LEADER 02255nam 22005772 450 001 9910542304903321 005 20190717104925.0 010 $a1-80034-087-7 010 $a1-909821-76-4 035 $a(CKB)4100000005182542 035 $a(MiAaPQ)EBC5485132 035 $a(UkCbUP)CR9781909821767 035 $a(Au-PeEL)EBL5485132 035 $a(OCoLC)1048777120 035 $a(StDuBDS)EDZ0002316077 035 $a(EXLCZ)994100000005182542 100 $a20190507e19972012 uy| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAthens in Jerusalem $eclassical antiquity and Hellenism in the making of the modern secular Jew /$fYaacov Shavit ; translated by Chaya Naor and Niki Werner$b[electronic resource] 205 $aFirst digital on-demand edition. 210 1$aLiverpool :$cLiverpool University Press,$d2012. 215 $a1 online resource (xv, 560 pages) $cdigital, PDF file(s) 225 1 $aLiverpool scholarship online 300 $aOriginally published in 1997. 300 $aTitle from publisher's bibliographic system (viewed on 05 Jul 2019). 311 $a1-874774-36-6 311 $a1-874774-25-0 320 $aIncludes bibliographical references and index. 330 $aAccording to the author the Hellenistic tradition played a role as a model for Jewish modernisers to draw upon as they perceived a lack in Jewish culture. The author believes that Greek and Hellenistic concepts are now internalised by the Jewish people '. 410 0$aLiverpool scholarship online. 606 $aJudaism$xRelations$xGreek religion 606 $aJews$xCivilization$xGreek influences 606 $aJudaism$xHistory$yModern period, 1750-$xHistoriography 607 $aGreece$xReligion 615 0$aJudaism$xRelations$xGreek religion. 615 0$aJews$xCivilization$xGreek influences. 615 0$aJudaism$xHistory$xHistoriography. 676 $a296.3/7 700 $aShavit$b Jacob$01150455 702 $aNaor$b Chaya 702 $aWerner$b Niki 801 0$bUkCbUP 801 1$bUkCbUP 906 $aBOOK 912 $a9910542304903321 996 $aAthens in Jerusalem$92789140 997 $aUNINA LEADER 01014nam a2200265 i 4500 001 991001939329707536 005 20020508183954.0 008 010704s1965 it ||| | ita 035 $ab10935411-39ule_inst 035 $aPARLA151565$9ExL 040 $aDip.to Filosofia$bita 082 0 $a351.1 100 1 $aSpreafico, Alberto$068494 245 12$aL'amministrazione e il cittadino /$cAlberto Spreafico 260 $aMilano :$bEdizioni di Comunità,$c1965 300 $a159 p. ;$c21 cm. 490 0 $aCultura e realta ;$v70 651 4$aItalia$xAmministrazione pubblica 907 $a.b10935411$b23-02-17$c28-06-02 912 $a991001939329707536 945 $aLE005IF XIV F 27$g1$iLE005IFA-1139$lle005$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i11041523$z28-06-02 945 $aLE005 DIR II B 120$g1$i2005000159336$lle005$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i13111012$z19-02-04 996 $aAmministrazione e il cittadino$9919753 997 $aUNISALENTO 998 $ale005$b01-01-01$cm$da $e-$fita$git $h2$i1 LEADER 05829nam 22008895 450 001 9910146617503321 005 20251226195445.0 010 $a3-540-49476-6 024 7 $a10.1007/11935230 035 $a(CKB)1000000000283703 035 $a(SSID)ssj0000315800 035 $a(PQKBManifestationID)11261545 035 $a(PQKBTitleCode)TC0000315800 035 $a(PQKBWorkID)10256692 035 $a(PQKB)10103879 035 $a(DE-He213)978-3-540-49476-8 035 $a(MiAaPQ)EBC3068676 035 $a(PPN)123139767 035 $a(BIP)34164504 035 $a(BIP)13887582 035 $a(EXLCZ)991000000000283703 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology -- ASIACRYPT 2006 $e12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings /$fedited by Xuejia Lai, Kefei Chen 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XIV, 470 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4284 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-49475-8 320 $aIncludes bibliographical references and index. 327 $aAttacks on Hash Functions -- Finding SHA-1 Characteristics: General Results and Applications -- Improved Collision Search for SHA-0 -- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions -- Stream Ciphers and Boolean Functions -- New Guess-and-Determine Attack on the Self-Shrinking Generator -- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition -- Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity -- Biometrics and ECC Computation -- Secure Sketch for Biometric Templates -- The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography -- Extending Scalar Multiplication Using Double Bases -- ID-Based Schemes -- HIBE With Short Public Parameters Without Random Oracle -- Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys -- On the Generic Construction of Identity-Based Signatures with Additional Properties -- Public-Key Schemes -- On the Provable Security of an Efficient RSA-Based Pseudorandom Generator -- On the Security of OAEP -- Relationship Between Standard Model Plaintext Awareness and Message Hiding -- RSA and Factorization -- On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms -- Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption -- A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants -- Construction of Hash Function -- Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding -- Multi-Property-Preserving Hash Domain Extension and the EMD Transform -- Combining Compression Functions and Block Cipher-Based Hash Functions -- Protocols -- A Scalable Password-Based Group Key Exchange Protocol in the Standard Model -- AWeakness in Some Oblivious Transfer and Zero-Knowledge Protocols -- Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution -- Block Ciphers -- KFC ? The Krazy Feistel Cipher -- Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions -- New Cryptanalytic Results on IDEA -- Signatures -- New Approach for Selectively Convertible Undeniable Signature Schemes -- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures -- Analysis of One Popular Group Signature Scheme. 330 $aThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The 30 revised full papers cover attacks on hash functions, stream ciphers, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4284 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aAlgorithms 606 $aElectronic data processing$xManagement 606 $aComputer networks 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCryptology 606 $aData and Information Security 606 $aAlgorithms 606 $aIT Operations 606 $aComputer Communication Networks 606 $aDiscrete Mathematics in Computer Science 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection. 615 0$aAlgorithms. 615 0$aElectronic data processing$xManagement. 615 0$aComputer networks. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aAlgorithms. 615 24$aIT Operations. 615 24$aComputer Communication Networks. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8 701 $aLai$b Xuejia$01763060 701 $aChen$b Kefei$f1959-$0947887 712 12$aInternational Conference on the Theory and Application of Cryptology and Information Security. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910146617503321 996 $aAdvances in Cryptology -- ASIACRYPT 2006$94521394 997 $aUNINA