LEADER 06052nam 22008175 450 001 996465703703316 005 20200706004258.0 010 $a1-280-39056-5 010 $a9786613568489 010 $a3-642-17455-8 024 7 $a10.1007/978-3-642-17455-1 035 $a(CKB)2670000000056692 035 $a(SSID)ssj0000446678 035 $a(PQKBManifestationID)11298846 035 $a(PQKBTitleCode)TC0000446678 035 $a(PQKBWorkID)10496423 035 $a(PQKB)10474384 035 $a(DE-He213)978-3-642-17455-1 035 $a(MiAaPQ)EBC3066140 035 $a(PPN)149890621 035 $a(EXLCZ)992670000000056692 100 $a20101118d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPairing-Based Cryptography - Pairing 2010$b[electronic resource] $e4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings /$fedited by Marc Joye, Atsuko Miyaji, Akira Otsuka 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XIII, 467 p. 37 illus.) 225 1 $aSecurity and Cryptology ;$v6487 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-17454-X 327 $aEfficient Software Implementation -- An Analysis of Affine Coordinates for Pairing Computation -- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto?Naehrig Curves -- Invited Talk 1 -- Some Security Topics with Possible Applications for Pairing-Based Cryptography -- Digital Signatures -- A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange -- Anonymizable Signature and Its Construction from Pairings -- Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches -- Cryptographic Protocols -- Oblivious Transfer with Access Control : Realizing Disjunction without Duplication -- Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares -- Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability -- Key Agreement -- Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange -- Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement -- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys -- Invited Talk 2 -- Pairing-Based Non-interactive Zero-Knowledge Proofs -- Applications: Code Generation, Time-Released Encryption, Cloud Computing -- Designing a Code Generator for Pairing Based Cryptographic Functions -- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability -- Optimal Authenticated Data Structures with Multilinear Forms -- Point Encoding and Pairing-Friendly Curves -- Deterministic Encoding and Hashing to Odd Hyperelliptic Curves -- Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time -- A New Method for Constructing Pairing-Friendly Abelian Surfaces -- Generating More Kawazoe-Takahashi Genus 2 Pairing-Friendly Hyperelliptic Curves -- ID-Based Encryption Schemes -- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks -- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts -- Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman -- Invited Talk 3 -- A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties -- Efficient Hardware, FPGAs, and Algorithms -- Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves -- A Variant of Miller?s Formula and Algorithm -- Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree -- High Speed Flexible Pairing Cryptoprocessor on FPGA Platform. 410 0$aSecurity and Cryptology ;$v6487 606 $aData encryption (Computer science) 606 $aComputer science?Mathematics 606 $aCoding theory 606 $aInformation theory 606 $aComputer communication systems 606 $aAlgorithms 606 $aComputer security 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aData encryption (Computer science). 615 0$aComputer science?Mathematics. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 0$aComputer security. 615 14$aCryptology. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aCoding and Information Theory. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 676 $a005.8/2 702 $aJoye$b Marc$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMiyaji$b Atsuko$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aOtsuka$b Akira$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference on Pairing-Based Cryptography 906 $aBOOK 912 $a996465703703316 996 $aPairing-Based Cryptography - Pairing 2010$92830595 997 $aUNISA LEADER 01272nam0 22002771i 450 001 UON00169985 005 20231205103050.17 100 $a20030616d1891 |0itac50 ba 101 $aita$aTHA 102 $aIT 105 $a|||| 1|||| 200 1 $aAyuthia o krung sri Ayuddhya$eStudi originali sull'antica capitale del regno di Syam e documenti storici riguardanti la storia della medesima tradotti ed annotati$fper G.E. Gerini (Ausonius) 205 $aManoscritto 210 $aBankok$d1891 215 $aQuaderno 33x23 cm, paginazione meccanica 1-285 606 $aTHAILANDIA$xSTORIA$xREGNO AYUTTHAYA$3UONC016072$2FI 686 $aTAI IV$cTAILANDIA - STORIA$2A 700 1$aGerini$bGerolamo Emilio$cColonnello$3UONV030885$01589412 790 1$aGERINI, G. E.$zGerini, Gerolamo Emilio $3UONV225140 790 0$aP'hrah Sarasasn Balakhandh$yGerini, Gerolamo Emilio $3UONV218952 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00169985 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI MS TAI 008 $eSI SA 108631 7 008 996 $aAyuthia o krung sri Ayuddhya$93897491 997 $aUNIOR LEADER 01074nam0 22002651i 450 001 UON00047447 005 20231205102212.613 100 $a20020107d1965 |0itac50 ba 101 $arus 102 $aSU 105 $a|||| 1|||| 200 1 $aNad arabskimi rukopisjami$eListki vospominanij o knigax i ljudjax$fI.Ju. Krackovskij 210 $aMoskva$cIzd. Akademii Nauk SSSR$d1965 215 $a230 p.$d24 cm 606 $aORIENTALISMO$xUNIONE SOVIETICA$3UONC004100$2FI 620 $aRU$dMoskva$3UONL003152 686 $aARA GEN F I$cPAESI ARABI - STORIA DELL'ORIENTALISMO$2A 700 1$aKRA?KOVSKIJ$bIgnatij Julianovi?$3UONV029240$0782303 712 $aIzdatel'stvo Vosto?noj Literatury$3UONV246797$4650 801 $aIT$bSOL$c20241213$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00047447 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI ARA GEN F I 003 $eSI SA 37709 5 003 996 $aNad arabskimi rukopisjami$91735610 997 $aUNIOR