CHES

IACR

Workshop on Cryptographic Hardware and Embedded Systems 2014 (CHES 2014)

 

Program

 

[Tuesday, 9/23] [Wednesday, 9/24] [Thursday, 9/25] [Friday, 98/26]

 

Tuesday, September 23rd
Sydney Room
TimeEvent
 SessionAuthorsTitle
09:30 - 10:00 Tutorial Registration
at Capri Room
10:00 - 13:00 CHES Tutorial 1 Guido Bertoni (ST Microelectronics) Keccak and SHA-3
14:30 - 17:30 CHES Tutorial 2

Viktor Fischer (Hubert Curien Laboratory, Jean Monnet University Saint-Etienne, France)

Random number generators for cryptography — design, evaluation and tests
18:00 - 20:30CHES Reception
Garden

 

Wednesday, September 24th
Grand Ballroom
TimeEvent
 SessionAuthorsTitle
07:30 - 08:30 Registration
8:30 - 10:10 Session 1
Side-Channel Attacks

Chair: Elke De Mulder
Naofumi Homma (Tohoku University),
Yu-ichi Hayashi (Tohoku University),
Noriyuki Miura (Kobe University),
Daisuke Fujimoto (Kobe University),
Daichi Tanaka (Kobe University),
Makoto Nagata (Kobe University),
and Takafumi Aoki (Tohoku University)
EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor
Yossef Oren (Columbia University),
Ofir Weisse (Tel Aviv University),
and Avishai Wool (Tel Aviv University)
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks
Victor Lomné (ANSSI),
Emmanuel Prouff (ANSSI),
Matthieu Rivain (CryptoExperts),
Thomas Roche (ANSSI),
and Adrian Thillard (ANSSI)
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
Annelie Heuser (Télécom ParisTech),
Olivier Rioul (Télécom ParisTech),
and Sylvain Guilley (Télécom ParisTech, Secure-IC)
Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory
10:10 - 10:45 Coffee Break
Capri Room
10:45 - 12:25 Session 2:
New Attacks and Constructions

Chair: Axel Poschmann
Naomi Benger (University of Adelaide),
Joop van de Pol (University of Bristol),
Nigel P. Smart (University of Bristol),
and Yuval Yarom (University of Adelaide)
"Ooh Aah... Just a Little Bit"': A small amount of side channel can go a long way
Harshal Tupsamudre, Shikha Bisht, and Debdeep Mukhopadhyay (IIT Kharagpur) Destroying Fault Invariant with Randomization - A Countermeasure for AES against Differential Fault Attacks
Takeshi Sugawara (Mitsubishi Electric Corp.),
Daisuke Suzuki (Mitsubishi Electric Corp.),
Ryoichi Fujii (Mitsubishi Electric Corp.),
Shigeaki Tawa (Mitsubishi Electric Corp.),
Ryohei Hori (Ritsumeikan Univ.)
Mitsuru Shiozaki (Ritsumeikan Univ.),
and Takeshi Fujino (Ritsumeikan Univ.)
Reversing Stealthy Dopant-Level Circuits
Yongqiang Li and Mingsheng Wang (The State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences) Constructing S-boxes for Lightweight Cryptography with Feistel Structure
12:25 - 13:30 Lunch
13:30 - 22:00

Guided Excursion to Kyoungju


 

Thursday, September 25th
Grand Ballroom
TimeEvent
 SessionAuthorsTitle
08:00 - 08:30 Registration
8:30 - 10:10 Session 3:
Countermeasure

Chair: Marcel Medwed
Adam Ding, Liwei Zhang, Yunsi Fei, and Pei Luo (Northeastern University) A Statistical Model for Higher Order DPA on Masked Devices
Jean-Sébastien Coron (University of Luxembourg),
Arnab Roy (University of Luxembourg, Luxembourg and Technical University of Denmark),
and Srinivas Vivek (University of Luxembourg)
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures
Jean-Sébastien Coron, Johann Großschädl, and Praveen Kumar Vadnala (University of Luxembourg) Secure Conversion between Boolean and Arithmetic Masking of any order
Gilles Barthe (IMDEA Software Institute),
François Dupressoir (IMDEA Software Institute),
Pierre-Alain Fouque (Université de Rennes 1, Institut Universitaire de France),
Benjamin Grégoire (INRIA),
Mehdi Tibouchi (NTT Secure Platform Laboratories),
and Jean-Christophe Zapalowicz (INRIA)
Making RSA-PSS Provably Secure Against Non-Random Faults
10:10 - 10:45 Coffee Break
Capri Room
10:45 - 12:25 Session 4:
Algorithm specific SCA

Chair: Mathieu Rivain
Daniel Genkin (Technion, Tel Aviv University),
Itamar Pipman (Tel Aviv University),
and Eran Tromer (Tel Aviv University)
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
Aurélie Bauer, Eliane Jaulmes, Victor Lomné, Emmanuel Prouff, and Thomas Roche (ANSSI) Side-Channel Attack Against RSA Key Generation Algorithms
Noboru Kunihiro and Junya Honda (University of Tokyo) RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
Christophe Clavier, Damien Marion, and Antoine Wurcker (University of Limoges) Simple Power Analysis on AES Key Expansion Revisited
12:25 - 13:30 Lunch
13:30 - 14:20 Session 5:
ECC Implementations

Chair: Mehdi Tibouchi
Thomas Unterluggauer and Erich Wenger (IAIK, Graz University of Technology) Efficient Pairings and ECC for Embedded Systems
Daniel J. Bernstein (University of Illinois at Chicago and Technische Universiteit Eindhoven),
Chitchanok Chuengsatiansup (Technische Universiteit Eindhoven),
and Tanja Lange (Technische Universiteit Eindhoven)
Curve41417: Karatsuba revisited
14:20 - 14:25 Pause
14:25 - 15:25

Session 6:
Invited Talk

André Weimerskirch (University of Michigan Transportation Research Institute) V2V Communication Security: a privacy-preserving design for 300 million vehicles
15:30 - 16:00 Coffee Break
Capri Room
16:00 - 17:15 Session 7:
Implementations

Chair: Junfeng Fan
Andrea Miele (LACAL EPFL Lausanne),
Joppe W. Bos (NXP Semiconductors),
Thorsten Kleinjung (LACAL EPFL Lausanne),
and Arjen K. Lenstra (LACAL EPFL Lausanne)
Cofactorization on Graphics Processing Units
Thomas Pöppelmann (Ruhr University Bochum),
Léo Ducas (University of California, San Diego),
and Tim Güneysu (Ruhr University Bochum)
Enhanced Lattice-Based Signatures on Reconfigurable Hardware
Sujoy Sinha Roy (ESAT/COSIC, KU Leuven),
Frederik Vercauteren (ESAT/COSIC, KU Leuven),
Nele Mentens (ESAT/COSIC, KU Leuven),
Donald Donglong Chen (City University of Hong Kong),
and Ingrid Verbauwhede (ESAT/COSIC, KU Leuven)
Compact Ring-LWE based Cryptoprocessor
18:00 - 23:00
Banquet and Rump Session
Grand Ballroom
Chair: Tim Güneysu and Helena Handschuh


 

Friday, September 26th
Grand Ballroom
TimeEvent
 SessionAuthorsTitle
08:30 - 09:00 Registration
9:00 - 10:15 Session 8:
Hardware Implementations of Symmetric Cryptosystems

Chair: Maire O'Neill
Pawel Morawiecki (Polish Academy of Sciences and University of Commerce),
Kris Gaj (George Mason University),
Ekawat Homsirikamol (George Mason University),
Krystian Matusiewicz (Intel),
Josef Pieprzyk (Macquarie University and Queensland University of Technology),
Marcin Rogawski (Cadence Design Systems),
Marian Srebrny (Polish Academy of Sciences and University of Commerce),
and Marcin Wójcik (University of Bristol)
ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption
Hai Brenner (IDC Herzliya),
Lubos Gaspar (ICTEAM/ELECN/Crypto Group UCL),
Gaëtan Leurent (EPI SECRET, INRIA),
Alon Rosen (IDC Herzliya),
and François-Xavier Standaert (ICTEAM/ELECN/Crypto Group UCL)
FPGA implementations of SPRING (And their Countermeasures against Side-Channel Attacks)
Khoongming Khoo (DSO National Laboratories),
Thomas Peyrin (SPMS, Nanyang Technological University),
Axel Poschmann (NXP Semiconductors),
and Huihui Yap (DSO National Laboratories)
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
10:15 - 10:45 Coffee Break
Capri Room
10:45 - 12:25 Session 9:
PUFs

Chair: D.-G. Han
Jeroen Delvaux (ESAT/COSIC, KU Leuven),
Dawu Gu (Shanghai Jiao Tong University),
Dries Schellekens (ESAT/COSIC, KU Leuven),
and Ingrid Verbauwhede (ESAT/COSIC, KU Leuven)
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?
Ulrich Rührmair (TU München),
Xiaolin Xu (UMass Amherst),
Jan Sölter (FU Berlin),
Ahmed Mahmoud (TU München),
Mehrdad Majzoobi (Rice University),
Farinaz Koushanfar (Rice University),
and Wayne Burleson (UMass Amherst)
Efficient Power and Timing Side Channels for Physical Unclonable Functions
Shahin Tajik, Enrico Dietz, Sven Frohmann, Dmitry Nedospasov, Jean-Pierre Seifert, Clemens Helfmeier, Christian Boit, and Helmar Dittrich (Technische Universität Berlin) Physical Characterization of Arbiter PUFs
Daniel E. Holcomb and Kevin Fu (University of Michigan) Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM
12:25 - 13:30 Lunch
13:30 - 14:20 Session 10:
RNGs and SCA Issues in Hardware

Chair: Wieland Fischer
Viktor Fischer (Hubert Curien Laboratory, University of Lyon) and
David Lubicz (DGA-Maîtrise de l'information, Université de Rennes 1)
Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG
Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, and Jiwu Jing (Chinese Academy of Sciences) Entropy Evaluation for Oscillator-Based True Random Number Generators
14:20 - 14:25 Pause
14:25 - 15:40 Session 10:
RNGs and SCA Issues in Hardware (continues)

Chair: Wieland Fischer
Amir Moradi (HGI, Ruhr University Bochum) Side-Channel Leakage through Static Power — Should We Care about in Practice?
Andrew J. Leiserson, Mark E. Marson, and Megan A. Wachs (Cryptography Research, Inc.) Gate-Level Masking Under a Path-Based Leakage Metric
Amir Moradi (HGI, Ruhr University Bochum)
and Vincent Immler (Fraunhofer Institute AISEC, Munich)
Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
15:40 - 15:50 Close