Fission and Fusion of Allies : The ROK Nuclear Quest and U.S.–France Competition and Cooperation / / by Lyong Choi, Jooyoung Lee
| Fission and Fusion of Allies : The ROK Nuclear Quest and U.S.–France Competition and Cooperation / / by Lyong Choi, Jooyoung Lee |
| Autore | Choi Lyong |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (XIII, 110 p. 3 illus., 2 illus. in color.) |
| Disciplina | 327.1747 |
| Soggetto topico |
Security, International
World politics Peace International relations International Security Studies Political History Peace and Conflict Studies Foreign Policy |
| ISBN | 981-19-9801-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Prologue -- Chapter 1 The Origin of the ROK Nuclear Program -- Chapter 2 The U.S. and the Emerging Threat of Proliferation: Opportunities and risks for the non-proliferation regimes created in the changing context of the Cold War order, 1960–1974 -- Chapter 3 The Rise and Downfall of Gaullism and France’s Nuclear Deals with Third World States, 1945–1974 -- Chapter 4 The Coexistence of the ROK–France–IAEA Nuclear Cooperation Agreement and the ROK–U.S. Nuclear Cooperation Agreement, 1975 -- Chapter 5 The Fall of the Gaullist Technocrats and End of the ROK Nuclear weapons Program, 1976–79; Epilogue. |
| Record Nr. | UNINA-9910686788803321 |
Choi Lyong
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information Security and Cryptology - ICISC 2014 [[electronic resource] ] : 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers / / edited by Jooyoung Lee, Jongsung Kim
| Information Security and Cryptology - ICISC 2014 [[electronic resource] ] : 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers / / edited by Jooyoung Lee, Jongsung Kim |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
| Descrizione fisica | 1 online resource (XIII, 448 p. 83 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Systems and Data Security Cryptology Management of Computing and Information Systems |
| ISBN | 3-319-15943-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA -- On the Security of Distributed Multiprime RSA -- Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs -- Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme -- Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1 -- Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks -- A Fast Phase-Based Enumeration Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors -- How Much Can Complexity of Linear Cryptanalysis Be Reduced? -- Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers -- Bicliques with Minimal Data and Time Complexity for AES -- Fault Analysis on SIMON Family of Lightweight Block Ciphers -- A Clustering Approach for Privacy-Preserving in Social Networks -- Securely Solving Classical Network Flow Problems -- Remote IP Protection Using Timing Channels -- Detecting Camouflaged Applications on Mobile Application Markets -- WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps -- A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 -- LSH: A New Fast Secure Hash Function Family -- Lossless Data Hiding for Binary Document Images Using n-Pairs Pattern -- Montgomery Modular Multiplication on ARM-NEON Revisited -- A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function -- Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols -- Compact and Efficient UC Commitments Under Atomic-Exchanges -- Issuer-Free Adaptive Oblivious Transfer with Access Policy -- Memory Address Side-Channel Analysis on Exponentiation -- Mutant Differential Fault Analysis of Trivium MDFA. |
| Record Nr. | UNISA-996200348503316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information Security and Cryptology - ICISC 2014 : 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers / / edited by Jooyoung Lee, Jongsung Kim
| Information Security and Cryptology - ICISC 2014 : 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers / / edited by Jooyoung Lee, Jongsung Kim |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
| Descrizione fisica | 1 online resource (XIII, 448 p. 83 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Systems and Data Security Cryptology Management of Computing and Information Systems |
| ISBN | 3-319-15943-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA -- On the Security of Distributed Multiprime RSA -- Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs -- Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme -- Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1 -- Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks -- A Fast Phase-Based Enumeration Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors -- How Much Can Complexity of Linear Cryptanalysis Be Reduced? -- Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers -- Bicliques with Minimal Data and Time Complexity for AES -- Fault Analysis on SIMON Family of Lightweight Block Ciphers -- A Clustering Approach for Privacy-Preserving in Social Networks -- Securely Solving Classical Network Flow Problems -- Remote IP Protection Using Timing Channels -- Detecting Camouflaged Applications on Mobile Application Markets -- WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps -- A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 -- LSH: A New Fast Secure Hash Function Family -- Lossless Data Hiding for Binary Document Images Using n-Pairs Pattern -- Montgomery Modular Multiplication on ARM-NEON Revisited -- A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function -- Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols -- Compact and Efficient UC Commitments Under Atomic-Exchanges -- Issuer-Free Adaptive Oblivious Transfer with Access Policy -- Memory Address Side-Channel Analysis on Exponentiation -- Mutant Differential Fault Analysis of Trivium MDFA. |
| Record Nr. | UNINA-9910483965003321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||