Monday, August 12th
Tuesday, August 13th
Wednesday, August 14th
Thursday, August 15th
|
|
Preliminary Program
Time |
Event |
19:00 - 21:00 |
Welcome Reception |
Time |
Event |
8:30 - 8:45 |
Welcome
|
---|
| Session
| Authors
| Talk's Title |
8:45 - 9:10 |
Invited Talk |
Jean-Jacques Quisquater (UCL, BE) |
CHES: Past Present and Future |
9:10 - 10:25 |
Session 1: Attack Strategies |
S. Skorobogatov and R. Anderson (U Cambridge, UK) |
Optical Fault Induction Attacks |
S. Chari, J.R. Rao, and P. Rohatgi (IBM, US) |
Template Attacks |
D. Agrawal, B. Archambeault, J.R. Rao, and P. Rohatgi (IBM, US) |
The EM Side-channel(s) |
10:25 - 10:45 |
Break |
10:45 - 12:00 |
Session 2: Finite Field and Modular Arithmetic I |
S. Gueron (University of Haifa, IL, and Discretix Technologies, IL) |
Enhanced Montgomery Multiplication |
R. Lórencz (CTU in Prague, CZ) |
New Algorithm for Classical Modular Inverse |
W. Fischer and J.-P. Seifert (Infineon, DE) |
Increasing the bitlength of crypto-coprocessors via smart hardware/software codesign |
12:00 - 13:20 |
Lunch |
13:20 - 15:00 |
Session 3: Elliptic Curve Cryptography I |
E. Oswald (TU-Graz, AT) |
Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems |
E. Trichina (Gemplus, IT) and A. Bellezza (University of Rome "La Sapienza", IT) |
Implementation of Elliptic curve cryptography with built-in counter measures against side channel attacks |
C. Gebotys and R. Gebotys (U Waterloo, CA) |
Secure Elliptic Curve Implementations: An analysis of resistance to power-attacks in a DSP processor core |
K. Itoh, T. Izu, and M. Takenaka (Fujitsu, JP) |
Address-bit Differential Power Analysis on Cryptographic Schemes OK-ECDH and OK-ECDSA |
15:00 - 15:20 |
Break |
15:20 - 17:25 |
Session 4: AES and AES Candidates |
A. K. Lutz, J. Treichler, F.K. Gurkaynak, H. Kaeslin, G. Basler, A. Erni, S. Reichmuth, P. Rommens, S. Oetiker, and W. Fichtner (ETH, CH) |
2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A comparative analysis |
G. Bertoni, L. Breveglieri (Politecnico di Milano, IT), P. Fragneto (STMicroelectronics, IT), M. Macchetti, and S. Marchesin (ALARI, University of Italian Switzerland, Lugano, CH) |
Efficient Software Implementation of AES on 32-bits Platforms |
S. Morioka and A. Satoh (IBM, JP) |
An Optimized S-Box Circuit Architecture for Low Power AES Design |
E. Trichina, D. De Seta, and L. Germani (Gemplus, IT) |
Simplified adaptive multiplicative masking for AES and its secure implementation |
J. Dj. Golic (Gemplus, IT) and C. Tymen (Gemplus, FR) |
Multiplicative masking and power analysis of AES |
17:25 - 17:50 |
Session 5: Tamper Resistance |
A. Huang (MIT, US) |
Keeping Secrets in Hardware: the Microsoft X-BOX Case Study |
17:50 |
Adjourn |
Time |
Event |
| Session
| Authors
| Talk's Title |
08:45 - 10:00 |
Session 6: RSA Implementation |
B. den Boer (TNO TPD, NL), K. Lemke, and G. Wicke (T-Systems, DE) |
A DPA Attack Against the Modular Reduction within a CRT Implementation of RSA |
V. Klima and T. Rosa (ICZ, CZ) |
Further Results and Considerations on Side Channel Attacks on RSA |
C. Aumueller, P. Bier, W. Fischer, P. Hofreiter, and J.-P. Seifert (Infineon, DE) |
Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures |
10:00 - 10:20 |
Break |
10:20 - 12:00 |
Session 7: Finite Field and Modular Arithmetic II |
C.D. Walter (Comodo, UK) |
Some Security Aspects of the Mist Randomized Exponentiation Algorithm |
M. Joye (Gemplus, FR) and S-M. Yen (Nat. Central U, TW) |
The Montgomery Powering Ladder |
K. Itoh, J. Yajima, M. Takenaka, and N. Torii (Fujitsu, JP) |
DPA Countermeasures by improving the window method |
M. Stam (TU Eindhoven, NL) and A.K. Lenstra (Citi, US) |
Efficient subgroup exponentiation in quadratic and sixth degree extensions |
12:00 - 13:20 |
Lunch |
13:20 - 15:25 |
Session 8: Elliptic Curve Cryptography II |
E. Konstantinou, Y. Stamatiou, and C. Zaroliagis (U Patras, GR) |
On the efficient generation of elliptic curves over prime fields |
N. Gura, S. Chang Shantz, H. Eberle (Sun Microsystems, US), D. Finchelstein (U Waterloo, CA), S. Gupta, V. Gupta, and D. Stebila (Sun Microsystems, US) |
An End-to-End Systems Approach to Elliptic Curve Cryptography |
R. Schroeppel, C. Beaver, R. Gonzales, R. Miller, and T. Draelos (Sandia, US) |
A Low-Power Design for an Elliptic Curve Digital Signature Chip |
M. Ernst, M. Jung, F. Madlener, S.A. Huss (TU Darmstadt, DE), and R. Bluemel (Cryptovision, DE) |
A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2^n) |
N. Boston, T.C. Clancy, Y. Liow, and J.E. Webster (Urbana-Champaign, US) |
Genus Two Hyperelliptic Curve Coprocessor |
15:25 - 15:45 |
Break |
15:45 - 16:10 |
Session 9: Random Number Generation |
V. Fischer (U Jean Monnet, FR) and M. Drutarovsky (U Kosice, SL) |
True Random Number Generator Embedded in Reconfigurable Hardware |
16:10 - 17:40 |
Invited Panel |
Werner Schindler (BSI, DE) (moderator), Randall J. Easter (NIST, US), Paul Timmel (NSA, US), and Thomas E. Tkacik (Motorola, US) |
Hardware Random Number Generation |
17:40 |
Adjourn |
Time |
Event |
| Session
| Authors
| Talk's Title |
08:35 - 09:35 |
Invited Talk |
Sanjay Sarma (MIT, US) |
Radio Frequency Identification Systems |
09:35 - 09:55 |
Break |
09:55 - 10:20 |
Session 10: New Primitives |
A. Klimov and A. Shamir (Weizmann, IL) |
A New Class of Invertible Mappings |
10:20 - 12:00 |
Session 11: Finite Field and Modular Arithmetic III |
A. A-A. Gutub, A. F. Tenca, E. Savas, and C.K. Koc (Oregon State U, US) |
Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2^n) |
J. Wolkerstorfer (TU-Graz, AT) |
Dual-Field Arithmetic Unit for GF(p) and GF(2^m) |
A. Reyhani-Masoleh and A. Hasan (U Waterloo, CA) |
Error Detection in Polynomial Basis Multipliers over Binary Extension Fields |
D. Page and N. Smart (U Bristol, UK) |
Hardware implementation of finite fields of characteristic three |
12:00 - 13:20 |
Lunch |
13:20 - 14:35 |
Session 12: Elliptic Curve Cryptography III |
M. Ciet, J-J. Quisquater, and F. Sica (UCL, BE) |
Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication |
J.C. Ha (Korea Nazarene U, KR) and S.J. Moon (Kyungpook National U, KR) |
Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks |
K. Okeya (Hitachi, JP) and K. Sakurai (Kyushu University, JP) |
Fast Multi-Scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy using Montgomery Trick |
14:35 - 15:25 |
Session 13: Hardware for Cryptanalysis |
R. Clayton and M. Bond (U Cambridge, UK) |
Experience Using a Low-Cost FPGA Design to Crack DES Keys |
F-X. Standaert, G. Rouvroy, J-J. Quisquater, and J-D. Legat (UCL, BE) |
A Time-Memory Tradeoff using Distinguished Points: New Analysis & FPGA Results |
15:25 |
Adjourn |
Notes:
- Regular presentations are 25 min long
- The Tuesday program is from 08:30 - 17:50
- The Wednesday program is from 08:45 - 17:40
- The Thursday program is from 08:35 - 15:25
|