Foreword -- Introduction -- The Homogeneous Case -- Hilbert Functions -- Further Applications -- A. The ABC of CoCoA 5 -- B. Suggestions for Further Reading -- C. Hints for Selected Exercises -- Bibliography.Computational Commutative Algebra 2 is the natural continuation of Computational Commutative Algebra 1 with some twists, starting with the differently coloured cover graphics. The first vol…
Sharper Upper and Lower Bounds for an Approximation Scheme for Consensus-Pattern -- On the Longest Common Rigid Subsequence Problem -- Text Indexing with Errors -- A New Compressed Suffix Tree Supporting Fast Search and Its Construction Algorithm Using Optimal Working Space -- Succinct Suffix Arrays Based on Run-Length Encoding -- Linear-Time Construction of Compressed Suffix Arrays Using o(n l…
Discrete Tomography -- Binary Matrices Under the Microscope: A Tomographical Problem -- On the Reconstruction of Crystals Through Discrete Tomography -- Binary Tomography by Iterating Linear Programs from Noisy Projections -- Combinatorics and Computational Models -- Hexagonal Pattern Languages -- A Combinatorial Transparent Surface Modeling from Polarization Images -- Integral Trees: Subtree D…
Conservation of Combinatorial Structures in Evolution Scenarios -- Toward a Phylogenetically Aware Algorithm for Fast DNA Similarity Search -- Multiple Genome Alignment by Clustering Pairwise Matches -- On the Structure of Reconciliations -- The Statistical Significance of Max-Gap Clusters -- Identifying Evolutionarily Conserved Segments Among Multiple Divergent and Rearranged Genomes -- Genome…
Lower Bounds for Maximum Parsimony with Gene Order Data -- Genes Order and Phylogenetic Reconstruction: Application to ?-Proteobacteria -- Maximizing Synteny Blocks to Identify Ancestral Homologs -- An Expectation-Maximization Algorithm for Analysis of Evolution of Exon-Intron Structure of Eukaryotic Genes -- Likely Scenarios of Intron Evolution -- OMA, A Comprehensive, Automated Project for th…
Authorisation -- A Multipurpose Delegation Proxy for WWW Credentials -- Secure Role Activation and Authorization in the Enterprise Environment -- Towards a Unified Authentication and Authorization Infrastructure for Grid Services: Implementing an Enhanced OCSP Service Provider into GT4 -- Interoperability -- A Heterogeneous Network Access Service Based on PERMIS and SAML -- Interoperation Betwe…
Cryptanalysis -- A New Related Message Attack on RSA -- Breaking a Cryptographic Protocol with Pseudoprimes -- Experimenting with Faults, Lattices and the DSA -- Key Establishment -- Securing RSA-KEM via the AES -- One-Time Verifier-Based Encrypted Key Exchange -- Password-Based Authenticated Key Exchange in the Three-Party Setting -- Optimization -- On the Optimization of Side-Channel Attacks …
Invited Talk I -- Trends and Challenges for Securer Cryptography in Practice -- Stream Ciphers Analysis -- Distinguishing Attacks on T-Functions -- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity -- Cryptography Based on Combinatorics -- Equivalent Keys in HFE, C*, and Variations -- A New Structural Attack for GPT and Variants -- A Family of F…
Invited Talk -- Abelian Varieties and Cryptography -- Sequences -- Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences -- Period of Streamcipher Edon80 -- Boolean Function and S-Box -- On the Algebraic Immunity of Symmetric Boolean Functions -- On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks -- Hash Functions -- How to Construct Universal One-Way…
Invited Talks -- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects -- Secure Protocols for Complex Tasks in Complex Environments -- Cryptographic Protocols -- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model -- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations -- Applications -- On the Security of a Certified E-Mail S…