نتایج جستجو برای: mansour e

تعداد نتایج: 1017306  

Journal: :فصلنامه علمی پژوهشی تاریخ اسلام 0
مصیب چراغی کارشناس ارشد تاریخ و تمدن ملل اسلامی - دانشگاه تهران

al-mansour mohammad ibn-e abi amer was the mighty chamberlain of hisham (moayyad), the omavite caliph of andalusia (caliphate 366-399). his period is simultaneous with the beginning of the moslems' military weakness and the anarchic circumstances in the rule of moslems over andalusia, as the christians dared to transgress the borderlines of, andalusia, and plunder and kill people there. al...

2008
Yossi Azar Benjamin E. Birnbaum Anna R. Karlin Claire Mathieu C. Thach Nguyen

We provide a 3/2-approximation algorithm for an offline budgeted allocations problem with applications to sponsored search auctions. This an improvement over the e/(e−1) approximation of Andelman and Mansour [1] and the e/(e − 1) − approximation (for ≈ 0.0001) of Feige and Vondrak [2] for the more general Maximum Submodular Welfare (SMW) problem. For a special case of our problem, we improve th...

2015
Sherif Moustafa David J. Patton Mansour Al Shanawani Faisal Al Samadi Farouk Mookadam

Mayo Clinic Arizona, 13400 East Shea Boulevard, Scottsdale, AZ 85259-USA Phone: 480 301-6907 Fax: 480 301-8018 E-mail: [email protected], [email protected] Accepted Date: 28.01.2015 Available Online Date: 04.03.2015 ©Copyright 2015 by Turkish Society of Cardiology Available online at www.anatoljcardiol.com DOI:10.5152/akd.2015.5914 Sherif Moustafa1,2, David J. Patton 3, Mansour ...

Journal: :IACR Cryptology ePrint Archive 2016
Ping Zhang Honggang Hu

Cogliati et al. introduced the tweakable Even-Mansour cipher constructed from a single permutation and an almost-XORuniversal (AXU) family of hash functions with tweak and key schedule. Most of previous papers considered the security of the (iterated) tweakable Even-Mansour cipher in the single-key setting. In this paper, we focus on the security of the tweakable Even-Mansour cipher in the mult...

Journal: :IACR Transactions on Symmetric Cryptology 2020

Journal: :IACR Cryptology ePrint Archive 2012
John P. Steinberger

A t-round key alternating cipher can be viewed as an abstraction of AES. It defines a cipher E from t fixed public permutations P1, . . . , Pt : {0, 1}n → {0, 1}n and a key k = k0‖ · · · ‖kt ∈ {0, 1}n(t+1) by setting Ek(x) = kt ⊕ Pt(kt−1 ⊕ Pt−1(· · · k1 ⊕ P1(k0 ⊕ x) · · · )). The indistinguishability of Ek from a random truly random permutation by an adversary who also has oracle access to the ...

Journal: :Archives of Ophthalmology 2007

Journal: :CoRR 2017
Hector Bjoljahn Hougaard

Recent results by Alagic and Russell have given some evidence that the Even-Mansour cipher may be secure against quantum adversaries with quantum queries, if considered over other groups than (Z/2)n. This prompts the question as to whether or not other classical schemes may be generalized to arbitrary groups and whether classical results still apply to those generalized schemes. In this paper, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید