01754nam 2200589 a 450 991045613560332120200520144314.0978-6-15505-387-0978-615-5053-87-09786155053870615-5053-87-11-281-26875-597866112687560-585-49960-8(CKB)111087028333702(OCoLC)123470247(CaPaEBR)ebrary10133544(SSID)ssj0000136470(PQKBManifestationID)11139184(PQKBTitleCode)TC0000136470(PQKBWorkID)10083748(PQKB)10734789(MiAaPQ)EBC3137213(MdBmJHUP)muse25949(Au-PeEL)EBL3137213(CaPaEBR)ebr10133544(OCoLC)939263205(EXLCZ)9911108702833370220031007d2004 uy 0engurcn|||||||||txtccrThe demise of Yugoslavia[electronic resource] a political memoir /by Stipe MesićBudapest ;New York Central European University Press20041 online resource (430 p.) Bibliographic Level Mode of Issuance: Monograph963-9241-71-7 Yugoslav War, 1991-1995CroatiaCroatiaPolitics and government1990-Electronic books.Yugoslav War, 1991-1995949.702/4Mesić Stipe1934-1051389MiAaPQMiAaPQMiAaPQBOOK9910456135603321The demise of Yugoslavia2481868UNINA04117nam 22008175 450 99646644480331620200704061554.03-319-70700-010.1007/978-3-319-70700-6(CKB)4340000000223553(DE-He213)978-3-319-70700-6(MiAaPQ)EBC6283484(MiAaPQ)EBC5594783(Au-PeEL)EBL5594783(OCoLC)1013928138(PPN)221251669(EXLCZ)99434000000022355320171117d2017 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – ASIACRYPT 2017[electronic resource] 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III /edited by Tsuyoshi Takagi, Thomas Peyrin1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XVIII, 473 p. 57 illus.) Security and Cryptology ;10626Includes index.3-319-70699-3 Cryptographic Protocols -- Foundations -- Zero-Knowledge Proofs -- Symmetric Key Designs.The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017. The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.Security and Cryptology ;10626Data encryption (Computer science)Computer securityCoding theoryInformation theoryManagement information systemsComputer scienceComputersComputer science—MathematicsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Theory of Computationhttps://scigraph.springernature.com/ontologies/product-market-codes/I16005Mathematics of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I17001Data encryption (Computer science).Computer security.Coding theory.Information theory.Management information systems.Computer science.Computers.Computer science—Mathematics.Cryptology.Systems and Data Security.Coding and Information Theory.Management of Computing and Information Systems.Theory of Computation.Mathematics of Computing.005.82Takagi Tsuyoshiedthttp://id.loc.gov/vocabulary/relators/edtPeyrin Thomasedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466444803316Advances in Cryptology – ASIACRYPT 20172808718UNISA