LEADER 01124nam 2200385 450 001 9910494715903321 005 20210122111631.0 010 $a1-68420-002-4 035 $a(CKB)4920000000488676 035 $a(MiAaPQ)EBC6326531 035 $a(EXLCZ)994920000000488676 100 $a20210122d2019 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aLaryngeal cancer $eclinical case-based approaches /$feditors, Roge?rio A. Dedivitis, [and three others] 210 1$aNew York, New York :$cThieme,$d[2019] 210 4$d©2019 215 $a1 online resource (xxiii, 193 pages) $cillustrations 300 $aIncludes index. 311 $a1-68420-001-6 606 $aLarynx$xCancer$xSurgery 608 $aElectronic books. 615 0$aLarynx$xCancer$xSurgery. 676 $a616.99422059 702 $aDedivitis$b Roge?rio A. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910494715903321 996 $aLaryngeal cancer$92477490 997 $aUNINA LEADER 02792oam 2200553 450 001 9910767529903321 005 20210716065645.0 010 $a3-540-69710-1 024 7 $a10.1007/3-540-69710-1 035 $a(CKB)1000000000210902 035 $a(SSID)ssj0000323098 035 $a(PQKBManifestationID)11242970 035 $a(PQKBTitleCode)TC0000323098 035 $a(PQKBWorkID)10288682 035 $a(PQKB)10831698 035 $a(DE-He213)978-3-540-69710-7 035 $a(MiAaPQ)EBC3072986 035 $a(MiAaPQ)EBC6486109 035 $a(PPN)155167227 035 $a(EXLCZ)991000000000210902 100 $a20210716d1998 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aFast software encryption $e5th international workshop, FSE '98, Paris, France, March 23-25, 1998 : proceedings /$fSerge Vaudenay (editor) 205 $a1st ed. 1998. 210 1$aBerlin, Heidelberg :$cSpringer,$d[1998] 210 4$d©1998 215 $a1 online resource (VIII, 297 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1372 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-64265-X 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aCryptanalysis I -- New Results in Linear Cryptanalysis of RC5 -- Higher Order Differential Attack of a CAST Cipher -- Cryptanalysis of TWOPRIME -- New Stream Ciphers -- JEROBOAM -- Fast Hashing and Stream Encryption with Panama -- Joint Hardware / Software Design of a Fast Stream Cipher -- Design Construction Analysis -- On the Security of the Hashing Scheme Based on SL 2 -- About Feistel Schemes with Six (or More) Rounds -- Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs -- Hash Functions -- MRD Hashing -- New Constructions for Secure Hash Functions -- Pseudo-Random Generators -- Cryptanalytic Attacks on Pseudorandom Number Generators -- New Block Ciphers -- CS-Cipher -- On the Design and Security of RC2 -- Serpent: A New Block Cipher Proposal -- Modes of Operations -- Attacking Triple Encryption -- Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation -- Cryptanalysis II -- Differential Cryptanalysis of the ICE Encryption Algorithm -- The First Two Rounds of MD4 are Not One-Way -- Differential Cryptanalysis of KHF. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1372 606 $aComputer science 615 0$aComputer science. 676 $a004 702 $aVaudenay$b Serge 712 12$aFSE '98 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a9910767529903321 996 $aFast Software Encryption$9772084 997 $aUNINA