01058nam0-22003731i-450-99000437246040332120110527101203.00-262-55036-9000437246FED01000437246(Aleph)000437246FED0100043724619990604d2000----km-y0itay50------baengUSy-------001yyStrong feelingsemotion, addiction, and human behaviorJon ElsterCambridge, MassachusettsThe MIT press2000XII, 252 p.20 cm<<The >>Jean Nicod lecturesAbuso di sostanzeComportamentoAnomalieAspetti socialiEmozioniPsicologia152.420it302.542616.86Elster,Jon<1940- >35657ITUNINARICAUNIMARCBK990004372460403321P.1 PG 83011672 DFMFLFBCFLFBCStrong Feelings39438UNINA03419nam 22007335 450 991048478010332120251226203200.010.1007/b137765(CKB)1000000000213090(SSID)ssj0000315725(PQKBManifestationID)11923438(PQKBTitleCode)TC0000315725(PQKBWorkID)10256216(PQKB)10490042(DE-He213)978-3-540-31840-8(MiAaPQ)EBC3067776(PPN)123095786(EXLCZ)99100000000021309020100704d2005 u| 0engurnn|008mamaatxtccrAdvanced Encryption Standard - AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers /edited by Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa1st ed. 2005.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2005.1 online resource (X, 190 p.) Security and Cryptology,2946-1863 ;3373Bibliographic Level Mode of Issuance: Monograph3-540-31840-2 3-540-26557-0 Includes bibliographical references and index.Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components -- An Algebraic Interpretation of 128 -- Hardware Implementations -- Efficient AES Implementations on ASICs and FPGAs -- Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results -- Other Topics -- Complementation-Like and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael Descriptions -- Linearity of the AES Key Schedule -- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers.Security and Cryptology,2946-1863 ;3373CryptographyData encryption (Computer science)AlgorithmsComputer scienceMathematicsDiscrete mathematicsCryptologyAlgorithmsSymbolic and Algebraic ManipulationDiscrete Mathematics in Computer ScienceCryptography.Data encryption (Computer science).Algorithms.Computer scienceMathematics.Discrete mathematics.Cryptology.Algorithms.Symbolic and Algebraic Manipulation.Discrete Mathematics in Computer Science.005.8Dobbertin Hans1753941Rijmen Vincent1970-1726354Sowa Aleksandra1230164MiAaPQMiAaPQMiAaPQBOOK9910484780103321Advanced encryption standard--AES4190015UNINA