LEADER 00930nam--2200313---450- 001 990002350030203316 005 20090305100331.0 035 $a000235003 035 $aUSA01000235003 035 $a(ALEPH)000235003USA01 035 $a000235003 100 $a20050111d1970----km-y0itay0103----ba 101 0 $aeng 102 $aGB 105 $a||||||||001yy 200 1 $aMathematical models of the economy and other essays$fby Richard Stone 210 $aLondon$cChapman and Hall$d1970 215 $aXV, 335 p.$d24 cm 676 $a510 700 1$aSTONE,$bRichard$0101734 801 0$aIT$bsalbc$gISBD 912 $a990002350030203316 951 $a510 STO 1 (IEP VIII 229)$b1775 E.C.$cIEP VIII$d00203359 959 $aBK 969 $aECO 979 $aSIAV6$b10$c20050111$lUSA01$h1700 979 $aRSIAV2$b90$c20090305$lUSA01$h1003 996 $aMathematical models of the economy and other essays$943798 997 $aUNISA LEADER 04620nam 22007095 450 001 996668469103316 005 20250714130234.0 010 $a9783031972607$b(electronic bk.) 010 $z9783031972591 024 7 $a10.1007/978-3-031-97260-7 035 $a(MiAaPQ)EBC32212132 035 $a(Au-PeEL)EBL32212132 035 $a(CKB)39653462600041 035 $a(DE-He213)978-3-031-97260-7 035 $a(EXLCZ)9939653462600041 100 $a20250714d2026 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProgress in Cryptology - AFRICACRYPT 2025 $e16th International Conference on Cryptology in Africa, Rabat, Morocco, July 21?23, 2025, Proceedings /$fedited by Abderrahmane Nitaj, Svetla Petkova-Nikova, Vincent Rijmen 205 $a1st ed. 2026. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2026. 215 $a1 online resource (842 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15651 311 08$aPrint version: Nitaj, Abderrahmane Progress in Cryptology - AFRICACRYPT 2025 Cham : Springer,c2025 9783031972591 327 $a -- Homomorphic Encryption. -- Convolution-Friendly Image Compression with FHE. -- Leveled Homomorphic Encryption over Composite Groups. -- Activate Me!: Designing Efficient Activation Functions for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption. -- One-Way Homomorphic Encryption: A Composite Group Approach. -- Cryptanalysis of RSA. -- A Novel Partial Key Exposure Attack on Common Prime RSA. -- Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve. -- A New Generalized Attack on RSA-like Cryptosystems. -- Cryptography Arithmetic. -- An Improvement of the Congruence Solver of Lattice Isomorphism Problem over Totally Real Number Fields and Applications. -- PMNS arithmetic for elliptic curve cryptography. -- Constant-time Integer Arithmetic for SQIsign. -- FPTRU:Optimization of NTRU-Prime and TLS Performance Assessment. -- Side-channel Attacks. -- Simple Power Analysis Attack on SQIsign. -- Correlation power analysis of LESS and CROSS. -- TPL: Power Leakage Model Based on Technology Library. -- Designs. -- Bivariate proximity test-based Asynchronous Verifiable Secret Sharing. -- Behemoth: transparent polynomial commitment scheme with constant opening proof size and verifier time. -- Attribute-based Encryption using Sum-Product Decomposition of Boolean Functions. -- Simultaneously simple universal and indifferentiable hashing to elliptic curves. -- Cryptanalysis. -- Conjunctive Dynamic SSE Schemes under Scrutiny: Exposing Privacy Issues in SDSSE-CQ-S and VCDSSE. -- Efficient and Optimized Modeling of S-Boxes. -- Tearing Solutions for Tree Traversal in Stateful Hash-based Cryptography. 330 $aThis book constitutes the refereed proceedings of the 16th International Conference on Cryptology in Africa, AFRICACRYPT 2025, which took place in Rabat, Morocco in July 2025. The 21 full papers presented in this volume were carefully reviewed and selected from 45 submissions. They are grouped into the following topics: Homomorphic Encryption; Cryptanalysis of RSA; Cryptography Arithmetic; Side-channel Attacks; Designs; Cryptanalysis. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15651 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer vision 606 $aComputer networks$xSecurity measures 606 $aData protection 606 $aMicroprogramming 606 $aCryptology 606 $aComputer Vision 606 $aMobile and Network Security 606 $aData and Information Security 606 $aControl Structures and Microprogramming 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer vision. 615 0$aComputer networks$xSecurity measures. 615 0$aData protection. 615 0$aMicroprogramming. 615 14$aCryptology. 615 24$aComputer Vision. 615 24$aMobile and Network Security. 615 24$aData and Information Security. 615 24$aControl Structures and Microprogramming. 676 $a005.824 700 $aNitaj$b Abderrahmane$01835212 701 $aPetkova-Nikova$b Svetla$01790060 701 $aRijmen$b Vincent$01726354 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a996668469103316 996 $aProgress in Cryptology - AFRICACRYPT 2025$94411445 997 $aUNISA