LEADER 01171cam0 2200301 450 001 E600200004442 005 20190619100805.0 100 $a20040908d1957 |||||ita|0103 ba 101 $aita 102 $aIT 200 1 $aProse scelte e annotate$fGiovanni Della Casa$ga cura di Severino Ferrari$gnuova presentazione di Ettore Bonora 210 $aFirenze$cSansoni$d1957 215 $aXIII, XVI, 150 p.$d21 cm 225 2 $aBiblioteca carducciana$v16 300 $aRiproduzione facsimilare dell'edizione del 1900 della Biblioteca scolastica di classici italiani 410 1$1001LAEC00019664$12001 $a*Biblioteca carducciana$v16 700 1$aDella_Casa$b, Giovanni$3AF00006825$4070$0163912 702 1$aFerrari, Severino$3AF00014737$4070 702 1$aBonora, Ettore$3AF00004593$4070 801 0$aIT$bUNISOB$c20190619$gRICA 850 $aUNISOB 852 $aUNISOB$j850|Coll|4|K$m13085 912 $aE600200004442 940 $aM 102 Monografia moderna SBN 941 $aM 957 $a850|Coll|4|K$b000025$gSI$d13085$racquisto$1pregresso2$2UNISOB$3UNISOB$420040908095731.0$520190619100735.0$6rovito 996 $aProse scelte e annotate$9136391 997 $aUNISOB LEADER 06617nam 22008655 450 001 9910484202103321 005 20251226202454.0 024 7 $a10.1007/b136415 035 $a(CKB)1000000000212975 035 $a(SSID)ssj0000315808 035 $a(PQKBManifestationID)11232653 035 $a(PQKBTitleCode)TC0000315808 035 $a(PQKBWorkID)10263587 035 $a(PQKB)10938986 035 $a(DE-He213)978-3-540-32055-5 035 $a(MiAaPQ)EBC3067803 035 $a(PPN)123094542 035 $a(EXLCZ)991000000000212975 100 $a20100715d2005 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology ? EUROCRYPT 2005 $e24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings /$fedited by Ronald Cramer 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XIV, 578 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v3494 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-32055-5 311 08$a3-540-25910-4 320 $aIncludes bibliographical references and index. 327 $aCryptanalysis I -- Cryptanalysis of the Hash Functions MD4 and RIPEMD -- How to Break MD5 and Other Hash Functions -- Collisions of SHA-0 and Reduced SHA-1 -- Theory I -- Reducing Complexity Assumptions for Statistically-Hiding Commitment -- Smooth Projective Hashing and Two-Message Oblivious Transfer -- On Robust Combiners for Oblivious Transfer and Other Primitives -- Encryption I -- Efficient Identity-Based Encryption Without Random Oracles -- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM -- Signatures and Authentication -- Secure Remote Authentication Using Biometric Data -- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators -- 3-Move Undeniable Signature Scheme -- Group Signatures with Efficient Concurrent Join -- Algebra and Number Theory I -- Floating-Point LLL Revisited -- Practical Cryptography in High Dimensional Tori -- A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers -- Quantum Cryptography -- Computational Indistinguishability Between Quantum States and Its Cryptographic Application -- Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes -- Secure Protocols -- Compact E-Cash -- Cryptographic Asynchronous Multi-party Computation with Optimal Resilience -- Algebra and Number Theory II -- Differential Cryptanalysis for Multivariate Schemes -- A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem -- Partial Key Exposure Attacks on RSA up to Full Size Exponents -- The RSA Group is Pseudo-Free -- Theory II -- Universally Composable Password-Based Key Exchange -- Mercurial Commitments with Applications to Zero-Knowledge Sets -- Encryption II -- Hierarchical Identity Based Encryption with Constant Size Ciphertext -- Fuzzy Identity-Based Encryption -- Cryptanalysis II -- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work -- Predicting and Distinguishing Attacks on RC4 Keystream Generator -- Related-Key Boomerang and Rectangle Attacks -- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions -- Broadcast Encryption and Traitor Tracing -- Public Traceability in Traitor Tracing Schemes -- One-Way Chain Based Broadcast Encryption Schemes. 330 $aThese are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;seewww.iacr.org),thisyearincooperationwiththeComputer Science Department of the University of Aarhus, Denmark. As General Chair, Ivan Damg? ard was responsible for local organization. TheEurocrypt2005ProgramCommittee(PC)consistedof30internationally renowned experts. Their names and a?liations are listed on pages VII and VIII of these proceedings. By the November 15, 2004 submission deadline the PC had received a total of 190 submissions via the IACR Electronic Submission Server. The subsequent selection process was divided into two phases, as usual. In the review phase each submission was carefully scrutinized by at least three independent reviewers, and the review reports, often extensive, were committed to the IACR Web Review System. These were taken as the starting point for the PC-wideWeb-baseddiscussionphase.Duringthisphase,additionalreportswere provided as needed, and the PC eventually had some 700 reports at its disposal. In addition, the discussions generated more than 850 messages, all posted in the system. During the entire PC phase, which started in August 2003 with my earliest invitations to PC members and which continued until March 2005, more than 1000 email messages were communicated. Moreover, the PC received much appreciated assistance from a large body of external reviewers. Their names are listed on page VIII of these proceedings. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v3494 606 $aCoding theory 606 $aInformation theory 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCoding and Information Theory 606 $aCryptology 606 $aComputer Communication Networks 606 $aOperating Systems 606 $aAlgorithms 606 $aDiscrete Mathematics in Computer Science 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aOperating systems (Computers). 615 0$aAlgorithms. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aCoding and Information Theory. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aAlgorithms. 615 24$aDiscrete Mathematics in Computer Science. 676 $a003.54 701 $aCramer$b Ronald L$01764144 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484202103321 996 $aAdvances in Cryptology-- EUROCRYPT 2005$94204883 997 $aUNINA