Search ISIT 2010

Technical Program

Q-Tu-2: Cryptography II

Time: Tuesday, June 15, 11:30 - 12:50
Location: Salon D
Session Chair: Hirosuke Yamamoto, The University of Tokyo
 
Q-Tu-2.1: A SIMPLE SECRET SHARING SCHEME USING A KEY AND ITS SECURITY AGAINST SUBSTITUTION OF SHARES
         Hiroki Koga; University of Tsukuba
 
Q-Tu-2.2: A ZERO-SUM PROPERTY FOR THE KECCAK-F PERMUTATION WITH 18 ROUNDS
         Christina Boura; INRIA
         Anne Canteaut; INRIA
 
Q-Tu-2.3: ALGEBRAIC ATTACK ON THE ALTERNATING STEP(R,S) GENERATOR
         Mehdi M. Hassanzadeh; Selmer Center, University of Bergen
         Tor Helleseth; Selmer Center, University of Bergen
 
Q-Tu-2.4: NLHB : A NON-LINEAR HOPPER-BLUM PROTOCOL
         Mukundan Madhavan; IIT Madras
         Andrew Thangaraj; IIT Madras
         Yogesh Sankarasubramanian; HP Research Labs (India)
         Kapali Viswanathan; HP Research Labs (India)
 

IEEE Valid HTML! Except for images and photographs, content on
this site is licensed under a Creative Commons
GNU General Public License, version 3.