00991nam0 22002531i 450 SUN004562220060526120000.0IT1935 1043720060526d1936 |0itac50 baitaIT|||| |||||Il condominio delle caselineamenti fondamentali dell'istituto secondo il Decreto-Legge 15 gennaio 1934, n. 56 e la Legge di conversione 10 gennaio 1935, n. 8Giuseppe Castelli AvolioNapoli : Jovene1936141 p. ; 24 cmFondo Raffaele Papa.NapoliSUNL000005Castelli Avolio, GiuseppeSUNV036610226565JoveneSUNV000014650ITSOL20191209RICASUN0045622UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA00CONS XV.Eda.39 00FP 28065 20060926 Condominio delle case585124UNICAMPANIA03563nam 22007095 450 99641821930331620200704155851.03-030-44223-310.1007/978-3-030-44223-1(CKB)4100000011223231(MiAaPQ)EBC6302156(DE-He213)978-3-030-44223-1(PPN)243760914(EXLCZ)99410000001122323120200326d2020 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierPost-Quantum Cryptography[electronic resource] 11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings /edited by Jintai Ding, Jean-Pierre Tillich1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (xiii, 560 pages) illustrationsSecurity and Cryptology ;121003-030-44222-5 Includes bibliographical references and index.Code-based cryptography -- Implementation -- Isogeny-based cryptography -- Lattice-based cryptography -- Multivariate cryptography -- Quantum algorithms -- Security proofs.This volume constitutes the proceedings of the 11th International Conference on post-quantum cryptography, PQCrypto 2020, held in Paris, France in April 2020. The 29 full papers presented in this volume were carefully reviewed and selected from 86 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.Security and Cryptology ;12100Data encryption (Computer science)Computer securityComputer networksSecurity measuresComputersComputer communication systemsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Security Serviceshttps://scigraph.springernature.com/ontologies/product-market-codes/I28030Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Mobile and Network Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28050Information Systems and Communication Servicehttps://scigraph.springernature.com/ontologies/product-market-codes/I18008Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Data encryption (Computer science).Computer security.Computer networksSecurity measures.Computers.Computer communication systems.Cryptology.Security Services.Systems and Data Security.Mobile and Network Security.Information Systems and Communication Service.Computer Communication Networks.005.82Ding Jintaiedthttp://id.loc.gov/vocabulary/relators/edtTillich Jean-Pierreedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996418219303316Post-quantum cryptography230307UNISA