LEADER 00927nam0-22003011i-450- 001 990000038070403321 035 $a000003807 035 $aFED01000003807 035 $a(Aleph)000003807FED01 035 $a000003807 100 $a20011111d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $a<>geometrie der wirbelfelder$ein anlehnung an das buch des verfassers uber die Maxwell'sche theorie der elektricitatund zu dessen erganzung$fA. Foppl. 210 $aLiepzig$cB. G. Teubner$d1897 215 $aX, 413 p.$cill.$d23 cm 610 0 $aElettromagnetismo 610 0 $aEquazioni di Maxwell 676 $a530.141 700 1$aFöppl,$bAugust$0331725 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000038070403321 952 $a13 AR 22 A 51$b244$fFINBC 959 $aFINBC 996 $aGeometrie der wirbelfelder$9106143 997 $aUNINA DB $aING01 LEADER 03995nam 22006135 450 001 996465868903316 005 20200705064136.0 010 $a3-540-46738-6 024 7 $a10.1007/3-540-53162-9 035 $a(CKB)1000000000233574 035 $a(SSID)ssj0000321090 035 $a(PQKBManifestationID)11260279 035 $a(PQKBTitleCode)TC0000321090 035 $a(PQKBWorkID)10262837 035 $a(PQKB)10405101 035 $a(DE-He213)978-3-540-46738-0 035 $a(PPN)155204181 035 $a(EXLCZ)991000000000233574 100 $a20121227d1990 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAlgebraic and Logic Programming$b[electronic resource] $eSecond International Conference, Nancy, France, October 1-3, 1990. Proceedings /$fedited by Helene Kirchner, Wolfgang Wechler 205 $a1st ed. 1990. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d1990. 215 $a1 online resource (IX, 389 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v463 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-53162-9 327 $aProving and rewriting -- Proving correctness w.r.t. specifications with hidden parts -- Hybrid implementations of algebraic specifications -- Multi-modal logic programming using equational and order-sorted logic -- Logic programs with equational type specifications -- Higher-order order-sorted algebras -- Axiomatization of a functional logic language -- Fourier algorithm revisited -- Fixpoint techniques for non-monotone maps -- Domain theory for nonmonotonic functions -- On the strong completion of logic programs -- An equivalence preserving first order unfold/fold transformation system -- Propositional calculus problems in CHIP -- Unfolding and fixpoint semantics of concurrent constraint logic programs -- Eliminating negation from normal logic programs -- On logic programming interpretations of Dislog: Programming long-distance dependencies in logic -- Recursive query processing in predicate-goal graph -- Implementation of completion by transition rules + control: ORME -- A matching process modulo a theory of categorical products -- Equation solving in conditional AC-theories -- Lazy narrowing in a graph machine -- An abstract concurrent machine for rewriting -- Applying term rewriting methods to finite groups -- Termination proofs by multiset path orderings imply primitive recursive derivation lengths -- Optimization of rewriting and complexity of rewriting -- AC-Termination of rewrite systems: A modified Knuth-Bendix ordering. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v463 606 $aSoftware engineering 606 $aArtificial intelligence 606 $aMathematical logic 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aMathematical Logic and Formal Languages$3https://scigraph.springernature.com/ontologies/product-market-codes/I16048 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 615 0$aSoftware engineering. 615 0$aArtificial intelligence. 615 0$aMathematical logic. 615 14$aSoftware Engineering/Programming and Operating Systems. 615 24$aArtificial Intelligence. 615 24$aMathematical Logic and Formal Languages. 615 24$aSoftware Engineering. 676 $a005.1 702 $aKirchner$b Helene$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWechler$b Wolfgang$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465868903316 996 $aAlgebraic and logic programming$91492537 997 $aUNISA LEADER 11343nam 2200541 450 001 996478862103316 005 20221229154551.0 010 $a3-031-08648-1 035 $a(MiAaPQ)EBC7026767 035 $a(Au-PeEL)EBL7026767 035 $a(CKB)24100756500041 035 $a(PPN)263903273 035 $a(EXLCZ)9924100756500041 100 $a20221229d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aComputers helping people with special needs$hPart I $e18th International Conference, ICCHP-AAATE 2022, Lecco, Italy, July 11-15, 2022, proceedings /$fKlaus Miesenberger [and five others] (editors) 210 1$aCham, Switzerland :$cSpringer,$d[2022] 210 4$d©2022 215 $a1 online resource (573 pages) 225 1 $aLecture notes in computer science ;$vVolume 13341 311 08$aPrint version: Miesenberger, Klaus Computers Helping People with Special Needs Cham : Springer International Publishing AG,c2022 9783031086472 320 $aIncludes bibliographical references and index. 327 $aComputers Helping People with Special Needs -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Art Karshmer Lectures in Access to Mathematics, Science and Engineering -- Art Karshmer Lectures in Access to Mathematics, Science and Engineering -- 1 Accessing -- 2 Understanding -- 3 Doing -- 4 Graphical Content -- References -- Conversion of Multi-lingual STEM Documents in E-Born PDF into Various Accessible E-Formats -- 1 Introduction -- 2 Background -- 3 Method -- 4 Multilingual Support in GUI -- 5 Evaluation -- 6 Conclusion and Future Works -- References -- An Efficient Method to Produce Accessible Contents for Online STEM Education -- 1 Introduction -- 2 Method -- 3 Preliminary Evaluation Report -- 4 Conclusion and Future Tasks -- References -- Making Equations Accessible in Scientific Documents -- 1 Introduction -- 2 Previous Work -- 3 Methodology -- 3.1 Pipeline -- 3.2 Heuristics - Display and Inline Maths -- 4 Work Status and Results -- 5 Conclusion and Future Work -- References -- Towards Semantically Enhanced Audio Rendering of Equations -- 1 Introduction and Motivation -- 2 Contextual Semantic Analysis -- 3 Literature Review -- 4 Architecture -- 4.1 Definition Extractor -- 4.2 Classifier -- 4.3 Semantic Extractor -- 4.4 Scope Finder -- 5 Conclusion -- References -- Accessible Chemical Structural Formulas Through Interactive Document Labeling -- 1 Introduction -- 2 Related Work -- 2.1 Accessibility of Structural Formulas -- 2.2 Learning-Based Detection and Labeling of Structural Formulas -- 3 Interactive Labeling of Structural Formulas -- 4 Evaluation -- 5 Conclusions -- References -- Designing an Inclusive and Accessible Mathematical Learning Environment Based on a Theorem Prover -- 1 Introduction -- 2 A Vision for Educational Math Software -- 3 User Requirements -- 4 Case Study: Solving Complex Problems. 327 $a4.1 An Example from Electrical Engineering -- 4.2 From Text and Figure to Formulas -- 4.3 ``Next-Step Guidance'' by a Hidden Formalisation -- 4.4 Relate the Problem to Available Knowledge -- 4.5 Iterating through the Tasks -- 5 Conclusion -- References -- Developing a Corpus of Hierarchically Classified STEM Images for Accessibility Purposes -- 1 Introduction -- 2 Images' Selection State of the Art -- 3 Corpus Creation Methodology -- 4 Image Classification -- 4.1 Creation of Categories -- 4.2 Assigning Images to Categories -- 5 Conclusions -- References -- Effective Non-visual Access to Diagrams via an Augmented Natural Language Interface -- 1 Introduction -- 1.1 Diagram Accessibility -- 1.2 AUDiaL: A Natural Language Interface to Diagrams -- 2 Accessible NLI to Diagrams -- 2.1 HCI Techniques for NLI Accessibility -- 2.2 Validation -- 3 Conclusion -- References -- Interface for Automatic Tactile Display of Data Plots -- 1 Introduction -- 2 Related Work -- 3 Comparison of Different Computer Algebraic Systems -- 4 The Tactile Plot Application -- 4.1 Interaction Concept -- 5 User Study -- 5.1 Participants -- 5.2 The Tasks -- 6 Results -- 7 Conclusions and Future Work -- References -- Mobile e-Learning Platform for Audio-Tactile Graphics Presentation -- 1 Introduction -- 2 The State of the Art -- 3 Our Research -- 3.1 Developed Platform -- 3.2 Research Group -- 3.3 Materials -- 3.4 Research Methodology -- 4 The Research Results -- 5 Discussion and Conclusion -- References -- Digital Solutions for Inclusive Mobility: Solutions and Accessible Maps for Indoor and Outdoor Mobility -- Digital Solutions for Inclusive Mobility: Solutions and Accessible Maps for Indoor and Outdoor Mobility -- 1 Introduction -- 2 Current Solutions to Improve Mobility -- 2.1 Information Needs -- 2.2 Orientation and Wayfinding -- 2.3 Tactile Maps. 327 $a2.4 Location-Based Services and Adaptive Routing -- 3 Conclusions -- References -- Split it Up: Allocentric Descriptions of Indoor Maps for People with Visual Impairments -- 1 Introduction -- 2 Related Work -- 3 A System for Modular Allocentric Descriptions -- 3.1 Design of the System -- 3.2 User Interface (UI) -- 4 User Study -- 4.1 Questionnaire and Procedure -- 4.2 Results -- 4.3 Discussion -- 5 Conclusions -- References -- Expert Study: Design and Use of Textures for Tactile Indoor Maps with Varying Elevation Levels -- 1 Introduction -- 2 Related Work -- 3 Use of Textures for Tactile Indoor Maps -- 4 Initial User Study on Tactile Indoor Map Design -- 4.1 Participants and Procedure -- 4.2 Results of the Initial User Study -- 5 Follow-up Study: Design of Textures in Tactile Indoor Maps -- 5.1 Materials and Procedure -- 5.2 Results and Observations of the Follow-Up Study -- 5.3 Summary of the Results -- 6 Conclusion -- References -- ATIM: Automated Generation of Interactive, Audio-Tactile Indoor Maps by Means of a Digital Pen -- 1 Introduction -- 2 Interactive Tactile Maps -- 3 Creating and Designing Audio-Tactile Indoor Maps -- 3.1 Producing Audio-Tactile Indoor Maps with a Digital Pen -- 3.2 Prototype for Audio-Tactile Indoor Maps -- 3.3 Pilot Study -- 4 Discussion and Outlook -- References -- An Audio-Tactile System for Visually Impaired People to Explore Indoor Maps -- 1 Introduction -- 2 Related Work -- 3 Creating New Features for TPad -- 4 Indoor Map Interaction Using TPad -- 5 User Study -- 5.1 Participants -- 5.2 Method -- 6 Results -- 7 Conclusions and Future Work -- References -- Supporting Independent Travelling for People with Visual Impairments in Buildings by Harmonizing Maps on Embossed Paper and Pin-Matrix Devices for Accessible Info-Points -- 1 Introduction -- 2 State of the Art -- 3 Concepts for Exploring Indoor Maps. 327 $a3.1 Concept of Splitting for Printable Tactile Maps -- 3.2 Concepts of Exploring with Braille Tactile Maps -- 4 Conclusion and Future Work -- References -- The Accessible Tactile Indoor Maps (ATIM) Symbol Set: A Common Symbol Set for Different Printing Methods -- 1 Introduction -- 2 Related Work -- 3 Creation of a Tactile Symbol Set for Indoor Maps -- 3.1 Selection Criteria -- 3.2 Transfer to a Lower Resolution Printing Technique -- 3.3 Testing and Adaption of the Symbols -- 4 The ATIM Symbol Set -- 4.1 Tactile Indoor Symbols with Distinct Semantics -- 5 Recommendations to Use the Symbols -- 6 Conclusion -- References -- Indoor Navigation Assistance for Visually Impaired People via Dynamic SLAM and Panoptic Segmentation with an RGB-D Sensor -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Preprocessing -- 3.2 Identifying Dynamic Objects -- 3.3 Ego-motion Estimation -- 3.4 Dynamic Objects Pose and Speed Estimation -- 4 Evaluation -- 5 Conclusion -- References -- Accessible Adaptable Indoor Routing for People with Disabilities -- 1 Introduction -- 2 State of the Art -- 3 Adaptable Indoor Routing for People with Disabilities -- 4 Evaluation Through a Pilot Study -- 5 Conclusion -- References -- Monocular Localization Using Invariant Image Feature Matching to Assist Navigation -- 1 Introduction -- 2 Related Work -- 3 Creating Path Feature Graph Object -- 4 Current Limitations and Future Work -- 5 Conclusion -- References -- Can Route Previews Amplify Building Orientation for People with Visual Impairment? -- 1 Introduction -- 2 Related Work -- 3 Transferring Real-World into Cognitive Maps -- 4 Evaluation Study, Results and Discussion -- 5 Conclusion -- References -- Implementation and Innovation in the Area of Independent Mobility Through Digital Technologies. 327 $aImplementation and Innovation in the Area of Independent Mobility Through Digital Technologies -- 1 Introduction -- 1.1 Co-design and Innovation in Mobility -- 1.2 Adoption of Innovation -- 1.3 Accessibility Standards and Legislation for Communicating Information -- 1.4 Routing and Journey Planning -- 1.5 The Final Leg of the Journey - Within Buildings -- 1.6 Transference -- 1.7 Summary -- References -- The Impact of Subjective Technology Adaptivity on the Willingness of Persons with Disabilities to Use Emerging Assistive Technologies: A European Perspective -- 1 Introduction -- 2 Methodology -- 2.1 Online Survey -- 2.2 Study Participants -- 3 Results -- 3.1 Subjective Technology Adaptivity -- 3.2 Use Intention for Emerging Technologies -- 4 Discussion -- References -- Towards Personalized Accessible Routing for People with Mobility Impairments -- 1 Introduction -- 2 State of the Art in Accessible Routing -- 3 Vision of Personalized Accessible Routing -- 4 Case Study Zurich -- 5 Conclusion -- References -- Traveling to Unknown Buildings: Accessibility Features for Indoor Maps -- 1 Introduction -- 2 Previous Work -- 3 Literature Review on Accessibility Features -- 4 Database of Accessibility Features for Maps -- 5 Discussion -- 6 Conclusions and Future Work -- References -- Acquiring Surrounding Visual Information Without Actively Taking Photos for People with Visual Impairment -- 1 Introduction -- 2 Related Work -- 3 User Study -- 3.1 Voice Guidance System -- 3.2 Results and Discussion -- 4 Conclusions -- References -- Listening First: Egocentric Textual Descriptions of Indoor Spaces for People with Blindness -- 1 Introduction -- 2 Related Work -- 3 Design of an Egocentric Description Component -- 3.1 Analysis of Literature and Existing Solutions -- 3.2 Specification of the Grammar -- 4 User Study -- 5 Results -- 6 Conclusion -- References. 327 $aHaptic and Digital Access to Art and Artefacts. 410 0$aLecture notes in computer science ;$vVolume 13341. 606 $aComputerized self-help devices for people with disabilities 606 $aComputers and people with disabilities$vCongresses 606 $aComputerized self-help devices for people with disabilities$vCongresses 615 0$aComputerized self-help devices for people with disabilities. 615 0$aComputers and people with disabilities 615 0$aComputerized self-help devices for people with disabilities 676 $a362.4048 702 $aMiesenberger$b Klaus$f1966- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996478862103316 996 $aComputers Helping People with Special Needs$92889197 997 $aUNISA LEADER 01069nam a2200265 i 4500 001 991003267369707536 008 160801s1999 it b 001 0 ita d 020 $a8886792204 035 $ab14306013-39ule_inst 040 $aDip. di Studi Umanistici$bita 082 0 $a945 100 1 $aTarabochia Canavero, Alessandra$0220995 245 10$aVorrei parlarti del cielo stellato :$bun viaggio tra filosofi e poeti, letterati e artisti alla scoperta dell'armonia /$cAlessandra Tarabochia Canavero 260 $aMilano :$bSimonelli,$c1999 300 $a502 p. :$bill. ;$c21 cm 440 3$aIl piacere di raccontare 504 $aContiene riferimenti bibliografici. Indice 650 7$aFilosofia$xStoria 650 7$aItalia$xCultura$xStoria 907 $a.b14306013$b01-08-16$c01-08-16 912 $a991003267369707536 945 $aLE007 945 TAR 01.01$g1$i2007000273708$lle007$og$pE25.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i15777704$z01-08-16 996 $aVorrei parlarti del cielo stellato$91392322 997 $aUNISALENTO 998 $ale007$b01-08-16$cm$da $e-$fita$git $h0$i0 LEADER 01197nam a22002771i 4500 001 991000599169707536 005 20021018130330.0 008 021018s1970 it |||||||||||||||||ita 035 $ab12028137-39ule_inst 035 $aARCHE-011793$9ExL 040 $aDip.to Filologia Ling. e Lett.$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a457.812 100 1 $aRoccella, Remigio$0449420 245 10$aVocabolario della lingua parlata in Piazza Armerina (Sicilia) /$cper Remigio Roccella 260 $aBologna :$bForni,$cstampa 1970 300 $a291 p. ;$c22 cm 500 $aRipr. facs. dell'ed.: Caltagirone, 1875. 650 4$aDialetti siciliani$xEnna (Provincia) - 650 4$aDizionari 907 $a.b12028137$b02-04-14$c01-04-03 912 $a991000599169707536 945 $aLE008 FL.M. (f.r.) XL 266$g1$i2008000518196$lle008$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i12318012$z01-04-03 945 $aLE008 FL.M. (f.r.) XL 150$g2$i2008000443115$lle008$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i15323195$z26-09-11 996 $aVocabolario della lingua parlata in Piazza Armerina (Sicilia$9142581 997 $aUNISALENTO 998 $ale008$b01-04-03$cm$da $e-$fita$git $h0$i1 LEADER 02455nam a2200313 i 4500 001 991004345026507536 005 20241004145430.0 008 241004s1792 it er 001 0 lat d 026 $ai-io teum$bisr- stsu (3)$c1792 (R) 040 $aBibl. Interfacoltà T. Pellegrino$bita$cSocioculturale Scs 041 0 $alat 100 1 $aHeinecke, Johann Gottlieb$0266403 245 10$aJo. Gottlieb, Heineccii, ... Elementa juris civilis secundum ordinem institutionum; commoda auditoribus methodo adornata. Accedunt variorum notae &observationes ... Pars 1. Lib. 1. & 2. continens 250 $aEditio nova italica ceteris longe auctior & emendatior 260 $aVenetiis :$bex Typographia balleoniana,$c1792 300 $a696 p. ;$c12° 500 $aEdizione completa dell'opera, contenente anche i libri 3 e 4, da p. 396; cfr. anche a c. 2F12v licenza concessa agli Eredi Baglioni di ristampare l'opera "... in duas partes divisa" 500 $aMarca (aquila bicefala coronata) sul frontespizio 500 $aNel titolo i numeri 1 e 2 sono espressi I. e II. 500 $aSegnatura: A-2F¹² 561 0 $aIl fondo Briganti-Stajano è stato annesso al patrimonio della Biblioteca Interfacoltà nel 1981. Le famiglie da cui il fondo prende il nome sono l'aristocratica famiglia gallipolina dei Briganti (fine XVIII sec.) e la famiglia Stajano di Sannicola, alla quale il fondo è pervenuto in eredità dopo la morte di Domenico Briganti, ultimo discendente (fine XIX sec.). Il fondo si compone di una sezione a stampa antica e moderna e di una sezione manoscritta. La sezione a stampa è costituita in buona parte dalla biblioteca dei due esponenti più noti dell?Illuminismo riformatore salentino, Tommaso Briganti (1691-1762) e il figlio Filippo (1726-1804), e riflette in pieno i loro interessi per le discipline storiche, giuridiche, economiche, religiose e filosofiche; sono presenti nella sezione, inoltre, libri, opuscoli, documenti e opere degli stessi Stajano.$5LE002 562 $a1 esemplare$5LE002 700 3 $aBriganti-Stajano $d$epossessore precedente$5LE002 710 2 $aBaglioni 710 2 $aBaglioni eredi 752 $aItalia$dVenezia 912 $a991004345026507536 996 $aJo. Gottlieb, Heineccii, ... Elementa juris civilis secundum ordinem institutionum; commoda auditoribus methodo adornata. Accedunt variorum notae &observationes ... Pars 1. Lib. 1. & 2. continens$94215849 997 $aUNISALENTO LEADER 01114nas 2200361 c 450 001 9910892291603321 005 20251012104432.0 011 $a2663-0125 035 $a(DE-599)ZDB3119346-8 035 $a(OCoLC)1319405982 035 $a(DE-101)1257696408 035 $a(CKB)5340000000015385 035 $a(EXLCZ)995340000000015385 100 $a20220517a20199999 |y | 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aConservation update$eCU : publication of ERC$fEuropean Research Centre for Book and Paper Conservation - Restoration 210 31$aLangenlois$cEuropean Research Centre for Book and Paper Conservation-Restoration$d2019- 215 $aOnline-Ressource 517 1 $aCU 608 $aZeitschrift$2gnd-content 676 $a020 712 02$aEuropean Research Centre for Book and Paper Conservation-Restoration$4isb 801 0$b0012 801 1$bDE-101 801 2$b9999 906 $aJOURNAL 912 $a9910892291603321 996 $aConservation update$93429894 997 $aUNINA LEADER 12660nam 22007815 450 001 9910574075903321 005 20251113180453.0 010 $a3-031-07085-2 024 7 $a10.1007/978-3-031-07085-3 035 $a(MiAaPQ)EBC7001515 035 $a(Au-PeEL)EBL7001515 035 $a(CKB)22978596100041 035 $a(PPN)268729786 035 $a(OCoLC)1322473599 035 $a(DE-He213)978-3-031-07085-3 035 $a(EXLCZ)9922978596100041 100 $a20220528d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? EUROCRYPT 2022 $e41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 ? June 3, 2022, Proceedings, Part II /$fedited by Orr Dunkelman, Stefan Dziembowski 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (920 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13276 311 08$aPrint version: Dunkelman, Orr Advances in Cryptology - EUROCRYPT 2022 Cham : Springer International Publishing AG,c2022 9783031070846 320 $aIncludes bibliographical references and index. 327 $aIntro -- Preface -- Organization -- Contents - Part II -- Cryptographic Protocols -- Single-Server Private Information Retrieval with Sublinear Amortized Time -- 1 Introduction -- 1.1 Our Results -- 1.2 Overview of Techniques -- 1.3 Related Work -- 2 Background -- 2.1 Standard Definitions -- 2.2 Definition of Offline/Online PIR -- 3 Two-Server PIR with a Single-Server Online Phase and Sublinear Amortized Time -- Construction 3 -- 4 Single-Server PIR with Sublinear Amortized Time from DCR, QR, DDH, or LWE -- 5 Single-Server PIR with Optimal Amortized Time and Storage from Fully Homomorphic Encryption -- 6 Lower Bounds -- 6.1 Lower Bound for Adaptive Schemes -- 6.2 Lower Bound for Batch PIR with Advice -- 7 Conclusion -- References -- Anamorphic Encryption: Private Communication Against a Dictator -- 1 Introduction -- 2 Related Works -- 3 Our Approach -- 4 Receiver-Anamorphic Encryption -- 4.1 Syntax -- 4.2 Modes of Operation -- 4.3 Security Notion -- 4.4 Properties of the Anamorphic Mode with Normal Encryption -- 4.5 Security of the Fully Anamorphic Mode -- 5 Constructions -- 5.1 Rejection Sampling -- 5.2 The Naor-Yung Transform -- 5.3 The NY Transform Gives Receive-AM Encryption -- 6 Sender-Anamorphic Encryption -- 6.1 Sufficient Conditions for Sender-AM with No Shared Key -- 6.2 Constructions Based on LWE Encryption Schemes -- 7 Conclusion -- References -- A PCP Theorem for Interactive Proofs and Applications -- 1 Introduction -- 1.1 Main Results -- 1.2 A Cryptographic Application to SNARKs -- 2 Techniques -- 2.1 Towards Transforming IPs to IOPs -- 2.2 Local Access to Randomness -- 2.3 Index-Decodable PCPs -- 2.4 Local Access to Prover Messages -- 2.5 Constructing Index-Decodable PCPs -- 2.6 Commit-and Prove SNARKs from Index-Decodable PCPs -- 2.7 Hardness of Approximation -- References. 327 $aGroup Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Technical Overview -- 2 Preliminaries -- 2.1 Non-interactive Zero-Knowledge Proofs of Knowledge in the ROM -- 2.2 Accountable Ring Signatures -- 3 Generic Construction of Accountable Ring Signature and Dynamic Group Signature -- 3.1 Generic Construction of Accountable Ring Signature -- 3.2 Accountable Ring Signature to Dynamic Group Signature -- 3.3 Tightly Secure Variant -- 4 Group-Action-Based Hard Instance Generators and PKEs -- 4.1 Group-Action-Based Hard Instance Generator -- 4.2 Group-Action-Based PKE -- 5 Sigma Protocol for a ``Traceable'' OR Relation -- 5.1 From a Group-Action-Based HIG and PKE to Base Traceable or Sigma Protocol -- 5.2 From Base to Main Traceable or Sigma Protocol -- 5.3 Base Sigma Protocol for the ``Tight'' Relation R-tight -- 6 Multi-proof Online Extractable NIZK from Sigma Protocol main traceable OR sigma protocol -- 7 Instantiations -- References -- Asymmetric PAKE with Low Computation and communication -- 1 Introduction -- 2 Key-Hiding One-Time-Key AKE -- 2.1 2DH as Key-Hiding One-Time-Key AKE -- 2.2 One-Pass HMQV as Key-Hiding One-Time-Key AKE -- 3 Protocol OKAPE: Asymmetric PAKE Construction #1 -- 4 Protocol aEKE: Asymmetric PAKE Construction #2 -- 5 Concrete aPAKE Protocol Instantiations -- 6 Curve Encodings and Ideal Cipher -- A Universally Composable Asymmetric PAKE Model -- B Simulator for Proof of Theorem 3 -- References -- Batch-OT with Optimal Rate -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Technical Overview -- 2.1 Oblivious Transfer from Homomorphic Encryption -- 2.2 Download-Rate Optimal String OT -- 2.3 Our Approach: Recrypting the Receiver's Message -- 2.4 Dealing with LPN Errors -- 2.5 Emulating Small Subgroups -- 3 Preliminaries. 327 $a3.1 Lattices and Gaussians -- 3.2 Distributed GGM-PPRF Correlation -- 4 Compression-Friendly Subgroup Emulation via Gaussian Rounding -- 5 Rate-1 Circuit-Private Linearly Homomorphic Encryption -- 5.1 Construction from DDH -- 6 Co-private Information Retrieval -- 6.1 Definition -- 7 Oblivious Transfer with Overall Rate 1 -- 7.1 The Protocol -- 7.2 Security -- 8 Oblivious Matrix-Vector Product and Oblivious Linear Evaluation with Overall Rate 1 -- 8.1 OLE Protocol -- A Additional Preliminaries -- A.1 UC Security -- A.2 Learning Parity with Noise -- References -- Adaptively Secure Computation for RAM Programs -- 1 Introduction -- 1.1 Our Results -- 1.2 Our Techniques -- 2 Equivocal ORAM -- 3 RAM-Efficient Equivocal Encryption -- 3.1 Our Construction -- 4 Equivocal Garbled RAM -- 4.1 Our Construction -- 4.2 Putting It Together -- 5 Adaptive Zero-Knowledge for RAM -- 5.1 Splitable Garbling -- 5.2 Our Adaptive UC ZK Protocol -- References -- Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions -- 1 Introduction -- 2 Technical Overview -- 2.1 Our CP-ABE Schemes -- 2.2 On Evasive Lattice Assumptions -- 2.3 Additional Related Work -- 3 Preliminaries -- 3.1 Lattices Background -- 3.2 Attribute-Based Encryption -- 4 Evasive LWE -- 5 Main Constructions -- 5.1 Homomorphic Computation on Matrices -- 5.2 CP-ABE for NC1 Circuits -- 5.3 Optimal Broadcast Encryption -- 5.4 CP-ABE for Polynomial-Depth Circuits -- 6 Discussion on Evasive LWE -- References -- Embedding the UC Model into the IITM Model -- 1 Introduction -- 2 A Brief Overview of the UC and IITM Models -- 2.1 The UC Model -- 2.2 The IITM Model -- 3 Embedding the UC Model in the IITM Model -- 3.1 Main Conceptual Differences -- 3.2 Mapping Protocols -- 3.3 UC Security Implies IITM Security -- 3.4 UC Composition Implies IITM Composition. 327 $a3.5 Capturing Dynamically Generated Machine Code -- 3.6 Discussion: Beyond UC Protocols -- 4 Impossibility of Embedding the IITM Model into the UC Model -- References -- Zero-Knowledge Proofs -- Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier -- 1 Introduction -- 1.1 Our Results -- 1.2 Related Work on Probabilistic Proofs -- 1.3 Related Work on Succinct Arguments -- 2 Techniques -- 2.1 Approach Overview -- 2.2 Construction Overview -- 2.3 From Tensor-Queries to Point-Queries in Zero-Knowledge -- 2.4 Tensor IOP for R1CS with Semi-honest Verifier Zero Knowledge -- 2.5 Hiding Properties of Linear Codes -- 2.6 On Bounded-Query Zero Knowledge -- 2.7 Linear-Time Succinct Arguments from Linear-Time IOPs -- References -- Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Technical Details -- 2 Preliminaries -- 2.1 Function Families -- 2.2 Sampling Procedure -- 2.3 Proof Systems -- 3 AC0[2]-Protocol for Linear Languages -- 4 Fine-Grained NIZK for Linear Languages -- 5 Fine-Grained OR-Proof -- 6 Fine-Grained NIZK Proof for Circuit SAT -- 7 Fine-Grained NIZK for AC0CM[2] with Short Proofs -- 7.1 Definition of Fine-Grained sFHE -- 7.2 Construction of Fine-Grained sFHE -- 7.3 Generic Construction of NIZK -- 8 Fine-Grained Non-Interactive Zap -- 8.1 Verifiable Correlated Key Generation -- 8.2 Construction of Fine-Grained Non-Interactive Zap -- 9 Fine-Grained NIZK in the URS Model -- References -- On Succinct Non-interactive Arguments in Relativized Worlds -- 1 Introduction -- 1.1 Our Results -- 1.2 Related Work -- 2 Techniques -- 2.1 Linear Code Random Oracles -- 2.2 Accumulation Scheme for Low-Degree Random Oracles -- 2.3 A Forking Lemma for Linear Code Random Oracles -- 2.4 A Zero-Finding Game for Low-Degree Random Oracles -- 2.5 SNARKs for Oracle Computations. 327 $a3 Preliminaries -- 3.1 Notations -- 3.2 Non-interactive Arguments in Oracle Models -- 3.3 Accumulation Schemes -- 3.4 Commitment Schemes -- 4 Linear Code Random Oracles -- 4.1 Query Transcripts and Partial Oracles -- 4.2 Constraints -- 4.3 Query Complexity -- 4.4 Low-Degree Random Oracles -- 5 A Forking Lemma for Linear Code Random Oracles -- 6 Oracle Zero-Finding Games -- 7 Accumulation Scheme for Low-Degree Random Oracles -- References -- Families of SNARK-Friendly 2-Chains of Elliptic Curves -- 1 Introduction -- 2 Preliminaries -- 2.1 Background on Bilinear Pairings -- 2.2 zk-SNARKs -- 2.3 SNARK-Friendly Chains -- 3 Inner Curves: Barreto-Lynn-Scott (BLS) Curves -- 3.1 Parameters with a Polynomial Form -- 3.2 Faster Co-factor Multiplication -- 3.3 Subgroup Membership Testing: GT -- 3.4 Choosing a Curve Coefficient b=1 -- 3.5 SNARK-Friendly Inner BLS Curves -- 4 Outer Curves: Brezing-Weng, Cocks-Pinch -- 4.1 Generic BW6 Curve Parameters -- 4.2 BW6 with BLS-12 -- 4.3 BW6 with BLS-24 -- 4.4 Two-Chains with Inner BLS and Outer Cocks-Pinch -- 4.5 Comparison of BW6, CP8 and CP12 Outer Curve Performances -- 5 Implementation and Benchmarking -- 5.1 SageMath Library: Derive the Curves -- 5.2 Our Short-List of Curves -- 5.3 Estimated Complexity of a DL Computation in GF(qk) -- 5.4 Golang Library: Implement the Short-List Curves -- 5.5 Benchmarking -- 6 Conclusion -- References -- Fiat-Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model) -- 1 Introduction -- 1.1 Technical Overview -- 1.2 Related Work -- 2 Preliminaries -- 3 Simulation-Extractability from State-Restoration Unique Response -- 3.1 Simulation-Extractability in the AGM -- 3.2 From Weak Unique Response to Simulation-extractability -- 3.3 Generic Result on Simulation-Extractability -- 4 Non-Malleability of Bulletproofs - Arithmetic Circuits -- 4.1 Algebraic Simulation. 327 $a4.2 State-Restoration Unique Responses. 330 $aThe 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May ? 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13276 606 $aCryptography 606 $aData encryption (Computer science) 606 $aApplication software 606 $aComputer networks 606 $aCoding theory 606 $aInformation theory 606 $aCryptology 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 606 $aCoding and Information Theory 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aApplication software. 615 0$aComputer networks. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aCryptology. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 615 24$aCoding and Information Theory. 676 $a929.605 676 $a005.82 702 $aDunkelman$b Orr 702 $aDziembowski$b Stefan 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910574075903321 996 $aAdvances in cryptology - EUROCRYPT 2022$92994191 997 $aUNINA LEADER 03029nam 22006495 450 001 9910483297303321 005 20251226193517.0 010 $a3-319-07536-5 024 7 $a10.1007/978-3-319-07536-5 035 $a(CKB)3710000000143845 035 $a(SSID)ssj0001274637 035 $a(PQKBManifestationID)11858394 035 $a(PQKBTitleCode)TC0001274637 035 $a(PQKBWorkID)11333307 035 $a(PQKB)10408935 035 $a(DE-He213)978-3-319-07536-5 035 $a(MiAaPQ)EBC3093206 035 $a(PPN)179766163 035 $a(EXLCZ)993710000000143845 100 $a20140604d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aApplied Cryptography and Network Security $e12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings /$fedited by Ioana Boureanu, Philippe Owesarski, Serge Vaudenay 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XVIII, 586 p. 127 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8479 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-07535-7 327 $aKey exchange -- Primitive construction -- Attacks (public-key cryptography) -- Hashing -- Cryptanalysis and attacks (symmetric cryptography) -- Network security -- Signatures -- System security.- Secure computation. 330 $aThis book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8479 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer science 606 $aData and Information Security 606 $aCryptology 606 $aTheory of Computation 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer science. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aTheory of Computation. 676 $a005.8 702 $aBoureanu$b Ioana$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aOwesarski$b Philippe$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVaudenay$b Serge$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910483297303321 996 $aApplied Cryptography and Network Security$9771881 997 $aUNINA