LEADER 01342nam 2200385Ia 450 001 996393477403316 005 20200818231506.0 035 $a(CKB)4940000000117810 035 $a(EEBO)2240852896 035 $a(OCoLC)ocm15564652e 035 $a(OCoLC)15564652 035 $a(EXLCZ)994940000000117810 100 $a19870422d1680 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 10$aBy the King, a proclamation for prising of wines$b[electronic resource] 210 $aLondon $cPrinted by John Bill, Thomas Newcomb and Henry Hills ...$d1679/80 [i.e. 1680] 215 $a1 broadside 300 $a"Given at our court at Whitehall the three and twentieth day of January 1679, in the one and thirtieth year of our reign." 300 $aReproduction of the original in the Huntington Library. 330 $aeebo-0113 606 $aWine and wine making$xLaw and legislation$zEngland 607 $aGreat Britain$xHistory$yCharles II, 1660-1685 615 0$aWine and wine making$xLaw and legislation 701 $aCharles$cKing of England,$f1630-1685.$0793293 801 0$bEAE 801 1$bEAE 801 2$bm/c 801 2$bEAE 801 2$bUMI 801 2$bWaOLN 906 $aBOOK 912 $a996393477403316 996 $aBy the King. A proclamation for prising of wines$92308009 997 $aUNISA LEADER 05897nam 2200661 450 001 996465822703316 005 20220817144121.0 010 $a1-280-80454-8 010 $a9786610804542 010 $a3-540-45961-8 024 7 $a10.1007/3-540-45961-8 035 $a(CKB)1000000000210867 035 $a(EBL)3036560 035 $a(SSID)ssj0000288100 035 $a(PQKBManifestationID)11205229 035 $a(PQKBTitleCode)TC0000288100 035 $a(PQKBWorkID)10373026 035 $a(PQKB)10741550 035 $a(DE-He213)978-3-540-45961-3 035 $a(MiAaPQ)EBC3036560 035 $a(MiAaPQ)EBC6806145 035 $a(Au-PeEL)EBL6806145 035 $a(OCoLC)1167636848 035 $a(PPN)155202707 035 $a(EXLCZ)991000000000210867 100 $a20220817d1988 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aAdvances in cryptology - EUROCRYPT '88 $eworkshop on the theory and application of cryptographic techniques Davos, Switzerland, May 25-27, 1988 proceedings /$fedited by D. Barstow [and ten others] 205 $a1st ed. 1988. 210 1$aBerlin, Heidelberg :$cSpringer-Verlag,$d[1988] 210 4$dİ1988 215 $a1 online resource (441 p.) 225 1 $aLecture Notes in Computer Science ;$v330 300 $aDescription based upon print version of record. 311 $a3-540-50251-3 320 $aIncludes bibliographical references and index. 327 $aKey Distribution -- Key Agreements Based on Function Composition -- Security of Improved Identity-based Conference Key Distribution Systems -- Authentication -- Subliminal-free Authentication and Signature -- Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts -- Authentication Codes with Multiple Arbiters -- Some Constructions for Authentication - Secrecy Codes -- Efficient Zero-Knowledge Identification Scheme for Smart Cards -- Signatures -- A Smart Card Implementation of the Fiat-Shamir Identification Scheme -- Manipulations and Errors, Detection and Localization -- Privacy Protected Payments ? Realization of a Protocol That Guarantees Payer Anonymity -- A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory -- A Generalized Birthday Attack -- Protocols -- An Interactive Data Exchange Protocol Based on Discrete Exponentiation -- Anonymous and Verifiable Registration in Databases -- Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA -- Passports and Visas Versus IDs -- Complexity and Number Theory -- The Probabilistic Theory of Linear Complexity -- A Probabilistic Primality Test Based on the Properties of Certain Generalized Lucas Numbers -- On the Construction of Random Number Generators and Random Function Generators -- Numerical Methods -- Factorization of Large Integers on a Massively Parallel Computer -- A Fast Modular Arithmetic Algorithm Using a Residue Table -- Fast Exponentiation in GF(2n) -- Fast RSA-Hardware: Dream or Reality? -- Cryptanalysis -- Properties of the Euler Totient Function Modulo 24 and Some of Its Cryptographic Implications -- An Observation on the Security of McEliece?s Public-Key Cryptosystem -- How to Break Okamoto?s Cryptosystem by Reducing Lattice Bases -- Cryptanalysis of F.E.A.L. -- Fast Correlation Attacks on Stream Ciphers -- Running-Key Ciphers -- A New Class of Nonlinear Functions for Running-key Generators -- Windmill Generators A generalization and an observation of how many there are -- Lock-in Effect in Cascades of Clock-Controlled Shift-Registers -- Proof of Massey?s Conjectured Algorithm -- Linear Recurring m-Arrays -- Cipher Theory and Threshold -- Substantial Number of Cryptographic Keys and Its Application to Encryption Designs -- A Measure of Semiequivocation -- Some New Classes of Geometric Threshold Schemes -- New Ciphers -- A Universal Algorithm for Homophonic Coding -- A New Probabilistic Encryption Scheme -- Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption -- Some Applications of Multiple Key Ciphers. 330 $aThe International .4ssociation for Cryptologic Research (1.4CR) organizes tmo - ternational conferences every year, one in Europe and one in the 1-nited States. EUROCRYI?T?88. held in the beautiful environment of the S\~isb mountains in Davos, was the sixth European conference. The number of contributions and of participants at the meeting has increased substantiall!.. which is an indication of the high interest in cryptography and system security in general. The interest has not only increased but has also further moved towards - thentication. signatures and other protocols. This is easy to understand in view of the urgent needs for such protocols, in particular in connection with open - formation systems, and in view of the exciting problems in this area. The equally fascinating classical field of secrecy, 2.e. the theory, design and analysis of stream or block ciphers and of public key cryptosystems. was however also well represented and several significant results mere communicated. The present proceedings contain all contributions which were accepted for presentation. The chapters correspond to the sessions at the conference. 410 0$aLecture notes in computer science ;$v330. 606 $aComputer science 606 $aData encryption (Computer science) 606 $aElectronic data processing 615 0$aComputer science. 615 0$aData encryption (Computer science) 615 0$aElectronic data processing. 676 $a004 702 $aBarstow$b D. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465822703316 996 $aAdvances in Cryptology ? EUROCRYPT '88$92830715 997 $aUNISA