Sunday, September 7th
Monday, September 8th
Tuesday, September 9th
Wednesday, September 10th
|
|
Final Program
Time |
Event |
18:00 |
Welcome Reception and Registration at Conference Hotel |
Time |
Event |
8:30 - 8:45 |
Welcome
|
---|
| Session
| Authors
| Talk's Title |
8:45 - 10:00 |
Session 1: Side Channel Attack Methodology |
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi |
Multi-Channel Attacks |
Chris Karlof, David Wagner |
Hidden Markov Model Cryptanalysis
[PDF] |
Berna Siddika Örs, Elisabeth Oswald, Bart Preneel |
Power-Analysis Attacks on an FPGA--First Experimental Results |
10:00 - 10:30 |
Coffee |
10:30 - 11:30 |
Invited Talk |
Adi Shamir |
RSA Security Analysis |
11:30 - 12:00 |
Session 2: Hardware Factorization |
Willi Geiselmann, Rainer Steinwandt |
Hardware to Solve Sparse Systems of Linear Eqns over GF(2)
[PDF] |
12:00 - 13:20 |
Lunch |
13:20 - 15:00 |
Session 3: Symmetric Ciphers -- Side-Channel Attacks and Counter-Measures |
Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, M. Shigeri, Hiroshi Miyauchi |
Cryptanalysis of DES Implemented on Computers With Cache |
Gilles Piret, Jean-Jacques Quisquater |
A Differential Fault Attack Technique Against SPN Structures, with Application to the AES and KHAZAD
[PDF] |
Jovan Dj. Goliç |
DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits
[PDF] |
Marc Joye, Pascal Paillier |
GCD-Free Algorithms for Computing Modular Inverses |
15:00 - 15:30 |
Coffee |
15:30 - 16:45 |
Session 4: Secure Hardware Logic |
Ramesh Karri, Grigori Kuznetsov, Michael Goessel |
Parity-based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers |
Kris Tiri, Ingrid Verbauwhede |
Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology |
Jacques J.A. Fournier, Simon Moore, Huiyun Li, Robert Mullins, George Taylor |
Security Evaluation of Asynchronous Circuits
[PDF] |
16:45 - 17:45 |
Panel Session |
Marc Joye (Gemplus) François Koeune (UCL, Louvain) Bart Preneel (COSIC, Leuven) Pankaj Rohatgi (IBM) Jean-Pierre Seifert (Infineon) Colin Walter (Comodo, chairman) |
Are software and hardware counter-measures
winning the war against side-channel leakage?
[PDF] |
19:30 |
Dinner |
Time |
Event |
| Session
| Authors
| Talk's Title |
08:45 - 10:00 |
Session 5: Random Number Generators |
Michael Epstein, Laszlo Hars, Raymond Krasinski, Martin Rosner, Hao Zheng |
Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts
[PDF] |
Boaz Barak, Ronen Shaltiel, Eran Tromer |
True Random Number Generators Secure in a Changing Environment |
Markus Dichtl |
How to Predict the Output of a Hardware Random Number Generator |
10:00 - 10:30 |
Coffee |
10:30 - 11:45 |
Session 6: Efficient Multiplication |
Arash Reyhani-Masoleh, M. Anwar Hasan |
On Time and Space Complexities of Bit Parallel Polynomial Basis Multiplier
[PDF] |
Jean-François Dhem |
Efficient Modular Reduction Algorithm in Fq[x] and its Application to "Left to Right" Modular Multiplication in F2[x] |
Benoit Chevallier-Mames, Marc Joye, Pascal Paillier |
Faster Double-Size Modular Multiplication From Euclidean Multipliers |
11:45 - 13:10 |
Lunch |
13:10 - 14:00 |
Session 7: More on Efficient Arithmetic |
Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong |
Efficient Exponentiation for a Class of Finite Fields GF(2n) determined by Gauss Periods |
Jean-Sébastien Coron, Alexei Tchulkine |
A New Algorithm for Switching from Arithmetic to Boolean Masking
[PDF] |
14:00 - 15:15 |
Session 8: Attacks on Asymmetric Crypto-Systems |
Pierre-Alain Fouque, Gwenaelle Martinet, Guillaume Poupard |
Attacking Unbalanced RSA-CRT using SPA
[PDF] |
Pierre-Alain Fouque, Frederic Valette |
The Doubling Attack: Why Upwards is better than Downwards |
Nigel Smart |
An Analysis of Goubin's Refined Power Analysis Attack
[PDF] |
15:15 - 15:45 |
Coffee |
15:45 - 16:10 |
Session 8 contd. |
Julien Cathalo, François Koeune, Jean-Jacques Quisquater |
A New Type of Timing Attack: Application to GPS
[PDF] |
16:10 - 17:10 |
Invited Talk |
Frank Stajano |
The Security Challenges of Ubiquitous Computing |
19:00 |
Banquet |
Wednesday, September 10th
|
---|
Time |
Event |
| Session
| Authors
| Talk's Title |
08:45 - 09:45 |
Invited Talk |
Hans Dobbertin |
Algebraic Structures in the Design of AES - Cryptographically Strong or Risky? |
09:45 - 10:15 |
Coffee |
10:15 - 11:30 |
Session 9: Implementation of Symmetric Ciphers |
Akashi Satoh, Sumio Morioka |
Unified Hardware Architecture for the 128-bit Block Ciphers AES and Camellia
[PDF] |
Pawel Chodowiec, Kris Gaj |
Very Compact FPGA Implementation of the AES Algorithm
[PDF] |
François-Xavier Standaert, Gael Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat |
Efficient Implementation of Rijndael in Reconfigurable Hardware: Improvements and Design Tradeoffs
[PDF] |
11:30 - 11:55 |
Session 10: Hyperelliptic Curve Cryptography |
Jan Pelzl, Thomas Wollinger, Jorge Guajardo, Christof Paar |
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
[PDF] |
11:55 - 12:55 |
Lunch |
12:55 - 13:20 |
Session 10 contd. |
Roberto M. Avanzi |
Countermeasures against Differential Analysis for Hyperelliptic Curve Cryptosystems
[PDF] |
13:20 - 14:10 |
Session 11: Counter-Measures to Side Channel Leakage |
Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
A Practical Countermeasure against Address-bit Differential Power Analysis
[PDF] |
Katsuyuki Okeya, Tsuyoshi Takagi |
A More Flexible Countermeasure against Side Channel Attacks using Window Method
[PDF] |
14:10 - 15:00 |
Session 12: Attacks against Standards |
Jolyon Clulow |
On the Security of PKCS #11
[PDF] |
Vlastimil Klima, Ondrej Pokorný, Tomas Rosa |
Attacking RSA-based Sessions in SSL/TLS |
15:00 - 15:05 |
Concluding Remarks |
15:05 - 15:35 |
Coffee |
15:35 |
Adjourn |
Notes:
- Regular presentations are 25 min long
- The Monday program is from 08:30 - 17:45
- The Tuesday program is from 08:45 - 17:10
- The Wednesday program is from 08:45 - 15:35
|