| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISALENTO991000095909707536 |
|
|
Autore |
Movimento Sociale Italiano-Destra nazionale |
|
|
Titolo |
Statuto : approvato dal IX Congresso Nazionale : Roma, Palazzo dei Congressi (EUR), 20 novembre 1970 / Movimento Sociale Italiano-Destra nazionale |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Partiti - Italia - Statuti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910838280803321 |
|
|
Autore |
Carlet Claude |
|
|
Titolo |
Selected Areas in Cryptography – SAC 2023 : 30th International Conference, Fredericton, Canada, August 14–18, 2023, Revised Selected Papers / / edited by Claude Carlet, Kalikinkar Mandal, Vincent Rijmen |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2024.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (457 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 14201 |
|
|
|
|
|
|
Altri autori (Persone) |
|
MandalKalikinkar |
RijmenVincent |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Computer networks |
Computer engineering |
Cryptography |
Data encryption (Computer science) |
Data and Information Security |
Computer Communication Networks |
Computer Engineering and Networks |
Cryptology |
Security Services |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Cryptanalysis of Lightweight Ciphers -- More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities -- A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH -- Improving the Rectangle Attack on GIFT-64 -- Side-Channel Attacks and Countermeasures -- Mask Compression: High-Order Masking on Memory-Constrained Devices -- Not so Difficult in the End: Breaking the Lookup Table-based Affine Masking Scheme -- Threshold Implementations with Non-Uniform Inputs -- Post-Quantum Constructions -- SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits -- A Post-Quantum Round-Optimal Oblivious PRF from Isogenies -- Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant -- Symmetric cryptography and fault attacks -- The Random Fault Model -- Probabilistic Related-Key Statistical Saturation Cryptanalysis -- Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher -- Post-Quantum Analysis and Implementations -- Bit Security Analysis of Lattice-Based KEMs under Plaintext-Checking Attacks -- Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery -- Fast and Efficient Hardware Implementation of HQC -- Homomorphic encryption -- On the Precision Loss in Approximate Homomorphic Encryption -- Secure Function Extensions to Additively Homomorphic Cryptosystems -- Public-Key Cryptography -- Generalized Implicit Factorization Problem -- Differential Cryptanalysis -- CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives -- Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications -- Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book contains revised selected papers from the 30th International Conference on Selected Areas in Cryptography, SAC 2023, held in Fredericton, New Brunswick, Canada, in August 2023. The 21full papers presented in these proceedings were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: Cryptanalysis of Lightweight Ciphers; Side-Channel Attacks and Countermeasures; Post-Quantum Constructions; Symmetric cryptography and fault attacks; Post-Quantum Analysis and Implementations; Homomorphic encryption; Public-Key Cryptography; and Differential Cryptanalysis. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9911019920403321 |
|
|
Titolo |
Plant breeding reviews . Volume 22 / / edited by Jules Janick |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, N.J., : John Wiley & Sons, c2003 |
|
|
|
|
|
|
|
ISBN |
|
9786610367351 |
9781280367359 |
1280367350 |
9780470301852 |
0470301856 |
9780470650202 |
0470650206 |
9780471463382 |
0471463388 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (457 p.) |
|
|
|
|
|
|
Collana |
|
Plant breeding reviews ; ; v. 22 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Plant breeding |
New crops - Breeding |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and indexes. |
|
|
|
|
|
|
Nota di contenuto |
|
PLANT BREEDING REVIEWS Volume 22; Contents; List of Contributors; 1. Dedication: Denton E. Alexander; Teacher, Maize Geneticist, and Breeder; 2. Estimating and Interpreting Heritability for Plant Breeding: An Update; I. The Meaning of Heritability; II. Response to Selection; III. Covariances of Relatives; IV. Variance Among Selection Units; V. Estimating Heritability as a Function of Variance Components; VI. Estimating Heritability from Parent-Offspring Regression; VII. Estimating Realized Heritability; VIII. Examples of Heritability Estimates; Appendices; Literature Cited |
3. Advanced Statistical Methods for Estimating Genetic Variances in PlantsI. Introduction; II. Genetic Model; III. Least Squares Estimation; IV. Maximum Likelihood Analysis; V. Bayesian Analysis; VI. Discussion and Conclusions; Literature Cited; 4. Oil Palm Genetic Improvement; I. Introduction; II. Germplasm Resources; III. Improvement Objectives; IV. |
|
|
|
|
|
|
|
|
|
|
|
Breeding Techniques; V. Future Prospects; Literature Cited; 5. Breeding Wheat for Resistance to Insects; I. Introduction; II. Wheat Stem Sawfly; III. Wheat Midge; IV. Hessian Fly; V. Russian Wheat Aphid; VI. Greenbug; Literature Cited |
6. Peanut Breeding and Genetic ResourcesI. Introduction; II. Evolution and Taxonomy; III. Reproductive Development; IV. Cytogenetics and Genomes; V. Genetic Resources; VI. Breeding Peanut; VII. Summary; Literature Cited; 7. History and Breeding of Table Beet in the United States; I. Introduction; II. Crop Origins; III. Horticulture of Table Beet; IV. Genetics and Breeding; V. Breeding Methods; VI. Future Directions; Literature Cited; 8. Yeast as a Molecular Genetic System for Improvement of Plant Salt Tolerance; I. Introduction; II. Yeast Complementation |
III. Orthologous Plant and Yeast GenesIV. Similarity of Cellular Salt Tolerance in Plants and Yeast; Literature Cited; Subject Index; Cumulative Subject Index; Cumulative Contributor Index |
|
|
|
|
|
|
Sommario/riassunto |
|
Plant Breeding Reviews, Volume 22 presents state-of-the-art reviews on plant genetics and the breeding of all types of crops by both traditional means and molecular methods. The emphasis of the series is on methodology, a practical understanding of crop genetics, and applications to major crops. |
|
|
|
|
|
|
|
| |