نتایج جستجو برای: known among lebaneses

تعداد نتایج: 1789891  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1389

abstract the present research is prepared to study the culture of tea consuming among iranian. the case group which was statistically used for this study was people of lahijan , about four hundred wich were chosen according to their age , gender , education and occupation , randomly selected to fill the questionnaire . then the data collected through the questionnaire was analyzed according ...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1391

the ability of composing a coherent and extended piece of writing in second language is considered as a fundamental factor to convey information and ideas of learners through the academic issues. although learners may achieve a perfect academic writing skill through assigning the l2 tasks in content based instruction, but demonstration of their abilities may be related to their ability in l1 es...

Journal: :CoRR 2011
Nick Inassaridze Manuel Ladra Tamaz Kandelaki

We give interpretations of some known key agreement protocols in the framework of category theory and in this way we give a method of constructing of many new key agreement protocols.

Journal: :CoRR 2011
Yu Zhang Chengqing Li Qin Li Dan Zhang Shi Shu

Recently, a chaotic image encryption algorithm based on perceptron model was proposed. The present paper analyzes security of the algorithm and finds that the equivalent secret key can be reconstructed with only one pair of known-plaintext/ciphertext, which is supported by both mathematical proof and experiment results. In addition, some other security defects are also reported.

Journal: :IACR Cryptology ePrint Archive 2001
Marina Pudovkina

Stream ciphers are often used in applications where high speed and low delay are a requirement. The ISAAC keystream generator is a fast software-oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known plaintext attack where only a small segment of plaintext is assumed to be known.

Journal: :IACR Cryptology ePrint Archive 2013
Jing Lv Dongdai Lin

The stream cipher RC4 was designed by R.Rivest in 1987, and it is a widely deployed cipher. Many predictive states of RC4 for some special indices i were presented in the last 20 years. In this paper, we present several long term predictive states. These states increase the probability to guess part of the internal state in a known plaintext attack and present a cryptanalytic weakness of RC4. T...

Journal: :Inf. Process. Lett. 2010
Orr Dunkelman Nathan Keller

The Advanced Encryption Standard (AES) is the most widely deployed block cipher. It follows the modern iterated block cipher approach, iterating a simple round function multiple times. The last round of AES slightly differs from the others, as a linear mixing operation (called MixColumns) is omitted from it. Following a statement of the designers, it is widely believed that the omission of the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید