02989nam2 2200421 i 450 VAN007740520221206094134.391feiVSu- vtam *-*- caca (3) 1586 (R)VAN 20100614d1586 |0itac50 balatGRCDE||||||||| |||||||||[1][16], 792, 169, [3] pTesto su due colonne: segnatura: *⁸ A-3V⁶ 2A-2V⁴ 2X⁶001VAN00774042001 ˆDionysiou Alikarnaseos ta ‰Euriskomena, Istorika te kai retorika, syggrammata. Dionysii Halicarnassei scripta quae exstant, omnia, et historica, et rhetorica. E veterum librorum auctoritate, doctorumque hominum animaduersionibus, quamplurimis in locis emendata & interpolata; cum Latina versione ad Graeci exemplaris fidem denuo sic collata & conformata, vt plerisque in locis sit plane noua. Addita fragmenta quaedam, cum Glareani Chronologia, & duplici appendice. Additae etiam Notae, quibus de vtriusque textus vel emendatione vel explanatione agitur. Adiecti praeterea duo locuetissimi rerum & verborum Indices; alter, Graecus; alter, Latinus. Opera & studio Friderici Sylburgii Veterensis210 Francofurdiapud heredes Andreae Wecheli1586215 2 volumi300 Prima parte del titolo in greco traslitterato; titolo dal frontespizio del volume 1. - Greco, romano, corsivo; iniziali e fregi xilografici[1]FrankfurtVANL001054Dionysius HalicarnassensisVANV056208714438GlareanusHenricus1488-1563VANV065802SylburgFriedrich1536-1596VANV065818Wechel, Andreas ErbenVANV065805Dionigi di AlicarnassoDionysius HalicarnassensisVANV081332Dionysius HalicarnasseusDionysius HalicarnassensisVANV081333Denys d'HalicarnasseDionysius HalicarnassensisVANV065798Loriti, HeinrichGlareanus, Henricus <1488-1563>VANV065803Glarean, HeinrichGlareanus, Henricus <1488-1563>VANV065804Sylburgius, FedericusSylburg, Friedrich <1536-1596>VANV065819Sylburgius, FridericusSylburg, Friedrich <1536-1596>VANV065820Typis Wechelianis <1581-1630>Wechel, Andreas ErbenVANV065806Wechel <1581-1830>Wechel, Andreas ErbenVANV065807ITSOL20221209RICAhttps://books.google.it/books?id=3KmCAWgcOO0C&printsec=frontcover&hl=it#v=onepage&q&f=falseVolume digitalizzato privo del fascicolo *⁸./sebina/repository/catalogazione/documenti/BL.500.35.1_ok.pdfBL.500.35.1_ok.pdfBIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZAIT-CE0105VAN00VAN0077405BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA00ANTICO BL.500.35 1 00BL 5843 20100909 Biblioteca Lauria.11715583UNISOB04299nam 2200649 450 99646551990331620220428223249.01-280-94372-697866109437223-540-72540-710.1007/978-3-540-72540-4(CKB)1000000000490218(EBL)3061526(SSID)ssj0000288099(PQKBManifestationID)11204351(PQKBTitleCode)TC0000288099(PQKBWorkID)10373025(PQKB)11452287(DE-He213)978-3-540-72540-4(MiAaPQ)EBC3061526(MiAaPQ)EBC6700627(Au-PeEL)EBL6700627(PPN)123162394(EXLCZ)99100000000049021820220428d2007 uy 0engur|n|---|||||txtccrAdvances in cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, proceedings /edited by Moni Naor1st ed. 2007.Berlin, Germany ;New York, New York :Springer,[2007]©20071 online resource (602 p.)Security and Cryptology ;4515Includes index.3-540-72539-3 Includes bibliographical references and index.Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities -- Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don’t Exist -- The Collision Intractability of MDC-2 in the Ideal-Cipher Model -- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries -- Revisiting the Efficiency of Malicious Two-Party Computation -- Efficient Two-Party Secure Computation on Committed Inputs -- Universally Composable Multi-party Computation Using Tamper-Proof Hardware -- Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model -- Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability -- Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility -- Zero Knowledge and Soundness Are Symmetric -- Mesh Signatures -- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks -- Batch Verification of Short Signatures -- Cryptanalysis of SFLASH with Slightly Modified Parameters -- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy -- Secure Computation from Random Error Correcting Codes -- Round-Efficient Secure Computation in Point-to-Point Networks -- Atomic Secure Multi-party Multiplication with Low Communication -- Cryptanalysis of the Sidelnikov Cryptosystem -- Toward a Rigorous Variation of Coppersmith’s Algorithm on Three Variables -- An L (1/3?+??) Algorithm for the Discrete Logarithm Problem for Low Degree Curves -- General Ad Hoc Encryption from Exponent Inversion IBE -- Non-interactive Proofs for Integer Multiplication -- Ate Pairing on Hyperelliptic Curves -- Ideal Multipartite Secret Sharing Schemes -- Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit -- Divisible E-Cash Systems Can Be Truly Anonymous -- A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security -- Range Extension for Weak PRFs; The Good, the Bad, and the Ugly -- Feistel Networks Made Public, and Applications -- Oblivious-Transfer Amplification -- Simulatable Adaptive Oblivious Transfer.Security and Cryptology ;4515CryptographyCongressesComputersAccess controlCongressesData transmission systemsSecurity measuresCongressesCryptographyComputersAccess controlData transmission systemsSecurity measures005.8Naor Moni1961-International Association for Cryptologic Research.MiAaPQMiAaPQMiAaPQBOOK996465519903316Advances in Cryptology - EUROCRYPT 2007772034UNISA