
Jean-Philippe Aumasson Philipp Jovanovic Samuel Neves

This paper presents NORX8 and NORX16, the 8-bit and 16-bit versions of the authenticated cipher NORX, one of the CAESAR candidates. These new versions are better suited for low-end systems—such as “internet of things” devices—than the original 32-bit and 64-bit versions: whereas 32-bit NORX requires 64 bytes of RAM or cache memory, NORX8 and NORX16 require just 16 and 32 bytes, respectively. Bo...

Journal: :The Classical Review 1890

Journal: :Hispanic American Historical Review 1965

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید