|
Conferences in DBLP
(mmics) 2008 (conf/mmics/2008)
On the Security of Beth's Identification Schemes against Active and Concurrent Adversaries. [Citation Graph (, )][DBLP]
Steiner t-Designs for Large t. [Citation Graph (, )][DBLP]
New Spatial Configurations. [Citation Graph (, )][DBLP]
Construction of Large Constant Dimension Codes with a Prescribed Minimum Distance. [Citation Graph (, )][DBLP]
Invited Talk: Embedding Classical into Quantum Computation. [Citation Graph (, )][DBLP]
A Criterion for Attaining the Welch Bounds with Applications for Mutually Unbiased Bases. [Citation Graph (, )][DBLP]
An Efficient Quantum Algorithm for the Hidden Subgroup Problem over Weyl-Heisenberg Groups. [Citation Graph (, )][DBLP]
Computing Equiangular Lines in Complex Space. [Citation Graph (, )][DBLP]
Complexity of Comparing Monomials and Two Improvements of the Buchberger-Möller Algorithm. [Citation Graph (, )][DBLP]
Invited Talk: Decoding Cyclic Codes: The Cooper Philosophy. [Citation Graph (, )][DBLP]
Kernel Dimension for Some Families of Quaternary Reed-Muller Codes. [Citation Graph (, )][DBLP]
Coding-Based Oblivious Transfer. [Citation Graph (, )][DBLP]
Protection of Sensitive Security Parameters in Integrated Circuits. [Citation Graph (, )][DBLP]
On Reconstruction of RC4 Keys from Internal States. [Citation Graph (, )][DBLP]
|