----------------------------------------------------------------------------------------- Open call for papers: Proceeding for Workshop D1 ----------------------------------------------------------------------------------------- During May 01 - May 06, Workshop D1 "Groebner Bases in Cryptography, Coding Theory, and Algebraic Combinatorics" was held, within the framework of the Special Semester on Groebner Bases at RICAM and RISC, Linz-Austria (see www.ricam.oeaw.ac.at/srs/groeb/). The workshop was divided into three consecutive sessions: Coding (chaired by M. Sala), Cryptography (chaired by L. Perret) and Algebraic Combinatorics (chaired by M. Klin), and started with an introductory lecture on Groebner bases by Bruno Buchberger. The conference included tutorials/surveys, research talks and poster presentations. The audience consisted of more than 120 researchers arrived from all over the world. The proceeding for the conference will be published through three different media: 1) a volume of the RISC Book Series, covering the Algebraic Combinatoric contributions, 2) a special issue of Journal of Symbolic Computation, covering research results for the Coding and Crypto parts whose authors plan to publish as full journal papers, 3) a volume of the RISC Book Series, including any contribution from the Coding and Crypto sessions, either in a short-note version or in a long-paper version. Book for proceedings D1: "Groebner, Coding, and Cryptography" Calls for 1) and 2) appear separately. We now describe 3). ------------------------------------ "Groebner, Coding, and Cryptography" (RISC Book Series, Springer) ------------------------------------ Managing Editor: M. Sala Editors: T. Mora, L. Perret, S. Sakata, M. Sala, C. Traverso This proceedings book will be published in the RISC Book Series (Springer). It will contain two parts: - Part I: a collections of tutorials / surveys giving a comprehensive introduction to the field. - Part II: short notes describing either presentations in the Coding and Cryptography sessions, or ideas and cooperations that were born during the workshops. As regards Part I, it consists of 15 20-page invited papers. All authors have already been invited. ------------------------------------------------------ Here is the paper list (tentative titles): 1) Groebner attacks to Public Key cryptosystems 2) Groebner attacks to symmetric block ciphers 3) Groebner attacks to stream ciphers 4) Cryptosystems based on Groebner bases 5) An introduction to cyclic codes 6) Decoding of cyclic codes with Groebner bases 7) An introduction to AG codes 8) Encoding AG codes 9) The BMS algorithm 10) The BMS algorithm to decode AG codes 11) AG codes and Order Domains 12) An introduction to FGLM-like algorithms 13) Applications of FGLM-like algorithm to and codes 14) An introduction to codes over rings 15) Non-commutative Groebner bases applied to codes over rings ------------------------------------------------------------ This call relates to Part II. Details follow. PART II The aim of this Part is to collect, as short notes, both presentations happened during the Coding and Cryptography sessions of the Workshop, and ideas and research directions that were generated during the workshop in these two sessions. For "presentations" we mean both invited talks and presented posters. We point out that even presentations submitted as full papers to the JSC issue may be welcome in this Part (but clearly not anything appeared in Part I). Moreover, any Workshop attendee is welcome to submit a contribution if based on ideas and/or collaborations established during these sessions. A typical note will have 3/4 pages (standard A4 12pt latex). We plan to publish 20/30 notes. Any submission should arrive to the M.E., M. Sala (msala@bcri.ucc.ie), and will be handled by an Editor, who will have it refereed by an anonymous referee. We welcome both new results and clear expositions of known results, including summary of thesis work. We will appreciate also notes where the new approaches are sketched, provided the rigorous foundations are not missing. Co-authors not present at the Workshop are welcome, but at least one of the authors has to be a registered attendee. Dead-line for submissions: 28 February 2007 Referee reports are due: 15 May 2007 Final acceptance decision: 10 June 2007 NOTE: Even if a note is accepted, the author is understood to be ready to make some changes, as follows: a) to implement some notation changes (to achieve some uniformity in the book) b) to lightly resize the note (shrinking or expanding slightly), to adhere to the formatting style (which will be decided later) c) to add some cross-references to other papers in the book d) any other change beneficial to a reader of the book.