LEADER 03249nam 2200553 450 001 9910464823803321 005 20200520144314.0 010 $a1-61168-562-1 035 $a(CKB)3710000000121587 035 $a(EBL)1524252 035 $a(SSID)ssj0001305270 035 $a(PQKBManifestationID)11861180 035 $a(PQKBTitleCode)TC0001305270 035 $a(PQKBWorkID)11257176 035 $a(PQKB)10396071 035 $a(MiAaPQ)EBC1524252 035 $a(OCoLC)890575626 035 $a(MdBmJHUP)muse33795 035 $a(Au-PeEL)EBL1524252 035 $a(CaPaEBR)ebr10878093 035 $a(CaONFJC)MIL616189 035 $a(OCoLC)881162542 035 $a(EXLCZ)993710000000121587 100 $a20140609h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAt the point of a cutlass $ethe pirate capture, bold escape, and lonely exile of Philip Ashton /$fGregory N. Flemming ; designed by Mindy Basinger Hill 210 1$aLebanon, New Hampshire :$cForeEdge,$d2014. 210 4$d©2014 215 $a1 online resource (265 p.) 300 $aDescription based upon print version of record. 311 $a1-61168-515-X 320 $aIncludes bibliographical references and index. 327 $aJuly 19, 1723 -- The Rebecca -- The capture -- To the Azores -- Dangerous waters -- Roatan -- The Baymen -- The Bay of Honduras -- As one coming from the dead -- "Ashton's memorial" -- Pirate executions and pirate treasure. 330 $aTaken in a surprise attack near Nova Scotia in June 1722, Ashton was forced to sail across the Atlantic and back with a crew under the command of Edward Low, a man so vicious he tortured victims by slicing off an ear or nose and roasting them over a fire. "A greater monster," one colonial official wrote, "never infested the seas." Ashton barely survived the nine months he sailed with Low's crew -- he was nearly shot in the head at gunpoint, came close to drowning when a ship sank near the coast of Brazil, and was almost hanged for secretly plotting a revolt against the pirates. Like many forced men, Ashton thought constantly about escaping. In March of 1723, he saw his chance when Low's crew anchored at the secluded island of Roatan, at the western edge of the Caribbean. Ashton fled into the thick, overgrown woods and, for more than a year, had to claw out a living on the remote strip of land, completely alone and with practically nothing to sustain him. The opportunity to escape came so unexpectedly that Ashton ran off without a gun, a knife, or even a pair of shoes on his feet. Yet the resilient young castaway -- who has been called America's real-life Robinson Crusoe -- was able to find food, build a crude shelter, and even survive a debilitating fever brought on by the cool winter rains before he was rescued by a band of men sailing near the island. 608 $aElectronic books. 676 $a972.83030924 700 $aFlemming$b Gregory N.$01055276 702 $aHill$b Mindy Basinger 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910464823803321 996 $aAt the point of a cutlass$92488564 997 $aUNINA LEADER 03832oam 2200613 450 001 996466125503316 005 20210715103529.0 010 $a3-540-48892-8 024 7 $a10.1007/3-540-48892-8 035 $a(CKB)1000000000211054 035 $a(SSID)ssj0000326485 035 $a(PQKBManifestationID)11912760 035 $a(PQKBTitleCode)TC0000326485 035 $a(PQKBWorkID)10296547 035 $a(PQKB)11092577 035 $a(DE-He213)978-3-540-48892-7 035 $a(MiAaPQ)EBC3072906 035 $a(MiAaPQ)EBC6485950 035 $a(PPN)155221213 035 $a(EXLCZ)991000000000211054 100 $a20210715d1999 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aSelected areas in cryptography $e5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, proceedings /$fStafford Tavares, Henk Meijer (editors) 205 $a1st ed. 1999. 210 1$aBerlin, Heidelberg :$cSpringer,$d[1999] 210 4$d©1999 215 $a1 online resource (X, 386 p.) 225 1 $aLecture Notes in Computer Science ;$v1556 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-65894-7 327 $aDesign of Secret Key Cryptosystems -- Feistel Ciphers with L 2-Decorrelation -- Key-Dependent S-Box Manipulations -- On the Twofish Key Schedule -- Towards Provable Security of Substitution-Permutation Encryption Networks -- Randomness and Computational Issues -- An Accurate Evaluation of Maurer?s Universal Test -- Computational Alternatives to Random Number Generators -- Storage-Efficient Finite Field Basis Conversion -- Verifiable Partial Sharing of Integer Factors -- Analysis of Secret Key Cryptosystems -- Higher Order Differential Attack Using Chosen Higher Order Differences -- On Maximum Non-averaged Differential Probability -- Cryptanalysis of RC4-like Ciphers -- Cryptographic Systems -- Key Preassigned Traceability Schemes for Broadcast Encryption -- Mix-Based Electronic Payments -- Over the Air Service Provisioning -- Public Key Cryptosystems -- Faster Attacks on Elliptic Curve Cryptosystems -- Improved Algorithms for Elliptic Curve Arithmetic in GF(2n) -- Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC ?97 -- A Lattice- Based Public-Key Cryptosystem -- Design and Implementation of Secret Key Cryptosystems -- Fast DES Implementations for FPGAs and Its Application to a Universal Key-Search Machine -- IDEA: A Cipher for Multimedia Architectures? -- A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis -- The Nonhomomorphicity of Boolean Functions -- Attacks on Secret Key Cryptosystems -- Cryptanalysis of ORYX -- A Timing Attack on RC5 -- Cryptanalysis of SPEED -- Invited Talks -- Authenticated Diffe-Hellman Key Agreement Protocols -- Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. 330 $aAC?98 A C - . AC?94 AC?96 ? ! K AC?95 AC?97 C ! O . & . I - * . & * AC?98 : ? D A ** K C * ? E? I* * C * ? C I ? /M N O 39 * AC?98,26 - * .& ! , A M K A * E B * I O ! J :C J -3. 410 0$aLecture notes in computer science ;$v1556. 606 $aComputer security$vCongresses 606 $aData encryption (Computer science)$vCongresses 606 $aComputer security 615 0$aComputer security 615 0$aData encryption (Computer science) 615 0$aComputer security. 676 $a005.8 702 $aTavares$b Stafford$f1940- 702 $aMeijer$b Henk$f1952- 712 12$aSAC'98 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a996466125503316 996 $aSelected Areas in Cryptography$92814504 997 $aUNISA