The Programming Language Ada. Reference Manual [[electronic resource] ] : American National Standards Institute, Inc. ANSI/MIL-STD-1815A-1983. Approved 17 February 1983 / / by David Hutchison, Takeo Kanade, Josef Kittler, Jon Kleinberg, Alfred Kobsa, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar M. Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Sudan Madhu, Demetri Terzopoulos, J. Doug Tygar, Gerhard Weikum |
Autore | Hutchison David |
Edizione | [1st ed. 1983.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1983 |
Descrizione fisica | 1 online resource (IX, 333 p.) |
Disciplina | 005.13 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Programming languages (Electronic computers)
Programming Languages, Compilers, Interpreters |
ISBN | 3-540-46841-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Lexical elements -- Declarations and types -- Names and expressions -- Statements -- Subprograms -- Packages -- Visibility rules -- Tasks -- Program structure and compilation issues -- Exceptions -- Generic units -- Representation clauses and implementation-dependent features -- Input-output. |
Record Nr. | UNISA-996466335303316 |
Hutchison David | ||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1983 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Progress in Cryptology - INDOCRYPT 2001 [[electronic resource] ] : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 / / edited by C. Pandu Rangan, Cunsheng Ding |
Edizione | [1st ed. 2001.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 |
Descrizione fisica | 1 online resource (XIV, 358 p.) |
Disciplina | 005.82 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer science—Mathematics Operating systems (Computers) Computers and civilization Algorithms Computer communication systems Cryptology Discrete Mathematics in Computer Science Operating Systems Computers and Society Algorithm Analysis and Problem Complexity Computer Communication Networks |
ISBN | 3-540-45311-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Lecture -- Cryptographic Functions and Design Criteria for Block Ciphers -- Hashing -- Mobile Agent Route Protection through Hash-Based Mechanisms -- A New Anonymous Fingerprinting Scheme with High Enciphering Rate -- A Parallel Algorithm for Extending Cryptographic Hash Functions -- Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining -- Algebraic Schemes -- Multiples of Primitive Polynomials over GF(2) -- Fast Generation of Cubic Irreducible Polynomials for XTR -- Cheating Prevention in Secret Sharing over GF(p t) -- Elliptic Curves -- An Application of Sieve Methods to Elliptic Curves -- Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography -- A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography -- Coding Theory -- Frameproof and IPP Codes -- Linear Authentication Codes: Bounds and Constructions -- Applications -I -- Selective Receipt in Certified E-mail -- Spatial Domain Digital Watermarking with Buyer Authentication -- Efficient Public Auction with One-Time Registration and Public Verifiability -- An Analysis of Integrity Services in Protocols -- Cryptanalysis -- Cryptanalysis of the Nonlinear FeedForward Generator -- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree -- Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem -- Distributed Cryptography -- Robust and Secure Broadcasting -- Toward Optimal Player Weights in Secure Distributed Protocols -- Boolean Functions -- Autocorrelation Properties of Correlation Immune Boolean Functions -- On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices -- Digital Signatures -- A Twin Algorithm for Efficient Generation of Digital Signatures -- Efficient “on the Fly” Signature Schemes Based on Integer Factoring -- Shift Registers -- Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator -- Efficient Software Implementation of Linear Feedback Shift Registers -- Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001 -- Applications -II -- Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography -- Re-dividing Complexity between Algorithms and Keys -- A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function. |
Record Nr. | UNISA-996465653503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Progress in Cryptology - INDOCRYPT 2001 : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 / / edited by C. Pandu Rangan, Cunsheng Ding |
Edizione | [1st ed. 2001.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 |
Descrizione fisica | 1 online resource (XIV, 358 p.) |
Disciplina | 005.82 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer science—Mathematics Operating systems (Computers) Computers and civilization Algorithms Computer networks Cryptology Discrete Mathematics in Computer Science Operating Systems Computers and Society Algorithm Analysis and Problem Complexity Computer Communication Networks |
ISBN | 3-540-45311-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Lecture -- Cryptographic Functions and Design Criteria for Block Ciphers -- Hashing -- Mobile Agent Route Protection through Hash-Based Mechanisms -- A New Anonymous Fingerprinting Scheme with High Enciphering Rate -- A Parallel Algorithm for Extending Cryptographic Hash Functions -- Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining -- Algebraic Schemes -- Multiples of Primitive Polynomials over GF(2) -- Fast Generation of Cubic Irreducible Polynomials for XTR -- Cheating Prevention in Secret Sharing over GF(p t) -- Elliptic Curves -- An Application of Sieve Methods to Elliptic Curves -- Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography -- A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography -- Coding Theory -- Frameproof and IPP Codes -- Linear Authentication Codes: Bounds and Constructions -- Applications -I -- Selective Receipt in Certified E-mail -- Spatial Domain Digital Watermarking with Buyer Authentication -- Efficient Public Auction with One-Time Registration and Public Verifiability -- An Analysis of Integrity Services in Protocols -- Cryptanalysis -- Cryptanalysis of the Nonlinear FeedForward Generator -- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree -- Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem -- Distributed Cryptography -- Robust and Secure Broadcasting -- Toward Optimal Player Weights in Secure Distributed Protocols -- Boolean Functions -- Autocorrelation Properties of Correlation Immune Boolean Functions -- On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices -- Digital Signatures -- A Twin Algorithm for Efficient Generation of Digital Signatures -- Efficient “on the Fly” Signature Schemes Based on Integer Factoring -- Shift Registers -- Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator -- Efficient Software Implementation of Linear Feedback Shift Registers -- Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001 -- Applications -II -- Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography -- Re-dividing Complexity between Algorithms and Keys -- A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function. |
Record Nr. | UNINA-9910143920403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|