LEADER 01195nam0-2200349 --450 001 9910290359603321 005 20181107130730.0 010 $a9780199271542 100 $a20181107d2010----kmuy0itay5050 ba 101 0 $alat 102 $aGB 105 $ay 001yy 200 1 $aL. Iuni Moderati Columellae Res Rustica$aincerti auctoris Liber de arboribus$frecognovit brevique adnotatione critica instruxit by R.H. Rodgers 210 $aOxonii$ce typographeo Clarendoniano$d2010 215 $aXXVI, 607 p.$d19 cm 225 1 $aScriptorum classicorum bibliotheca Oxoniensis 300 $aSulla cop.: Oxford Classical Texts 500 10$aDe re rustica$m$919674 500 10$aDe arboribus$m$919673 610 0 $aColumella, Lucio Giunio Moderato$aOpere$aAgricoltura 676 $a878$v20 676 $a630.937$v21 700 1$aColumella,$bLucius Iunius Moderatus$071617 702 1$aRodgers,$bRobert H. 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910290359603321 952 $aP2B-640-OXON-COLUM.-200A -2010$bBIBL 2018$fFLFBC 959 $aFLFBC 996 $aDe arboribus$919673 996 $aDe re rustica$919674 997 $aUNINA LEADER 06048nam 22009015 450 001 9910484124603321 005 20251226202214.0 010 $a3-642-01001-6 024 7 $a10.1007/978-3-642-01001-9 035 $a(CKB)1000000000718101 035 $a(SSID)ssj0000315949 035 $a(PQKBManifestationID)11233420 035 $a(PQKBTitleCode)TC0000315949 035 $a(PQKBWorkID)10264110 035 $a(PQKB)11661621 035 $a(DE-He213)978-3-642-01001-9 035 $a(MiAaPQ)EBC3064091 035 $a(PPN)134131223 035 $a(EXLCZ)991000000000718101 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology ? EUROCRYPT 2009 $e28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009, Proceedings /$fedited by Antoine Joux 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XV, 611 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5479 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-01000-8 320 $aIncludes bibliographical references and index. 327 $aSecurity, Proofs and Models (1) -- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening -- Breaking RSA Generically Is Equivalent to Factoring -- Resettably Secure Computation -- On the Security Loss in Cryptographic Reductions -- Hash Cryptanalysis -- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures -- Cryptanalysis of MDC-2 -- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC -- Finding Preimages in Full MD5 Faster Than Exhaustive Search -- Group and Broadcast Encryption -- Asymmetric Group Key Agreement -- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) -- Traitors Collaborating in Public: Pirates 2.0 -- Cryptosystems (1) -- Key Agreement from Close Secrets over Unsecured Channels -- Order-Preserving Symmetric Encryption -- A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier -- Cryptanalysis -- On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis -- Cube Attacks on Tweakable Black Box Polynomials -- Smashing SQUASH-0 -- Cryptosystems (2) -- Practical Chosen Ciphertext Secure Encryption from Factoring -- Realizing Hash-and-Sign Signatures under Standard Assumptions -- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks -- Invited Talk -- Cryptography without (Hardly Any) Secrets ? -- Security, Proofs and Models (2) -- Salvaging Merkle-Damgård for Practical Applications -- On the Security of Padding-Based Encryption Schemes ? or ? Why We Cannot Prove OAEP Secure in the Standard Model -- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters? IBE Scheme -- On the Portability of Generalized Schnorr Proofs -- SideChannels -- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks -- A Leakage-Resilient Mode of Operation -- Curves -- ECM on Graphics Cards -- Double-Base Number System for Multi-scalar Multiplications -- Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves -- Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields -- Randomness -- Verifiable Random Functions from Identity-Based Key Encapsulation -- Optimal Randomness Extraction from a Diffie-Hellman Element -- A New Randomness Extraction Paradigm for Hybrid Encryption. 330 $aThis book constitutes the refereed proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009, held in Cologne, Germany, in April 2009. The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 148 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. The papers are organized in topical sections on security, proofs, and models, hash cryptanalysis, group and broadcast encryption, cryptosystems, cryptanalysis, side channels, curves, and randomness. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5479 606 $aCryptography 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aComputer networks 606 $aData protection 606 $aAlgorithms 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCryptology 606 $aCoding and Information Theory 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aAlgorithms 606 $aDiscrete Mathematics in Computer Science 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer networks. 615 0$aData protection. 615 0$aAlgorithms. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aCryptology. 615 24$aCoding and Information Theory. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aAlgorithms. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.82 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 701 $aJoux$b Antoine$01763995 712 12$aEUROCRYPT. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484124603321 996 $aAdvances in cryptology - Eurocrypt 2009$94204729 997 $aUNINA