LEADER 01356cam0-22003011i-450- 001 990005572040403321 005 20150330154827.0 012 $amano d)el diu- stno (3) 1707 (R)$2fei$5IT-NA0105 035 $a000557204 035 $aFED01000557204 035 $a(Aleph)000557204FED01 035 $a000557204 100 $a19990604d1707----km-y0itay50------ba 101 0 $aita 102 $aIT 140 $aa-------------------bb0----- 200 1 $aAtene attica descritta da suoi principii fino all'acquisto fatto dall'armi venete nel 1687. Colla relazione de suoi re, prencipi, arconti, e tiranni ... Diuisa in quattro parti. Con varietà di medaglie, ritratti, e dissegni. Di Francesco Fanelli ... 210 $aVenezia$cappresso Antonio Bortoli$d1707 215 $a[6], 386, [2] p., [15] c. di tav. di cui 6 ripieg.$cill.$d28 cm 700 1$aFanelli,$bFrancesco$0186181 719 00$aBortoli,$gAntonio$4650 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aAQ 912 $a990005572040403321 952 $aSG 900/B 190$bARCH. 5200$fFLFBC 959 $aFLFBC 996 $aAtene attica descritta da suoi principii fino all'acquisto fatto dall'armi venete nel 1687. Colla relazione de suoi re, prencipi, arconti, e tiranni ... Diuisa in quattro parti. Con varietà di medaglie, ritratti, e dissegni. Di Francesco Fanelli ..$9607363 997 $aUNINA LEADER 02691nam 2200505 a 450 001 9910481005303321 005 20181102233622.0 010 $a1-283-26000-X 010 $a9786613260000 010 $a90-485-2158-0 035 $a(CKB)2670000000114406 035 $a(EBL)770972 035 $a(OCoLC)751963318 035 $a(SSID)ssj0000631431 035 $a(PQKBManifestationID)11415160 035 $a(PQKBTitleCode)TC0000631431 035 $a(PQKBWorkID)10599625 035 $a(PQKB)11713817 035 $a(MiAaPQ)EBC770972 035 $a(EXLCZ)992670000000114406 100 $a20091030d2008 uy 0 101 0 $adut 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$a125 jaar Marx$b[electronic resource] $edenken over zijn betekenis voor de 21e eeuw /$fSjaak van der Velden (red.) 210 $aAmsterdam $cAksant$dc2008 215 $a1 online resource (72 p.) 300 $aDescription based upon print version of record. 311 $a90-5260-320-0 320 $aIncludes bibliographical references. 327 $a125 jaar Marx; Inhoud; Voorwoord; Inleiding. Als je maar lang genoeg wacht...; 1.Toespraak bij het graf van Karl Marx Highgate begraafplaats, Londen, 17 maart 1883; 2. De actualiteit van een 19e eeuwse meesterdenker; 3.""We moeten het kapitalisme niet als een eindstation beschouwen""; 4. Marx voor de 21e eeuw; 5. Fragmenten uit het Communistisch Manifest; 6.Voorwoord bij de eerste druk van Het Kapitaal; 7. Geen socialisme zonder kapitalisme; 8. Marx, de analyticus van het kapitalisme; 9. De strijd om het ontslagrecht en de meerwaardetheorie; 10. Marx en de meerduidigheid van ontwikkelingen 327 $a11. Goed om Marx weer af te stoffenNawoord; Over de schrijvers; Noten 330 $aKarl Marx overleed in 1883. Zijn naam was tot 1989 verbonden aan regimes die hun achterstand op de westerse wereld probeerden in te halen. Zij koppelden de naam van Marx aan die van hun eigen leiders en claimden het alleenrecht op het marxistische gedachtegoed.Marx had zich echter altijd verzet tegen het gebruik van zijn naam voor een isme. Hij wilde geen marxisme, maar een manier van analyseren verspreiden onder socialisten. Die analyse is tot op de dag van vandaag de meest omvattende kritiek op het kapitalisme. Doordat bovengenoemde regimes het alleenrecht op zijn analyse opeisten, verloren 608 $aElectronic books. 676 $a900 701 $aVelden$b Jacobus Hermanus Antonius van der$f1954-$0861419 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910481005303321 996 $a125 jaar Marx$91922482 997 $aUNINA LEADER 06709nam 22008775 450 001 9910485140003321 005 20251226202952.0 010 $a3-642-04159-0 024 7 $a10.1007/978-3-642-04159-4 035 $a(CKB)1000000000772895 035 $a(SSID)ssj0000319957 035 $a(PQKBManifestationID)11243389 035 $a(PQKBTitleCode)TC0000319957 035 $a(PQKBWorkID)10343833 035 $a(PQKB)10077973 035 $a(DE-He213)978-3-642-04159-4 035 $a(MiAaPQ)EBC3064488 035 $a(PPN)139951237 035 $a(BIP)27506858 035 $a(EXLCZ)991000000000772895 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSelected Areas in Cryptography $e15th Annual International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, 2008 /$fedited by Roberto Avanzi, Liam Keliher, Francesco Sica 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XI, 457 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5381 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-04158-2 320 $aIncludes bibliographical references and index. 327 $aElliptic and Hyperelliptic Curve Arithmetic -- Faster Halvings in Genus 2 -- Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates -- On Software Parallel Implementation of Cryptographic Pairings -- Block Ciphers I -- The Cryptanalysis of Reduced-Round SMS4 -- Building Secure Block Ciphers on Generic Attacks Assumptions -- First Invited Talk -- Lifting and Elliptic Curve Discrete Logarithms -- Hash Functions I -- Preimage Attacks on One-Block MD4, 63-Step MD5 and More -- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 -- Cryptanalysis of Tweaked Versions of SMASH and Reparation -- Mathematical Aspects of Applied Cryptography I -- Counting Functions for the k-Error Linear Complexity of 2 n -Periodic Binary Sequences -- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model -- Stream Ciphers Cryptanalysis -- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers -- A Cache Timing Analysis of HC-256 -- An Improved Fast Correlation Attack on Stream Ciphers -- Hash Functions II -- A Three-Property-Secure Hash Function -- Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques -- A Scheme to Base a Hash Function on a Block Cipher -- Collisions and Other Non-random Properties for Step-Reduced SHA-256 -- Cryptography with Algebraic Curves -- Public Verifiability from Pairings in Secret Sharing Schemes -- The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences -- Second Invited Talk ? Stafford Tavares Lecture -- The ?Coefficients H? Technique -- Mathematical Aspects of Applied Cryptography II -- Distinguishing Multiplications from Squaring Operations -- Subquadratic Polynomial Multiplication over GF(2 m ) Using Trinomial Bases and ChineseRemaindering -- Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators -- Curve-Based Primitives in Hardware -- HECC Goes Embedded: An Area-Efficient Implementation of HECC -- ECC Is Ready for RFID ? A Proof in Silicon -- Block Ciphers II -- Cryptanalysis of a Generic Class of White-Box Implementations -- New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256 -- Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia. 330 $aThe book in front of you contains the proceedings of SAC 2008, the 15th - nual Workshop on Selected Areas in Cryptography. SAC 2008 took place during August 14-15 at Mount Allison University, Sackville, New Brunswick, Canada. This was the ?rst time that SAC was hosted in New Brunswick, and the second time in an Atlantic Canadian province. Previous SAC workshops were held at Queen's University in Kingston (1994, 1996, 1998, 1999, and 2005), at Carleton University in Ottawa (1995, 1997, 2003), at the University of Waterloo (2000, 2004), at the Fields Institute in Toronto (2001), at Memorial University of N- foundland at St. John's (2002), at Concordia University in Montreal (2006) and at the University of Ottawa (2007). The intent ofthe workshopseriesis to provide a relaxedatmospherein which researchers in cryptography can present and discuss new work on selected areas of current interest. The SAC workshop series has ?rmly established itself as an international forum for intellectual exchange in cryptological research. Theresponsibilityforchoosingthe venueofeachSACworkshopandappoi- ingtheCo-chairslieswiththeSACOrganizingBoard.TheCo-chairsthenchoose the Program Committee in consultation with the Board. Hence, we would like to expressour gratitudeto the SAC OrganizingBoardfor giving usthe mandate to organize SAC 2008, and for their invaluable feedback while assembling the Program Committee. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5381 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aCoding theory 606 $aInformation theory 606 $aData structures (Computer science) 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCryptology 606 $aData and Information Security 606 $aCoding and Information Theory 606 $aData Structures and Information Theory 606 $aDiscrete Mathematics in Computer Science 606 $aSymbolic and Algebraic Manipulation 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aData structures (Computer science). 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aCoding and Information Theory. 615 24$aData Structures and Information Theory. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aSymbolic and Algebraic Manipulation. 676 $a005.8 701 $aAvanzi$b Roberto$01759873 701 $aKeliher$b Liam$01759874 701 $aSica$b Francesco$0220756 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910485140003321 996 $aSelected areas in cryptography$94198546 997 $aUNINA