LEADER 05212nam 22008055 450 001 996465649503316 005 20200705235300.0 010 $a3-540-36492-7 024 7 $a10.1007/3-540-36492-7 035 $a(CKB)1000000000211929 035 $a(SSID)ssj0000326484 035 $a(PQKBManifestationID)11255389 035 $a(PQKBTitleCode)TC0000326484 035 $a(PQKBWorkID)10296701 035 $a(PQKB)11394114 035 $a(DE-He213)978-3-540-36492-4 035 $a(MiAaPQ)EBC3073148 035 $a(PPN)155209698 035 $a(EXLCZ)991000000000211929 100 $a20121227d2003 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSelected Areas in Cryptography$b[electronic resource] $e9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers /$fedited by Kaisa Nyberg, Howard Heys 205 $a1st ed. 2003. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2003. 215 $a1 online resource (XII, 412 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2595 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-00622-2 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aElliptic Curve Enhancements -- Modifications of ECDSA -- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves -- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves -- SNOW -- Guess-and-Determine Attacks on SNOW -- A New Version of the Stream Cipher SNOW -- Encryption Schemes -- Encryption-Scheme Security in the Presence of Key-Dependent Messages -- On the Security of CTR + CBC-MAC -- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing -- Differential Attacks -- Markov Truncated Differential Cryptanalysis of Skipjack -- Higher Order Differential Attack of Camellia(II) -- Square-like Attacks on Reduced Rounds of IDEA -- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC?98 -- Boolean Functions and Stream Ciphers -- On Propagation Characteristics of Resilient Functions -- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q) -- Multiples of Primitive Polynomials and Their Products over GF(2) -- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function -- Block Cipher Security -- White-Box Cryptography and an AES Implementation -- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive -- Signatures and Secret Sharing -- New Results on Unconditionally Secure Distributed Oblivious Transfer -- Efficient Identity Based Signature Schemes Based on Pairings -- The Group Diffie-Hellman Problems -- MAC and Hash Constructions -- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model -- An Efficient MAC for Short Messages -- RSA and XTR Enhancements -- Optimal Extension Fields for XTR -- On Some Attacks on Multi-prime RSA. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2595 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aScience, Humanities and Social Sciences, multidisciplinary$3https://scigraph.springernature.com/ontologies/product-market-codes/A11007 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aOperating systems (Computers). 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aScience, Humanities and Social Sciences, multidisciplinary. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 676 $a005.8/2 702 $aNyberg$b Kaisa$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHeys$b Howard$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aSAC 2002 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465649503316 996 $aSelected Areas in Cryptography$9772069 997 $aUNISA LEADER 01083nam a2200277 i 4500 001 991000187939707536 008 090421s2000 it 000 0 ita d 020 $a9788879463379 035 $ab13824016-39ule_inst 040 $aDip.to Scienze pedagogiche$bita 082 0 $a371.37 100 1 $aCzerwinsky Domenis, Loredana$0185336 245 13$aLa discussione intelligente :$buna strategia didattica per la costruzione sociale della conoscenza /$cLoredana Domenis Czerwinsky 260 $aGardolo :$bErickson,$c2000 300 $a256 p. ;$c24 cm 440 0$aGuide per l'educazione 500 $aBibliografia: p. 251-256 650 04$aDidattica$xMetodi 650 04$aDiscussione 650 04$aApprendimento$xMetodi 907 $a.b13824016$b31-08-18$c21-04-09 912 $a991000187939707536 945 $aLE022 371 CZE01.02$g1$i2022000128315$lle022$nLE022/MONOGRAFIE/2009$nLE022/PICCINNO/2009$op$pE19.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i14959677$z27-04-09 996 $aDiscussione intelligente$91747185 997 $aUNISALENTO 998 $ale022$b21-04-09$cm$da $e-$fita$git $h3$i0