00943cam2 22002531 450 SOBE0003658120130925091229.020130925d1943 |||||ita|0103 baitaIT<<1:>>Letteratura e culturaBenedetto CroceNapoliRicciardi1943517 p.22 cm001SOBE000365792001 Pagine sparse / Benedetto CroceCroce, Benedetto <1866-1952>AF000033570709641ITUNISOB20130925RICAUNISOBUNISOBFondo Ortolani10722|ortSOBE00036581M 102 Monografia moderna SBNMFondo Ortolani1|C-18modalità di consultazione sulla home page della Biblioteca link FondiNO10722|ortOrtolaniSdonocalvano123UNISOBUNISOB20130925084909.020130925085009.0calvano123Letteratura e cultura476982UNISOB06430nam 22008175 450 991014391810332120251116234221.03-540-45537-X10.1007/3-540-45537-X(CKB)1000000000211663(SSID)ssj0000326483(PQKBManifestationID)11268664(PQKBTitleCode)TC0000326483(PQKBWorkID)10296791(PQKB)10337897(DE-He213)978-3-540-45537-0(MiAaPQ)EBC3072171(PPN)155236954(BIP)7581901(EXLCZ)99100000000021166320121227d2001 u| 0engurnn|008mamaatxtccrSelected Areas in Cryptography 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001. Revised Papers /edited by Serge Vaudenay, Amr M. Youssef1st ed. 2001.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2001.1 online resource (XII, 364 p.) Lecture Notes in Computer Science,0302-9743 ;2259Bibliographic Level Mode of Issuance: Monograph3-540-43066-0 Includes bibliographical references at the end of each chapters and index.Cryptanalysis I -- Weaknesses in the Key Scheduling Algorithm of RC4 -- A Practical Cryptanalysis of SSC2 -- Analysis of the E 0 Encryption System -- Boolean Functions -- Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case -- Linear Codes in Constructing Resilient Functions with High Nonlinearity -- New Covering Radius of Reed-Muller Codes for t-Resilient Functions -- Generalized Zig-zag Functions and Oblivious Transfer Reductions -- Rijndael -- A Simple Algebraic Representation of Rijndael -- Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael -- Invited Talk I -- Polynomial Reconstruction Based Cryptography -- Elliptic Curves and Efficient Implementation I -- An Improved Implementation of Elliptic Curves over GF(2 n ) when Using Projective Point Arithmetic -- Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves -- Algorithms for Multi-exponentiation -- Two Topics in Hyperelliptic Cryptography -- Cryptanalysis II -- A Differential Attack on Reduced-Round SC2000 -- On the Complexity of Matsui’s Attack -- Random Walks Revisited: Extensions of Pollard’s Rho Algorithm for Computing Multiple Discrete Logarithms -- Elliptic Curves and Efficient Implementation II -- Fast Normal Basis Multiplication Using General Purpose Processors -- Fast Multiplication of Integers for Public-Key Applications -- Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form -- On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication -- Public Key Systems -- The GH Public-Key Cryptosystem -- XTR Extended to GF(p 6m ) -- Invited Talk II -- The Two Faces of Lattices in Cryptology -- Protocols and Mac -- New (Two-Track-)MAC Based on the Two Trails of RIPEMD -- Key Revocation with Interval Cover Families -- Timed-Release Cryptography.SAC 2001, the eighth annual workshop on selected areas in cryptography, was held at the Fields Institute in Toronto, Ontario, Canada. Previous SAC wo- shops were held at Queen's University in Kingston (1994, 1996, 1998, and 1999), at Carlton University in Ottawa (1995 and 1997) and at the University of Wat- loo (2000). The conference was sponsored by the center for applied cryptographic research (CACR) at the University of Waterloo, Certicom Corporation, C- munications and Information Technology Ontario (CITO), Ecole Polytechnique F´ed´erale de Lausanne, Entrust Technologies, and ZeroKnowledge. We are gra- ful to these organizations for their support of the conference. The current SAC board includes Carlisle Adams, Doug Stinson, Ed Dawson, Henk Meijer, Howard Heys, Michael Wiener, Serge Vaudenay, Sta'ord Tavares, and Tom Cusick. We would like to thank all of them for giving us the mandate to organize SAC 2001. The themes for SAC 2001 workshop were: - Design and analysis of symmetric key cryptosystems. - Primitives for private key cryptography, including block and stream ciphers, hash functions, and MACs. - E'cient implementations of cryptographic systems in public and private key cryptography. - Cryptographic solutions for web and internet security.Lecture Notes in Computer Science,0302-9743 ;2259Data encryption (Computer science)Operating systems (Computers)Computers and civilizationAlgorithmsComputer networksComputer scienceMathematicsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Computational Science and Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/M14026Data encryption (Computer science)Operating systems (Computers)Computers and civilization.Algorithms.Computer networks.Computer scienceMathematics.Cryptology.Operating Systems.Computers and Society.Algorithm Analysis and Problem Complexity.Computer Communication Networks.Computational Science and Engineering.005.82Vaudenay Sergeedthttp://id.loc.gov/vocabulary/relators/edtYoussef Amr M.edthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910143918103321Selected Areas in Cryptography2814504UNINA