LEADER 01384nam0 22003011i 450 001 UON00042917 005 20231205102153.935 100 $a20020107d1967 |0itac50 ba 101 $arus 102 $aSU 105 $a||||e ||||| 200 1 $aAvarsko-Russkij slovar'$eS prilozeniem kratkogo grammaticeskogo ocerka avarskogo jazyja ; sostav. Magomedsajid Saidov 210 $aMoskva$cIzdatel'stvo Sovetskaja Enciklopedija$d1967 215 $a806 p.$d21 c 300 $aIn testa al front. Dagestanskij Filial Akademii Nauk SSSR, Institut Istorii, Jazyka i Literatury im. Gamzata Cadasa 510 1$3UON00355986$aAvar-Gurus macial'ul slovar' 606 $aLingua avara$xDizionari$3UONC014689$2FI 606 $aLINGUE CAUCASICHE$xGRUPPO NORDORIENTALE$xAVARO$3UONC014688$2FI 620 $aRU$dMoskva$3UONL003152 686 $aCAU II C$cCAUCASO E ARMENIA - LINGUISTICA - LINGUE CAUCASICHE DI NORD EST$2A 702 1$aSAIDOV$bMagomedsajid$3UONV027252 712 $aIzdatel'stvo Sovetskaja Čnciklopedija$3UONV265893$4650 801 $aIT$bSOL$c20250509$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00042917 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI CAU II C 002 $eSI SA 3606 7 002 996 $aAvarsko-Russkij slovar$91153016 997 $aUNIOR LEADER 05472nam 22007815 450 001 9910512310103321 005 20251225180442.0 010 $a3-030-92062-3 024 7 $a10.1007/978-3-030-92062-3 035 $a(MiAaPQ)EBC6819758 035 $a(Au-PeEL)EBL6819758 035 $a(CKB)19968778600041 035 $a(OCoLC)1287129407 035 $a(PPN)258838906 035 $a(BIP)82384554 035 $a(BIP)82050571 035 $a(DE-He213)978-3-030-92062-3 035 $a(EXLCZ)9919968778600041 100 $a20211130d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2021 $e27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6?10, 2021, Proceedings, Part I /$fedited by Mehdi Tibouchi, Huaxiong Wang 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (715 pages) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v13090 311 08$aPrint version: Tibouchi, Mehdi Advances in Cryptology - ASIACRYPT 2021 Cham : Springer International Publishing AG,c2022 9783030920616 320 $aIncludes bibliographical references and index. 327 $aOn the Hardness of the NTRU problem -- A Geometric Approach to Linear Cryptanalysis -- Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation -- Partial Key Exposure Attack on Short Secret Exponent CRT-RSA -- A formula for disaster: a unified approach to elliptic curve special-point-based attacks -- Cryptanalysis of an oblivious PRF from supersingular isogenies -- A Practical Key-Recovery Attack on 805-Round Trivium -- Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations -- Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials -- Clustering Effect in Simon and Simeck -- New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair -- Convexity of division property transitions: theory, algorithms and compact models -- Strong and Tight Security Guarantees against Integral Distinguishers -- Massive Superpoly Recovery with Nested Monomial Predictions -- Quantum Linearization Attacks -- Generic Framework forKey-Guessing Improvements -- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model -- Redeeming Reset Indifferentiability and Applications to Post-Quantum Security -- Franchised Quantum Money -- Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP -- Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication -- Tight adaptive reprogramming in the QROM -- QCB: Efficient Quantum-secure Authenticated Encryption. 330 $aThe four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptoanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v13090 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData structures (Computer science) 606 $aInformation theory 606 $aApplication software 606 $aComputer networks 606 $aData protection 606 $aCryptology 606 $aData Structures and Information Theory 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 606 $aData and Information Security 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aApplication software. 615 0$aComputer networks. 615 0$aData protection. 615 14$aCryptology. 615 24$aData Structures and Information Theory. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 676 $a001.5436 702 $aTibouchi$b Mehdi 702 $aWang$b Huaxiong 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910512310103321 996 $aAdvances in cryptology - ASIACRYPT 2021$92906579 997 $aUNINA