Workshop on Cryptographic Hardware and
Embedded Systems
|
Tuesday, August 10 |
Program
( in PDF format; in PostScript format ) |
Tuesday, August 10 |
---|
Time | Event | ||
---|---|---|---|
18:00-20:00 | Registration
at Conference Hotel and Welcome Reception (wine and cheese) |
Wednesday, August 11 |
---|
Time | Event | ||
---|---|---|---|
7:00 - ... | Registration continues | ||
8:30 - 8:45 |
Welcome
to CHES 2004 |
||
Session | Authors | Talk's Title | |
8:45 - 10:00 | Session 1: Side Channels I |
Jason Waddle, David
Wagner |
Towards
Efficient Second-Order Power Analysis |
Eric Brier, Christophe Clavier, Francis Olivier |
Correlation Power
Analysis with a Leakage Model |
||
François-Xavier
Standaert, Siddika Berna Örs, Bart Preneel |
Power Analysis of an FPGA
|
||
10:00 - 10:30 | Coffee break |
||
10:30 - 11:30 | Invited Talk | Neil Gershenfeld The Center for Bits and Atoms, MIT |
Physical Information Security |
11:30 - 12:45 | Session
2: Modular Multiplication |
Laszlo Hars |
Long
Modular
Multiplication for Cryptographic Applications |
Jean-Claude Bajard, Laurent Imbert,
Pierre-Yvan Liardet, Yannick Teglia |
Leak Resistant Arithmetic |
||
Soonhak Kwon, Kris Gaj, Chang Hoon Kim,
Chun Pyo Hong |
Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography |
||
12:45 - 14:15 | Lunch | ||
14:15 - 15:30 | Session 3: Low Ressources I |
Erdinc Öztürk, Berk Sunar, Erkay Savaş | Low
Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic |
Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer |
A Low-cost ECC Coprocessor for Smartcards |
||
Nils Gura, Arun Patel, Arvinderpal
Wander, Hans Eberle, Sheueling Chang Shantz |
Comparing Elliptic Curve
Cryptography and RSA on 8-bit CPUs |
||
15:30 - 16:00 | Coffee break |
||
16:00 - 16:50 | Session 4: Implementation
Aspects |
Johann
Großschädl,
Erkay Savaş |
Instruction
Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2m) |
Roberto Maria Avanzi |
Aspects of Hyperelliptic
Curves over Large Prime Fields in Software Implementations |
||
18:30 - 22:00 | Cruise Dinner (from Boston harbour) |
Thursday, August 12 |
---|
Time | Event | ||
---|---|---|---|
Session | Authors | Talk's Title | |
08:30 - 9:20 | Session 5: Collision Attacks |
Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar |
A Collision-Attack on AES |
Hervé Ledig, Frédéric Muller, Frédéric Valette |
Enhancing Collision
Attacks |
||
9:20 - 10:10 | Session 6: Side-Channels II |
Colin D. Walter | Simple
Power Analysis of Unified Code for ECC Double and Add |
Kerstin Lemke, Kai Schramm, Christof Paar | DPA on n-bit sized Boolean and Arithmetic Operations and its Application to IDEA, RC6 and the HMAC-Construction | ||
10:10
- 10:40 |
Coffee Break |
||
10:40 - 11:30 |
Session 6: Side-Channels II (cont'd) |
Loren D.
Olson |
Side-Channel Attacks in
ECC: A General Technique for Varying the Parametrization of the
Elliptic Curve |
Olaf Neiße, Jürgen Pulkus |
Switching Blindings |
||
11:30 - 12:20 | Session 7: Fault Attacks |
Jonathan
J. Hoch, Adi Shamir |
Fault
Analysis of Stream Ciphers |
Ludger Hemme |
A Differential Fault
Attack Against Early Rounds of (Triple-)DES |
||
12:20
- 14:00 |
Lunch |
||
14:00 - 14:50 | Session 8: Hardware
Implementation I |
Holger Bock, Marco
Bucci, Raimondo Luzzi |
An
Offset-compensated Oscillator-based Random Bit Source for Security
Applications |
Danil Sokolov, Julian Murphy, Alex Bystrov, Alex Yakovlev |
Improving the Security of
Dual-Rail Circuits |
||
14:50 - 15:50 | Invited Talk | Isaac Chuang Medialab, MIT |
Quantum Cryptography |
15:50
- 16:20 |
Coffee Break |
||
16:20 - 18:00 |
Session 9: Side-Channels III |
Yasuyuki Sakai, Kouichi Sakurai |
A New Attack with Side Channel Leakage
during Exponent Recoding Computations |
Pierre-Alain Fouque, Frédéric
Muller, Guillaume Poupard, Frédéric Valette |
Defeating Countermeasures Based on Randomized BSD Representations |
||
Pradeep Kumar Mishra |
Pipelined Computation of Scalar
Multiplication in Elliptic Curve Cryptosystems |
||
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto |
Efficient Countermeasures against RPA, DPA, and SPA |
||
19:00 - 20:30 | Dinner (hotel) |
||
20:30 | Rump Session |
Friday, August 13 |
---|
Time | Event | ||
---|---|---|---|
Session | Authors | Talk's Title | |
09:00 - 10:00 | Invited Talk | Paul Kocher Cryptographic Research |
From Proof to Practice: Real - World Cryptography |
10:00 - 10:30 | Coffee break |
||
10:30 - 11:20 | Session 10: Low Ressources II |
Martin Feldhofer, Sandra Dominikus,
Johannes Wolkerstorfer |
Strong Authentication for
RFID Systems using the AES Algorithm |
Bo-Yin Yang,
Jiun-Ming Chen, Yen-Hung Chen |
TTS: High-Speed
Signatures on a Low-Cost Smart Card |
||
11:20 - 12:10 | Session 11: Hardware Implementation II |
Eric Peeters, Michaël Nève,
Mathieu Ciet |
XTR Implementation in Reconfigurable Hardware |
Nikhil Joshi, Kaijie Wu, Ramesh Karri |
Concurrent
Error Detection Schemes for Involution Ciphers |
||
12:10 - 13:40 | Lunch | ||
13:40 - 14:55 | Session 12: Authentication and
Signatures |
Marc Girault, David Lefranc |
Public Key Authentification
with one (on-line) Single Addition |
Peter J. Leadbitter,
Dan
Page, Nigel P. Smart |
Attacking
DSA under a Repeated Bits Assumption |
||
Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval |
How to Disembed a Program? |
||
14:55 - 15:00 | Best Paper Award(s) and Concluding Remarks |