نتایج جستجو برای: key block method

تعداد نتایج: 2235566  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده علوم انسانی 1392

this study investigated how group formation method, namely student-selected vs. teacher-assigned, influences the results of the community model of teaching creative writing; i.e., group dynamics and group outcome (the quality of performance). the study adopted an experimental comparison group and microgenetic research design to observe the change process over a relatively short period of time. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان همدان - دانشکده ادبیات و علوم انسانی 1390

abstract this study is an attempt to determine the effect of nano- technology education on science lesson for fifth grade in primary school in the city of kermanshah. this research is experimental and is conducted in the from of pre-test and post- test for the control group. an achievement test was administered to determine the rate of learning in the students. the research is an applied one. ...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده روانشناسی و علوم تربیتی 1391

the purpose of this study was the relationship between problem – solvi ability with fdi cognitive style of students.the research method was correlation method. for data analysis pearson test was used. statistical society in this research was all the students of alligoodarz city in 1391-92 year.to sampling of statiscal population was used sampling multi-stage random the size of sample selected 2...

Slope stability analysis of jointed rocks has been the focus of many studies. The presence of joints and discontinuities in rock environments intensifies instability along with the development of block movements. Many analytical and numerical methods have been proposed and applied to analyze the stability of jointed rock slopes. Computation complexity, incapability of presenting a reliable safe...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...

Journal: :مجله دانشگاه علوم پزشکی زنجان 0
مهدی قائمی m ghaemi مجید انصاری m ansari سعید محمدی s mohammadi

background & objective: outpatient surgery can be performed by general or spinal anesthesia. spinal anesthetic drugs have side effects. many anesthesiologists choose general anesthesia, because of its relative predictability and to avoid undesirable side effects associated with spinal anesthesia. for example lidocaine is frequently associated with transient neuroligic symptoms (tns). bupivacain...

Journal: :IACR Cryptology ePrint Archive 2007
Nicolas Courtois

The cipher CTC (Courtois Toy Cipher) described in [4] has been designed to demonstrate that it is possible to break on a PC a block cipher with good diffusion and very small number of known (or chosen) plaintexts. It has however never been designed to withstand all known attacks on block ciphers and Dunkelman and Keller have shown [13] that a few bits of the key can be recovered by Linear Crypt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید