نتایج جستجو برای: stream mikkes
تعداد نتایج: 57939 فیلتر نتایج به سال:
Westerns, who thought that they were the unrivaled rulers in the world after the collapse of the Soviet :::::union:::::, suddenly faced with Islamic revolution in Iran and the power of Shia, and from the beginning of the victory of the Islamic Revolution in Iran, they tried to prevent the increasing power of Shia in Iran and all over the world in different ways. The purpose of this study is rev...
In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...
Instream flow needs (IFN) assessment studies are performed to provide guidelines for stream water management and to assess the impacts of different water projects such as weirs, dams and stream diversions on the available fish habitat. The physical habitat simulation is one of the IFN assessment methods and also a powerful tool in management of river ecosystem that has not become a common metho...
ABSTRACT When a star passes close to supermassive black hole (BH), the BH’s tidal forces rip it apart into thin stream, leading disruption event (TDE). In this work, we study post-disruption phase of TDEs in general relativistic hydrodynamics (GRHD) using our GPU-accelerated code h-amr. We carry out first grid-based simulation deep-penetration TDE (? = 7) with realistic system parameters: hole-...
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.
value stream mapping because of being able to understand process bottlenecks, as one of the most common tools for analyzing, identifying and eliminating various losses in operational and support processes are used. on the other hand, inventory management, precise control entry and exit of goods, accurate and timely information about the inventories status and planning, reduce product maintenanc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید