LEADER 04483nam 2200589 450 001 9910155386903321 005 20200520144314.0 010 $a3-11-044817-3 010 $a3-11-044881-5 024 7 $a10.1515/9783110448818 035 $a(CKB)3850000000001160 035 $a(MiAaPQ)EBC4768896 035 $a(DE-B1597)457940 035 $a(OCoLC)966489789 035 $a(DE-B1597)9783110448818 035 $a(PPN)20211063X 035 $a(Au-PeEL)EBL4768896 035 $a(CaPaEBR)ebr11316718 035 $a(CaONFJC)MIL970135 035 $a(EXLCZ)993850000000001160 100 $a20161219h20162016 uy 0 101 0 $ager 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aTranslating writings of early scholars in the ancient near east, egypt, greece, and rome $emethodological aspects with examples /$fedited by Annette Imhausen and Tanja Pommerening 210 1$aBerlin, [Germany] ;$aBoston, [Massachusetts] :$cDe Gruyter,$d2016. 210 4$d©2016 215 $a1 online resource (624 pages) $cillustrations, photographs 225 1 $aBeitra?ge zur Altertumskunde,$x1616-0452 ;$vBand 344 311 $a3-11-044886-6 311 $a3-11-044704-5 320 $aIncludes bibliographical references and index. 327 $tFrontmatter -- $tVorwort -- $tContents -- $tEin Methodenbuch zur Übersetzung von Wissenstexten: Gründe, Ziele, Wege und Ausblick -- $tMedizinische Texte aus dem Alten Mesopotamien -- $tTranslating Babylonian Mathematical Problem Texts -- $tTranslating Babylonian Astronomical Diaries and Procedure Texts -- $tHeilkundliche Texte aus dem Alten Ägypten: Vorschläge zur Kommentierung und Übersetzung -- $tZum Arbeiten mit hieratischen mathematischen Aufgabentexten -- $tBeispiele für Übersetzung und Kommentierung ägyptischer astronomischer Texte: Sonnenuhr, Sonnenaufgang und Dekansterne -- $tChallenges of interpreting Egyptian astronomical texts -- $tÜbersetzung aus einem griechischen medizinischen Werk (Corpus Hippocraticum, De morbo sacro VI?VII, 5) -- $tA case-study in Roman mathematics: The description of the analemma in -- $tTranslating Greek Astronomy: Theon of Smyrna on the Apparent Motions of the Planets -- $tTranslating Greco-Roman Astrological Texts: The Horoscope of Hadrian by Antigonus of Nicaea -- $tAppendix -- $tIndex 330 $aAncient cultures have left written evidence of a variety of scientific texts. But how can/should they be translated? Is it possible to use modern concepts (and terminology) in their translation and which consequences result from this practice? Scholars of various disciplines discuss the practice of translating ancient scientific texts and present examples of these texts and their translations. 330 $aDie Übersetzung antiker wissenschaftlicher Texte stellt Studierende wie Forschende immer wieder vor besondere Herausforderungen, auch deshalb, weil eine systematische Referenzgrundlage für den Umgang mit diesen Texten bislang fehlt. Im Rahmen eines von der Fritz Thyssen Stiftung geförderten Projektes haben einschlägige Wissenschaftshistoriker und -historikerinnen der Ägyptologie, Altorientalistik und Altphilologie grundsätzliche Probleme von Übersetzungen und mögliche Lösungen diskutiert. Das Ergebnis ist ein Methodenhandbuch, das Studierenden und Forschenden aus den entsprechenden Philologien, Natur-, Geschichts- und Kulturwissenschaften Grundlagen der Übersetzungspraxis und -methodik vermittelt. Mit ausgewählten Fallbeispielen aus den Bereichen der antiken Heilkunde, Astronomie, Astrologie und Mathematik, mit fachspezifischen Hinweisen auf Übersetzungs- und Kommentierungswege sowie mit fachbezogenen Übersichten über Hilfsmittel wird das Übersetzen und das Verständnis und die Bewertung bereits vorhandener Übersetzungen antiker wissenschaftlicher Texte erleichtert. 410 0$aBeitra?ge zur Altertumskunde ;$vBand 344. 606 $aEgyptian language$xWriting, Hieroglyphic 608 $aElectronic books. 615 0$aEgyptian language$xWriting, Hieroglyphic. 676 $a493.1 686 $aFX 228105$2rvk 702 $aImhausen$b Annette 702 $aPommerening$b Tanja 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910155386903321 996 $aTranslating writings of early scholars in the ancient near east, egypt, greece, and rome$92457810 997 $aUNINA LEADER 11395nam 22008175 450 001 996465545803316 005 20200702015552.0 010 $a3-642-32009-0 024 7 $a10.1007/978-3-642-32009-5 035 $a(CKB)3400000000085701 035 $a(SSID)ssj0000745811 035 $a(PQKBManifestationID)11451524 035 $a(PQKBTitleCode)TC0000745811 035 $a(PQKBWorkID)10859469 035 $a(PQKB)10959403 035 $a(DE-He213)978-3-642-32009-5 035 $a(MiAaPQ)EBC3069836 035 $a(PPN)168320797 035 $a(EXLCZ)993400000000085701 100 $a20120806d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology -- CRYPTO 2012$b[electronic resource] $e32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings /$fedited by Reihaneh Safavi-Naini, Ran Canetti 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XV, 888 p. 103 illus.) 225 1 $aSecurity and Cryptology ;$v7417 300 $aInternational conferenc proceedings. 311 $a3-642-32008-2 320 $aIncludes bibliographical references and author index. 327 $aSymmetric Cryptosystems -- An Enciphering Scheme Based on a Card Shuffle.- Tweakable Blockciphers with Beyond Birthday-Bound Security.- Breaking and Repairing GCM Security Proofs.- On the Distribution of Linear Biases: Three Instructive Examples.- Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs.- Invited Talk -- The End of Crypto.- Secure Computation I.- Adaptively Secure Multi-Party Computation with Dishonest Majority.- Collusion-Preserving Computation.- Secret Sharing Schemes for Very Dense Graphs.- Attribute-Based and Functional Encryption -- Functional Encryption with Bounded Collusions via Multi-party Computation.- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption -- Functional Encryption for Regular Languages.- Proof Systems.- Database Commitments and Universal Arguments of Quasi Knowledge.- Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits.- Protocols -- On the Security of TLS-DHE in the Standard Model.- Semantic Security for the Wiretap Channel.- Multi-instance Security and Its Application to Password-Based Cryptography.- Hash Functions -- Hash Functions Based on Three Permutations: A Generic Security Analysis.-  Hash or Not to Hash Again? (In)Differentiability Results for H2 and HMAC.- New Preimage Attacks against Reduced SHA-1.- Stam?s Conjecture and Threshold Phenomena in Collision Resistance.- Composable Security -- Universal Composability from Essentially Any Trusted Setup.- Impossibility Results for Static Input Secure Computation.- New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation.- Black-Box Constructions of Composable Protocols without Set-Up.- Privacy -- Crowd-Blending Privacy.- Differential Privacy with Imperfect Randomness.- Leakage and Side-Channels -- Tamper and Leakage Resilience in the Split-State Model.- Securing Circuits against Constant-Rate Tampering.- How to Compute under AC0 Leakage without Secure Hardware.- Invited Talk -- Recent Advances and Existing Research Questions in Platform Security.- Signatures -- Group Signatures with Almost-for-Free Revocation.- Tightly Secure Signatures and Public-Key Encryption.- Implementation Analysis -- Efficient Padding Oracle Attacks on Cryptographic Hardware.- Public Keys.- Secure Computation II -- Multiparty Computation from Somewhat Homomorphic Encryption -- Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority -- A New Approach to Practical Active-Secure Two-Party Computation -- Black-Box Separation -- The Curious Case of Non-Interactive Commitments ? On the Power of Black-Box vs. Non-Black-Box Use of Primitive -- Cryptanalysis -- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems -- Resistance against Iterated Attacks by Decorrelation Revisited -- Quantum Cryptography -- Secure Identity-Based Encryption in the Quantum Random Oracle Model -- Quantum to Classical Randomness Extractors -- Actively Secure Two-Party Evaluation of Any Quantum Operation -- Key Encapsulation and One-Way functions -- On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups -- Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves -- Homomorphic Evaluation of the AES Circuit -- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. An Enciphering Scheme Based on a Card Shuffle.- Tweakable Blockciphers with Beyond Birthday-Bound Security.- Breaking and Repairing GCM Security Proofs.- On the Distribution of Linear Biases: Three Instructive Examples.- Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs.- Invited Talk -- The End of Crypto.- Secure Computation I.- Adaptively Secure Multi-Party Computation with Dishonest Majority.- Collusion-Preserving Computation.- Secret Sharing Schemes for Very Dense Graphs.- Attribute-Based and Functional Encryption -- Functional Encryption with Bounded Collusions via Multi-party Computation.- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption -- Functional Encryption for Regular Languages.- Proof Systems.- Database Commitments and Universal Arguments of Quasi Knowledge.- Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits.- Protocols -- On the Security of TLS-DHE in the Standard Model.- Semantic Security for the Wiretap Channel.- Multi-instance Security and Its Application to Password-Based Cryptography.- Hash Functions -- Hash Functions Based on Three Permutations: A Generic Security Analysis.-  Hash or Not to Hash Again? (In)Differentiability Results for H2 and HMAC.- New Preimage Attacks against Reduced SHA-1.- Stam?s Conjecture and Threshold Phenomena in Collision Resistance.- Composable Security -- Universal Composability from Essentially Any Trusted Setup.- Impossibility Results for Static Input Secure Computation.- New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation.- Black-Box Constructions of Composable Protocols without Set-Up.- Privacy -- Crowd-Blending Privacy.- Differential Privacy with Imperfect Randomness.- Leakage and Side-Channels -- Tamper and Leakage Resilience in the Split-State Model.- Securing Circuits against Constant-Rate Tampering.- How to Compute under AC0 Leakage without Secure Hardware.- Invited Talk -- Recent Advances and Existing Research Questions in Platform Security.- Signatures -- Group Signatures with Almost-for-Free Revocation.- Tightly Secure Signatures and Public-Key Encryption.- Implementation Analysis -- Efficient Padding Oracle Attacks on Cryptographic Hardware.- Public Keys.- Secure Computation II -- Multiparty Computation from Somewhat Homomorphic Encryption -- Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority -- A New Approach to Practical Active-Secure Two-Party Computation -- Black-Box Separation -- The Curious Case of Non-Interactive Commitments ? On the Power of Black-Box vs. Non-Black-Box Use of Primitive -- Cryptanalysis -- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems -- Resistance against Iterated Attacks by Decorrelation Revisited -- Quantum Cryptography -- Secure Identity-Based Encryption in the Quantum Random Oracle Model -- Quantum to Classical Randomness Extractors -- Actively Secure Two-Party Evaluation of Any Quantum Operation -- Key Encapsulation and One-Way functions -- On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups -- Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves -- Homomorphic Evaluation of the AES Circuit -- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. 330 $aThis book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functional encryption, proofs systems, protocols, hash functions, composable security, privacy, leakage and side-channels, signatures, implementation analysis, black-box separation, cryptanalysis, quantum cryptography, and key encapsulation and one-way functions. 410 0$aSecurity and Cryptology ;$v7417 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aComputer security 606 $aComputers and civilization 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 608 $aConference proceedings.$2fast 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aComputers and civilization. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8/2 702 $aSafavi-Naini$b Reihaneh$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCanetti$b Ran$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aCRYPTO (Conference) 906 $aBOOK 912 $a996465545803316 996 $aAdvances in Cryptology -- CRYPTO 2012$92831771 997 $aUNISA