02300nam 2200433zu 450 991098468060332120250114201421.097814780603071478060301(CKB)37190724000041(EXLCZ)993719072400004120250114|2025uuuu || |engur|||||||||||The fine art of persuasion corporate advertising design, nation, and empire in modern Japan /Gennifer WeisenfeldDuke University Press20259781478031314 147803131X Promoting the profession -- Visible language + the art of letterforms -- Health + beauty -- Food + beverage -- Light, labor + leisure -- Nation + empire -- Transwar design."In The Fine Art of Persuasion, author Gennifer Weisenfeld offers a survey of Japanese advertising graphics from the turn of the twentieth century to the 1964 Tokyo Olympics. Examining Japan as a node in the international design network, Weisenfeld demonstrates the profound impact consumer capitalism and mass culture had on the development of modern Japanese art. Weisenfeld also analyzes the ways in which the militarist regime of Imperial Japan used these same mechanisms of mass culture to commodify and market national politics, especially in the context of the early part of the 20th century before the Asia-Pacific War (WWII)"--Provided by publisher.Commercial artJapanHistory20th centuryGraphic artsJapanHistory20th centuryDesignJapanHistory20th centuryAdvertisingJapanHistory20th centuryART / History / GeneralbisacshSOCIAL SCIENCE / Ethnic Studies / Asian StudiesbisacshCommercial artHistoryGraphic artsHistoryDesignHistoryAdvertisingHistoryART / History / GeneralSOCIAL SCIENCE / Ethnic Studies / Asian Studies744.0952/0904ART015000SOC008020bisacshWeisenfeld Gennifer S(Gennifer Stacy),1966-1794387BOOK9910984680603321The fine art of persuasion4335004UNINA04867nam 22007575 450 991073945100332120251226202528.03-642-35999-X10.1007/978-3-642-35999-6(CKB)3400000000102975(SSID)ssj0000880066(PQKBManifestationID)11542505(PQKBTitleCode)TC0000880066(PQKBWorkID)10873213(PQKB)11159878(DE-He213)978-3-642-35999-6(MiAaPQ)EBC3068795(PPN)168329603(EXLCZ)99340000000010297520130107d2013 u| 0engurnn|008mamaatxtccrSelected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers /edited by Lars R. Knudsen, Huapeng Wu1st ed. 2013.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2013.1 online resource (XIV, 407 p. 61 illus.) Security and Cryptology,2946-1863 ;7707Bibliographic Level Mode of Issuance: Monograph3-642-35998-1 Includes bibliographical references and index.Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery -- Cryptanalysis of the Xiao – Lai White-Box AES Implementation -- Digital Signatures A Practical Leakage-Resilient Signature Scheme in the Generic Group Model -- Forward Secure Signatures on Smart Cards -- The Stafford Tavares Lecture Extracts from the SHA-3 Competition -- Stream Ciphers Cryptanalysis of the “Kindle” Cipher -- Cryptographically Strong de Bruijn Sequences with Large Periods -- Cryptanalysis of the Loiss Stream Cipher -- Implementations -- Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three -- Efficient Implementation of Bilinear Pairings on ARM Processors -- Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over F21223 -- Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers -- Block Cipher Cryptanalysis -- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach -- Improved Cryptanalysis of the Block Cipher KASUMI -- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers -- Attacking (EC)DSA Given Only an Implicit Hint -- Lattice Reduction for Modular Knapsack -- Hash Functions -- The Boomerang Attacks on the Round-Reduced Skein-512 -- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function -- Provable Security of BLAKE with Non-ideal Compression Function -- Block Cipher Constructions TWINE: A Lightweight Block Cipher for Multiple Platforms -- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions -- Miscellaneous -- Private Stream Search at Almost the Same Communication Cost as a Regular Search -- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks.This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Selected Areas in Cryptography, SAC 2012, held in Windsor, Ontario, Canada, in August 2012. The 24 papers presented were carefully reviewed and selected from 87 submissions. They are organized in topical sections named: cryptanalysis, digital signatures, stream ciphers, implementations, block cipher cryptanalysis, lattices, hashfunctions, blockcipher constructions, and miscellaneous.Security and Cryptology,2946-1863 ;7707CryptographyData encryption (Computer science)Data protectionAlgorithmsComputer networksApplication softwareCryptologyData and Information SecurityAlgorithmsComputer Communication NetworksComputer and Information Systems ApplicationsCryptography.Data encryption (Computer science).Data protection.Algorithms.Computer networks.Application software.Cryptology.Data and Information Security.Algorithms.Computer Communication Networks.Computer and Information Systems Applications.005.82MiAaPQMiAaPQMiAaPQBOOK9910739451003321Selected Areas in Cryptography2814504UNINA