| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910892960403321 |
|
|
Titolo |
Optica pura y aplicada |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Madrid, : Instituto de Optica Daza de Valdés |
|
|
|
|
|
|
|
ISSN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Periodico |
|
|
|
|
|
Note generali |
|
"Official publication of the Sociedad Española de Optica." |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910965680103321 |
|
|
Titolo |
Materials research to meet 21st century defense needs / / Committee on Materials Research for Defense After Next, National Materials Advisory Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Washington, D.C., : National Academies Press, 2003 |
|
|
|
|
|
|
|
ISBN |
|
9786610182916 |
9780309168403 |
0309168406 |
9781280182914 |
1280182911 |
9780309505727 |
0309505720 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (329 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Materials - Research - United States |
Defense industries - Materials - United States |
Electric power systems - Materials |
Electronics - Materials |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Matter -- Preface -- Contents -- Figures and Tables -- Executive Summary -- 1 Department of Defense Materials Needs -- 2 Department of Defense Materials Needs -- 3 Structural and Multifunctional Materials -- 4 Energy and Power Materials -- 5 Electronic and Photonic Materials -- 6 Functional Organic and Hybrid Materials -- 7 Bioinspired and Bioderived Materials -- 8 Integration of Research Opportunities -- A Meeting Speakers -- B Biographical Sketches of Committee and Panel Members -- C Integration of Materials Systems and Structures Development -- D Energy and Power Materials -- E Functional and Organic Hybrid Materials -- F Bioinspired and Bioderived Materials. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
In order to achieve the revolutionary new defense capabilities offered by materials science and engineering, innovative management to reduce the risks associated with translating research results will be needed along with the R&D. While payoff is expected to be high from the promising areas of materials research, many of the benefits are likely to be evolutionary. Nevertheless, failure to invest in more speculative areas of research could lead to undesired technological surprises. Basic research in physics, chemistry, biology, and materials science will provide the seeds for potentially revolutionary technologies later in the 21st century. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910484780703321 |
|
|
Titolo |
Fast Software Encryption : 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers / / edited by Henri Gilbert, Helena Handschuh |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
|
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2005.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XI, 443 p.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 3557 |
|
|
|
|
|
|
Altri autori (Persone) |
|
GilbertHenri |
HandschuhHelena |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Coding theory |
Information theory |
Algorithms |
Computer science - Mathematics |
Discrete mathematics |
Cryptology |
Coding and Information Theory |
Discrete Mathematics in Computer Science |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"The Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops ... sponsored for the fourth year by the International Association for Cryptologic Research"--Pref. |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
New Designs -- A New MAC Construction ALRED and a Specific Instance ALPHA-MAC -- New Applications of T-Functions in Block Ciphers and Hash Functions -- The Poly1305-AES Message-Authentication Code -- Stream Ciphers I -- Narrow T-Functions -- A New Class of Single Cycle T-Functions -- F-FCSR: Design of a New Class of Stream Ciphers -- Boolean Functions -- Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity -- The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function -- Block Ciphers I -- |
|
|
|
|
|
|
|
|
|
|
|
New Combined Attacks on Block Ciphers -- Small Scale Variants of the AES -- Stream Ciphers II -- Unbiased Random Sequences from Quasigroup String Transformations -- A New Distinguisher for Clock Controlled Stream Ciphers -- Analysis of the Bit-Search Generator and Sequence Compression Techniques -- Some Attacks on the Bit-Search Generator -- Hash Functions -- SMASH – A Cryptographic Hash Function -- Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model -- Preimage and Collision Attacks on MD2 -- Modes of Operation -- How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms -- Two-Pass Authenticated Encryption Faster Than Generic Composition -- Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs -- Stream Ciphers III -- Analysis of the Non-linear Part of Mugi -- Two Attacks Against the HBB Stream Cipher -- Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers -- Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4 -- Block Ciphers II -- Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192 -- New Attacks Against Reduced-Round Versions of IDEA -- Implementations -- How toMaximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors -- A Side-Channel Analysis Resistant Description of the AES S-Box -- DPA Attacks and S-Boxes. |
|
|
|
|
|
|
Sommario/riassunto |
|
The Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored for the fourth year by the International Association for Cryptologic Research (IACR). The workshop concentratedonallaspectsoffastprimitivesforsymmetriccryptology,including thedesign,cryptanalysisandimplementationofblockandstreamciphersaswell as hash functions and message authentication codes. The ?rst FSE workshop was held in Cambridge in 1993, followed by Leuven in 1994, Cambridge in 1996, Haifain1997,Parisin1998,Romein1999,NewYorkin2000,Yokohamain2001, Leuven in 2002, Lund in 2003, and New Delhi in 2004. This year, a total of 96 submissions were received. After an extensive review by the Program Committee, 30 submissions were accepted. Two of these s- missions were merged into a single paper, yielding a total of 29 papers accepted for presentation at the workshop. Also, we were very fortunate to have in the programan invited talk byXuejia Laion "Attacks andProtection ofHash Fu- tions" and a very entertaining rump session that Bart Preneel kindly accepted to chair. These proceedings contain the revised versions of the accepted papers; the revised versions were not subsequently checked for correctness. |
|
|
|
|
|
|
|
| |