Results 111 to 120 of about 51,661 (237)
The Boomerang Effect of Suppression of Emotional Expression: Relationship Power, Affectivity and Adolescent and Youth Male-To-Female Dating Violence [PDF]
Silvia Ubillos Landa +4 more
openalex +1 more source
Boomerang technique for female genital aesthetic surgery [PDF]
Introduction: Hypertrophy of the labia minora combined with a redundant clitoral hood is a common complaint among women seeking aesthetic genital cosmetic surgery for functional, psychological, and aesthetic complaints. The objective of this study was to
Tatiana Turini +1 more
doaj +1 more source
New CMB constraints on the cosmic matter budget: trouble for nucleosynthesis?
We compute the joint constraints on ten cosmological parameters from the latest CMB measurements. The lack of a significant second acoustic peak in the latest Boomerang and Maxima data favors models with more baryons than Big Bang nucleosynthesis ...
Tegmark, Max, Zaldarriaga, Matias
core +1 more source
In coupled ring-satellite systems, satellites exchange angular momentum with both the primary through tides and the ring through Lindblad torques, and may exchange material with the ring through accretion and tidal disruption.
Andrew J. Hesselbrock, David A. Minton
doaj +1 more source
Resumen: La presente investigación indaga en la influencia de algunos escritores latinoamericanos entre los intelectuales españoles a lo largo del siglo XX.
Carmen Alemany Bay
doaj +1 more source
Analysis of types of questions asked by sixth grade children concerning social studies content. [PDF]
Thesis (M.A.)--Boston ...
Myers, Robert Joseph
core +1 more source
Truncated Boomerang Attacks and Application to AES-based Ciphers
Augustin Bariant, G. Leurent
semanticscholar +1 more source
Automatic boomerang attacks search on Rijndael
Boomerang attacks were introduced in 1999 by Wagner (The boomerang attack. In: Knudsen LR, editor. FSE’99. vol. 1636 of LNCS. Heidelberg: Springer; 1999. p.
Rouquette Loïc +2 more
doaj +1 more source
Related-key impossible boomerang cryptanalysis on LBlock
The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.
Min XIE, Yan-li MU
doaj +2 more sources

