LEADER 01219nam 2200385 450 001 9910520105403321 005 20220925100559.0 010 $a90-04-49961-X 035 $a(CKB)5600000000181612 035 $a(NjHacI)995600000000181612 035 $a(EXLCZ)995600000000181612 100 $a20220925d2021 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aHome-Based Work and Home-Based Workers (1800-2021) /$fedited by Malin Nilsson, Indrani Mazumdar, Silke Neunsinger 210 1$aLeiden :$cBRILL,$d2021. 215 $a1 online resource (xix, 421 pages) $cillustrations 311 $a90-04-49944-X 320 $aIncludes bibliographical references and index. 517 $aHome-Based Work and Home-Based Workers 606 $aHome-based businesses 615 0$aHome-based businesses. 676 $a658.0412 702 $aNilsson$b Malin 702 $aMazumdar$b Indrani 702 $aNeunsinger$b Silke 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910520105403321 996 $aHome-Based Work and Home-Based Workers (1800-2021)$92582462 997 $aUNINA LEADER 01361nam0 22003733i 450 001 SBL0159315 005 20231121125816.0 020 $aIT$b792954 100 $a20210601d1977 ||||0itac50 ba 101 | $aita 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $aMio figlio ha paura$eche fare?$fAnne-Marie Lerich 210 $aRoma$cA. Armando$d[1977] 215 $a124 p.$d21 cm 225 | $aBiblioteca dei genitori 300 $aTrad. P. Massimi. 410 0$1001CFI0057692$12001 $aBiblioteca dei genitori 500 10$a˜La œpeur .$3UM10148537$9SBLV093252$93635941 606 $aPaura$xInfanzia$2FIR$3RMLC218321$9I 676 $a155.4$9Psicologia infantile.$v21 700 1$aLeriche$b, Anne Marie$3SBLV093252$4070$01447178 702 1$aMassimi$b, Paolo$3RAVV028594 790 1$aMassimi$b, P.$3UTOV558844$zMassimi, Paolo 801 3$aIT$bIT-01$c20210601 850 $aIT-RM028 $aIT-FR0017 899 $aBiblioteca Universitaria Alessandrina$bRM028 899 $aBiblioteca umanistica Giorgio Aprea$bFR0017 $eN 912 $aSBL0159315 950 0$aBiblioteca umanistica Giorgio Aprea$d 52MAG 14/939$e 52FSS0000014645 VMB RS $fA $h20210601$i20210601 977 $a 01$a 52 996 $aPeur$93635941 997 $aUNICAS LEADER 05000nam 22008655 450 001 9910299568803321 005 20251202120325.0 010 $a981-10-5065-1 024 7 $a10.1007/978-981-10-5065-7 035 $a(CKB)4340000000062865 035 $a(DE-He213)978-981-10-5065-7 035 $a(MiAaPQ)EBC4925113 035 $a(PPN)203667271 035 $a(MiAaPQ)EBC6235583 035 $a(EXLCZ)994340000000062865 100 $a20170725d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMathematical Modelling for Next-Generation Cryptography $eCREST Crypto-Math Project /$fedited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong 205 $a1st ed. 2018. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2018. 215 $a1 online resource (VIII, 368 p. 23 illus., 6 illus. in color.) 225 1 $aMathematics for Industry,$x2198-3518 ;$v29 311 08$a981-10-5064-3 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $a1. Algebraic Geometry -- 2. Number Theory -- 3. Theory of Computation -- 4. Quantum Computation -- 5. Quantum Field Theory -- 6. Mathematical Physics -- 7. Representation Theory -- 8. Lattice Theory -- 9. Multivariate Polynomial Theory -- 10. Data Encryption -- 11. Digital Signature -- 12. Searchable Encryption -- 13. Obfuscation -- 14. Privacy Protection -- 15. Copyright Protection -- 16. ID-Based Encryption. . 330 $aThis book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts. 410 0$aMathematics for Industry,$x2198-3518 ;$v29 606 $aData structures (Computer science) 606 $aInformation theory 606 $aData protection 606 $aEngineering mathematics 606 $aEngineering$xData processing 606 $aNumber theory 606 $aElementary particles (Physics) 606 $aQuantum field theory 606 $aQuantum physics 606 $aData Structures and Information Theory 606 $aData and Information Security 606 $aMathematical and Computational Engineering Applications 606 $aNumber Theory 606 $aElementary Particles, Quantum Field Theory 606 $aQuantum Physics 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aData protection. 615 0$aEngineering mathematics. 615 0$aEngineering$xData processing. 615 0$aNumber theory. 615 0$aElementary particles (Physics). 615 0$aQuantum field theory. 615 0$aQuantum physics. 615 14$aData Structures and Information Theory. 615 24$aData and Information Security. 615 24$aMathematical and Computational Engineering Applications. 615 24$aNumber Theory. 615 24$aElementary Particles, Quantum Field Theory. 615 24$aQuantum Physics. 676 $a652.8 702 $aTakagi$b Tsuyoshi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWakayama$b Masato$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTanaka$b K.$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKunihiro$b Noboru$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKimoto$b Kazufumi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDuong$b Dung Hoang$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299568803321 996 $aMathematical Modelling for Next-Generation Cryptography$92545796 997 $aUNINA