LEADER 01607nlm0 22004691i 450 001 990009242220403321 010 $a9783540468776 035 $a000924222 035 $aFED01000924222 035 $a(Aleph)000924222FED01 035 $a000924222 100 $a20100926d2006----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aAdvances in Cryptology — EUROCRYPT ’90$bRisorsa elettronica$eWorkshop on the Theory and Application of Cryptographic Techniques Aarhus, Denmark, May 21–24, 1990 Proceedings$fedited by Ivan Bjerre Damgård 210 $aBerlin ; Heidelberg$cSpringer$d2006 225 1 $aLecture Notes in Computer Science$x0302-9743$v473 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aDamgård,$bIvan Bjerre 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/3-540-46877-3 901 $aEB 912 $a990009242220403321 961 $aCoding and Information Theory 961 $aCoding theory 961 $aCombinatorics 961 $aCombinatorics 961 $aCommunications Engineering, Networks 961 $aComputer science 961 $aComputer Science 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aDatabase management 961 $aDatabase Management 961 $aOperating Systems 961 $aOperating systems (Computers) 961 $aTelecommunication 996 $aAdvances in Cryptology — EUROCRYPT ’90$9772391 997 $aUNINA