03450nam 22006614a 450 991045299320332120200520144314.01-281-91715-X978661191715990-474-1915-410.1163/ej.9789004155879.i-252(CKB)1000000000549462(EBL)467932(OCoLC)646789716(SSID)ssj0000119696(PQKBManifestationID)11142867(PQKBTitleCode)TC0000119696(PQKBWorkID)10074740(PQKB)10483708(MiAaPQ)EBC467932(OCoLC)74526262(nllekb)BRILL9789047419150(PPN)170426262(Au-PeEL)EBL467932(CaPaEBR)ebr10270946(CaONFJC)MIL191715(EXLCZ)99100000000054946220061207d2007 uy 0engur|n|---|||||txtccrChance and determinism in Avicenna and Averroes[electronic resource] /by Catarina BeloLeiden ;Boston Brill20071 online resource (264 p.)Islamic philosophy, theology and science,0169-8729 ;v. 69Revision of the author's thesis (doctoral)--Oxford, 2004.90-04-15587-2 Includes bibliographical references (p. [233]-239) and indexes.Preliminary Material /C. Belo --Introduction /C. Belo --Chapter One. Avicenna On Chance /C. Belo --Chapter Two. Avicenna On Matter /C. Belo --Chapter Three. Avicenna On Celestial Causation And Providence /C. Belo --Chapter Four. Averroes On Chance /C. Belo --Chapter Five. Averroes On Matter And Necessity /C. Belo --Chapter Six. Averroes On Celestial Causation And Providence /C. Belo --Conclusion /C. Belo --Bibliography /C. Belo --General Index /C. Belo --Index Of Main Passages /C. Belo.This book examines the question whether medieval Muslim philosophers Avicenna (Arabic Ibn Sīnā 980-1037) and Averroes (Arabic Ibn Rushd 1126-1198) are determinists. With a focus on physics and metaphysics it studies their views on chance events in nature, as well as matter, in particular prime matter, and divine providence. In addition it sets their positions against the historical/philosophical background that influenced their response, the Greco-Arabic philosophical tradition - Aristotelian and Neoplatonic - on the one hand, and the tradition of Islamic theology ( kalām ) on the other. In comparing their philosophical systems, it lays emphasis on the way in which Avicenna and Averroes use these traditions to offer an original answer to the problem of determinism.Islamic philosophy, theology, and science ;v. 69.Free will and determinismReligious aspectsIslamIslamic philosophyElectronic books.Free will and determinismReligious aspectsIslam.Islamic philosophy.123.092/208.10bclBelo Catarina C. M. de M(Catarina Carriço Marques de Moura),1974-995943MiAaPQMiAaPQMiAaPQBOOK9910452993203321Chance and determinism in Avicenna and Averroes2282178UNINA05503nam 22007695 450 991051057970332120251225181943.03-030-92068-210.1007/978-3-030-92068-5(CKB)5100000000149406(MiAaPQ)EBC6819764(Au-PeEL)EBL6819764(PPN)258838892(BIP)82384553(BIP)82050717(DE-He213)978-3-030-92068-5(EXLCZ)99510000000014940620211130d2021 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – ASIACRYPT 2021 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part IV /edited by Mehdi Tibouchi, Huaxiong Wang1st ed. 2021.Cham :Springer International Publishing :Imprint: Springer,2021.1 online resource (784 pages)Security and Cryptology,2946-1863 ;130933-030-92067-4 Includes bibliographical references and index.NTRU Fatigue: How Stretched is Overstretched? -- Faster Dual Lattice Attacks for Solving LWE -- with applications to CRYSTALS -- Lattice sieving via quantum random walks -- A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs -- Gladius: LWR based efficient hybrid public key encryption with distributed decryption -- Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy -- A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV -- Shorter Lattice-Based Group Signatures via ``Almost Free'' Encryption and Other Optimizations -- Séta: Supersingular Encryption from Torsion Attacks -- SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH -- Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups -- Public Key Encryption with Flexible Pattern Matching -- Bounded Collusion ABE for TMs from IBE -- Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting -- (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin -- Boosting the Security of Blind Signature Schemes -- PrORAM: Fast O(log n) Authenticated Shares ZK ORAM -- Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures -- Promise $\Sigma$-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups -- The One-More Discrete Logarithm Assumption in the Generic Group Model -- Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge -- Chain Reductions for Multi-Signatures and the HBMS Scheme -- Symmetric Key Exchange with Full Forward Security and Robust Synchronization -- Security Analysis of CPace -- Modular Design of Role-Symmetric Authenticated Key Exchange Protocols.The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.Security and Cryptology,2946-1863 ;13093CryptographyData encryption (Computer science)Computer engineeringComputer networksCoding theoryInformation theoryData protectionCryptologyComputer Engineering and NetworksCoding and Information TheoryComputer Communication NetworksData and Information SecurityCryptography.Data encryption (Computer science)Computer engineering.Computer networks.Coding theory.Information theory.Data protection.Cryptology.Computer Engineering and Networks.Coding and Information Theory.Computer Communication Networks.Data and Information Security.001.5436Tibouchi MehdiWang HuaxiongMiAaPQMiAaPQMiAaPQBOOK9910510579703321Advances in cryptology - ASIACRYPT 20212906579UNINA