Cryptography I |
On the Security of Beth's Identification Schemes against Active and Concurrent Adversaries / Giovanni Di Crescenzo |
Designs |
Steiner t-Designs for Large t / Michael Huber |
New Spatial Configurations / Harald Gropp |
Construction of Large Constant Dimension Codes with a Prescribed Minimum Distance / Axel Kohnert ; Sascha Kurz |
Quantum Computing |
Invited Talk: Embedding Classical into Quantum Computation / Richard Jozsa |
A Criterion for Attaining the Welch Bounds with Applications for Mutually Unbiased Bases / Aleksandrs Belovs ; Juris Smotrovs |
An Efficient Quantum Algorithm for the Hidden Subgroup Problem over Weyl-Heisenberg Groups / Hari Krovi ; Martin Rotteler |
Algorithms |
Computing Equiangular Lines in Complex Space / Markus Grassl |
Complexity of Comparing Monomials and Two Improvements of the Buchberger-Moller Algorithm / Samuel Lundqvist |
Coding Theory |
Invited Talk: Decoding Cyclic Codes: The Cooper Philosophy (Extended Abstract) / Teo Mora ; Emmanuela Orsini |
Kernel Dimension for Some Families of Quaternary Reed-Muller Codes / J. Pernas ; J. Pujol ; M. Villanueva |
Cryptography II |
Coding-Based Oblivious Transfer / Kazukuni Kobara ; Kirill Morozov ; Raphael Overbeck |
Protection of Sensitive Security Parameters in Integrated Circuits / Dejan E. Lazich ; Micaela Wuensche |
On Reconstruction of RC4 Keys from Internal States / Shahram Khazaei ; Willi Meier |
Author Index |
Cryptography I |
On the Security of Beth's Identification Schemes against Active and Concurrent Adversaries / Giovanni Di Crescenzo |
Designs |