LEADER 01501nam a2200373 i 4500 001 991000790839707536 005 20020507173631.0 008 980410s1996 de ||| | eng 020 $a3110142198 035 $ab10757764-39ule_inst 035 $aLE01302375$9ExL 040 $aDip.to Matematica$beng 082 0 $a519.2 084 $aAMS 28-06 084 $aAMS 60-06 111 2 $aConference on convergence in ergodic theory and probability <1993 ; Ohio State University>$0535036 245 10$aConvergence in ergodic theory and probability /$ceditors, V. Bergelson, P. March, J. Rosenblatt 260 $aBerlin ; New York :$c1996 300 $axi, 445 p. :$bill. ;$c25 cm. 490 0 $aOhio State University Mathematical Research Institute publications ;$v5 500 $aPapers from the Conference on convergence in ergodic theory and probability, held at Ohio State University, in June, 1993 650 4$aConvergence$xCongresses 650 4$aErgodic theory$xCongresses 650 4$aInequalities$xCongresses 650 4$aProbability$xCongresses 700 1 $aBergelson, V. 700 1 $aMarch, P. 700 1 $aRosenblatt, J. 907 $a.b10757764$b23-02-17$c28-06-02 912 $a991000790839707536 945 $aLE013 60-XX BER11 (1996)$g1$i2013000097732$lle013$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i10852281$z28-06-02 996 $aConvergence in ergodic theory and probability$9923025 997 $aUNISALENTO 998 $ale013$b01-01-98$cm$da $e-$feng$gde $h0$i1 LEADER 06194nam 22008895 450 001 9910483541303321 005 20251226200625.0 010 $a1-280-39054-9 010 $a9786613568465 010 $a3-642-17401-9 024 7 $a10.1007/978-3-642-17401-8 035 $a(CKB)2670000000064704 035 $a(SSID)ssj0000476588 035 $a(PQKBManifestationID)11913368 035 $a(PQKBTitleCode)TC0000476588 035 $a(PQKBWorkID)10480192 035 $a(PQKB)10745197 035 $a(DE-He213)978-3-642-17401-8 035 $a(MiAaPQ)EBC3066228 035 $a(PPN)149893477 035 $a(BIP)32522849 035 $a(EXLCZ)992670000000064704 100 $a20101201d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProgress in Cryptology - INDOCRYPT 2010 $e11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings /$fedited by Guang Gong, Kishan Chand Gupta 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XVI, 366 p. 63 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v6498 300 $aIncludes index. 311 08$a3-642-17400-0 327 $aInvited Talk -- Getting a Few Things Right and Many Things Wrong -- Security of RSA and Multivariate Schemes -- Partial Key Exposure Attack on RSA ? Improvements for Limited Lattice Dimensions -- Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks -- CyclicRainbow ? A Multivariate Signature Scheme with a Partially Cyclic Public Key -- Security Analysis, Pseudorandom Permutations and Applications -- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols -- Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations -- The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants -- Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface -- Invited Talk -- Cryptographic Hash Functions: Theory and Practice -- Hash Functions -- Cryptanalysis of Tav-128 Hash Function -- Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing -- Speeding Up the Wide-Pipe: Secure and Fast Hashing -- Attacks on Block Ciphers and Stream Ciphers -- New Boomerang Attacks on ARIA -- Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers -- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA -- Greedy Distinguishers and Nonrandomness Detectors -- Fast Cryptographic Computation -- Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity -- Random Euclidean Addition Chain Generation and Its Application to Point Multiplication -- Cryptanalysis of AES -- Attack on a Higher-Order Masking of the AES Based on Homographic Functions -- Improved Impossible Differential Cryptanalysis of 7-Round AES-128 -- Cryptanalysis ofa Perturbated White-Box AES Implementation -- Efficient Implementation -- A Program Generator for Intel AES-NI Instructions -- ECC2K-130 on NVIDIA GPUs -- One Byte per Clock: A Novel RC4 Hardware. 330 $aThe LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R & D community, with numerous individuals, as well as with prestigious organizations and societies, LNCS has grown into the most comprehensive computer science research forum available. The scope of LNCS, including its subseries LNAI and LNBI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes proceedings (published in time for the respective conference) post-proceedings (consisting of thoroughly revised final full papers) research monographs (which may be based on outstanding PhD work, research projects, technical reports, etc.) More recently, several color-cover sublines have been added featuring, beyond a collection of papers, various added-value components; these sublines include tutorials (textbook-like monographs or collections of lectures given at advanced courses) state-of-the-art surveys (offering complete and mediated coverage of a topic) hot topics (introducing emergent topics to the broader community) Book jacket. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v6498 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aAlgorithms 606 $aElectronic data processing$xManagement 606 $aData protection 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCryptology 606 $aComputer Communication Networks 606 $aAlgorithms 606 $aIT Operations 606 $aData and Information Security 606 $aDiscrete Mathematics in Computer Science 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aAlgorithms. 615 0$aElectronic data processing$xManagement. 615 0$aData protection. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aAlgorithms. 615 24$aIT Operations. 615 24$aData and Information Security. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.82 701 $aGong$b Guang$f1956-$01757502 701 $aGupta$b Kishan Chand$01757503 712 12$aInternational Conference in Cryptology in India. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483541303321 996 $aProgress in cryptology - INDOCRYPT 2010$94195377 997 $aUNINA