04648nam 22007935 450 99646578840331620200701172514.03-540-39887-210.1007/b93938(CKB)1000000000212235(SSID)ssj0000323093(PQKBManifestationID)11937890(PQKBTitleCode)TC0000323093(PQKBWorkID)10296493(PQKB)11244611(DE-He213)978-3-540-39887-5(MiAaPQ)EBC3088692(PPN)155203339(EXLCZ)99100000000021223520121227d2003 u| 0engurnn|008mamaatxtccrFast Software Encryption[electronic resource] 10th International Workshop, FSE 2003, LUND, Sweden, February 24-26, 2003, Revised Papers /edited by Thomas Johansson1st ed. 2003.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2003.1 online resource (X, 402 p.) Lecture Notes in Computer Science,0302-9743 ;2887Bibliographic Level Mode of Issuance: Monograph3-540-20449-0 Includes bibliographical references and index.Block Cipher Cryptanalysis -- Cryptanalysis of IDEA-X/2 -- Differential-Linear Cryptanalysis of Serpent -- Rectangle Attacks on 49-Round SHACAL-1 -- Cryptanalysis of Block Ciphers Based on SHA-1 and MD5 -- Analysis of Involutional Ciphers: Khazad and Anubis -- Boolean Functions and S-Boxes -- On Plateaued Functions and Their Constructions -- Linear Redundancy in S-Boxes -- Stream Cipher Cryptanalysis -- Loosening the KNOT -- On the Resynchronization Attack -- Cryptanalysis of Sober-t32 -- MACs -- OMAC: One-Key CBC MAC -- A Concrete Security Analysis for 3GPP-MAC -- New Attacks against Standardized MACs -- Analysis of RMAC -- Side Channel Attacks -- A Generic Protection against High-Order Differential Power Analysis -- A New Class of Collision Attacks and Its Application to DES -- Block Cipher Theory -- Further Observations on the Structure of the AES Algorithm -- Optimal Key Ranking Procedures in a Statistical Cryptanalysis -- Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES -- Linear Approximations of Addition Modulo 2 n -- Block Ciphers and Systems of Quadratic Equations -- New Designs -- Turing: A Fast Stream Cipher -- Rabbit: A New High-Performance Stream Cipher -- Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive -- PARSHA-256 – A New Parallelizable Hash Function and a Multithreaded Implementation -- Modes of Operation -- Practical Symmetric On-Line Encryption -- The Security of ”One-Block-to-Many” Modes of Operation.Lecture Notes in Computer Science,0302-9743 ;2887Data encryption (Computer science)Coding theoryInformation theoryAlgorithmsComputer science—MathematicsComputer softwareCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Symbolic and Algebraic Manipulationhttps://scigraph.springernature.com/ontologies/product-market-codes/I17052Algorithmshttps://scigraph.springernature.com/ontologies/product-market-codes/M14018Mathematical Softwarehttps://scigraph.springernature.com/ontologies/product-market-codes/M14042Data encryption (Computer science).Coding theory.Information theory.Algorithms.Computer science—Mathematics.Computer software.Cryptology.Coding and Information Theory.Algorithm Analysis and Problem Complexity.Symbolic and Algebraic Manipulation.Algorithms.Mathematical Software.005.82Johansson Thomasedthttp://id.loc.gov/vocabulary/relators/edtFSE 2003MiAaPQMiAaPQMiAaPQBOOK996465788403316Fast Software Encryption772084UNISA03212oam 2200661I 450 991079245940332120230725023134.01-135-15817-71-135-15818-51-282-57140-097866125714040-203-85758-510.4324/9780203857588 (CKB)2670000000009330(EBL)484758(OCoLC)647887454(SSID)ssj0000366917(PQKBManifestationID)11252947(PQKBTitleCode)TC0000366917(PQKBWorkID)10418719(PQKB)11561333(MiAaPQ)EBC484758(Au-PeEL)EBL484758(CaPaEBR)ebr10371531(CaONFJC)MIL257140(EXLCZ)99267000000000933020180706d2010 uy 0engur|n|---|||||txtccrTransforming children's spaces children's and adults' participation in designing learning environments /Alison ClarkLondon ;New York :Routledge,2010.1 online resource (238 p.)Description based upon print version of record.0-415-45860-9 0-415-45859-5 Includes bibliographical references and index.Book Cover; Title; Copyright; Contents; Figures; Tables; Foreword; Acknowledgements; Part I Finding the tools; 1.1 Introduction; 1.2 Viewfinders; 1.3 Case studies; 1.4 The Mosaic approach; 1.5 Conclusion; Part II Gathering children's perspectives; 2.1 Introduction; 2.2 Existing spaces; 2.3 Possible spaces; 2.4 New spaces; 2.5 Temporal spaces; 2.6 Conclusion; Part III Facilitating exchange; 3.1 Introduction; 3.2 Working with practitioners and parents; 3.3 Working with architects; 3.4 Conclusion; Part IV Ways forward: Narratives of learning spaces; 4.1 Introduction4.2 Narratives in the design process4.3 Narratives in learning communities; 4.4 Narratives and narrators; 4.5 Conclusion; Epilogue; Glossary; Bibliography; IndexHow can young children play an active role in developing the design of learning environments? What methods can be used to bring together children's and practitioners' views about their environment? What insights can young children offer into good designs for these children's spaces?With the expansion of early childhood education and the move to 'extended schools', more young children will spend more time than ever before in institutions. Based on two actual building projects, this book is the first of its kind to demonstrate the possibilities of including young childrenEarly childhood educationClassroom environmentChildren and adultsEarly childhood education.Classroom environment.Children and adults.372.21711.57Clark Alison.984492MiAaPQMiAaPQMiAaPQBOOK9910792459403321Transforming children's spaces3825167UNINA