Information Security and Related Combinatorics

Opatija, Croatia

May 31, 2010 - June 11, 2010

HOME Committee Programme

Invited

Lectures

Participants Deadlines

Application

Registration Accommodation Venue

 

Invited Lectures

K.T. Arasu, Wright State University, USA

Perfect sequences

 

Charles Colbourn, Arizona State University, USA
Perfect hash families and covering arrays

Ryoh Fuji-Hara, Tsukuba University, Japan
Multi-structured designs and their applications

Willem Haemers, Tilburg University, The Netherlands
Algebraic methods for graphs, designs and codes

Masakazu Jimbo, Nagoya University, Japan
Quantum jump codes and related combinatorial designs

Jennifer D. Key, Clemson University, USA
Permutation decoding for codes from designs, finite geometries and graphs

Hadi Kharaghani, University of Lethbridge, Canada
On mutually unbiased Hadamard matrices and their applications in quantum cryptography

Clement Lam, Concordia University, Canada
Finding error-correcting codes using computers

Spyros Magliveras, Florida Atlantic University, USA
Crypto applications of combinatorial group theory

Jamshid Moori, University of KwaZulu-Natal, South Africa
Finite groups, codes and designs

 

Tanush Shaska, Oakland University, USA
Genus 2 curves and their applications to cryptography

Leo Storme, Ghent University, Belgium
The use of Galois geometries in coding theory and cryptography

Vladimir D. Tonchev, Michigan Technological University, USA
Finite geometry designs, codes, and Hamada's conjecture

Rick Wilson, Department of Mathematics, California Institute of Technology, USA
Incidence matrices and codes associated with t-designs and t-uniform hypergraphs

 

Sponsors