LEADER 00958nam0-22002891i-450- 001 990004018380403321 005 20080226152616.0 035 $a000401838 035 $aFED01000401838 035 $a(Aleph)000401838FED01 035 $a000401838 100 $a19990604d1977----km-y0itay50------ba 101 0 $aspa 105 $ay-------001yy 200 1 $aHumanismo y marxismo.$eCritica de la independizacion de la ciencia. Con un apendice de textos de los humanistas italianos Francesco Petrarca ed altri..$fErnesto Grassi$gVersion esp. de Manuel Albella Martin 210 $aMadrid$cGredos$d1977 215 $a313 p.$d20 cm 225 1 $aBibl. hispanica de filos.$v91 700 1$aGrassi,$bErnesto$0384337 702 1$aAlbella Martin,$bManuel 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004018380403321 952 $aP.1 M/FG 94$bBIBL.60816$fFLFBC 959 $aFLFBC 996 $aHumanismo y marxismo$9472899 997 $aUNINA LEADER 06127nam 22008535 450 001 9910143639503321 005 20251116234014.0 010 $a3-540-46513-8 024 7 $a10.1007/3-540-46513-8 035 $a(CKB)1000000000211203 035 $a(SSID)ssj0000326481 035 $a(PQKBManifestationID)11248973 035 $a(PQKBTitleCode)TC0000326481 035 $a(PQKBWorkID)10296847 035 $a(PQKB)10704925 035 $a(DE-He213)978-3-540-46513-3 035 $a(MiAaPQ)EBC3071683 035 $a(PPN)155210270 035 $a(BIP)6424369 035 $a(EXLCZ)991000000000211203 100 $a20121227d2000 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSelected Areas in Cryptography $e6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings /$fedited by Howard Heys, Carlisle Adams 205 $a1st ed. 2000. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2000. 215 $a1 online resource (VIII, 241 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1758 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-67185-4 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aCryptosystems and Pseudorandom Number Generators -- A Universal Encryption Standard -- Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator -- Elliptic Curve Pseudorandom Sequence Generators -- Security Aspects of Block Ciphers -- Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness -- Guesswork and Variation Distance as Measures of Cipher Security -- Modeling Linear Characteristics of Substitution-Permutation Networks -- Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors -- Cryptanalysis of Block Ciphers -- Security of E2 against Truncated Differential Cryptanalysis -- Key-Schedule Cryptanalysis of DEAL -- Efficient Evaluation of Security against Generalized Interpolation Attack -- Efficient Implementations of Cryptosystems -- Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders -- Improving and Extending the Lim/Lee Exponentiation Algorithm -- Software Optimization of Decorrelation Module -- Cryptography for Network Applications -- Pseudonym Systems -- Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures -- Protecting a Mobile Agent?s Route against Collusions -- Photuris: Design Criteria. 330 $aSAC'99 was the sixth in a series of annual workshops on Selected Areas in Cryptography. Previous workshops were held at Carleton University in Ottawa (1995 and 1997) and at Queen's University in Kingston (1994, 1996, and 1998). The intent of the annual workshop is to provide a relaxed atmosphere in which researchers in cryptography can present and discuss new work on selected areas of current interest. The themes for the SAC'99 workshop were: { Design and Analysis of Symmetric Key Cryptosystems { E cient Implementations of Cryptographic Systems { Cryptographic Solutions for Web/Internet Security The timing of the workshop was particularly fortuitous as the announcement by NIST of the v e nalists for AES coincided with the rst morning of the workshop, precipitating lively discussion on the merits of the selection! A total of 29 papers were submitted to SAC'99 and, after a review process that had all papers reviewed by at least 3 referees, 17 were accepted and p- sented. As well, two invited presentations were given: one by Miles Smid from NIST entitled \From DES to AES: Twenty Years of Government Initiatives in Cryptography"and the other by Mike Reiter from Bell Labs entitled \Password Hardening with Applications to VPN Security". The program committee for SAC'99 consisted of the following members: Carlisle Adams, Tom Cusick, Howard Heys, Lars Knudsen, Henk Meijer, Luke O'Connor, Doug Stinson, Stao rd Tavares, and Serge Vaudenay. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1758 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aComputer science 606 $aComputer networks 606 $aAlgorithms 606 $aManagement information systems 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aComputer Science, general$3https://scigraph.springernature.com/ontologies/product-market-codes/I00001 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science) 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer science. 615 0$aComputer networks. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 14$aCryptology. 615 24$aCoding and Information Theory. 615 24$aComputer Science, general. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 676 $a005.82 702 $aHeys$b Howard$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAdams$b Carlisle$f1961-$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aSAC'99 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143639503321 996 $aSelected Areas in Cryptography$92814504 997 $aUNINA