Permutation

Results: 881



#Item
651Discrete mathematics / Combinatorics on words / Character encoding / String / Computational complexity theory / NP / Permutation / Pancake sorting / Ternary search tree / Mathematics / Combinatorics / Formal languages

Prefix Reversals on Binary and Ternary Strings Cor Hurkens1 , Leo van Iersel1 , Judith Keijsper1 , Steven Kelk2 , Leen Stougie1,2 , and John Tromp2 1 Technische Universiteit Eindhoven (TU/e), Den Dolech 2,

Add to Reading List

Source URL: homepages.cwi.nl

Language: English - Date: 2008-01-17 14:40:10
652Photosynthesis / Plant cells / Asclepiadoideae / Stoma / Caralluma / Crassulacean acid metabolism / Chlorophyll fluorescence / Guard cell / Transpiration / Biology / Plant physiology / Botany

Crassulacean Acid Metabolism Permutation and Survival of Caralluma Species (Apocynaceae) in Arid Habitats

Add to Reading List

Source URL: web.uni-plovdiv.bg

Language: English - Date: 2012-05-18 05:44:04
653Permutation / Support / Measure theory / Abstract algebra / Combinatorics

Pants Decompositions of Surfaces Allen Hatcher In studying the geometry and topology of surfaces it often happens that one considers a collection of disjointly embedded circles in a compact orientable surface Σ which de

Add to Reading List

Source URL: www.math.cornell.edu

Language: English - Date: 1999-06-12 13:36:06
654

§11 同種粒子 11.1 置換の基礎的事項 • 置換 Pˆ (permutation) —– 席 j にあったものを席 pj に移す。   1

Add to Reading List

Source URL: phys.sci.hokudai.ac.jp

Language: Japanese - Date: 2008-10-14 18:21:33
    655One-way function / Permutation / Preimage attack / Applied mathematics / Mathematics / Combinatorics / Cryptography

    Hash Functions Based on Three Permutations: A Generic Security Analysis Bart Mennink and Bart Preneel Dept. Electrical Engineering, ESAT/COSIC, KU Leuven, and IBBT, Belgium [removed], bart.preneel@esa

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English
    656Proof theory / Circle / Quadrilateral / Trigonometric functions / Permutation pattern / Prime-counting function / Mathematics / Geometry / Mathematical fallacy

    54th Mathematical Olympiad in Poland Problems of the first round, September – December[removed]Determine all pairs of positive integers x, y satisfying the equation (x + y)2 − 2(xy)2 = [removed]A real number a1 is give

    Add to Reading List

    Source URL: www.mimuw.edu.pl

    Language: English - Date: 2003-04-24 08:31:49
    657Data types / Primitive types / C++ / Keccak / NIST hash function competition / Pointer / C programming language / C++ classes / C / Computing / Computer programming / Software engineering

    A so ware interface for K In this note, we propose an interface to K at the level of the sponge and duplex constructions, and inside K at the level of the K - f permutation. The purpose is twofold.

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-07-03 11:17:08
    658Hashing / Search algorithms / NIST hash function competition / Keccak / Hash function / Crypt / VEST / GOST / Tabulation hashing / Cryptography / Cryptographic hash functions / Error detection and correction

    Note on K parameters and usage The K sponge function family is characterized by three parameters: the bitrate r, the capacity c (where r + c is the width of the underlying permutation) and

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:42
    659Combinatorics / Bible code / Numerology / Torah / WRR / Random permutation / Robert Aumann / Mathematics / Permutations / Music

    SOLVING THE BIBLE CODE PUZZLE BRENDAN MCKAY, DROR BAR-NATAN, MAYA BAR-HILLEL, AND GIL KALAI Abstract. A paper of Witztum, Rips and Rosenberg in this journal in 1994 made the extraordinary claim that the Hebrew text of th

    Add to Reading List

    Source URL: www.math.toronto.edu

    Language: English - Date: 1999-09-05 17:16:04
    660ICE / Block cipher / S-box / VEST / Substitution-permutation network / Differential cryptanalysis / Cryptography / Data Encryption Standard / Cryptographic hash functions

    PAIRS AND TRIPLETS OF DES S-BOXES Donald Davies Sean Murphy Information Security Group, Royal Holloway and Bedford New College,

    Add to Reading List

    Source URL: www.isg.rhul.ac.uk

    Language: English - Date: 2005-11-30 04:39:40
    UPDATE