Ближний порядок в магнитомягком сплаве alpha-FeAl
نویسندگان
چکیده
منابع مشابه
POINT DEFECTS IN FeAl
Point defects in annealed B2-phase FeAl samples in the range 47-53 at.% Fe were studied using 57Fe Mössbauer spectroscopy. Spectra were analyzed using local environment models according to which point defects in atomic shells close to probe atoms induce shifts in the nuclear monopole interaction. For well-annealed samples, better results were obtained assuming only the presence of FeAl antisite...
متن کاملLinear Cryptanalysis Using Multiple Approximations and FEAL
We describe the results of experiments on the use of multiple approximations in a linear cryptanalytic attack on FEAL; we pay particular attention to FEAL-8. While these attacks on FEAL are interesting in their own right, many important and intriguing issues in the use of multiple approximations are brought to light.
متن کامل1 Self evaluation of FEAL - NX
1 Evaluation of security 1.1. Differential cryptanalysis In extending differential cryptanalysis, Aoki , Kobayashi, and Moriai [1] greatly reduced the computational amount needed [2]. They determined that differential cryptanalysis could not be applied to FEAL with more than 32 rounds. Biham et al. [3] proposed a new cyptanalysis of Skipjack [4] using impossible differentials. Although regular ...
متن کاملDISORDERING OF FeAl BY MECHANICAL MILLING
Point defect concentrations in milled samples of stoichiometric FeAl were obtained by Mssbauer measurements. Mssbauer spectra consisted of a single absorption dip with broadening attributed to unresolved hyperfine interactions. A local environment model was used to analyze spectra that allowed for defect-induced changes in monopole interactions at Fe probe atoms due to elementary defects in t...
متن کاملDiierential Cryptanalysis of Feal and N-hash
In 1,2] we introduced the notion of diierential cryptanalysis and described its application to DESS11] and several of its variants. In this paper we show the applicability of diierential cryptanalysis to the Feal family of encryption algorithms and to the N-Hash hash function. In addition, we show how to transform diierential cryptanalytic chosen plaintext attacks into known plaintext attacks.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Физика твердого тела
سال: 2018
ISSN: 0367-3294
DOI: 10.21883/ftt.2018.09.46375.028