LEADER 01465nam 2200337 n 450 001 996384674403316 005 20200824120515.0 035 $a(CKB)4940000000068655 035 $a(EEBO)2264192822 035 $a(UnM)99843358_8082e 035 $a(UnM)99843358_8082 035 $a(EXLCZ)994940000000068655 100 $a19910711d1640 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 10$aAchitophel, or the picture of a wicked polititian$b[electronic resource] $eDivided into three parts. A treatise presented heretofore in three sermons to the Vniversity of Oxford and now published. By Nath. Carpenter B.D. & fellow of Excet. Coll. in Oxford 210 $aOxford $cPrinted by Leonard Lichfield for Mathew Hunt$d1640 215 $a[8], 177, [3] p 300 $aA parable on Irish politics of uncertain reference. 300 $aThe last leaf is blank. 300 $aReproduction of the originals in Cambridge University Library and the British Library. 300 $aAppears at reel 1626 (Cambridge University Library copy) and at reel 1657 (British Library copy). 330 $aeebo-0021 517 3 $aPicture of a wicked polititian 607 $aIreland$xPolitics and government$y17th century$vEarly works to 1800 700 $aCarpenter$b Nathanael$f1589-1628?$01002440 801 0$bCu-RivES 906 $aBOOK 912 $a996384674403316 996 $aAchitophel, or the picture of a wicked polititian$92378309 997 $aUNISA LEADER 04034nam 22006735 450 001 996418304803316 005 20200705030920.0 010 $a3-030-45727-3 024 7 $a10.1007/978-3-030-45727-3 035 $a(CKB)4100000011273677 035 $a(MiAaPQ)EBC6286224 035 $a(DE-He213)978-3-030-45727-3 035 $a(PPN)248394525 035 $a(EXLCZ)994100000011273677 100 $a20200501d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? EUROCRYPT 2020$b[electronic resource] $e39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10?14, 2020, Proceedings, Part III /$fedited by Anne Canteaut, Yuval Ishai 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (xv, 821 pages) $cillustrations 225 1 $aSecurity and Cryptology ;$v12107 311 $a3-030-45726-5 327 $aAsymmetric Cryptanalysis -- Verifiable Delay Functions -- Signatures -- Attribute-Based Encryption -- Side-Channel Security -- Non-Interactive Zero-Knowledge -- Public-Key Encryption -- Zero-Knowledge -- Quantum II. 330 $aThe three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic. The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II. 410 0$aSecurity and Cryptology ;$v12107 606 $aData encryption (Computer science) 606 $aComputers 606 $aComputer communication systems 606 $aComputer security 606 $aArtificial intelligence 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSecurity Services$3https://scigraph.springernature.com/ontologies/product-market-codes/I28030 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aData encryption (Computer science). 615 0$aComputers. 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aArtificial intelligence. 615 14$aCryptology. 615 24$aInformation Systems and Communication Service. 615 24$aComputer Communication Networks. 615 24$aSecurity Services. 615 24$aArtificial Intelligence. 676 $a005.8 702 $aCanteaut$b Anne$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIshai$b Yuval$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996418304803316 996 $aAdvances in Cryptology ? EUROCRYPT 2020$91961611 997 $aUNISA