LEADER 00748nam0-22002771i-450- 001 990005565740403321 005 19990530 010 $a90-04-06531-8 035 $a000556574 035 $aFED01000556574 035 $a(Aleph)000556574FED01 035 $a000556574 100 $a19990530d1981----km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aAncient Jewish Law$eThree Inaugural Lectures$fby David Daube 210 $aLeiden$cE.J. Brill$dc1981 215 $aXII, 129 p.$d25 cm 700 1$aDaube,$bDavid$0205044 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990005565740403321 952 $aB 861$bBIBL. 57680$fFLFBC 959 $aFLFBC 996 $aAncient Jewish Law$9606918 997 $aUNINA LEADER 03889nam 22007935 450 001 996465866503316 005 20200629162549.0 010 $a3-642-34047-4 024 7 $a10.1007/978-3-642-34047-5 035 $a(CKB)3400000000086234 035 $a(SSID)ssj0000767510 035 $a(PQKBManifestationID)11489957 035 $a(PQKBTitleCode)TC0000767510 035 $a(PQKBWorkID)10741617 035 $a(PQKB)10442693 035 $a(DE-He213)978-3-642-34047-5 035 $a(MiAaPQ)EBC3070600 035 $a(PPN)168326027 035 $a(EXLCZ)993400000000086234 100 $a20120910d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFast Software Encryption$b[electronic resource] $e19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers /$fedited by Anne Canteaut 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XII, 463 p. 82 illus.) 225 1 $aSecurity and Cryptology ;$v7549 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-34046-6 320 $aIncludes bibliographical references and author index. 327 $aBlock ciphers -- Differential cryptanalysis -- Hash functions -- Modes of operation -- New tools for cryptanalysis -- New designs -- Keccak. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Fast Software Encryption, held in Washington, DC, USA, in March 2012. The 24 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 89 initial submissions. The papers are organized in topical sections on block ciphers, differential cryptanalysis, hash functions, modes of operation, new tools for cryptanalysis, new designs and Keccak. 410 0$aSecurity and Cryptology ;$v7549 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aComputer security 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer security. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aSystems and Data Security. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8 702 $aCanteaut$b Anne$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aFSE 2012 906 $aBOOK 912 $a996465866503316 996 $aFast Software Encryption$9772084 997 $aUNISA