04222nam 22006615 450 99646596660331620230111090305.03-662-53015-510.1007/978-3-662-53015-3(CKB)3710000000765286(DE-He213)978-3-662-53015-3(MiAaPQ)EBC5585312(PPN)194515230(EXLCZ)99371000000076528620160720d2016 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – CRYPTO 2016[electronic resource] 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III /edited by Matthew Robshaw, Jonathan Katz1st ed. 2016.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2016.1 online resource (XIII, 651 p. 77 illus.)Security and Cryptology ;98163-662-53014-7 Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric cryptography -- Symmetric cryptography -- Cryptanalytic tools -- Hardware-oriented cryptography -- Secure computation and protocols -- Obfuscation -- Quantum techniques -- Spooky encryption -- IBE, ABE, and functional encryption -- Automated tools and synthesis -- Zero knowledge -- Theory.The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.Security and Cryptology ;9816Data encryption (Computer science)Computer securityAlgorithmsManagement information systemsComputer scienceComputer science—MathematicsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Discrete Mathematics in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17028Data encryption (Computer science).Computer security.Algorithms.Management information systems.Computer science.Computer science—Mathematics.Cryptology.Systems and Data Security.Algorithm Analysis and Problem Complexity.Management of Computing and Information Systems.Discrete Mathematics in Computer Science.005.82Robshaw Matthewedthttp://id.loc.gov/vocabulary/relators/edtKatz Jonathan1974-edthttp://id.loc.gov/vocabulary/relators/edtBOOK996465966603316Advances in Cryptology – CRYPTO 20162808738UNISA03902nam 2200817 450 991079501670332120230120063927.00-8232-5414-30-8232-6111-50-8232-5413-50-8232-5412-710.1515/9780823254132(CKB)4390000000004147(StDuBDS)EDZ0000292564(OCoLC)867149739(MdBmJHUP)muse27541(DE-B1597)555481(DE-B1597)9780823254132(Au-PeEL)EBL3239859(CaPaEBR)ebr10790358(OCoLC)899045311(OCoLC)1178768983(Au-PeEL)EBL2033538(OCoLC)958513135(MiAaPQ)EBC3239859(MiAaPQ)EBC2033538(dli)HEB32067(MiU) MIU01100000000000000000021(EXLCZ)99439000000000414720130805d2014 uy 0engur|||||||||||rdacontentrdamediardacarrierAmbiguity and the absolute Nietzsche and Merleau-Ponty on the question of truth /Frank ChouraquiFirst edition.New York :Fordham University Press,2014.1 online resource (xviii, 304 pages)Perspectives in Continental PhilosophyPerspectives in continental philosophy0-8232-5411-9 Includes bibliographical references and index.Frontmatter -- Contents -- Abbreviations -- Preface -- Introduction -- 1 Nietzsche on Self-Differentiation and Genealogy -- 2 The Incorporation of Truth and the Symbiosis of Truth and Life -- 3 The Self-Becoming of the World and the Incompleteness of Being -- Transition: Vicious Circles, Virtuous Circles, and Meeting Merleau-Ponty in the Middle -- 4 The Origin of Truth -- 5 Existential Reduction and the Object of Truth -- 6 Merleau-Ponty’s “Soft” Ontology of Truth as Falsification -- Conclusion -- Notes -- Bibliography -- Index Friedrich Nietzsche and Maurice Merleau-Ponty, Chouraqui argues, are linked by how they conceive the question of truth. Although both thinkers criticize the traditional concept of truth as objectivity, they both find that rejecting it does not solve the problem. What is it in our natural existence that gave rise to the notion of truth?The answer to that question is threefold. First, Nietzsche and Merleau-Ponty both propose a genealogy of “truth” in which to exist means to make implicit truth claims. Second, both seek to recover the preobjective ground from which truth as an erroneous concept arose. Finally, this attempt at recovery leads both thinkers to ontological considerations regarding how we must conceive of a being whose structure allows for the existence of the belief in truth. In conclusion, Chouraqui suggests that both thinkers’ investigations of the question of truth lead them to conceive of being as the process of self-falsification by which indeterminate being presents itself as determinate.Perspectives in continental philosophy.Absolute, TheAmbiguityTruthDifference.Epoche.History.Incorporation.Merleau-Ponty.Nietzsche.Ontology.Phenomenological reduction.Sedimentation.Truth.Absolute, The.Ambiguity.Truth.121Chouraqui Frank790904MiAaPQMiAaPQMiAaPQBOOK9910795016703321Ambiguity and the absolute1766878UNINA