01087cam0 22003133 450 TWSOB0000043520201027092700.020020513d1981 |||||ita|0103 baitaITEtruschil'arteMaja Sprenger, Gilda Bartolonifotografie di Max e Albert Hirmer1. ed. it.MilanoJaca Book1981stampa 1983173 p., tav.ill.31 cm<Le >grandi stagioni001LAEC000155582001 Le *grandi stagioniSprenger, MajaAF00011738070459479Bartoloni, GildaAF00021989070Hirmer, MaxAF00021990070Hirmer, AlbertAF00021991070ITUNISOB20201027RICAUNISOBUNISOB700|Coll|36|K68151TWSOB00000435M 102 Monografia moderna SBNM700|Coll|36|K000014SI68151ACQUISTOcatenacciUNISOBUNISOB20170214125914.020170214125931.0catenacciEtruschi1675626UNISOB03903nam 22007095 450 99646595920331620200706032741.03-642-40084-110.1007/978-3-642-40084-1(CKB)3710000000015892(SSID)ssj0000988019(PQKBManifestationID)11621027(PQKBTitleCode)TC0000988019(PQKBWorkID)10948295(PQKB)10655059(DE-He213)978-3-642-40084-1(MiAaPQ)EBC3093058(PPN)172428947(EXLCZ)99371000000001589220130814d2013 u| 0engurnn#008mamaatxtccrAdvances in Cryptology – CRYPTO 2013[electronic resource] 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II /edited by Ran Canetti, Juan A. Garay1st ed. 2013.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2013.1 online resource (XVIII, 558 p. 31 illus.)Security and Cryptology ;8043Bibliographic Level Mode of Issuance: Monograph3-642-40083-3 Implementation-Oriented Protocols -- Number-Theoretic Hardness -- MPC-Foundations -- Codes and Secret Sharing -- Signatures and Authentication -- Quantum Security -- New Primitives -- Functional Encryption.The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption.Security and Cryptology ;8043Data encryption (Computer science)Computer securityAlgorithmsComputer science—MathematicsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Discrete Mathematics in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17028Computer Science, generalhttps://scigraph.springernature.com/ontologies/product-market-codes/I00001Data encryption (Computer science).Computer security.Algorithms.Computer science—Mathematics.Computer science.Cryptology.Systems and Data Security.Algorithm Analysis and Problem Complexity.Discrete Mathematics in Computer Science.Computer Science, general.005.82Canetti Ranedthttp://id.loc.gov/vocabulary/relators/edtGaray Juan Aedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465959203316Advances in Cryptology – CRYPTO 20132830070UNISA