01192nam a22002771i 450099100344916970753620040601133702.0040802s1920 fr |||||||||||||||||fre b13075998-39ule_instARCHE-102860ExLBiblioteca InterfacoltàitaA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l.944.0320Tallemant des Réaux, Gedeon396711Le cardinal de Richelieu :sa famille, son favori Bois-Robert /Tallemant des Réaux ; introduction et notes par Émile Magne ; avec un portrait gravé sur bois par Achille OuvréParis :Bossard,1920220 p. ;19 cmCollection des chefs-d'oeuvre méconnusRichelieu, Armand Jean :du Plessis, cardinal deBiografiaOuvré, AchilleMagne, Émile.b1307599802-04-1405-08-04991003449169707536LE002 Fondo Giudici D 102012002000221650le002C. 1-E0.00-no 00000.i1370404705-08-04Cardinal de Richelieu291045UNISALENTOle00205-08-04ma -frefr 3105280nam 22009135 450 991048373380332120251226203353.03-540-85538-610.1007/978-3-540-85538-5(CKB)1000000000490855(SSID)ssj0000319321(PQKBManifestationID)11265733(PQKBTitleCode)TC0000319321(PQKBWorkID)10337092(PQKB)11399216(DE-He213)978-3-540-85538-5(MiAaPQ)EBC3063536(MiAaPQ)EBC6511627(Au-PeEL)EBL6511627(OCoLC)1166255366(PPN)128126256(EXLCZ)99100000000049085520100301d2008 u| 0engurnn|008mamaatxtccrPairing-Based Cryptography – Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008, Proceedings /edited by Steven Galbraith, Kenny Paterson1st ed. 2008.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2008.1 online resource (XI, 377 p.) Security and Cryptology,2946-1863 ;5209Includes index.3-540-85503-3 Includes bibliographical references and index.Invited Talks -- Pairings in Trusted Computing -- Pairing Lattices -- The Uber-Assumption Family -- Cryptography I -- Homomorphic Encryption and Signatures from Vector Decomposition -- Hidden-Vector Encryption with Groups of Prime Order -- Mathematics -- The Hidden Root Problem -- Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography -- Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group -- Constructing Pairing Friendly Curves -- Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field -- Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials -- A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties -- Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y 2?=?x 5?+?ax -- Implementation of Pairings -- Integer Variable ?–Based Ate Pairing -- Pairing Computation on Twisted Edwards Form Elliptic Curves -- Exponentiation in Pairing-Friendly Groups Using Homomorphisms -- Generators for the ?-Torsion Subgroup of Jacobians of Genus Two Curves -- Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms -- Pairings on Hyperelliptic Curves with a Real Model -- Hardware Implementation -- Faster Implementation of ? T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition -- A Comparison between Hardware Accelerators for the Modified Tate Pairing over and -- Cryptography II -- One-Round ID-Based Blind Signature Scheme without ROS Assumption -- Tracing Malicious Proxies in Proxy Re-encryption -- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities.This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008. The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.Security and Cryptology,2946-1863 ;5209CryptographyData encryption (Computer science)Computer programmingAlgorithmsComputer scienceMathematicsDiscrete mathematicsData structures (Computer science)Information theoryCryptologyProgramming TechniquesAlgorithmsDiscrete Mathematics in Computer ScienceData Structures and Information TheorySymbolic and Algebraic ManipulationCryptography.Data encryption (Computer science).Computer programming.Algorithms.Computer scienceMathematics.Discrete mathematics.Data structures (Computer science).Information theory.Cryptology.Programming Techniques.Algorithms.Discrete Mathematics in Computer Science.Data Structures and Information Theory.Symbolic and Algebraic Manipulation.005.8254.62bclPaterson Kenneth G.1969-Galbraith Steven D.International Conference on Pairing-Based CryptographyMiAaPQMiAaPQMiAaPQBOOK9910483733803321Pairing-Based Cryptography – Pairing 2008774467UNINA