04680nam 22008295 450 99646557980331620221102205642.03-540-46513-810.1007/3-540-46513-8(CKB)1000000000211203(SSID)ssj0000326481(PQKBManifestationID)11248973(PQKBTitleCode)TC0000326481(PQKBWorkID)10296847(PQKB)10704925(DE-He213)978-3-540-46513-3(MiAaPQ)EBC3071683(PPN)155210270(EXLCZ)99100000000021120320121227d2000 u| 0engurnn#008mamaatxtccrSelected Areas in Cryptography[electronic resource] 6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings /edited by Howard Heys, Carlisle Adams1st ed. 2000.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2000.1 online resource (VIII, 241 p.)Lecture Notes in Computer Science,0302-9743 ;1758Bibliographic Level Mode of Issuance: Monograph3-540-67185-4 Includes bibliographical references at the end of each chapters and index.Cryptosystems and Pseudorandom Number Generators -- A Universal Encryption Standard -- Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator -- Elliptic Curve Pseudorandom Sequence Generators -- Security Aspects of Block Ciphers -- Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness -- Guesswork and Variation Distance as Measures of Cipher Security -- Modeling Linear Characteristics of Substitution-Permutation Networks -- Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors -- Cryptanalysis of Block Ciphers -- Security of E2 against Truncated Differential Cryptanalysis -- Key-Schedule Cryptanalysis of DEAL -- Efficient Evaluation of Security against Generalized Interpolation Attack -- Efficient Implementations of Cryptosystems -- Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders -- Improving and Extending the Lim/Lee Exponentiation Algorithm -- Software Optimization of Decorrelation Module -- Cryptography for Network Applications -- Pseudonym Systems -- Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures -- Protecting a Mobile Agent’s Route against Collusions -- Photuris: Design Criteria.Lecture Notes in Computer Science,0302-9743 ;1758Data encryption (Computer science)Coding theoryInformation theoryComputer scienceComputer communication systemsAlgorithmsManagement information systemsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Computer Science, generalhttps://scigraph.springernature.com/ontologies/product-market-codes/I00001Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science).Coding theory.Information theory.Computer science.Computer communication systems.Algorithms.Management information systems.Cryptology.Coding and Information Theory.Computer Science, general.Computer Communication Networks.Algorithm Analysis and Problem Complexity.Management of Computing and Information Systems.005.82Heys Howardedthttp://id.loc.gov/vocabulary/relators/edtAdams Carlisle1961-edthttp://id.loc.gov/vocabulary/relators/edtSAC'99MiAaPQMiAaPQMiAaPQBOOK996465579803316Selected Areas in Cryptography772069UNISA01045nam 2200337Ka 450 991069730510332120080819163601.0(CKB)5470000002387886(OCoLC)244111439(EXLCZ)99547000000238788620080819d2005 ua 0spatxtrdacontentcrdamediacrrdacarrierCáncer temprano de próstata[electronic resource] preguntas y respuestas[Bethesda, Md.] :National Cancer Institute,[2005]6 pages digital, PDF fileHojas informativas ;5.23sTitle from title screen (viewed on Aug. 19, 2008)."1/3/05."Cáncer temprano de próstata ProstateCancerProstateCancer.National Cancer Institute (U.S.)GPOGPOBOOK9910697305103321Cáncer temprano de próstata3528065UNINA