Mathematical Methods in Computer Science 2008 (MMICS 2008)

MMICS 2008
17. 12. 2008
Ort Hörsaal -101, Informatik-Hauptgebäude (Geb. 50.34), Am Fasanengarten 5, 76131 Karlsruhe
Campusplan | Google-Maps
18:00 - 20:00 Welcome Reception

 

18. 12. 2008
Ort Hörsaal -101, Informatik-Hauptgebäude (Geb. 50.34), Am Fasanengarten 5, 76131 Karlsruhe
Campusplan | Google-Maps
08:50 - 09:00 Welcome: The Organizers
Cryptography I: Session chair Jörn Müller-Quade
09:00 - 09:40 Invited Talk: Ones and zeros Fred Piper
09:40 - 10:20 Coding-Based Oblivious Transfer
Kazukuni Kobara, Kirill Morozov, and Raphael Overbeck
Coffee
Designs: Session chair Markus Püschel  
10:50 - 11:20 Steiner t-designs for Large t
Michael Huber
11:20 - 11:50 New Spatial Configurations Harald Gropp
11:50 - 12:20 Construction of Large Constant Dimension Codes with a Prescribed Minimum Distance
Axel Kohnert and Sascha Kurz
Lunch
Quantum Computing: Session chair: Dominik Janzing
13:45 - 14:45 Invited Talk: Embedding Classical into Quantum Computation Richard Jozsa
14:45 - 15:15 A Criterion for Attaining the Welch Bounds with Applications for Mutually Unbiased Bases:
Aleksandrs Belovs and Juris Smotrovs
15:15 - 15:45 An Efficient Quantum Algorithm for the Hidden Subgroup Problem over Weyl-Heisenberg Groups
Hari Krovi and Martin Rötteler
  Coffee  
Algorithms: Session chair: Martin Rötteler
16:15 - 16:45 Computing Equiangular Lines in Complex Space Markus Grassl
16:45 - 17:15 Complexity of Comparing Monomials and Two Improvements of the Buchberger-Möller Algorithm
Samuel Lundqvist
19:30

Dinner

 

19. 12. 2008
Ort Hörsaal -101, Informatik-Hauptgebäude (Geb. 50.34), Am Fasanengarten 5, 76131 Karlsruhe
Campusplan | Google-Maps
Coding Theory: Session chair: Markus Grassl
09:00 - 10:00 Invited Talk: Decoding Cyclic Codes: The Cooper Philosophy
Teo Mora and Emmanuela Orsini
10:00 - 10:30 Kernel Dimension for Some Families of Quaternary Reed-Muller Codes
J. Pernas, J. Pujol, and M. Villanueva
Coffee
Cryptography II: Session chair: Rainer Steinwandt
11:00 - 11:30 Protection of Sensitive Security Parameters in Integrated Circuits
Dejan E. Lazich and Micaela Wuensche
11:30 - 12:00 On Reconstruction of RC4 Keys from Internal States
Shahram Khazaei and Willi Meier
12:00 - 12:30 On the Security of Beth's Identification Schemes against Active and Concurrent Adversaries
Giovanni Di Crescenzo
Lunch