LEADER 04409nam 2200577 a 450 001 9910481961503321 005 20200520144314.0 010 $a3-540-32648-0 024 7 $a10.1007/11605805 035 $a(CKB)1000000000232750 035 $a(SSID)ssj0000320424 035 $a(PQKBManifestationID)11244845 035 $a(PQKBTitleCode)TC0000320424 035 $a(PQKBWorkID)10248669 035 $a(PQKB)11082098 035 $a(DE-He213)978-3-540-32648-9 035 $a(MiAaPQ)EBC3067747 035 $a(PPN)123130271 035 $a(EXLCZ)991000000000232750 100 $a20051117d2006 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTopics in cryptology--CT-RSA 2006 $ethe Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006 : proceedings /$fDavid Pointcheval (ed.) 205 $a1st ed. 2006. 210 $aBerlin $cSpringer$dc2006 215 $a1 online resource (XI, 365 p.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v3860 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-31033-9 320 $aIncludes bibliographical references and index. 327 $aAttacks on AES -- Cache Attacks and Countermeasures: The Case of AES -- Related-Key Impossible Differential Attacks on 8-Round AES-192 -- Identification -- Session Corruption Attack and Improvements on Encryption Based MT-Authenticators -- Fair Identification -- Algebra -- Efficient Doubling on Genus 3 Curves over Binary Fields -- Another Look at Small RSA Exponents -- Integrity -- Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing -- RFID-Tags for Anti-counterfeiting -- Public Key Encryption -- A ?Medium-Field? Multivariate Public-Key Encryption Scheme -- A New Security Proof for Damgård?s ElGamal -- Signatures -- Stand-Alone and Setup-Free Verifiably Committed Signatures -- Toward the Fair Anonymous Signatures: Deniable Ring Signatures -- Side-Channel Attacks -- Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers -- Higher Order Masking of the AES -- CCA Encryption -- Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles -- How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack -- Message Authentication -- On the (Im)possibility of Blind Message Authentication Codes -- An Optimal Non-interactive Message Authentication Protocol -- Block Ciphers -- A New Criterion for Nonlinearity of Block Ciphers -- Block Ciphers Sensitive to Gröbner Basis Attacks -- Multi-party Computation -- Universally Composable Oblivious Transfer in the Multi-party Setting -- A Round and Communication Efficient Secure Ranking Protocol. 330 $aThe RSA R Conference, with over 15,000attendees, as well as over 225 sponsors and exhibitors, is the largest computer security event of the year. The Cr- tographers? Track is one of the many parallel tracks. These proceedings contain the papers presented during the sixth edition. The tradition indeed started in 2001, and is by now well established: the Cryptographers? Track at the RSA Conference is among the major events in cryptography. There were 72 submitted contributions, of which 22 were selected for p- sentation. They cover all aspects of cryptography (symmetric and asymmetric cryptography, constructions and attacks, new trends). In addition, the program includes two invited talks, by Xiaoyun Wang on ?Cryptanalysis of Hash fu- tions and Potential Dangers,? and Philip MacKenzie on ?Passwords Will Not Die: How Cryptography Can Help Deal with Them. ? All the submissions were reviewed by at least three members of the Program Committee. Iamverygratefultothe24membersfortheirhardandconscientious work. 410 0$aLecture notes in computer science ;$v3860. 517 3 $aCT-RSA 2006 606 $aComputer security$vCongresses 606 $aCryptography$vCongresses 615 0$aComputer security 615 0$aCryptography 676 $a005.8 701 $aPointcheval$b David$01759592 712 12$aCryptographers' Track at RSA Conference 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910481961503321 996 $aTopics in cryptology--CT-RSA 2006$94198148 997 $aUNINA LEADER 01050nam0 22003011i 450 001 UON00317770 005 20231205104126.902 010 $a88-89862-28-9 100 $a20081127d2008 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| 1|||| 200 1 $aTagliato per l'esilio$fKarim Metref$gedidato da Silvia De Marchi 205 $a1 ed 210 $aNapoli$cMangrovie$d2008 215 $a126 p.$cill.$d17 cm 606 $aLetteratura berbera$3UONC018842$2FI 620 $aIT$dNapoli$3UONL000012 676 $a893.3$cLETTERATURA BERBERA$v21 700 1$aKARIM$bMetref$3UONV183153$0698473 702 1$aDE_MARCHI$bSilvia$3UONV183154 712 $aMangrovie$3UONV275102$4650 801 $aIT$bSOL$c20251024$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00317770 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI 1 0474 $eSI AA 29461 5 0474 996 $aTagliato per l'esilio$91374355 997 $aUNIOR LEADER 03344nam 22005053 450 001 9910163355803321 005 20250731080249.0 010 $a9781782897743 010 $a1782897747 035 $a(CKB)3810000000098048 035 $a(BIP)054487182 035 $a(VLeBooks)9781782897743 035 $a(Perlego)3018203 035 $a(MiAaPQ)EBC32229048 035 $a(Au-PeEL)EBL32229048 035 $a(Exl-AI)993810000000098048 035 $a(Exl-AI)32229048 035 $a(OCoLC)1530382514 035 $a(EXLCZ)993810000000098048 100 $a20250731d2014 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTransport Helicopters 205 $a1st ed. 210 1$aBielefeld :$cPickle Partners Publishing,$d2014. 210 4$d©2014. 215 $a1 online resource (40 p.) 327 $aTitle page -- TABLE OF CONTENTS -- EXECUTIVE SUMMARY -- Introduction -- What is Operational Maneuver? -- Maneuver Warfare and the Marines -- Understanding Linear Battle Space -- The Threat to Heliborne Forces -- Marine Corps Transport Helicopters -- Aircraft Survivability -- Aircraft Survivability Equipment -- Aircraft Survival Equipment on Marine Transport Helicopters -- Existing Shortfalls -- The V-22 Osprey -- Conclusions and Recommendations -- REQUEST FROM THE PUBLISHER -- Bibliography$7Generated by AI. 330 8 $aMarine Corps' publication FMFM 1 describes Marine Corps doctrine on warfighting. In very broad terms, chapter 4 of Warfighting attempts to identify the challenges and realities of the modern battlefield. Marine Corps' doctrine attempts to exploit "the time-competitive rhythm of war, generating and exploiting superior tempo and velocity in an uncertain, chaotic, fluid environment." The Marine Corps employs a combined arms team to generate the combat power needed to succeed in this environment. This combined arms team is the Marine Air Ground Task Force (MAGTF).The largest deployable MAGTF is the Marine Expeditionary Force (MEF). The MEF is normally employed as a maneuver element for a larger Joint Task Force (JTF).Like the U.S. Army, the Marine Corps selected maneuver warfare as its warfighting philosophy. In theory, the MEF Commander could be a JTF Commander and could conduct operational level maneuver with his MEF and any other assigned forces. Unfortunately, the MEF cannot effectively conduct operational maneuver against a medium to high intensity threat with its current mix of assault transport helicopters. Simply stated, the Marine Corps transport helicopter fleet is not capable of supporting maneuver warfare as envisioned in FMFM 1 or Forward... From the Sea. Based upon the current Five Year Defense Plan (FYDP) and the current Marine Aviation Plan, our transport helicopters will remain the Achilles Heel of maneuver warfare in the 21st Century. 606 $aManeuver warfare$7Generated by AI 606 $aMilitary helicopters$7Generated by AI 615 0$aManeuver warfare 615 0$aMilitary helicopters 676 $a355.00973 700 $aKane USMC$b Joel P$01835532 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910163355803321 996 $aTransport Helicopters$94412219 997 $aUNINA