01033nam0-22003371i-450-9900031588304033210-674-68590-3000315883FED01000315883(Aleph)000315883FED0100031588320000920d1986----km-y0itay50------baengIT<<The >>Political Economy of Reform in Post-Mao Chinaedited by Elizabeth J. Perry and Christine Wong.Cambridge (Mass.)The Council on East Asian Studies at Harvard University1986.XIV, 331 p.23 cmHarvard Contemporary China Series2CinaPolitica economicaF/1.321H/1.14H/2.14Perry,Elizabeth J.Wong,ChristineITUNINARICAUNIMARCBK990003158830403321F/1.321 POL4687SESSESPolitical Economy of Reform in Post-Mao China458725UNINA03943nam 22007815 450 991050844410332120251225180440.03-030-90456-310.1007/978-3-030-90456-2(CKB)4940000000615728(MiAaPQ)EBC6799128(Au-PeEL)EBL6799128(OCoLC)1284916332(PPN)258838574(BIP)82135258(BIP)81776670(DE-He213)978-3-030-90456-2(EXLCZ)99494000000061572820211104d2021 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierTheory of Cryptography 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part III /edited by Kobbi Nissim, Brent Waters1st ed. 2021.Cham :Springer International Publishing :Imprint: Springer,2021.1 online resource (525 pages)Security and Cryptology,2946-1863 ;130443-030-90455-5 Includes bibliographical references and index.Covert Learning: How to Learn with an Untrusted Intermediary -- Random-Index PIR and Applications -- Forward Secret Encrypted RAM: Lower Bounds and Applications -- Laconic Private Set Intersection and Applications -- Amortizing Rate-1 OT and Applications to PIR and PSI -- Ring-based Identity Based Encryption { Asymptotically Shorter MPK and Tighter Security -- Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption -- Grafting Key Trees: Efficient Key Management for Overlapping Groups -- Updatable Public Key Encryption in the Standard Model -- Towards Tight Adaptive Security of Non-Interactive Key Exchange -- On the Impossibility of Purely Algebraic Signatures -- Policy-Compliant Signatures -- Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions -- Non-Malleable Vector Commitments via Local Equivocability -- Non-Malleable Time-Lock Puzzles and Applications -- Vector and Functional Commitments from Lattices.-.The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.Security and Cryptology,2946-1863 ;13044CryptographyData encryption (Computer science)Coding theoryInformation theoryApplication softwareComputer networksData protectionCryptologyCoding and Information TheoryComputer and Information Systems ApplicationsComputer Communication NetworksData and Information SecurityCryptography.Data encryption (Computer science).Coding theory.Information theory.Application software.Computer networks.Data protection.Cryptology.Coding and Information Theory.Computer and Information Systems Applications.Computer Communication Networks.Data and Information Security.005.824Waters BrentNissim KobbiMiAaPQMiAaPQMiAaPQBOOK9910508444103321Theory of Cryptography3000229UNINA