نتایج جستجو برای: the tillich zemor hash function
تعداد نتایج: 16181744 فیلتر نتایج به سال:
a novel ultra wideband microstrip bandpass filter using radial stub loaded resonator and interdigital coupled lines is presented in this paper. the radial stub loaded resonator and decagonal patch form a resonator named m to create tuneable multiple notches in the passband for suppression wlan interference. to realize sharp roll-off, two adjustable transmission nulls are located at the lower an...
during natural gas processing, water in natural gas may cause to hydrates formation in pipelines which may lead to serious damages to process equipments. given the problems raised by present of water in natural gas, glycol solvent uses to remove water.in contact of glycol with gas always an amount of btex and voc absorb along with water, which on glycol recovery process, these substances separa...
dendrimer synthesis strategies now provide virtual control of macromolecular nanostructures as a function of size and surface/interior functionality. these strategies involve the covalent assembly of hierarchical components reactive monomers , branch cells or dendron’s around atomic or molecular cores according to divergent/convergent dendrite branching principles.combinon of two or more dendri...
flow in natural river bends is a complex and turbulent phenomenon which affects the scour and sedimentations and causes an irregular bed topography on the bed. for the reason, the flow hydralics and the parameters which affect the flow to be studied and understand. in this study the effect of bed and wall roughness using the software fluent discussed in a sharp 90-degree flume bend with 40.3cm ...
This paper initially addresses the possibility that expanding human-robot interaction (HRI) – particularly HRI involving humanoid service robots – may increasingly encourage de facto assignment of some measures of moral status to such artifacts. Finding reasons to believe that emergence of a social phenomenon of this kind is plausible, it then examines such assignment from the perspective of a ...
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less than 2 bits. The underlying block cipher, based on the Advanced Encryption Standard (AES), takes a 512-bit key and operates on 512-bit blocks of plaintext. Whirlpool has been endorsed by NESSIE (New European Schemes for ...
1 Introduction "S pace" and "place" are familiar words denoting common "Sexperiences. We live in space. There is no space for an-< • / other building on the lot. The Great Plains look spacious. Place is security, space is freedom: we are attached to the one and long for the other. There is no place like home. What is home? It is the old homestead, the old neighborhood, home-town, or motherland....
In this document we present SHAvite-3, a secure and efficient hash function based on the HAIFA construction and the AES building blocks. SHAvite-3 uses a well understood set of primitives such as a Feistel block cipher which iterates a round function based on the AES round function. SHAvite-3’s compression functions are secure against cryptanalysis, while the selected mode of iteration offers m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید