نتایج جستجو برای: the tillich zemor hash function

تعداد نتایج: 16181744  

پایان نامه :دانشگاه آزاد اسلامی واحد کرمانشاه - دانشکده مهندسی برق و الکترونیک 1393

a novel ultra wideband microstrip bandpass filter using radial stub loaded resonator and interdigital coupled lines is presented in this paper. the radial stub loaded resonator and decagonal patch form a resonator named m to create tuneable multiple notches in the passband for suppression wlan interference. to realize sharp roll-off, two adjustable transmission nulls are located at the lower an...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

during natural gas processing, water in natural gas may cause to hydrates formation in pipelines which may lead to serious damages to process equipments. given the problems raised by present of water in natural gas, glycol solvent uses to remove water.in contact of glycol with gas always an amount of btex and voc absorb along with water, which on glycol recovery process, these substances separa...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور مرکز - دانشکده شیمی 1391

dendrimer synthesis strategies now provide virtual control of macromolecular nanostructures as a function of size and surface/interior functionality. these strategies involve the covalent assembly of hierarchical components reactive monomers , branch cells or dendron’s around atomic or molecular cores according to divergent/convergent dendrite branching principles.combinon of two or more dendri...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی 1392

flow in natural river bends is a complex and turbulent phenomenon which affects the scour and sedimentations and causes an irregular bed topography on the bed. for the reason, the flow hydralics and the parameters which affect the flow to be studied and understand. in this study the effect of bed and wall roughness using the software fluent discussed in a sharp 90-degree flume bend with 40.3cm ...

2007
Theodore Metzler

This paper initially addresses the possibility that expanding human-robot interaction (HRI) – particularly HRI involving humanoid service robots – may increasingly encourage de facto assignment of some measures of moral status to such artifacts. Finding reasons to believe that emergence of a social phenomenon of this kind is plausible, it then examines such assignment from the perspective of a ...

Journal: :Cryptologia 2006
William Stallings

In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less than 2 bits. The underlying block cipher, based on the Advanced Encryption Standard (AES), takes a 512-bit key and operates on 512-bit blocks of plaintext. Whirlpool has been endorsed by NESSIE (New European Schemes for ...

2013
Yi-Fu Tuan

1 Introduction "S pace" and "place" are familiar words denoting common "Sexperiences. We live in space. There is no space for an-< • / other building on the lot. The Great Plains look spacious. Place is security, space is freedom: we are attached to the one and long for the other. There is no place like home. What is home? It is the old homestead, the old neighborhood, home-town, or motherland....

2008
Eli Biham Orr Dunkelman

In this document we present SHAvite-3, a secure and efficient hash function based on the HAIFA construction and the AES building blocks. SHAvite-3 uses a well understood set of primitives such as a Feistel block cipher which iterates a round function based on the AES round function. SHAvite-3’s compression functions are secure against cryptanalysis, while the selected mode of iteration offers m...

Journal: :Journal of Engineering and Applied Sciences 2019

Journal: :DEStech Transactions on Engineering and Technology Research 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید