01659nam2-2200457---450 99000169216020331620191114121009.0000169216USA01000169216(ALEPH)000169216USA0100016921620040524d1976----km-y0itay5003----baitaIT||||||||001yy<<I>> risultati della inchiesta agrariarelazione pubblicata negli Atti della Giunta per l'Inchiesta agrariaStefano Jaciniintroduzione di Giacomina NenciTorinoEinaudi1976XXXI, 175 p.18 cmPiccola biblioteca Einaudi290Sottotitolo in copertina: la situazione dell'agricoltura e dei contadini italiani dopo l'Unità0010005978912001Piccola biblioteca Einaudi, 290338.10945JACINI,Stefano<1826-1891>309460NENCI,GiacominaITsalbcISBD990001692160203316X.3.B. 77(Varie Coll. 11/290)18013 L.M.X.3.00153963X.3.B. 77a(Varie Coll. 11/290 a)18014 L.M.X.3.00153964XV.14.A. 1088260140 L.M.XV.14.407704BKUMAMARFVIGSIAV51020040524USA011556COPAT39020041217USA011019COPAT39020041217USA011100COPAT39020050120USA011406COPAT59020060630USA011017IANNONE9020141111USA011115Risultati della inchiesta agraria822408UNISA02628nam 2200469 450 99657425820331620240113235842.0978981998742910.1007/978-981-99-8742-9(CKB)29437161200041(MiAaPQ)EBC31028023(Au-PeEL)EBL31028023(DE-He213)978-981-99-8742-9(EXLCZ)992943716120004120240113d2023 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierAdvances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIII /edited by Jian Guo and Ron SteinfeldFirst edition.Singapore :Springer,[2023]©20231 online resource (342 pages)Lecture Notes in Computer Science Series ;Volume 144459789819987412 Includes bibliographical references and index.Quantum cryptography -- key exchange -- symmetric-key design.The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.Lecture notes in computer science ;Volume 14445.ComputersComputers.929.605Guo JianSteinfeld RonMiAaPQMiAaPQMiAaPQ996574258203316Advances in Cryptology - ASIACRYPT 20233870048UNISA01092nam0 22002891i 450 UON0041573920231205104759.79506-311-3346-120130107d1988 |0itac50 baengGB|||| 1||||Language, gender, powerJohn MiltonCatherine BelseyOxfordBlackwell1988ix, 114 p.22 cm.MILTON JOHNUONC039930FIGBOxfordUONL000029820.09Letteratura inglese e in antico inglese. Storia, descrizione, studi critici21MILTONJohnUONV114368308340BELSEYCatherineUONV116765175617BlackwellUONV257126650ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00415739SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI Angl III B 0086 SI LO 39430 5 0086 BuonoLanguage, gender, power1338729UNIOR