01391nam0 22003491i 450 UON0008877120231205102500.44288-00-83623-220020107d1990 |0itac50 baitaIT|||| |||||Filodemo in ItaliaMarcello GiganteFirenzeLe Monnier1990. 141 p.16 p. di tav. ; 19 cm001UON000871912001 Bibliotechina del Saggiatore49BIBLIOTECHEErcolanoUONC025742FIEPICUREISMOFilodemo di GadaraUONC025739FIERCOLANOBibliotecheUONC025743FIERCOLANOVilleVilla dei PapiriUONC025741FIFILODEMO DI GADARA (I sec. a.C.)UONC025738FIPAPIRIUONC025740FIVILLE ERCOLANESIVilla dei PapiriUONC025744FIITFirenzeUONL000052187Filosofia epicurea21GiganteMarcelloUONV05578336239Le MonnierUONV249266650ITSOL20250425RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00088771SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI P 5 0593 SI MC 15024 5 Filodemo in Italia477644UNIOR03512nam 22007815 450 991074117040332120260211161739.03-031-38554-310.1007/978-3-031-38554-4(CKB)27965593000041(DE-He213)978-3-031-38554-4(PPN)27225987X(MiAaPQ)EBC31051199(Au-PeEL)EBL31051199(EXLCZ)992796559300004120230727d2023 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – CRYPTO 2023 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V /edited by Helena Handschuh, Anna Lysyanskaya1st ed. 2023.Cham :Springer Nature Switzerland :Imprint: Springer,2023.1 online resource (XIX, 868 p. 126 illus., 23 illus. in color.)Lecture Notes in Computer Science,1611-3349 ;140859783031385537 Includes bibliographical references and index.The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023. The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting. .Lecture Notes in Computer Science,1611-3349 ;14085CryptographyData encryption (Computer science)Computer engineeringComputer networksComputer networksSecurity measuresCoding theoryInformation theoryCryptologyComputer Engineering and NetworksMobile and Network SecurityCoding and Information TheoryXifratge (Informàtica)thubSeguretat informàticathubCongressosthubLlibres electrònicsthubCryptography.Data encryption (Computer science)Computer engineering.Computer networks.Computer networksSecurity measures.Coding theory.Information theory.Cryptology.Computer Engineering and Networks.Mobile and Network Security.Coding and Information Theory.Xifratge (Informàtica)Seguretat informàtica005.8Handschuh HelenaLysyanskaya AnnaMiAaPQMiAaPQMiAaPQBOOK9910741170403321Advances in Cryptology – CRYPTO 20233561418UNINA