02173nam 2200601Ia 450 991079028410332120170925182924.01-63670-093-41-55936-701-610.5040/9781636700939.00000007(CKB)2670000000180061(EBL)900481(OCoLC)792687705(SSID)ssj0000639781(PQKBManifestationID)12252284(PQKBTitleCode)TC0000639781(PQKBWorkID)10605424(PQKB)11758563(MiAaPQ)EBC900481(OCoLC)1285288954(OCoLC)1285288967(EXLCZ)99267000000018006120160926d2004 uy dengur|n|---|||||txtccrPlays, 1996-2000[electronic resource] /Richard MaxwellFirst editionLondon :Bloomsbury Publishing,2004.1 online resource (248 p.)"TCG collection".1-55936-228-6 Contents; Champions of Magic; Billings; Superintendents; Flight Courier Service; Burger King; Ute Mnos V. Crazy Liquors; Debate; House; A-1 Rolling Steak House; Showy Lady Slipper; Caveman; Boxing 2000"A genuinely original new talent. --Ben Brantley, New York Times." The play centers around a man and a woman, who are visited by one of the man's co-workers. The couple apparently once had a son who has gone missing; the woman wants to drive around looking for him. The production also features a love triangle, a fist fight, and onstage urination".Man-woman relationshipsDramaInterpersonal relationshipsDramaDrama.lcgftMan-woman relationshipsInterpersonal relationships812.6812/.6813.6Maxwell Richard1967-1474966UkLoBPUkLoBPUkLoBPBOOK9910790284103321Plays, 1996-20003688921UNINA04065nam 22008175 450 991098330930332120251116222222.09783031823800303182380X10.1007/978-3-031-82380-0(CKB)37627741700041(MiAaPQ)EBC31911837(Au-PeEL)EBL31911837(DE-He213)978-3-031-82380-0(OCoLC)1503844792(EXLCZ)993762774170004120250218d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierNumber-Theoretic Methods in Cryptology 4th International Conference, NuTMiC 2024, Szczecin, Poland, June 24–26, 2024, Revised Selected Papers /edited by Andrzej Dąbrowski, Josef Pieprzyk, Jacek Pomykała1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (762 pages)Lecture Notes in Computer Science,1611-3349 ;149669783031823794 3031823796 -- Invited Talks. -- On the efficient representation of isogenies. -- Elliptic-curves factoring, witnesses and oracles. -- Elliptic Curves in Cryptography. -- On chains of pairing-friendly elliptic curves. -- Faster algorithms for isogeny computations over extensions of finite fields. -- Integral solutions of some systems of polynomial equations and constructing families of pairing-friendly elliptic curves with small ρ-value. -- Number Theory. -- Algebraic Equipage for Learning with Errors in Cyclic Division Algebras. -- From Worst to Average Case to Incremental Search Bounds of the Strong Lucas Test. -- Algebraic Structures and Public-Key Cryptography. -- A New Public Key Cryptosystem Based on the Cubic Pell Curve. -- The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem. -- Compartment-based and Hierarchical Threshold Delegated Verifiable Accountable Subgroup Multi-signatures. -- Towards message recovery in NTRU Encryption with auxiliary data.This book constitutes the refereed post-conference proceedings of the 4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024, held in Szczecin, Poland, during June 24–26, 2024. The 9 full papers and 2 invited papers presented in this book were carefully reviewed and selected from 12 submissions. They were organized in topical sections as follows: invited talks; elliptic curves in cryptography; number theory; algebraic structures and public-key cryptography.Lecture Notes in Computer Science,1611-3349 ;14966CryptographyData encryption (Computer science)Computer scienceMathematicsDiscrete mathematicsAlgorithmsNumber theorySoftware engineeringComputersCryptologyDiscrete Mathematics in Computer ScienceAlgorithmsNumber TheorySoftware EngineeringComputing MilieuxCryptography.Data encryption (Computer science)Computer scienceMathematics.Discrete mathematics.Algorithms.Number theory.Software engineering.Computers.Cryptology.Discrete Mathematics in Computer Science.Algorithms.Number Theory.Software Engineering.Computing Milieux.005.824Dąbrowski Andrzej0Pieprzyk Josef486892Pomykała Jacek1784659MiAaPQMiAaPQMiAaPQBOOK9910983309303321Number-Theoretic Methods in Cryptology4316264UNINA