LEADER 04680nam 22008295 450 001 996465579803316 005 20221102205642.0 010 $a3-540-46513-8 024 7 $a10.1007/3-540-46513-8 035 $a(CKB)1000000000211203 035 $a(SSID)ssj0000326481 035 $a(PQKBManifestationID)11248973 035 $a(PQKBTitleCode)TC0000326481 035 $a(PQKBWorkID)10296847 035 $a(PQKB)10704925 035 $a(DE-He213)978-3-540-46513-3 035 $a(MiAaPQ)EBC3071683 035 $a(PPN)155210270 035 $a(EXLCZ)991000000000211203 100 $a20121227d2000 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSelected Areas in Cryptography$b[electronic resource] $e6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings /$fedited by Howard Heys, Carlisle Adams 205 $a1st ed. 2000. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2000. 215 $a1 online resource (VIII, 241 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1758 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-67185-4 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aCryptosystems and Pseudorandom Number Generators -- A Universal Encryption Standard -- Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator -- Elliptic Curve Pseudorandom Sequence Generators -- Security Aspects of Block Ciphers -- Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness -- Guesswork and Variation Distance as Measures of Cipher Security -- Modeling Linear Characteristics of Substitution-Permutation Networks -- Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors -- Cryptanalysis of Block Ciphers -- Security of E2 against Truncated Differential Cryptanalysis -- Key-Schedule Cryptanalysis of DEAL -- Efficient Evaluation of Security against Generalized Interpolation Attack -- Efficient Implementations of Cryptosystems -- Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders -- Improving and Extending the Lim/Lee Exponentiation Algorithm -- Software Optimization of Decorrelation Module -- Cryptography for Network Applications -- Pseudonym Systems -- Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures -- Protecting a Mobile Agent?s Route against Collusions -- Photuris: Design Criteria. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1758 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aComputer science 606 $aComputer communication systems 606 $aAlgorithms 606 $aManagement information systems 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aComputer Science, general$3https://scigraph.springernature.com/ontologies/product-market-codes/I00001 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer science. 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 14$aCryptology. 615 24$aCoding and Information Theory. 615 24$aComputer Science, general. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 676 $a005.82 702 $aHeys$b Howard$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAdams$b Carlisle$f1961-$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aSAC'99 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465579803316 996 $aSelected Areas in Cryptography$9772069 997 $aUNISA LEADER 00993nam a22002411i 4500 001 991000090769707536 005 20020911082057.0 008 020911s1973 it |||||||||||||||||ita 035 $ab11957967-39ule_inst 035 $aARCHE-004777$9ExL 040 $aDip.to Filologia Ling. e Lett.$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 100 1 $aBrancati, Vitaliano$0174046 245 13$aIl borghese e l'immensità :$bscritti 1930-1954 /$cVitaliano Brancati ; a cura di Sandro De Feo e G. A. Cibotto ; introduzione di G. A. Cibotto 260 $aMilano :$bBompiani,$c1973 300 $a398 p. ;$c22 cm 700 1 $aDe Feo, Sandro 700 1 $aCibotto, Giovanni Antonio 907 $a.b11957967$b02-04-14$c01-04-03 912 $a991000090769707536 945 $aLE008 TS B VII 15$g1$i2008000374235$lle008$o-$pE0.00$q-$rl$s- $t0$u1$v0$w1$x0$y.i12235052$z01-04-03 996 $aBorghese e l'immensità$9137384 997 $aUNISALENTO 998 $ale008$b01-04-03$cm$da $e-$fita$git $h3$i1