LEADER 00911nam0-2200277 --450 001 9910513206403321 005 20220103150014.0 100 $a20220103d1992----kmuy0itay5050 ba 101 2 $alat$afre 102 $aBE 105 $a 001yy 200 1 $aCorpus orationum$finchoante Eugenio Moeller$gsubsequente Ioanne Maria Clement$gtotum opus perfecit Bertrandus Coppieters 't Wallant 210 $aTurnholti$cBrepols$d1992 215 $avolumi$d26 cm 225 1 $aCorpus christianorum$v160 702 1$aClément,$bJean-Marie 702 1$aMoeller,$bEdmond Eugène 702 1$aCoppieters't Wallant,$bBertrand 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910513206403321 952 $a870.08 CH CORP. CHISTANORUM 160 (1)$b14292$fFLFBC 952 $a870.08 CH CORP. CHISTANORUM 160 (6)$b18587$fFLFBC 959 $aFLFBC 996 $aCORPUS orationum$9486313 997 $aUNINA LEADER 04117nam 22008175 450 001 996466444803316 005 20200704061554.0 010 $a3-319-70700-0 024 7 $a10.1007/978-3-319-70700-6 035 $a(CKB)4340000000223553 035 $a(DE-He213)978-3-319-70700-6 035 $a(MiAaPQ)EBC6283484 035 $a(MiAaPQ)EBC5594783 035 $a(Au-PeEL)EBL5594783 035 $a(OCoLC)1013928138 035 $a(PPN)221251669 035 $a(EXLCZ)994340000000223553 100 $a20171117d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2017$b[electronic resource] $e23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III /$fedited by Tsuyoshi Takagi, Thomas Peyrin 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XVIII, 473 p. 57 illus.) 225 1 $aSecurity and Cryptology ;$v10626 300 $aIncludes index. 311 $a3-319-70699-3 327 $aCryptographic Protocols -- Foundations -- Zero-Knowledge Proofs -- Symmetric Key Designs. 330 $aThe three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017. The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs. 410 0$aSecurity and Cryptology ;$v10626 606 $aData encryption (Computer science) 606 $aComputer security 606 $aCoding theory 606 $aInformation theory 606 $aManagement information systems 606 $aComputer science 606 $aComputers 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aTheory of Computation$3https://scigraph.springernature.com/ontologies/product-market-codes/I16005 606 $aMathematics of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I17001 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aCoding and Information Theory. 615 24$aManagement of Computing and Information Systems. 615 24$aTheory of Computation. 615 24$aMathematics of Computing. 676 $a005.82 702 $aTakagi$b Tsuyoshi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPeyrin$b Thomas$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466444803316 996 $aAdvances in Cryptology ? ASIACRYPT 2017$92808718 997 $aUNISA LEADER 01388aam 2200385I 450 001 9910710268203321 005 20160121100809.0 024 8 $aGOVPUB-C13-117e0f25dfa4655ff9069f32594c015b 035 $a(CKB)5470000002476603 035 $a(OCoLC)935500277 035 $a(EXLCZ)995470000002476603 100 $a20160121d1981 ua 0 101 0 $aeng 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aRecommended practice for measuring benefit/cost and savings-to-investment ratios for buildings and building systems /$fHarold E. Marshall; Rosalie T. Ruegg 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d1981. 215 $a1 online resource 225 1 $aNBSIR ;$v81-2397 300 $a1981. 300 $aContributed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aTitle from PDF title page. 320 $aIncludes bibliographical references. 700 $aMarshall$b Harold E$01389866 701 $aMarshall$b Harold E$01389866 701 $aRuegg$b Rosalie T$01381280 712 02$aUnited States.$bNational Bureau of Standards. 801 0$bNBS 801 1$bNBS 801 2$bGPO 906 $aBOOK 912 $a9910710268203321 996 $aRecommended practice for measuring benefit$93488790 997 $aUNINA