Examination of block ciphers Rijndael, Safer K-64 and a slide attack on Spectr-H64.

Kavut, Selçuk


Investigation of the Linear Stability Problem of Electrified Jets, Inviscid Analysis
Özgen, Serkan; Uzol, Oğuz (2012-09-01)
The instability characteristics of a liquid jet discharging from a nozzle into a stagnant gas are investigated using the linear stability theory. Starting with the equations of motion for incompressible, inviscid, axisymmetric flows in cylindrical coordinates, a dispersion relation is obtained, where the amplification factor of the disturbance is related to its wave number. The parameters of the problem are the laminar velocity profile shape parameter, surface tension, fluid densities, and electrical charge...
Analysis of the Alternative Conceptions of Preservice Teachers and High School Students Concerning Atomic Size
Eymur, Guluzar; Cetin, Pinar; Geban, Ömer (American Chemical Society (ACS), 2013-08-01)
The purpose of this study was to analyze and compare the alternative conceptions of high school students and preservice teachers on the concept of atomic size. The Atomic Size Diagnostic Instrument was developed; it is composed of eight, two-tier multiple-choice items. The results of the study showed that as a whole 56.2% of preservice teachers and 59.4% of high school students correctly answered six or more questions out of eight. New alternative conceptions about atomic size, which could be grouped under ...
Investigation of drilling degrees of freedom in the finite element method
Sönmez, Hülya; Utku, Mehmet; Wasti, S. Tanvir; Department of Civil Engineering (1997)
Investigation of decodability properties of variable-length codes under constraints
Dinçer, Nergis; Gönenç, Güney; Bilgen, Semih; Department of Electrical and Electronics Engineering (1998)
Investigation of the star tracker algorithms and kalman filter integration
Sargın Güçlü, Selva; Yavrucuk, İlkay; Department of Aerospace Engineering (2019)
This research outlines the investigation of star tracker algorithms and Kalman Filter implementation of star tracker aided INS. In the first chapter, the usage areas of the star tracker sensor was investigated. The purposes to use this sensor were also included. Furthermore, the sensor architecture and algorithms were examined. In the second chapter, the three main steps of the star tracker algorithms were investigated. First of all, literature survey about centroiding algorithms was done and two of them we...
Citation Formats
S. Kavut, “Examination of block ciphers Rijndael, Safer K-64 and a slide attack on Spectr-H64.,” Middle East Technical University, 2002.