1.

Record Nr.

UNISALENTO991001745449707536

Autore

Chateaubriand, François Auguste René : de

Titolo

Napoleone / François-René de Chateaubriand ; con un saggio di Giovanni Macchia: Il mito di Chateaubriand

Pubbl/distr/stampa

Firenze : Sansoni, [1969]

Descrizione fisica

XXII, 478 p. ; 25 cm

Altri autori (Persone)

Macchia, Giovanni

Disciplina

944

Soggetti

Napoleone <Imperatore ; 1.>

Napoleone <Imperatore ; 1.>

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Da: Memoires d'outre-tombe. Libri XIX-XXIV



2.

Record Nr.

UNINA9910955441403321

Autore

Cohn-Sherbok Dan

Titolo

Dictionary of Jewish biography / / Dan Coh-Sherbok

Pubbl/distr/stampa

London ; ; New York, : Continuum, 2005

ISBN

9786612710650

9781282710658

1282710656

9781441197849

1441197842

Edizione

[1st ed.]

Descrizione fisica

1 online resource (383 p.)

Disciplina

296.0922

920.009294

920/.009294

Soggetti

Jews

Judaism - History

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di contenuto

Contents; Maps; Advisors; Preface; Chronology; Historical Background; Glossary; List of Entries; The Dictionary

Sommario/riassunto

From Abraham to Saul Bellow, from Moses Maimonides to Woody Allen, from the Baal Shem Tov to Albert Einstein, this comprehensive dictionary of Jewish biographies provides a first point of entry into the fascinating richness of the Jewish heritage. Modelled on the highly acclaimed Dictionary of Christian Biography (Continuum 2001) and with the advice of leading Jewish scholars, the Dictionary of Jewish Biography provides a rapid reference to those Jewish men and women who have, over the last four thousand years, contributed to the life of the Jewish people and the history of the Jewish religion



3.

Record Nr.

UNISA996668472503316

Autore

Susilo Willy

Titolo

Information Security and Privacy : 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14–16, 2025, Proceedings, Part I / / edited by Willy Susilo, Josef Pieprzyk

Pubbl/distr/stampa

Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025

ISBN

981-9690-95-1

Edizione

[1st ed. 2025.]

Descrizione fisica

1 online resource (723 pages)

Collana

Lecture Notes in Computer Science, , 1611-3349 ; ; 15658

Altri autori (Persone)

PieprzykJosef

Disciplina

005.8

Soggetti

Data protection

Computer security

Cryptography

Data encryption (Computer science)

Data protection - Law and legislation

Computer networks - Security measures

Blockchains (Databases)

Data and Information Security

Principles and Models of Security

Cryptology

Privacy

Mobile and Network Security

Blockchain

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

-- Symmetric-Key Cryptography and Cryptanalysis.  -- Forgery Attacks on SipHash.  -- Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initial ization Vulnerabilities.  -- Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks.  -- Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields Applications to MiMC, CIMINION and Chaghri.  -- Improved Differential Meet-In-The-Middle Cryptanalysis on SIMON and Piccolo.  -- Strengthening Key Scheduling of AES-256 with Minimal Software Modifications.  -- Public-



Key Encryption.  -- Ideal Transformations for Public Key Encryption.  -- Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs Implicit Rejection.  -- Digital Signatures and Zero Knowledge.  -- Compressed Sigma Protocols: New Model and Aggregation Techniques.  -- Glitter: A Fully Adaptive and Tightly Secure Threshold Signature.  -- Faster VOLEitH Signatures from All-but-One Vector Commitment and Half Tree.  -- Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption.  -- Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures and Breaking the Information-Theoretic Limit.  -- Cryptographic Protocols and Blockchain.  -- FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round Complexity.  -- TEAKEX: TESLA-Authenticated Group Key Exchange.  -- SoK: A Deep Dive into Anti-Money Laundering Techniques for Blockchain Cryptocurrencies.  -- Advanced Temporal Graph Embedding For Detecting Fraudulent Transactions on Complex Blockchain Transactional Networks.  -- Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols.  -- PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among Multiple Blockchains Based on Parent-Child Blockchain.

Sommario/riassunto

This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.