You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Dans un cadre interdisciplinaire et dans une perspective à la fois intertextuelle et contextuelle, les auteurs s'interrogent sur ces acteurs, cinéastes, producteurs, compositeurs et écrivains européens qui ont émigré ou se sont exilés aux Etats-Unis, essentiellement lors de la première moitié du XXe siècle : pourquoi, comment, quel rôle dans le cinéma américain, etc.
L'image est en soi un lieu de mémoire, elle l'actualise, la commente, la traque. Tant au cinéma où l'impression de réalité fait d'elle le vecteur même par où la/les mémoires s'insinuent qu'en littérature où, verbalisée, elle ne cesse de renvoyer à elle-même. La photographie porte en elle une manière d'intemporel de la mémoire comme à travers les photos d'Ouka Lele qui disent la movida madrilène des années 70-80 ; la peinture se fait écho de peintures anciennes, de souvenirs. L'image est ainsi à la croisée de toutes les mémoires, de toutes nos archives.
Contributions autour de cinq fictions et d'un documentaire de J. Medem. Elles ont pour ambition d'en dégager certaines lignes directrices tout en prenant en compte le contexte dans lequel ces oeuvres ont vu le jour. Outre la modernité formelle et la récurrence de certains thèmes, les auteurs questionnent la manifestation d'une identité basque, notamment à travers l'utilisation des mythes.
This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.
A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis Written by authors known within the academic cryptography community, this book presents the latest developments in current research Unique in its combination of both algorithmic-level design and hardware-level implementation; this all-round approach - algorithm to implementation – covers security from start to completion Deals with AES (Advanced Encryption standard), one of the most used symmetric-key ciphers, which helps the reader to learn the fundamental theory of cryptanalysis and practical applications of side-channel analysis
This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithms mathematical and algorithmic aspects of applied cryptology cryptography for the Internet of Things
None
This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015. The 34 full papers included in this volume were carefully reviewed and selected from 128 submissions. They are organized in the following topical sections: processing techniques in side-channel analysis; cryptographic hardware implementations; homomorphic encryption in hardware; side-channel attacks on public key cryptography; cipher design and cryptanalysis; true random number generators and entropy estimations; side-channel analysis and fault injection attacks; higher-order side-channel attacks; physically unclonable functions and hardware trojans; side-channel attacks in practice; and lattice-based implementations.
Among the simplest combinatorial designs, triple systems have diverse applications in coding theory, cryptography, computer science, and statistics. This book provides a systematic and comprehensive treatment of this rich area of mathematics.