LEADER 01572nlm0 22004571i 450 001 990009249780403321 010 $a9783540305767 035 $a000924978 035 $aFED01000924978 035 $a(Aleph)000924978FED01 035 $a000924978 100 $a20100926d2005----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aTheory of Cryptography$bRisorsa elettronica$eSecond Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings$fedited by Joe Kilian 210 $aBerlin ; Heidelberg$cSpringer$d2005 225 1 $aLecture Notes in Computer Science$x0302-9743$v3378 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aKilian,$bJoe 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/b106171 901 $aEB 912 $a990009249780403321 961 $aAlgorithm Analysis and Problem Complexity 961 $aComputational complexity 961 $aComputer science 961 $aComputer Science 961 $aComputer software 961 $aComputers and Society 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aDiscrete Mathematics in Computer Science 961 $aInformation Systems 961 $aManagement of Computing and Information Systems 961 $aOperating Systems 961 $aOperating systems (Computers) 996 $aTheory of Cryptography$9772206 997 $aUNINA LEADER 00839nam0-22003131i-450 001 990000858430403321 005 20190510085250.0 010 $a88-256-0610-9 035 $a000085843 035 $aFED01000085843 035 $a(Aleph)000085843FED01 035 $a000085843 100 $a20001010d1994----km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aUsare subito Word per Windows 6$fT. Tozzola 210 $aMilano$cJackson Libri$d1994 215 $aIX, 293 p.$d24 cm 610 0 $aElaboratori elettronici 676 $a005.1 700 1$aTozzola,$bTiziana$0344796 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000858430403321 952 $a02 53 C 74$b6577$fFINBN 959 $aFINBN 996 $aUsare subito Word per Windows 6$9349678 997 $aUNINA DB $aING01