LEADER 02152nam a2200361 a 4500 001 991001196459707536 008 110506m it 001 0 ita 035 $ab13976126-39ule_inst 040 $aDip.to Studi Storici$bita 082 04$a327.4550457 245 10$aCorrispondenza degli ambasciatori fiorentini a Napoli 260 $aNapoli :$bCAR [poi] Laveglia & Carlone,$c[2002]- 300 $a v. ;$c25 cm. 440 0$aFonti per la storia di Napoli aragonese.$nSer. 2. ;$v1-2,4,6 505 00$g1:$tGiovanni Lanfredini (13 aprile 1484-9 maggio 1485) /$ra cura di Elisabetta Scarton. - [2005].$g- lxiii, 721 p. 505 00$g2:$tGiovanni Lanfredini (maggio 1485-ottobre 1486) /$ra cura di Elisabetta Scarton. - [2002].$g- xcv, 812 p. 505 00$g4:$tFrancesco Valori (agosto 1487-giugno 1488), Piero Vettori (giugno 1488-giugno 1489) /$ra cura di Patrizia Meli. - [2011].$g- lii, 531 p. 505 00$g6:$tPiero Nasi (10 aprile 1491-22 novembre 1491), Antonio Della Valle (23 novembre 1491-25 gennaio 1492) e Niccolò Michelozzi (26 gennaio 1492-giugno 1492) /$ra cura di Bruno Figliuolo e Sabrina Marcotti. - [2004].$g- lix, 475 p. 651 4$aFirenze e Regno di Napoli <1266-1815>$y1484-1494$vFonti archivistiche 700 1 $aScarton, Elisabetta 700 1 $aMeli, Patrizia 700 1 $aFigliuolo, Bruno 700 1 $aMarcotti, Sabrina 710 2 $aIstituto italiano per gli studi storici 907 $a.b13976126$b02-04-14$c06-05-11 912 $a991001196459707536 945 $aLE023 327.455 COR 1 1$g1$i2023000085318$lle023$o-$pE75.00$q-$rn$s- $t0$u1$v0$w1$x0$y.i14229018$z03-05-06 945 $aLE023 327.455 COR 1 2$g1$i2023000085325$lle023$o-$pE100.00$q-$rn$s- $t0$u1$v0$w1$x0$y.i14229031$z03-05-06 945 $aLE023 327.455 COR 1 4 $g1$i2023000126547$lle023$o-$pE70.00$q-$rn$so $t0$u0$v0$w0$x0$y.i15263411$z05-05-11 945 $aLE023 327.455 COR 1 6$g1$i2023000085332$lle023$o-$pE70.00$q-$rn$so $t0$u0$v0$w0$x0$y.i14229043$z03-05-06 996 $aCorrispondenza degli ambasciatori fiorentini a Napoli$9246838 997 $aUNISALENTO 998 $ale023$b06-05-11$cm$da $e-$fita$git $h0$i0 LEADER 04416nam 22008295 450 001 9910483046403321 005 20251226203321.0 010 $a3-540-88403-3 024 7 $a10.1007/978-3-540-88403-3 035 $a(CKB)1000000000490871 035 $a(DE-He213)978-3-540-88403-3 035 $a(MiAaPQ)EBC3063628 035 $a(MiAaPQ)EBC6511666 035 $a(Au-PeEL)EBL6511666 035 $a(OCoLC)304563387 035 $a(PPN)13018568X 035 $a(EXLCZ)991000000000490871 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPost-Quantum Cryptography $eSecond International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings /$fedited by Johannes Buchmann, Jintai Ding 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (X, 231 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5299 300 $aIncludes index. 311 08$a3-540-88402-5 320 $aIncludes bibliographical references and index. 327 $aA New Efficient Threshold Ring Signature Scheme Based on Coding Theory -- Square-Vinegar Signature Scheme -- Attacking and Defending the McEliece Cryptosystem -- McEliece Cryptosystem Implementation: Theory and Practice -- Merkle Tree Traversal Revisited -- Explicit Hard Instances of the Shortest Vector Problem -- Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ?IC-Derivatives -- Digital Signatures Out of Second-Preimage Resistant Hash Functions -- Cryptanalysis of Rational Multivariate Public Key Cryptosystems -- Syndrome Based Collision Resistant Hashing -- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems -- On the Power of Quantum Encryption Keys -- Secure PRNGs from Specialized Polynomial Maps over Any -- MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy -- Side Channels in the McEliece PKC. 330 $aThis book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the lattice-based public key cryptosystems and the multivariate public key cryptosystems. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5299 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aUser interfaces (Computer systems) 606 $aHuman-computer interaction 606 $aElectronic data processing$xManagement 606 $aAlgorithms 606 $aComputer networks 606 $aCryptology 606 $aData and Information Security 606 $aUser Interfaces and Human Computer Interaction 606 $aIT Operations 606 $aAlgorithms 606 $aComputer Communication Networks 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aUser interfaces (Computer systems). 615 0$aHuman-computer interaction. 615 0$aElectronic data processing$xManagement. 615 0$aAlgorithms. 615 0$aComputer networks. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aIT Operations. 615 24$aAlgorithms. 615 24$aComputer Communication Networks. 676 $a005.82 702 $aDing$b Jintai 702 $aBuchmann$b Johannes 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483046403321 996 $aPost-quantum cryptography$9230307 997 $aUNINA