نتایج جستجو برای: caesar
تعداد نتایج: 799 فیلتر نتایج به سال:
A draft call for the CAESAR authenticated-encryption competition adopts an interface that is not aligned with existing definitions in the literature. It is the purpose of this brief note to formalize what we believe to be the intended definitions.
~us writes Sayyid Qutb, the founding father • ~f the Islamic Brotherhood in Egypt, in a polemic essay! which levels at Christians the common Islamic accusation that they suffer from a 'hideous schizophrenia' encapsulated in the exhortation to 'render to Caesar the things that are Caesar's and to God the things that are God's.' Since its inception, Islam has presented unprecedented challenges to...
RATIONALE Despite 4 decades of intense effort and substantial financial investment, the cardioprotection field has failed to deliver a single drug that effectively reduces myocardial infarct size in patients. A major reason is insufficient rigor and reproducibility in preclinical studies. OBJECTIVE To develop a multicenter, randomized, controlled, clinical trial-like infrastructure to conduct...
Black gospelwoman and pastor Shirley Ann Caesar Williams, better known as “Shirley Caesar” to her listeners over the last several decades, entered a professionalization phase of ministry career from 1958 1966 when she joined performed with The Caravans. Being Caravan member brought it possibility being in compromising situations while on road, which would expose Caesar—a woman—to sexual (and ra...
حوضهها و سیستمهای رودخانهای در پاسخ به تغییرات عوامل بیرونی و درونی تغییر مییابد. از این رو تکنیکهای متعددی جهت شبیهسازی این تغییرات و تحول سیستم رودخانه مطرح شده است. اتومای سلولی یکی از جدیدترین مدلهای سلولی رودخانهای میباشد که چشمانداز حوضه را با شبکهای از سلولها تعریف کرده و توسعه این چشمانداز توسط عمل متقابل بین سلولها (مانند جریان آب و رسوب) با کاربرد قوانینی بر اساس سادهسا...
An Authenticated encryption scheme is a scheme which provides privacy and integrity by using a secret key. In 2013, CAESAR (the “Competition for Authenticated Encryption: Security, Applicability, and Robustness”) was co-founded by NIST and Dan Bernstein with the aim of finding authenticated encryption schemes that offer advantages over AES-GCM and are suitable for widespread adoption. The first...
The description of the spatial characteristics of twoand three-dimensional objects, in the framework of MPEG-7, is considered. The shape of an object is one of its fundamental properties, and this paper describes an e$cient way to represent the coarse shape, scale and composition properties of an object. This representation is invariant to resolution, translation and rotation, and may be used f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید