01188nas 2200385 450 99000350932020331620110304142439.0000350932USA01000350932(ALEPH)000350932USA0100035093220110304a----9999km-y-itay50------baitaITacazz--||||<<La>> riforma medicagiornale settimanale di medicina chirurgia e scienze affinidiretto da L. Condorelli, L. D'Amato, L. TorracaNapoliRiforma medica1 v.22 cmDescrizione basata su: estratto n. 32-39-47-52SettimanaleMedicinaPeriodiciBNCF610.5CONDORELLI,L.D'AMATO,L.TORRACA,L.ITsalbcISBD990003509320203316MEDFDC MISC 4/87-901950;1956;MEDFDC MISC 2/62-631964;1968;SEMANCUSO9020110304USA011334MANCUSO9020110304USA011335MANCUSO9020110304USA011424Riforma medica788992UNISA03824nam 22008895 450 991048469920332120251226195313.03-319-31517-X10.1007/978-3-319-31517-1(CKB)3710000000653136(SSID)ssj0001666049(PQKBManifestationID)16455315(PQKBTitleCode)TC0001666049(PQKBWorkID)15000466(PQKB)11031169(DE-He213)978-3-319-31517-1(MiAaPQ)EBC6298817(MiAaPQ)EBC5577366(Au-PeEL)EBL5577366(OCoLC)946502279(PPN)193443872(EXLCZ)99371000000065313620160407d2016 u| 0engurnn|008mamaatxtccrProgress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings /edited by David Pointcheval, Abderrahmane Nitaj, Tajjeeddine Rachidi1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (X, 369 p. 49 illus.) Security and Cryptology,2946-1863 ;9646Bibliographic Level Mode of Issuance: Monograph3-319-31516-1 Lattices -- Elliptic curves -- Secret-key cryptanalysis -- Efficient implementations -- Secure protocols.-Public-key cryptography.This book constitutes the thoroughly refereed proceedings of the 8th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2016, held in Fes, Morooco, in April 2016. The 18 papers presented in this book were carefully reviewed and selected from 65 submissions. The aim of Africacrypt 2016 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography. Topics of interest are such as lattices; elliptic curves; secret-key cryptanalysis; efficient implementations; secure protocols; and public-key cryptography.Security and Cryptology,2946-1863 ;9646Data protectionCryptographyData encryption (Computer science)Coding theoryInformation theoryNumerical analysisComputer scienceElectronic data processingManagementData and Information SecurityCryptologyCoding and Information TheoryNumerical AnalysisTheory of ComputationIT OperationsData protection.Cryptography.Data encryption (Computer science).Coding theory.Information theory.Numerical analysis.Computer science.Electronic data processingManagement.Data and Information Security.Cryptology.Coding and Information Theory.Numerical Analysis.Theory of Computation.IT Operations.004Pointcheval Davidedthttp://id.loc.gov/vocabulary/relators/edtNitaj Abderrahmaneedthttp://id.loc.gov/vocabulary/relators/edtRachidi Tajjeeddineedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484699203321Progress in Cryptology – AFRICACRYPT 20162813568UNINA