Ближний порядок в магнитомягком сплаве alpha-FeAl

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

POINT DEFECTS IN FeAl

Point defects in annealed B2-phase FeAl samples in the range 47-53 at.% Fe were studied using 57Fe Mössbauer spectroscopy. Spectra were analyzed using local environment models according to which point defects in atomic shells close to probe atoms induce shifts in the nuclear monopole interaction. For well-annealed samples, better results were obtained assuming only the presence of FeAl antisite...

متن کامل

Linear Cryptanalysis Using Multiple Approximations and FEAL

We describe the results of experiments on the use of multiple approximations in a linear cryptanalytic attack on FEAL; we pay particular attention to FEAL-8. While these attacks on FEAL are interesting in their own right, many important and intriguing issues in the use of multiple approximations are brought to light.

متن کامل

1 Self evaluation of FEAL - NX

1 Evaluation of security 1.1. Differential cryptanalysis In extending differential cryptanalysis, Aoki , Kobayashi, and Moriai [1] greatly reduced the computational amount needed [2]. They determined that differential cryptanalysis could not be applied to FEAL with more than 32 rounds. Biham et al. [3] proposed a new cyptanalysis of Skipjack [4] using impossible differentials. Although regular ...

متن کامل

DISORDERING OF FeAl BY MECHANICAL MILLING

Point defect concentrations in milled samples of stoichiometric FeAl were obtained by Mšssbauer measurements. Mšssbauer spectra consisted of a single absorption dip with broadening attributed to unresolved hyperfine interactions. A local environment model was used to analyze spectra that allowed for defect-induced changes in monopole interactions at Fe probe atoms due to elementary defects in t...

متن کامل

Diierential Cryptanalysis of Feal and N-hash

In 1,2] we introduced the notion of diierential cryptanalysis and described its application to DESS11] and several of its variants. In this paper we show the applicability of diierential cryptanalysis to the Feal family of encryption algorithms and to the N-Hash hash function. In addition, we show how to transform diierential cryptanalytic chosen plaintext attacks into known plaintext attacks.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Физика твердого тела

سال: 2018

ISSN: 0367-3294

DOI: 10.21883/ftt.2018.09.46375.028