Telemedical Applications and Grid Technology -- Statistical Modeling and Segmentation in Cardiac MRI Using a Grid Computing Approach -- A Grid Molecular Simulator for E-Science -- Application Driven Grid Developments in the OpenMolGRID Project -- ATLAS Data Challenge 2: A Massive Monte Carlo Production on the Grid -- High Throughput Computing for Spatial Information Processing (HIT-SIP) System …
Cryptanalysis I -- Cryptanalysis of the Hash Functions MD4 and RIPEMD -- How to Break MD5 and Other Hash Functions -- Collisions of SHA-0 and Reduced SHA-1 -- Theory I -- Reducing Complexity Assumptions for Statistically-Hiding Commitment -- Smooth Projective Hashing and Two-Message Oblivious Transfer -- On Robust Combiners for Oblivious Transfer and Other Primitives -- Encryption I -- Efficien…
Efficient Collision Search Attacks on SHA-0 -- Finding Collisions in the Full SHA-1 -- Pebbling and Proofs of Work -- Composition Does Not Imply Adaptive Security -- On the Discrete Logarithm Problem on Algebraic Tori -- A Practical Attack on a Braid Group Based Cryptographic Protocol -- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption -- Unconditional Characteriza…
Keynote Papers -- Counting by Coin Tossings -- On the Role Definitions in and Beyond Cryptography -- Meme Media for the Knowledge Federation Over the Web and Pervasive Computing Environments -- Contributed Papers -- Probabilistic Space Partitioning in Constraint Logic Programming -- Chi-Square Matrix: An Approach for Building-Block Identification -- Design Exploration Framework Under Imprecisen…
Conceptual Track -- Morphogenesis and Development -- Robotics and Autonomous Agents -- Evolutionary Computation and Theory -- Cellular Automata -- Models of Biological Systems and Their Applications -- Ant Colony and Swarm Systems -- Evolution of Communication -- Simulation of Social Interactions -- Self-replication -- Artificial Chemistry -- Posters.TheArti?cialLifetermappearedmorethan20yearsa…
Topology and Calculus -- Limits and Topology -- Differentiability -- Inverse and Implicit Functions -- Integration -- The Fundamental Theorem of Calculus and Fubini’s Theorem -- Vector Fields -- Fixpoints -- Main Theorem of ODEs -- Third Advanced Topic -- Selected Higher Subjects -- Categories -- Splines -- Fourier Theory -- Wavelets -- Fractals -- Neural Networks -- Probability Theory -- Lam…
Keynote Speech -- Research Issues in Adapting Computing to Small Devices -- Mobile Context-Aware Systems – Linking the Physical and Digital World -- Architecture -- A Data Transformations Based Approach for Optimizing Memory and Cache Locality on Distributed Memory Multiprocessors -- A Fetch Policy Maximizing Throughput and Fairness for Two-Context SMT Processors -- A Loop Transformation Usin…
Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- Ge…
Towards Generic Pattern Mining -- Conceptual Exploration of Semantic Mirrors -- Towards a Formal Concept Analysis Approach to Exploring Communities on the World Wide Web -- Automatic Selection of Noun Phrases as Document Descriptors in an FCA-Based Information Retrieval System -- Combining Spatial and Lattice-Based Information Landscapes -- Explaining the Structure of FrameNet with Concept Latt…
New Designs -- A New MAC Construction ALRED and a Specific Instance ALPHA-MAC -- New Applications of T-Functions in Block Ciphers and Hash Functions -- The Poly1305-AES Message-Authentication Code -- Stream Ciphers I -- Narrow T-Functions -- A New Class of Single Cycle T-Functions -- F-FCSR: Design of a New Class of Stream Ciphers -- Boolean Functions -- Cryptographically Significant Boolean Fu…