CHES

Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005)

Edinburgh, Scotland
Monday Evening August 29th - Thursday September 1st, 2005
The Roxburghe Hotel
IACR
sponsored by IACR
[CHES 05][PROGRAM][CHES BANQUET][ACCEPTED PAPERS][ACCOMMODATIONS][TRANSPORT][EDINBURGH INFO]

Monday, August 29

Tuesday, August 30

Wednesday, August 31

Thursday, September 1


Program

Monday, August 29
Time Event
18:00-20:00 Registration at the Conference Hotel
19:00-21:00 Welcome Reception (wine, sandwich and canapés)

Tuesday, August 30
Time Event
  Session Authors Talk's Title
8:00 - ... Registration desk reopens
8:20 - 9:00 Tea, Coffee and Danish
9:00 - 9:15 Welcome to CHES 2005
9:15 - 10:30 Session 1:
Side Channels I
William Dupuy, Sébastien Kunz-Jacques
Resistance of Randomized Projective Coordinates Against Power Analysis
Dakshi Agrawal, Josyula R Rao,
Pankaj Rohatgi, Kai Schramm
Templates as Master Keys
Werner Schindler, Kerstin Lemke,
Christof Paar
A Stochastic Model for Differential Side Channel Cryptanalysis
10:30 - 11:00 Coffee break
11:00 - 12:00 Invited Talk Ross Anderson
University of Cambridge
What Identity Systems Can and Cannot Do
12:00- 12:50 Session 2: Arithmetic for Cryptanalysis
Jean-Sébastien Coron, David Lefranc,
Guillaume Poupard
A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis
P.J. Green, R. Noad, N.P. Smart
Further Hidden Markov Model Cryptanalysis
12:50 - 14:00 Buffet lunch in hotel quadrangle
14:00 - 15:15 Session 3:
Low
Resources
Johann Großschädl, Roberto M. Avanzi,
Erkay Sava
ş, Stefan Tillich
Energy-Efficient Software Implementation of Long Integer Modular Arithmetic
Katsuyuki Okeya, Tsuyoshi Takagi,
Camille Vuillaume
Short-Memory Scalar Multiplication on Koblitz Curves
David Hwang, Lejla Batina, Alireza Hodjat,
Bart Preneel, Ingrid Verbauwhede
Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051 microprocessor
15:15 - 15:45 Coffee break
15:45 - 17:00 Session 4: Special Purpose Hardware
Jens Franke, Thorsten Kleinjung,
Christof Paar, Jan Pelzl, Christine Priplata,
Colin Stahlke
SHARK - A Realizable Special Hardware Sieving Device for Factoring 1024-bit Integers
Willi Geiselmann, Adi Shamir,
Rainer Steinwandt, Eran Tromer
Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization
Marco Bucci, Raimondo Luzzi
Design of Testable Random Bit Generators
19:00 - 20:30 Dinner in Hotel's George Suite
21:00 - 22:30 Rump Session

Wednesday, August 31
Time Event
  Session Authors Talk's Title
8:30 - ... Registration desk opens
8:20 - 9:00 Tea, Coffee and Danish
09:00 - 10:15 Session 5: Hardware Attacks and Countermeasures I
Stefan Mangard, Norbert Pramstaller, Elisabeth Oswald
Successfully Attacking Masked AES Hardware Implementations
Thomas Popp, Stefan Mangard
Masked Dual-Rail Pre-Charge Logic: DPA-Resistance without Routing Constraints
Wieland Fischer, Berndt M. Gammel
Masking at Gate Level in the Presence of Glitches
10:15 - 10:45
Coffee Break
10:45 - 12:25
Session 6:
Arithmetic for Cryptography
Marcelo E. Kaihara, Naofumi Takagi
Bipartite Modular Multiplication
Laszlo Hars
Fast Truncated Multiplication and its Applications in Cryptography
Martin Seysen
Using an RSA accelerator for modular inversion
David Cyganski, Berk Sunar
Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite Rings
12:25 - 14:00
Buffet lunch in hotel quadrangle
14:00 - 15:15 Session 7:
Side Channel II (EM)
C.Gebotys, S.Ho, C.Tiu
EM Analysis of Rijndael and ECC on a Wireless Java-based PDA
Markus G. Kuhn
Security Limits for Compromising Emanations
Huiyun Li, Theodore Markettos,
Simon Moore

Security Evaluation Against Electromagnetic Analysis at Design Time
15:15 - 15:45 Coffee break
15:45 - 16:35 Session 8:
Side Channel III
Marc Joye, Pascal Paillier,
Berry Schoenmakers

On Second-Order Differential Power Analysis
Eric Peeters, François-Xavier Standaert, Nicolas Donckers,
Jean-Jacques Quisquater

Improved Higher-Order Side-Channel Attacks with FPGA Experiments
16:35 - 17:00 Session 9: Trusted Computing
Ulrich Kühn, Klaus Kursawe,
Stefan Lucks, Ahmad-Reza Sadeghi,
Christian Stüble

Secure Data Management in Trusted Computing
17:00 - 17:15 Break
17:15 - 18:45 Invited Talk Thomas Wille
Philips Semiconductors Inc
Scurity of Identification Products: How to Manage
19:30 - 23:00 Banquet at the Royal Museum (name badge required)

Thursday, September 1
Time Event
  Session Authors Talk's Title
8:30 - ... Registration desk opens
8:20 - 9:00 Tea, Coffee and Danish
09:00 - 10:00 Invited Talk Jim Ward
Trusted Computing Group and IBM
Trusted Computing in Embedded Systems
10:00 - 10:50 Session 10:
Hardware Attacks and Countermeasures II
Sergei Skorobogatov
Data Remanence in Flash Memory Devices
Kris Tiri, David Hwang, Alireza Hodjat,
Bo-Cheng Lai, Shenglin Yang,
Patrick Schaumont, Ingrid Verbauwhede
Prototype IC with WDDL and Differential Routing DPA Resistance Assessment
10:50 - 11:20 Coffee Break
11:20 - 12:10 Session 11:
Hardware Attacks and Countermeasures III
Daisuke Suzuki, Minoru Saeki,
Tetsuya Ichikawa

DPA Leakage Models for CMOS Logic Circuits
Sylvain Guilley, Philippe Hoogvorst,
Yves Mathieu, Renaud Pacalet

The "backend duplication" method
12:10 - 13:30 Buffet lunch in hotel quadrangle
13:30 - 14:20 Session 12:
Efficient Hardware I
P. Grabher, D. Page
Hardware Acceleration of the Tate Pairing in Characteristic Three
T. Kerins, W. P. Marnane, E. M. Popovici,
P.S.L.M. Barreto

Efficient hardware for the Tate pairing calculation in characteristic three
14:20 - 14:50 Coffee Break
14:50 - 15:40 Session 13:
Efficient Hardware II
T. Good and M. Benaissa
AES on FPGA from the fastest to the smallest
D. Canright A Very Compact S-box for AES
15:40 - 16:00 Best Paper Awards and Concluding Remarks

Note: Regular presentations are 25 minutes long including questions.



Last update: November 9th, 2005.