LEADER 01395nam0-2200385---450- 001 990004471010403321 005 20110901133814.0 035 $a000447101 035 $aFED01000447101 035 $a(Aleph)000447101FED01 035 $a000447101 100 $a19990604g18151818km-y0itay50------ba 101 0 $afre$ager 105 $ay-------101yy 200 1 $aActen des Wiener Congresses in den Jahren 1814 und 1815. Herausgegeben von D. Johann Ludwig Klüber [...] 210 $aErlangen$cbei J.J. Palm und Ernst Enke$d1815-1818 215 $a8 v.$d20 cm 300 $aOgni volume è diviso in quattro libri 676 $a940.27$zita 702 1$aKlüber,$bJohann Ludwig$f<1762-1837> 710 12$aWiener Congresses$f<1814 - 1815 ;$eWien>$0494588 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aAQ 912 $a990004471010403321 952 $aSG 900/A 65 (1)$bbibl.9966$fFLFBC 952 $aSG 900/A 65 (2)$bbibl.9966$fFLFBC 952 $aSG 900/A 65 (3)$bbibl.9966$fFLFBC 952 $aSG 900/A 65 (4)$bbibl.9966$fFLFBC 952 $aSG 900/A 65 (5)$bbibl.9966$fFLFBC 952 $aSG 900/A 65 (6)$bbibl.9966$fFLFBC 952 $aSG 900/A 65 (7)$bbibl.9966$fFLFBC 952 $aSG 900/A 65 (8)$bbibl.9966$fFLFBC 959 $aFLFBC 996 $aActen des Wiener Congresses in den Jahren 1814 und 1815. Herausgegeben von D. Johann Ludwig Klüber$9544801 997 $aUNINA LEADER 00666nam a2200193 i 4500 001 991004359536507536 005 20250701162432.0 008 250102s1966 at er 001 0 eng d 040 $aBibl. Dip.le Aggr. Scienze Giuridiche - Sez. Studi Giuridici$bita$cSocioculturale Scs 041 0 $aeng 082 04$a647.95$223 100 1 $aFreeland, John Maxwell$d<1920- >$0305046 245 14$aThe Australian Pub /$cJ. M. Freeland 260 $a[Melbourne] :$bMelbourne University Press,$c1966 300 $aXIV, 229 p., [25] carte di tav. :$bill. ;$c25 cm 651 4$aBirrerie$zAustralia 912 $a991004359536507536 996 $aAustralian Pub$94306847 997 $aUNISALENTO LEADER 06436nam 22008535 450 001 9910483947503321 005 20251226203412.0 010 $a3-642-10366-9 024 7 $a10.1007/978-3-642-10366-7 035 $a(CKB)1000000000812676 035 $a(SSID)ssj0000355416 035 $a(PQKBManifestationID)11289862 035 $a(PQKBTitleCode)TC0000355416 035 $a(PQKBWorkID)10340886 035 $a(PQKB)10539485 035 $a(DE-He213)978-3-642-10366-7 035 $a(MiAaPQ)EBC3064894 035 $a(PPN)139962697 035 $a(EXLCZ)991000000000812676 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology - ASIACRYPT 2009 $e15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Proceedings /$fedited by Mitsuri Matsui 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XIV, 722 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5912 300 $aInternational conference proceedings. 311 08$a3-642-10365-0 320 $aIncludes bibliographical references and index. 327 $aBlock Ciphers -- Related-Key Cryptanalysis of the Full AES-192 and AES-256 -- The Key-Dependent Attack on Block Ciphers -- Cascade Encryption Revisited -- Quantum and Post-Quantum -- Quantum-Secure Coin-Flipping and Applications -- On the Power of Two-Party Quantum Cryptography -- Security Bounds for the Design of Code-Based Cryptosystems -- Hash Functions I -- Rebound Attack on the Full Lane Compression Function -- Rebound Distinguishers: Results on the Full Whirlpool Compression Function -- MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners -- The Intel AES Instructions Set and the SHA-3 Candidates -- Encryption Schemes -- Group Encryption: Non-interactive Realization in the Standard Model -- On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations -- Hierarchical Predicate Encryption for Inner-Products -- Hedged Public-Key Encryption: How to Protect against Bad Randomness -- Multi Party Computation -- Secure Two-Party Computation Is Practical -- Secure Multi-party Computation Minimizing Online Rounds -- Improved Non-committing Encryption with Applications to Adaptively Secure Protocols -- Cryptographic Protocols -- Non-malleable Statistically Hiding Commitment from Any One-Way Function -- Proofs of Storage from Homomorphic Identification Protocols -- Simple Adaptive Oblivious Transfer without Random Oracle -- Hash Functions II -- Improved Generic Algorithms for 3-Collisions -- A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical -- How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! -- Models and Frameworks I -- On the Analysis of Cryptographic Assumptions in the Generic Ring Model -- Zero Knowledge in the Random Oracle Model, Revisited -- A Framework for Universally Composable Non-committing BlindSignatures -- Cryptanalysis: Sqaure and Quadratic -- Cryptanalysis of the Square Cryptosystems -- Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses -- Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? -- Models and Frameworks II -- Security Notions and Generic Constructions for Client Puzzles -- Foundations of Non-malleable Hash and One-Way Functions -- Hash Functions III -- Improved Cryptanalysis of Skein -- Linearization Framework for Collision Attacks: Application to CubeHash and MD6 -- Preimages for Step-Reduced SHA-2 -- Lattice-Based -- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures -- Efficient Public Key Encryption Based on Ideal Lattices -- Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices -- Side Channels -- PSS Is Secure against Random Fault Attacks -- Cache-Timing Template Attacks -- Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions -- Signature Schemes with Bounded Leakage Resilience. 330 $aThis book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5912 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer programming 606 $aDiscrete mathematics 606 $aAlgorithms 606 $aData structures (Computer science) 606 $aInformation theory 606 $aComputer science$xMathematics 606 $aCryptology 606 $aProgramming Techniques 606 $aDiscrete Mathematics 606 $aAlgorithms 606 $aData Structures and Information Theory 606 $aDiscrete Mathematics in Computer Science 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer programming. 615 0$aDiscrete mathematics. 615 0$aAlgorithms. 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aComputer science$xMathematics. 615 14$aCryptology. 615 24$aProgramming Techniques. 615 24$aDiscrete Mathematics. 615 24$aAlgorithms. 615 24$aData Structures and Information Theory. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8 701 $aMatsui$b Mitsuru$f1961-$01755328 712 12$aInternational Conference on the Theory and Application of Cryptology and Information Security. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483947503321 996 $aAdvances in cryptology - ASIACRYPT 2009$94198841 997 $aUNINA