04013nam 2200673 450 99646561630331620211008191825.01-282-33190-697866123319093-642-03317-210.1007/978-3-642-03317-9(CKB)1000000000761241(EBL)450562(OCoLC)437347231(SSID)ssj0000296177(PQKBManifestationID)11238329(PQKBTitleCode)TC0000296177(PQKBWorkID)10326689(PQKB)11776600(DE-He213)978-3-642-03317-9(MiAaPQ)EBC450562(MiAaPQ)EBC6511680(Au-PeEL)EBL6511680(PPN)136310907(EXLCZ)99100000000076124120211008d2009 uy 0engur|n|---|||||txtccrFast software encryption 16th international workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009 ; revised selected papers /Orr Dunkelman (ed.)1st ed. 2009.Berlin, Germany ;New York, New York :Springer,[2009]©20091 online resource (425 p.)Security and Cryptology ;5665Includes index.3-642-03316-4 Includes bibliographical references and index.Stream Ciphers -- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium -- An Efficient State Recovery Attack on X-FCSR-256 -- Key Collisions of the RC4 Stream Cipher -- Invited Talk -- Intel’s New AES Instructions for Enhanced Performance and Security -- Theory of Hash Functions -- Blockcipher-Based Hashing Revisited -- On the Security of Tandem-DM -- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 -- Hash Functions Analysis I -- Cryptanalysis of RadioGatún -- Preimage Attacks on Reduced Tiger and SHA-2 -- Cryptanalysis of the LAKE Hash Family -- Block Ciphers Analysis -- New Cryptanalysis of Block Ciphers with Low Algebraic Degree -- Algebraic Techniques in Differential Cryptanalysis -- Multidimensional Extension of Matsui’s Algorithm 2 -- Hash Functions Analysis II -- Meet-in-the-Middle Attacks on SHA-3 Candidates -- Practical Collisions for EnRUPT -- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl -- Block Ciphers -- Revisiting the IDEA Philosophy -- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2) -- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher -- Theory of Symmetric Key -- Enhanced Target Collision Resistant Hash Functions Revisited -- Message Authentication Codes -- MAC Reforgeability -- New Distinguishing Attack on MAC Using Secret-Prefix Method -- Fast and Secure CBC-Type MAC Algorithms -- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption.This book constitutes the thoroughly refereed proceedings of the 16th International Workshop on Fast Software Encryption, FSE 2009 held in Leuven, Belgium in February 2009. The 24 revised full papers were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on stream ciphers, theory of hash functions, block ciphers analysis, block ciphers, theory of symmetric key, and message authentication codes.Security and Cryptology ;5665Data encryption (Computer science)CongressesComputersAccess controlCongressesData encryption (Computer science)ComputersAccess control005.82DAT 465fstubSS 4800rvkDunkelman OrrFSE 2009MiAaPQMiAaPQMiAaPQBOOK996465616303316Fast Software Encryption772084UNISA02912nam 2200565 450 991080836390332120230125194500.01-60650-986-1(CKB)3710000000648965(EBC)4512174(OCoLC)949865103(CaBNvSL)swl00406498(MiAaPQ)EBC4512174(Au-PeEL)EBL4512174(CaPaEBR)ebr11206163(CaONFJC)MIL917014(OCoLC)950463712(EXLCZ)99371000000064896520190122d2016 uy 0engurcnu||||||||rdacontentrdamediardacarrierAnimal physiology /A. Malcolm Campbell and Christopher J. ParadiseNew York, NY :Momentum Press,[2016]©20161 online resource (72 pages) illustrationsBiology collection1-60650-985-3 Includes bibliographical references and index.1. Mammals have cellular clock mechanism -- Ethical, legal, social implications: sleep is connected to daily rhythms -- 2. Maternal immune system tolerates non-self fetus -- 3. Maintaining body weight and fat levels -- Ethical, legal, social implications: challenges of the obesity epidemic -- 4. Animals age and die at different rates -- Ethical, legal, social implications: end of life issues -- Conclusions -- Glossary -- Index.This book examines four examples of animal physiology that illustrate emergent properties in whole organisms. The first example shows how mammals coordinate the activity of all their cells using a daily rhythm. The second case explains an apparent contradiction that happens every time a woman gets pregnant and delivers a healthy baby--how the immune system tolerates a foreign tissue such as the fetus. The next case study in this book shows how bodies regulate the amount of fat using a complex interaction of proteins that function as a lipostat, a self-regulating fat maintenance system. Finally, the book provides an understanding of why some species live long lives while others die after very short lives, and under what conditions each situation is favored. What is evolutionarily adaptive about death? These four case studies provide sufficient evidence to understand how animals regulate many of their own metabolic functions.Biology collection.Physiology, ComparativeLaboratory manualsPhysiology, Comparative612.0078Campbell A. Malcolm1595299Paradise Christopher J.MiAaPQMiAaPQMiAaPQBOOK9910808363903321Animal physiology3916173UNINA