|
Workshop on Cryptographic Hardware and
Embedded Systems
|
| Tuesday, August 10 |
Program
( in PDF format; in PostScript format ) |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Tuesday, August 10 |
|---|
| Time | Event | ||
|---|---|---|---|
| 18:00-20:00 | Registration
at Conference Hotel and Welcome Reception (wine and cheese) |
||
| Wednesday, August 11 |
|---|
| Time | Event | ||
|---|---|---|---|
| 7:00 - ... | Registration continues | ||
| 8:30 - 8:45 |
Welcome
to CHES 2004 |
||
| Session | Authors | Talk's Title | |
| 8:45 - 10:00 | Session 1: Side Channels I |
Jason Waddle, David
Wagner |
Towards
Efficient Second-Order Power Analysis |
| Eric Brier, Christophe Clavier, Francis Olivier |
Correlation Power
Analysis with a Leakage Model |
||
| François-Xavier
Standaert, Siddika Berna Örs, Bart Preneel |
Power Analysis of an FPGA
|
||
| 10:00 - 10:30 | Coffee break |
||
| 10:30 - 11:30 | Invited Talk | Neil Gershenfeld The Center for Bits and Atoms, MIT |
Physical Information Security |
| 11:30 - 12:45 | Session
2: Modular Multiplication |
Laszlo Hars |
Long
Modular
Multiplication for Cryptographic Applications |
| Jean-Claude Bajard, Laurent Imbert,
Pierre-Yvan Liardet, Yannick Teglia |
Leak Resistant Arithmetic |
||
| Soonhak Kwon, Kris Gaj, Chang Hoon Kim,
Chun Pyo Hong |
Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography |
||
| 12:45 - 14:15 | Lunch | ||
| 14:15 - 15:30 | Session 3: Low Ressources I |
Erdinc Öztürk, Berk Sunar, Erkay Savaş | Low
Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic |
| Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer |
A Low-cost ECC Coprocessor for Smartcards |
||
| Nils Gura, Arun Patel, Arvinderpal
Wander, Hans Eberle, Sheueling Chang Shantz |
Comparing Elliptic Curve
Cryptography and RSA on 8-bit CPUs |
||
| 15:30 - 16:00 | Coffee break |
||
| 16:00 - 16:50 | Session 4: Implementation
Aspects |
Johann
Großschädl,
Erkay Savaş |
Instruction
Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2m) |
| Roberto Maria Avanzi |
Aspects of Hyperelliptic
Curves over Large Prime Fields in Software Implementations |
||
| 18:30 - 22:00 | Cruise Dinner (from Boston harbour) |
||
| Thursday, August 12 |
|---|
| Time | Event | ||
|---|---|---|---|
| Session | Authors | Talk's Title | |
| 08:30 - 9:20 | Session 5: Collision Attacks |
Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar |
A Collision-Attack on AES |
| Hervé Ledig, Frédéric Muller, Frédéric Valette |
Enhancing Collision
Attacks |
||
| 9:20 - 10:10 | Session 6: Side-Channels II |
Colin D. Walter | Simple
Power Analysis of Unified Code for ECC Double and Add |
| Kerstin Lemke, Kai Schramm, Christof Paar | DPA on n-bit sized Boolean and Arithmetic Operations and its Application to IDEA, RC6 and the HMAC-Construction | ||
| 10:10
- 10:40 |
Coffee Break |
||
| 10:40 - 11:30 |
Session 6: Side-Channels II (cont'd) |
Loren D.
Olson |
Side-Channel Attacks in
ECC: A General Technique for Varying the Parametrization of the
Elliptic Curve |
| Olaf Neiße, Jürgen Pulkus |
Switching Blindings |
||
| 11:30 - 12:20 | Session 7: Fault Attacks |
Jonathan
J. Hoch, Adi Shamir |
Fault
Analysis of Stream Ciphers |
| Ludger Hemme |
A Differential Fault
Attack Against Early Rounds of (Triple-)DES |
||
| 12:20
- 14:00 |
Lunch |
||
| 14:00 - 14:50 | Session 8: Hardware
Implementation I |
Holger Bock, Marco
Bucci, Raimondo Luzzi |
An
Offset-compensated Oscillator-based Random Bit Source for Security
Applications |
| Danil Sokolov, Julian Murphy, Alex Bystrov, Alex Yakovlev |
Improving the Security of
Dual-Rail Circuits |
||
| 14:50 - 15:50 | Invited Talk | Isaac Chuang Medialab, MIT |
Quantum Cryptography |
| 15:50
- 16:20 |
Coffee Break |
||
| 16:20 - 18:00 |
Session 9: Side-Channels III |
Yasuyuki Sakai, Kouichi Sakurai |
A New Attack with Side Channel Leakage
during Exponent Recoding Computations |
| Pierre-Alain Fouque, Frédéric
Muller, Guillaume Poupard, Frédéric Valette |
Defeating Countermeasures Based on Randomized BSD Representations |
||
| Pradeep Kumar Mishra |
Pipelined Computation of Scalar
Multiplication in Elliptic Curve Cryptosystems |
||
| Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto |
Efficient Countermeasures against RPA, DPA, and SPA |
||
| 19:00 - 20:30 | Dinner (hotel) |
||
| 20:30 | Rump Session |
||
| Friday, August 13 |
|---|
| Time | Event | ||
|---|---|---|---|
| Session | Authors | Talk's Title | |
| 09:00 - 10:00 | Invited Talk | Paul Kocher Cryptographic Research |
From Proof to Practice: Real - World Cryptography |
| 10:00 - 10:30 | Coffee break |
||
| 10:30 - 11:20 | Session 10: Low Ressources II |
Martin Feldhofer, Sandra Dominikus,
Johannes Wolkerstorfer |
Strong Authentication for
RFID Systems using the AES Algorithm |
| Bo-Yin Yang,
Jiun-Ming Chen, Yen-Hung Chen |
TTS: High-Speed
Signatures on a Low-Cost Smart Card |
||
| 11:20 - 12:10 | Session 11: Hardware Implementation II |
Eric Peeters, Michaël Nève,
Mathieu Ciet |
XTR Implementation in Reconfigurable Hardware |
| Nikhil Joshi, Kaijie Wu, Ramesh Karri |
Concurrent
Error Detection Schemes for Involution Ciphers |
||
| 12:10 - 13:40 | Lunch | ||
| 13:40 - 14:55 | Session 12: Authentication and
Signatures |
Marc Girault, David Lefranc |
Public Key Authentification
with one (on-line) Single Addition |
| Peter J. Leadbitter,
Dan
Page, Nigel P. Smart |
Attacking
DSA under a Repeated Bits Assumption |
||
| Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval |
How to Disembed a Program? |
||
| 14:55 - 15:00 | Best Paper Award(s) and Concluding Remarks | ||