01063nam0 22002653i 450 SUN009861720140710105839.95488-02-04470-80.0020140710d1991 |0itac50 baitaIT|||| |||||Appalti pubblici e mercato unico europeoFelicetta Lauriaprefazione del prof. Umberto LeanzaTorinoUTET1991XX, 349 p.25 cm.001SUN00107562001 ˆIl ‰diritto europeo2210 TorinoUtet.TorinoSUNL000001Lauria, FelicettaSUNV000004156646UTETSUNV000072650ITSOL20181109RICASUN0098617UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI ECONOMIA03 PREST IVFc2 03 31845 UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI ECONOMIAIT-CE010631845PREST IVFc2paAppalti pubblici e mercato unico europeo192445UNICAMPANIA04711nam 22007215 450 99646628050331620200701050026.03-030-36033-410.1007/978-3-030-36033-7(CKB)4100000009939733(MiAaPQ)EBC5983799(DE-He213)978-3-030-36033-7(PPN)257357955(EXLCZ)99410000000993973320191122d2019 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierTheory of Cryptography[electronic resource] 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part II /edited by Dennis Hofheinz, Alon Rosen1st ed. 2019.Cham :Springer International Publishing :Imprint: Springer,2019.1 online resource (xiv, 578 pages) illustrationsSecurity and Cryptology ;118923-030-36032-6 Succinct Arguments in the Quantum Random Oracle Model -- Delegating Quantum Computation in the Quantum Random Oracle Model -- Tighter proofs of CCA security in the quantum random oracle model -- Attribute Based Encryption for Deterministic Finite Automata from DLIN -- CPA-to-CCA Transformation for KDM Security -- New Approaches to Traitor Tracing with Embedded Identities -- A Unified and Composable Take on Ratcheting -- Continuously Non-Malleable Secret Sharing for General Access Structures -- Interactive Non-Malleable Codes -- Stronger Lower Bounds for Online ORAM -- Adaptively Secure Garbling Schemes for Parallel Computations -- Statistical Difference Beyond the Polarizing Regime -- Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions & Hardness -- Fully Homomorphic NIZK and NIWI Proofs -- Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND -- Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles -- Compressible FHE with Applications to PIR -- Permuted Puzzles and Cryptographic Hardness -- Linear-Size Constant-Query IOPs for Delegating Computation -- On the (In)security of Kilian-Based SNARGs -- Incrementally Verifiable Computation via Incremental PCPs.The two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019. The 43 full papers presented were carefully reviewed and selected from 147 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.Security and Cryptology ;11892Data encryption (Computer science)Computer communication systemsApplication softwareData structures (Computer science)Computer securityComputersCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Data Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computing Milieuxhttps://scigraph.springernature.com/ontologies/product-market-codes/I24008Data encryption (Computer science).Computer communication systems.Application software.Data structures (Computer science).Computer security.Computers.Cryptology.Computer Communication Networks.Information Systems Applications (incl. Internet).Data Structures and Information Theory.Systems and Data Security.Computing Milieux.005.82Hofheinz Dennisedthttp://id.loc.gov/vocabulary/relators/edtRosen Alonedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466280503316Theory of Cryptography772206UNISA