LEADER 01913nam0 22003131i 450 001 VAN0048616 005 20110301120541.84 010 $a88-243-1629-8 100 $a20060728d2006 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aRegime della terra e imposizione fondiaria nell'etā dei Gracchi$etesto e commento storico-giuridico della legge agraria del 111 a. c.$fOsvaldo Sacchi 210 $aNapoli$cJovene$d2006 215 $aXXVIII, 627 p.$d24 cm. 410 1$1001VAN0010123$12001 $aPubblicazioni della Facoltā di giurisprudenza della Seconda Universitā di Napoli. Sezione Monografie$1210 $aNapoli$cJovene$d1996-.$v29 620 $dNapoli$3VANL000005 700 1$aSacchi$bOsvaldo$3VANV020586$0285288 712 $aJovene $3VANV107888$4650 801 $aIT$bSOL$c20230707$gRICA 912 $aVAN0048616 950 $aBIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA$d00CONS XVIII.Ele.87 $e00 32341 20060728 950 $aBIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA$d00CONS XVIII.Ele.87 bis $e00 32339 20060728 950 $aBIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA$d00CONS XVIII.Ele.87 qq $e00 32342 20060728 950 $aBIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA$d00CONS XVIII.Ele.87 qt $e00 32343 20060728 950 $aBIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA$d00CONS XVIII.Ele.87 ss $e00BFG665 20081010 950 $aBIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA$d00CONS XVIII.Ele.87 ter $e00 32340 20060728 996 $aRegime della terra e imposizione fondiaria nell'etā dei Gracchi$9730263 997 $aUNICAMPANIA LEADER 04738nam 22007695 450 001 9910999686403321 005 20250618151915.0 010 $a3-031-91098-2 024 7 $a10.1007/978-3-031-91098-2 035 $a(CKB)38641846900041 035 $a(DE-He213)978-3-031-91098-2 035 $a(MiAaPQ)EBC32047793 035 $a(Au-PeEL)EBL32047793 035 $a(EXLCZ)9938641846900041 100 $a20250427d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? EUROCRYPT 2025 $e44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4?8, 2025, Proceedings, Part VII /$fedited by Serge Fehr, Pierre-Alain Fouque 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XX, 468 p. 33 illus., 14 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15607 311 08$a3-031-91097-4 327 $aTheoretical Foundations: Oracle Separation Between Quantum Commitments and Quantum One-wayness -- A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID -- Hard Quantum Extrapolations in Quantum Cryptography -- A Meta-complexity Characterization of Quantum Cryptography -- The power of a single Haar random state: constructing and separating quantum pseudorandomness -- Pseudorandomness in the (Inverseless) Haar Random Oracle Model -- Verifiable random function from the Deuring correspondence and higher dimensional isogenies -- Exponent-VRFs and Their Applications -- Good Things Come to Those Who Wait: Dishonest-Majority Coin-Flipping Requires Delay Functions -- LEAP: A Fast, Lattice-based OPRF with Application to Private Set Intersection -- Pseudorandom Functions with Weak Programming Privacy and Applications to Private Information Retrieval -- Distributed Randomness using Weighted VUFs -- A New Approach to Generic Lower Bounds: Classical/Quantum MDL, Quantum Factoring, and More -- Fine-Grained Complexity in a World without Cryptography -- Succinct Randomized Encodings from Laconic Function Evaluation, Faster and Simpler -- BitGC: Garbled Circuits with 1 Bit per Gate. 330 $aThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4?8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows: Part I: Secure Multiparty Computation I Part II: Public-Key Cryptography and Key-Exchange Part III: Advanced Cryptographic Schemes Part IV: (Non-)Interactive Proofs and Zero-Knowledge Part V: Secure Multiparty Computation II Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks Part VII: Theoretical Foundations Part VIII: Real-World Cryptography. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15607 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aApplication software 606 $aData protection 606 $aCryptology 606 $aMobile and Network Security 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aSecurity Services 606 $aXifratge (Informātica)$2thub 606 $aSeguretat informātica$2thub 608 $aCongressos$2thub 608 $aLlibres electrōnics$2thub 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 0$aApplication software. 615 0$aData protection. 615 14$aCryptology. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aSecurity Services. 615 7$aXifratge (Informātica) 615 7$aSeguretat informātica 676 $a005.824 702 $aFehr$b S$g(Serge),$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFouque$b Pierre-Alain$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910999686403321 996 $aAdvances in Cryptology ? EUROCRYPT 2025$94373624 997 $aUNINA