LEADER 00722nam0-22002531i-450- 001 990002757980403321 035 $a000275798 035 $aFED01000275798 035 $a(Aleph)000275798FED01 035 $a000275798 100 $a20000920d1966----km-y0itay50------ba 101 1$aENG 200 1 $aPlanning and Control with PERT CPM.$fby Le vin R.I. , Kirkpatrick C.A. 210 $aNew York$cMcGraw-Hill$d1966 700 1$aLevin,$bR.I.$0367780 702 1$aKirkpatrick,$bCharles Atkinson 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990002757980403321 952 $a1-5-65$b1711 ITA$fECA 959 $aECA 996 $aPlanning and Control with PERT CPM$9422660 997 $aUNINA DB $aING01 LEADER 04823nam 22007695 450 001 9910999777703321 005 20250618150804.0 010 $a3-031-91124-5 024 7 $a10.1007/978-3-031-91124-8 035 $a(CKB)38641838800041 035 $a(DE-He213)978-3-031-91124-8 035 $a(MiAaPQ)EBC32047790 035 $a(Au-PeEL)EBL32047790 035 $a(EXLCZ)9938641838800041 100 $a20250427d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? EUROCRYPT 2025 $e44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4?8, 2025, Proceedings, Part II /$fedited by Serge Fehr, Pierre-Alain Fouque 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XX, 484 p. 76 illus., 16 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15602 311 08$a3-031-91123-7 327 $aPublic-Key Cryptography and Key-Exchange: Somewhat Homomorphic Encryption from Linear Homomorphism and Sparse LPN -- Leveraging Small Message Spaces for CCA1 Security in Additively Homomorphic and BGN-type Encryption -- Post-Quantum PKE from Unstructured Noisy Linear Algebraic Assumptions: Beyond LWE and Alekhnovich's LPN -- POKÉ: A Compact and Efficient PKE from Higher-dimensional Isogenies -- Re-Randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions -- A reduction from Hawk to the principal ideal problem in a quaternion algebra -- Cryptanalysis of rank-2 module-LIP: a single real embedding is all it takes -- Do Not Disturb a Sleeping Falcon: Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences -- (Un)breakable curses - re-encryption in the Fujisaki-Okamoto transform -- Generic Anamorphic Encryption, Revisited: New Limitations and Constructions -- Glacius: Threshold Schnorr Signatures from DDH with Full Adaptive Security -- Stronger Security for Threshold Blind Signatures -- Non-Interactive Blind Signatures from RSA Assumption and More -- PAKE Combiners and E cient Post-Quantum Instantiations -- Hybrid Password Authentication Key Exchange in the UC Framework -- Under What Conditions Is Encrypted Key Exchange Actually Secure? 330 $aThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4?8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows: Part I: Secure Multiparty Computation I Part II: Public-Key Cryptography and Key-Exchange Part III: Advanced Cryptographic Schemes Part IV: (Non-)Interactive Proofs and Zero-Knowledge Part V: Secure Multiparty Computation II Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks Part VII: Theoretical Foundations Part VIII: Real-World Cryptography. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15602 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aApplication software 606 $aData protection 606 $aCryptology 606 $aMobile and Network Security 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aSecurity Services 606 $aXifratge (Informātica)$2thub 606 $aSeguretat informātica$2thub 608 $aCongressos$2thub 608 $aLlibres electrōnics$2thub 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 0$aApplication software. 615 0$aData protection. 615 14$aCryptology. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aSecurity Services. 615 7$aXifratge (Informātica) 615 7$aSeguretat informātica 676 $a005.824 702 $aFehr$b S$g(Serge),$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFouque$b Pierre-Alain$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910999777703321 996 $aAdvances in Cryptology ? EUROCRYPT 2025$94373624 997 $aUNINA