01232cam0-22004211i-450-99000319004040332120100316113058.088-06-14363-8000319004FED01000319004(Aleph)000319004FED0100031900420030910d1998----km-y0itay50------baitaITy-------001yySe tre milioni vi sembran pochisui modi per combattere la disoccupazioneLuciano GallinoTorinoEinaudi1998XXII, 266 p.20 cmEinaudi contemporanea62DisoccupazioneAspetti sociologiciOccupazione e disoccupazioneItalia331.13794521ita331.10945Gallino,Luciano<1927- >33207ITUNINARICAUNIMARCBK990003190040403321331.137945 GAL 11385BFSSE 112.04.05-1389DDECSECOLLEZ. 1436 (62)33248FSPBCDPR 29-53416854DECBFSDECSEFSPBCDECSe tre milioni vi sembran pochi70002UNINA03419nam 22007335 450 991048478010332120251226203200.010.1007/b137765(CKB)1000000000213090(SSID)ssj0000315725(PQKBManifestationID)11923438(PQKBTitleCode)TC0000315725(PQKBWorkID)10256216(PQKB)10490042(DE-He213)978-3-540-31840-8(MiAaPQ)EBC3067776(PPN)123095786(EXLCZ)99100000000021309020100704d2005 u| 0engurnn|008mamaatxtccrAdvanced Encryption Standard - AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers /edited by Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa1st ed. 2005.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2005.1 online resource (X, 190 p.) Security and Cryptology,2946-1863 ;3373Bibliographic Level Mode of Issuance: Monograph3-540-31840-2 3-540-26557-0 Includes bibliographical references and index.Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components -- An Algebraic Interpretation of 128 -- Hardware Implementations -- Efficient AES Implementations on ASICs and FPGAs -- Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results -- Other Topics -- Complementation-Like and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael Descriptions -- Linearity of the AES Key Schedule -- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers.Security and Cryptology,2946-1863 ;3373CryptographyData encryption (Computer science)AlgorithmsComputer scienceMathematicsDiscrete mathematicsCryptologyAlgorithmsSymbolic and Algebraic ManipulationDiscrete Mathematics in Computer ScienceCryptography.Data encryption (Computer science).Algorithms.Computer scienceMathematics.Discrete mathematics.Cryptology.Algorithms.Symbolic and Algebraic Manipulation.Discrete Mathematics in Computer Science.005.8Dobbertin Hans1753941Rijmen Vincent1970-1726354Sowa Aleksandra1230164MiAaPQMiAaPQMiAaPQBOOK9910484780103321Advanced encryption standard--AES4190015UNINA